{"title":"基于NOMA和接入点选择的射频能量收集移动边缘计算网络安全方案","authors":"Van-Truong Truong, Dac-Binh Ha","doi":"10.1109/NICS51282.2020.9335833","DOIUrl":null,"url":null,"abstract":"In this paper, we study an RF energy harvesting mobile edge computing network where an energy-constrained user harvests the RF energy from the power station and of-floading its tasks to two access points based on non-orthogonal multiple access (NOMA). In particular, the user can offload its confidential tasks to the trusted access point, and nonconfidential tasks can be offload to both trusted and untrusted access points by using the harvested energy. We propose two protocols based on NOMA, non-access point selection (NAPS), and access point selection (APS) schemes, namely NOMA-NAPS and NOMA-APS. The closed-form exact expressions of successful computation probability (SCP) are derived to evaluate these proposed protocols' system performance. Numerical results are shown that the NOMA-APS protocol outperforms the NOMA-NAPS one. The Monte-Carlo simulation results also verify the correctness of our analysis.","PeriodicalId":308944,"journal":{"name":"2020 7th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Secured Scheme for RF Energy Harvesting Mobile Edge Computing Networks based on NOMA and Access Point Selection\",\"authors\":\"Van-Truong Truong, Dac-Binh Ha\",\"doi\":\"10.1109/NICS51282.2020.9335833\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we study an RF energy harvesting mobile edge computing network where an energy-constrained user harvests the RF energy from the power station and of-floading its tasks to two access points based on non-orthogonal multiple access (NOMA). In particular, the user can offload its confidential tasks to the trusted access point, and nonconfidential tasks can be offload to both trusted and untrusted access points by using the harvested energy. We propose two protocols based on NOMA, non-access point selection (NAPS), and access point selection (APS) schemes, namely NOMA-NAPS and NOMA-APS. The closed-form exact expressions of successful computation probability (SCP) are derived to evaluate these proposed protocols' system performance. Numerical results are shown that the NOMA-APS protocol outperforms the NOMA-NAPS one. The Monte-Carlo simulation results also verify the correctness of our analysis.\",\"PeriodicalId\":308944,\"journal\":{\"name\":\"2020 7th NAFOSTED Conference on Information and Computer Science (NICS)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 7th NAFOSTED Conference on Information and Computer Science (NICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NICS51282.2020.9335833\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 7th NAFOSTED Conference on Information and Computer Science (NICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NICS51282.2020.9335833","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secured Scheme for RF Energy Harvesting Mobile Edge Computing Networks based on NOMA and Access Point Selection
In this paper, we study an RF energy harvesting mobile edge computing network where an energy-constrained user harvests the RF energy from the power station and of-floading its tasks to two access points based on non-orthogonal multiple access (NOMA). In particular, the user can offload its confidential tasks to the trusted access point, and nonconfidential tasks can be offload to both trusted and untrusted access points by using the harvested energy. We propose two protocols based on NOMA, non-access point selection (NAPS), and access point selection (APS) schemes, namely NOMA-NAPS and NOMA-APS. The closed-form exact expressions of successful computation probability (SCP) are derived to evaluate these proposed protocols' system performance. Numerical results are shown that the NOMA-APS protocol outperforms the NOMA-NAPS one. The Monte-Carlo simulation results also verify the correctness of our analysis.