361 research outputs found

    Resource Allocation for Enhancing Offloading Security in NOMA-Enabled MEC Networks

    Get PDF
    This letter studies an uplink non-orthogonal multiple access (NOMA) enabled mobile-edge computing (MEC) network. Specifically, we focus on the practical design of secure offloading without knowing the eavesdropper’s channel state information. The aim is to maximize the minimum antieavesdropping ability (AEA) for uplink NOMA users subject to the worst-case secrecy rate requirements and limited transmission power budgets. The formulated problem is non-convex and difficult to be solved directly. In order to tackle this issue, we propose an efficient iterative algorithm by jointly designing the secrecy rate, local computing bits and power allocation. The local computing bits and the power allocation are derived in closed form. Numerical results are provided to demonstrate the efficiency of our proposed scheme in terms of AEA

    Joint Computation and Communication Cooperation for Mobile Edge Computing

    Full text link
    This paper proposes a novel joint computation and communication cooperation approach in mobile edge computing (MEC) systems, which enables user cooperation in both computation and communication for improving the MEC performance. In particular, we consider a basic three-node MEC system that consists of a user node, a helper node, and an access point (AP) node attached with an MEC server. We focus on the user's latency-constrained computation over a finite block, and develop a four-slot protocol for implementing the joint computation and communication cooperation. Under this setup, we jointly optimize the computation and communication resource allocation at both the user and the helper, so as to minimize their total energy consumption subject to the user's computation latency constraint. We provide the optimal solution to this problem. Numerical results show that the proposed joint cooperation approach significantly improves the computation capacity and the energy efficiency at the user and helper nodes, as compared to other benchmark schemes without such a joint design.Comment: 8 pages, 4 figure
    • …
    corecore