Conference PaperPDF Available

Secured Scheme for RF Energy Harvesting Mobile Edge Computing Networks based on NOMA and Access Point Selection

Authors:

Figures

Content may be subject to copyright.
Secured Scheme for RF Energy Harvesting Mobile
Edge Computing Networks based on NOMA and
Access Point Selection
Van-Truong Truong
Faculty of Electrical-Electronic Engineering
Duy Tan University
Da Nang, 550000, Vietnam
truongvantruong@dtu.edu.vn
Dac-Binh Ha
Faculty of Electrical-Electronic Engineering
Duy Tan University
Da Nang, 550000, Vietnam
hadacbinh@duytan.edu.vn
Abstract—In this paper, we study an RF energy harvesting
mobile edge computing network where an energy-constrained
user harvests the RF energy from the power station and of-
floading its tasks to two access points based on non-orthogonal
multiple access (NOMA). In particular, the user can offload
its confidential tasks to the trusted access point, and non-
confidential tasks can be offload to both trusted and untrusted
access points by using the harvested energy. We propose two
protocols based on NOMA, non-access point selection (NAPS),
and access point selection (APS) schemes, namely NOMA-NAPS
and NOMA-APS. The closed-form exact expressions of successful
computation probability (SCP) are derived to evaluate these
proposed protocols’ system performance. Numerical results are
shown that the NOMA-APS protocol outperforms the NOMA-
NAPS one. The Monte-Carlo simulation results also verify the
correctness of our analysis.
Index Terms—mobile edge computing, non-orthogonal multiple
access, access point selection, successful computation probability.
I. INTRODUCTION
With the rapid development of the Internet of Things (IoT),
many new applications and services with big data have been
inspired in practice. These new services and applications
contain intensive computation, which introduces a challenge to
system design, specifically in resource-constrained networks,
e.g., wireless sensor networks. In this kind of networks, the
computation ability of nodes is limited. To solve this challenge,
mobile edge computing (MEC) technique has been proposed,
in which the function of servers or access points moves
towards the network edge to support the intensive computation
needs of nodes [1]–[6].
Meantime, due to the energy-constrained battery and diver-
sity functions of wireless devices, the energy problem is also
another challenge on the device design. Several new energy
harvesting techniques have been proposed and deployed to
power the users, e.g., radio frequency energy, solar energy,
wind energy, thermal energy, magnetic energy, and so on. The
radio frequency energy harvesting (RF EH) is an emerging
technique that can prolong mobile devices’ lifetime and main-
tain the coverage of wireless networks [7]. The prior research
results have shown that the user computation performance can
be improved by integrating the RF EH technique into MEC
networks [3], [8]. Besides RF EH, the NOMA technique has
been recognized as a promising solution for future wireless
networks due to its ability to serve multiuser by using the
same time and frequency resources [9]–[11].
The combination of RF EH and NOMA techniques in MEC
networks is proposed in some prior works to improve the sys-
tem performance [8], [12]–[14]. In [12], three different modes
of the offloading scheme, namely the partial computation
offloading, the complete local computation, and the complete
offloading, were proposed for a NOMA MEC network. The
optimal solutions for an optimization problem to maximize
the successful computation probability were proposed by
jointly optimizing this considered scheme’s parameters. The
authors in [13] proposed a computation efficiency maximiza-
tion framework for wireless-powered MEC networks based on
uplink NOMA with partial and binary computation offloading
modes. The iterative and alternative optimization algorithms
were proposed to solve the computation efficiency non-convex
problem. In the work of [8], the efficient algorithms were
proposed to solve the weighted sum-energy minimization
problems under both cases with partial and binary offloading
for multi-antenna NOMA multiuser MEC system. The NOMA
MEC networks for both uplink and downlink transmissions
were studied in [14]. It is shown that the deployment of
NOMA can efficiently reduce the latency and energy con-
sumption of MEC offloading compared to their conventional
orthogonal multiple access approaches.
In this work, we consider the scenario that a user harvests
the RF energy from the power station and partially offloads
its tasks to two MEC access points, in which the confidential
task must be offloaded to the trusted access point by applying
downlink NOMA scheme. The main contributions of our paper
are as follows.
We propose two quadra-phase protocols for the con-
sidered mobile edge computing system based on the
downlink NOMA scheme, namely NOMA-NAPS and
NOMA-APS.
Accordingly, we derive the closed-form exact expressions
of successful computation probability for these protocols
to evaluate the system performance.
Numerical results are provided to investigate the impacts
of key parameters, i.e., transmit power, time switching ra-
tio, and power allocation ratio on the system performance
to verify these proposed protocols’ effectiveness.
The remainder of this paper is organized as follows. The
system model is described in Section II. Section III presents
the detailed derivations of the closed-form exact expression
of the successful computation probability used to analyze the
considered system performance. Section IV provides numeri-
cal results and discussions. Finally, Section V concludes the
paper.
II. SY ST EM MO DE L DESCRIPTION
We define the notations adopted in the next part of this work
in Table I.
TABLE I
NOTATIO NS
Notation Meaning
g0, g1, g2Channel power gains of the links P-U,U-AP1,U-
AP2
λiFading parameter of the links P-U,U-AP1,U-AP2
LLength of the task
L1Length of the confidential task
L2Length of the non-confidential task
αTime switching ratio
TTransmission block time
ηEnergy conversion efficiency
P0Transmit power of the power station
γ0Average transmit SNR
PTTransmit power of the user
ciNumber of required CPU cycles for each bit of APi
fiCPU-cycle frequency at the APi
bPower allocation ratio
BBandwidth
C1Channel capacity of link U-AP1
C2Channel capacity of link U-AP2
P rsSuccessful computation probability
Fig. 1 describes an RF energy harvesting mobile edge
computing network where an energy-constrained user (U)
harvests RF energy from a power station (P) and offloading
its tasks to two access points (APs). Due to the constraint of
latency requirement and its limited computation ability, Umay
not execute its tasks locally. Hence, it offloads its tasks to MEC
servers located at APs, which have a more strong computation
ability. In particular, Umust offload its confidential tasks to
the trusted AP, denote as AP1, and the non-confidential
tasks can be offloaded to both trusted and untrusted access
points, denote as AP2. Assuming that Uhas a number of
tasks with the same length of Lbits to be executed, each
task consists of L1-bit confidential subtask and L2-bit non-
confidential subtask (L1+L2=L) [15]–[17]. Thus, the L1-
bit confidential subtasks are designed to offloaded to AP1
to ensure the security requirement of this considered system.
Moreover, due to the limited battery problem, Uoffloads its
tasks by using all energy harvested from Pand by applying the
downlink NOMA scheme. Finally, APs return the computing
Fig. 1. System model for the RF EH NOMA MEC network
Fig. 2. Time flowchart of the considered RF EH NOMA MEC system
results to Uby uplink NOMA scheme. The entire protocol
can divide into four phases as the time flowchart depicted in
Fig. 2.
Assuming that all the channels have block Rayleigh fading,
i.e., the channel power gain is constant over each block
but vary independently between different blocks and follows
Rayleigh distribution. We also assume that P,U, and APs
are single antenna devices and operate in half-duplex mode.
Let gi,i {0,1,2}, denote the channel power gains of the
wireless links P-U,U-AP1and U-AP2, respectively
with gi CN(0, σ2). In this work, we propose two different
protocols for this considered system as follows.
A. NOMA-NAPS protocol
In this subsection, we describe the NOMA-NAPS protocol
as follows.
In the first phase (energy harvesting phase), Uharvests
energy from Pduring the duration of τ0=αT , where α
denotes the time switching ratio, i.e., 0< α < 1, and T
stands for transmission block time.
In the second phase (offloading phase), Uoffloads L1-bit
confidential subtasks to AP1and L2-bit non-confidential
subtasks to AP2by applying downlink NOMA scheme
during duration τ1.
In the third phase (computing phase), all offloaded tasks
are computed at the corresponding MEC APs during
duration τ2.
In the last phase (result returning phase): After successful
computation, the APs feedback the computed results to
Uwithin τ3. Here, the computed results are small, and it
means that τ3is very small compared to τ0,τ1, as well
as τ2and thus, is neglected [12], [13].
In a summary manner, the NOMA-NAPS protocol is proposed
for Uas Algorithm 1.
Algorithm 1 NOMA-NAPS Algorithm for U
1: Uharvests energy in duration of τ0=αT
2: dividing L-bit task into L1-bit subtask (Task 1) and L2-bit
subtask (Task 2)
3: applying NOMA, Uoffloads Task 1 to AP1and Task 2
to AP2
4: waiting for the computed results
5: download results from corresponding APs
B. NOMA-APS protocol
In this subsection, we present the NOMA-APS protocol as
follows.
The first phase (energy harvesting phase) is the same as
NOMA-NAPS protocol.
In the second phase (offloading phase), if channel of link
UAP1is better than of link UAP2then Uoffloads
whole task to AP1, else Uoffloads L1-bit confidential
subtasks to AP1and L2-bit non-confidential subtasks to
AP2by applying downlink NOMA scheme.
The third phase (computing phase) is the same as the
NOMA-NAPS protocol.
In the last phase (result returning phase) is the same as
the NOMA-NAPS protocol.
In a summary manner, the NOMA-APS protocol is proposed
for Uas Algorithm 2.
Algorithm 2 NOMA-APS Algorithm for U
1: Uharvests energy in duration of τ0=αT
2: procedure SELE CT IO N(AP1,AP2)
3: if g1> g2then AP1selected
4: Uoffloads L-bit task to AP1
5: goto 11
6: else divide L-bit task into L1-bit subtask (Task 1) and
L2-bit subtask (Task 2)
7: applying NOMA, Uoffloads Task 1 to AP1and Task
2 to AP2
8: goto 11
9: end if
10: waiting for the computed results
11: download results from corresponding APs
During the energy harvesting phase, the harvested energy
of Uis obtained by
Eh=ηP0g0αT , (1)
where 0< η 1stands for the energy conversion efficiency
of the energy receiver [18], P0denotes the transmit power of
P. The transmit power PTcalculated as follows
PT=Eh
(1 α)Tτ=aP0g0,(2)
where a
=ηαT
(1α)Tτ,τ= max{τ21, τ22 }in which τ2iis the
computing time for Li-bit at APi,i {1,2}.τ2iis defined as
follows:
τ2i=ciLi
fi
,(3)
where cistands for the number of required CPU cycles for
each bit of APi, and fidenotes the CPU-cycle frequency at
the APi,i {1,2}.
During the offloading phase, when applying NOMA, U
transmits superimposed signal
x=bs1+p(1 b)s2,(4)
to APs, where s1and s2are the data messages corresponding
to L1-bit and L2-bit subtasks, respectively; bstands for the
power allocation coefficient. Due to the priority for the trusted
AP1, we assume that the transmit power is allocated to AP1
more than AP2, thus bis selected to satisfy the condition 0.5<
b < 1to apply NOMA scheme.
The i.i.d. quasi-static Rayleigh channel power gains gi,
i {0,1,2}, follows exponential distributions with parameters
λi. Therefore, the cumulative density function (CDF) and
probability density function (PDF) of gi(i= 0,1,2) are
respectively given by
Fgi(x)=1ex
λi,(5)
fgi(x) = 1
λi
ex
λi.(6)
III. PERFORMANCE ANALYSIS
In this section, we present the performance analysis of this
proposed MEC system in terms of successful computation
probability. The successful computation probability, namely
P rs, is defined as the probability that all tasks are successfully
executed within a given time T > 0. For this proposed system,
P rsis expressed as
P rs= Pr [τ1+τ(1 α)T].(7)
In order to evaluate the performance of this considered MEC
system, we obtain the following theorems.
Theorem 1: Under quasi-static Rayleigh fading, the closed-
form exact expression of the successful computation proba-
bility P rN AP S
sfor this considered MEC system based on the
proposed NOMA-NAPS scheme is given by
P rN AP S
s=(0,if b < ρ
uK1(u),if b > ρ (8)
where u= 2r1
λ0β1
λ1+β2
λ2,β1=
2
L1
(1α)B11
0"b(1b) 2
L1
(1α)B11!#,β2=2
L2
(1α)B21
a(1b)γ0,
1= (1 α)Tc1L1
f1,2= (1 α)Tc2L2
f2,
ρ= 1 1
2
L1
(1α)Ω1B
, and Kν(.)is the modified Bessel
function of the second kind and νth order.
Proof. See in Appendix A.
Theorem 2: Under quasi-static Rayleigh fading, the closed-
form exact expression of the successful computation proba-
bility P rAP S
sfor this considered MEC system based on the
proposed NOMA-APS scheme is given by
P rAP S
s=
v0Kν(v0)λ2
(λ1+λ2)v1Kν(v1),if b < ρ
v0Kν(v0)λ2
(λ1+λ2)v1Kν(v1)+
v2Kν(v2)λ1
(λ1+λ2)v3Kν(v3),if b > ρ
(9)
where v0= 2qβ
λ0λ1,v1= 2qβ(λ1+λ2)
λ0λ1λ2,v2=
2r1
λ0β1
λ1+β2
λ2,v3= 2qβ2(λ1+λ2)
λ0λ1λ2,β=2
L
(1α)B1
0,
= (1 α)Tc1L
f1.
Proof. See in Appendix B.
IV. NUMERICAL RESULTS AND DISCUSSION
In this section, we provide numerical results in terms
of the successful computation probability. The Monte-Carlo
simulations are also used to verify the analytical results. The
parameters to consider are introduced in Table II.
TABLE II
SIMULATION PARAMETERS
Parameters Notation Typical Values
Environment Rayleigh
Fading parameter λ0,λ1,λ21
Number of antennas of APs 1
Average transmit SNR γ00-30 dB
Energy conversion efficiency η0.75
CPU-cycle frequency of APsf1, f25 GHz
The number of CPU cycles for each bit c1,c210
Channel bandwidth B100 MHz
The threshold of latency T0.5s
The length of confidential task L132 Mbits
The length of non-confidential task L248 Mbits
In Figs. 3 and 4, we examine the effect of average transmit
SNR and time switching ratio on system performance in terms
of P rs. From these figures, we can see that when the transmit
power increases, P rsincreases. It means that the increase of
transmit power can improve system performance. Meanwhile,
the variation of P rsis not the same, specifically, when α
increases from 0 to 1, P rsincreases to the highest value and
then decreases to 0. It means that there exists an optimal value
of α, called α, making P rsto achieve the optimal value.
Similarly, in Figs. 5 and 6, we examine the effect of
average transmit SNR and power allocation ratio on system
performance in terms of P rs. From these figures, we also
see that the increase in transmit power can improve system
performance. Meanwhile, when the power allocation ratio b
increases from 0.5 to 1, P rsincreases to the highest value,
and then degrades. It means that there exists an optimal value
of b, called b, making P rsto achieve the optimal value.
From the above figures 3-6, we can conclude that the
NOMA-APS protocol outperforms the NOMA-NAPS one in
terms of successful computation probability. Finally, we also
Fig. 3. P rsvs. the average transmit SNR with different values of α
Fig. 4. P rsvs. the time switching ratio with different values of γ0
observe from these figures that the analysis and simulation
results are very good matching. This has verified the accuracy
of our analysis.
V. CONCLUSION
In this paper, we proposed two quadra-phase protocols,
namely NOMA-NAPS and NOMA-APS, for the RF energy
harvesting mobile edge computing system based on downlink
NOMA scheme. Accordingly, we have derived the closed-form
exact expressions of successful computation probability for
these protocols to evaluate the system performance. Finally,
the numerical results are provided to investigate the impacts
of key parameters, i.e., transmit power, time switching ratio,
and power allocation ratio on the system performance to verify
the effectiveness of these proposed protocols. The numerical
results have shown that the NOMA-APS protocol outperforms
Fig. 5. P rsvs. the average transmit SNR with different values of b
Fig. 6. P rsvs. the power allocation ratio with different values of γ0
the NOMA-NAPS one in terms of successful computation
probability.
APPENDIX A
PROO F OF TH EO RE M 1
This appendix provides the detailed proof for Theorem 1.
From equation (7), we derive the closed-form expression of
P rN AP S
sas (A-1) at the top of the next page. This ends our
proof of Theorem 1.
APPENDIX B
PROO F OF TH EO RE M 2
This appendix provides the detailed proof for Theorem 2.
P rAP S
sis calculated as follows.
P rAP S
s= Pr g1> g2, C > L
| {z }
P1
+ Pr g1< g2, C1>L1
1
, C2>L2
2
| {z }
P2
,
(10)
where Cdenotes the channel capacities of link U-AP1.P1
and P2are calculated as (B-1) at the top of the next page.
This ends our proof of Theorem 2.
REFERENCES
[1] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey
on mobile edge computing: The communication perspective, IEEE
Communications Survey Tutorials, vol. 19, no. 4, pp. 2322–2358, 2017.
[2] S. Chen, H. Wen, J. Wu, A. Xu, Y. Jiang, H. Song, and Y. Chen,
“Radio frequency fingerprint-based intelligent mobile edge computing
for internet of things authentication,” Sensors, vol. 19, no. 16, p. 3610,
2019.
[3] F. Zhou, Y. Wu, R. Q. Hu, and Y. Qian, “Computation rate maximization
in UAV-enabled wireless powered mobile-edge computing systems,”
IEEE Journal on Selected Areas in Communications, vol. 36, no. 9,
pp. 1927–1941, 2018.
[4] H. Sun, F. Zhou, and R. Q. Hu, “Joint offloading and computation
energy efficiency maximization in a mobile edge computing system,
IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 3052–
3056, 2019.
[5] Y. Zhang, X. Lan, Y. Li, L. Cai, and J. Pan, “Efficient computation
resource management in mobile edge-cloud computing,” IEEE Internet
of Things Journal, vol. 6, no. 2, pp. 3455–3466, 2019.
[6] Q. Li, J. Zhao, and Y. Gong, “Computation offloading and resource
allocation for mobile edge computing with multiple access points,” IET
Communications, vol. 13, no. 17, pp. 2668–2677, 2019.
[7] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks
with RF energy harvesting: A contemporary survey,” IEEE Communi-
cations Surveys and Tutorials, 17(2), pp. 757–789, 2014.
[8] F. Wang and X. Zhang, “Dynamic computation offloading and resource
allocation over mobile edge computing networks with energy harvest-
ing capability, in IEEE International Conference on Communications
(ICC), Kansas City, MO, USA, May 2018.
[9] D.-B. Ha and Q. S. Nguyen, “Outage performance of energy harvesting
DF relaying NOMA networks,” Mobile Networks and Applications,
2017.
[10] D.-D. Tran, H.-V. Tran, D.-B. Ha, and G. Kaddoum, “Cooperation in
NOMA networks under limited user-to-user communications: Solution
and analysis,” in IEEE Wireless Communications and Networking Con-
ference (WCNC), 15-18/4/2018, Barcelona, Spain.
[11] D.-D. Tran and D.-B. Ha, “Secrecy performance analysis of QoS-based
non-orthogonal multiple access networks over nakagami-m fading, in
The International Conference on Recent Advances in Signal Processing,
Telecommunications and Computing (SigTelCom), HCMC, Vietnam,
2018.
[12] Y. Ye, G. Lu, R. Q. Hu, and L. Shi, “On the performance and optimiza-
tion for MEC networks using uplink NOMA,” in IEEE International
Conference on Communications Workshops (ICC Workshops), Shanghai,
China, 2019.
[13] F. Zhou, Y. Wu, R. Q. Hu, and Y. Qian, “Computation efficiency in
a wireless-powered mobile edge computing network with NOMA, in
IEEE International Conference on Communications (ICC), Shanghai,
China, 20-24 May 2019, 2019.
P rN AP S
s= Pr L1
C1
+c1L1
f1(1 α)T, L2
C2
+c2L2
f2(1 α)T
= Pr (1 α)Blog21 + abγ0g0g1
a(1 b)γ0g0g1+ 1>L1
1
,(1 α)Blog2[1 + a(1 b)γ0g0g2]>L2
2
=(0,if b<ρ
R
0h1Fg1β1
xih1Fg2β2
xifg0(x)dy, if b>ρ
=
0,if b < ρ
2r1
λ0β1
λ1+β2
λ2K12r1
λ0β1
λ1+β2
λ2,if b > ρ
(A-1)
where C1and C2denote the channel capacities of link U-AP1and U-AP2, respectively, Bis the channel bandwidth,
γ0
=P0
σ2is the average transmit signal-to-noise ratio (SNR).
P1= Pr g1> g2, g0g1>2L
(1α)B1
0!= Pr g1> g2, g1>β
g0=Z
0Z
β
y
Fg2(x)fg1(x)fg0(y)dxdy
(a)
= 2rβ
λ0λ1K1 2rβ
λ0λ1!2λ2
(λ1+λ2)sβ(λ1+λ2)
λ0λ1λ2K1
2sβ(λ1+λ2)
λ0λ1λ2
.
P2=(0,if b<ρ
Pr g1< g2, g1>β1
g0, g2>β2
g0,if b>ρ
=(0,if b<ρ
R
0R
β2
yhFg1(x)Fg1β1
yifg2(x)fg0(y)dxdy, if b>ρ
(b)
=
0,if b < ρ
2r1
λ0β1
λ1+β2
λ2K12r1
λ0β1
λ1+β2
λ22λ1
(λ1+λ2)qβ2(λ1+λ2)
λ0λ1λ2K12qβ2(λ1+λ2)
λ0λ1λ2,if b > ρ
(B-1)
where step (a) and (b) are obtained by substituting (5) and (6) into the integrals.
[14] Z. Ding, P. Fan, and H. V. Poor, “Impact of non-orthogonal multiple
access on the offloading of mobile edge computing,” IEEE Trans.
Commun., vol. 67, no. 1, pp. 375–390, 2019.
[15] Y. Ye, R. Q. Hu, G. Lu, and L. Shi, “Enhance latency-constrained
computation in mec networks using uplink noma,” IEEE Transactions
on Communications, vol. 68, no. 4, pp. 2409–2425, 2020.
[16] L. P. Qian, B. Shi, Y. Wu, B. Sun, and D. H. Tsang, “Noma-enabled
mobile edge computing for internet of things via joint communication
and computation resource allocations,” IEEE Internet of Things Journal,
vol. 7, no. 1, pp. 718–733, 2019.
[17] F. Fang, K. Wang, and Z. Ding, “Optimal task assignment and power
allocation for downlink noma mec networks, in 2019 IEEE Globecom
Workshops (GC Wkshps). IEEE, 2019, pp. 1–6.
[18] D.-B. Ha, D.-D. Tran, V. Tran-Ha, and E.-K. Hong, “Performance
of amplify-and-forward relaying with wireless power transfer over
dissimilar channels,” Elektronika ir Elektrotechnika Journal, vol. 21, no.
5, pp. 90–95, 2015.
... Power allocation coefficients should be optimized for CRN using NOMA to maximize the throughput [14][15][16]. NOMA with energy harvesting was studied in [17][18][19]. The physical layer security of NOMA with energy harvesting was derived in [19]. ...
... NOMA with energy harvesting was studied in [17][18][19]. The physical layer security of NOMA with energy harvesting was derived in [19]. However, harvesting duration was not optimized in [17][18][19]. ...
... The physical layer security of NOMA with energy harvesting was derived in [19]. However, harvesting duration was not optimized in [17][18][19]. Optimal power allocation for NOMA networks was suggested in [20,21]. The proposed optimal harvesting and sensing durations with respect to [22][23][24]. ...
Article
Full-text available
In this article, users’ powers, harvesting, and sensing durations are optimized for interweave cognitive radio networks using Non-Orthogonal Multiple Access (NOMA). In the first slot, the secondary source harvests energy using the received signal from node H during \(\beta T\) seconds where \(0<\beta <1\) is the harvesting duration percentage and T is frame duration. In the second slot, the secondary source senses the channel during \((1-\beta )\nu T\) seconds to detect primary source activity using the energy detector. When the primary node is idle, the secondary source transmits data to N NOMA secondary users during \((1-\beta )(1-\nu ) T\) seconds. Users’ powers, harvesting \(\beta \) and sensing durations \(\nu \) were not yet optimized for interweave cognitive radio networks using NOMA to maximize the throughput. We derive the outage probability at each user in order to compute and optimize the throughput using the alternating maximization algorithm. Two strategies are considered for users’ ranking based on the instantaneous or the average power of channel gains. Optimal harvesting and sensing durations with optimal power allocation offer up to 7.8 dB gain with respect to using the same durations for energy harvesting and spectrum sensing. Joint optimization of harvesting and sensing durations offers up to 5 dB gain with respect to optimizing either the sensing or the harvesting durations as proposed in the literature.
... Thus, to realize MEC, not only aspects of the device's computing capability to be considered, but the communication process between devices also plays a critical role and should be taken into account [18]. Non-orthogonal multiple access (NOMA) techniques can combine with MEC to improve throughput, reduce latency, and save energy in RAN [19][20][21][22]. ...
... We use successful computation probability (SCP) to evaluate system performance [11,12,[16][17][18]. SCP is defined as the probability that all tasks at the CU s are calculated successfully within the allowable delay time T . ...
Preprint
Full-text available
Recent years have witnessed the process of computing gradually move to the edge network, where it is close to the physical data source, to serve applications that require large computations with very little latency. However, the terminal wireless devices’ limited computing and energy resources pose obstacles to the practical implementation of these applications. Mobile Edge Computing (MEC) based non-orthogonal multiple access (NOMA) technology is solving this problem well thanks to its ability to serve many users with high data rates and spectrum utilization efficiency. This study investigates the performance and optimization of MEC surveillance systems using NOMA. Specifically, two camera units (CUs) perform the monitoring task to be accomplished by the MEC access point (AP) through Rayleigh fading wireless links. We then proposed the four-phase protocol for this system. Accordingly, we derive the closed-form exact expressions of the successful computation probability (SCP), and study the impact of the network parameters on the system performance. Furthermore, we propose and compare three meta-heuristic-based algorithms, namely MSCP-GA, MSCP-PSO, and MSCP-HGAPSO, to find the optimal parameters set to help the proposed system achieve the maximum SCP. The results show that the proposed algorithms can significantly improve the system's performance by 40% higher than when the optimal algorithm is not used. Insights on the pros and cons of different algorithms are also discussed in this study. Finally, we use the Monte-Carlo simulation to verify the correctness of this study.
... As a result, these wireless devices can still work well in environments that cannot be powered by the grid or replace the battery due to security constraints, difficult terrain, or high maintenance costs [15]. Studies in [16,17] have proven that the integration of RF EH into wireless networks ensures an active power source for devices, thereby improving system performance. ...
... Assuming that all the channels have block Rayleigh fading, i.e., the channel power gain is constant over each block but vary independently between different blocks and follows exponential distribution with parameter λ [17,18]. We also assume that all devices operate in half-duplex mode and all harvested energy is used for their transmission. ...
Article
Full-text available
In this paper, we study the physical layer security (PLS) of a radio frequency energy harvesting (RF EH) non-orthogonal multiple access (NOMA) relaying network where relay-user selection scheme and secrecy performance optimization are investigated. Specifically, we consider a scenario, where the energy-constrained users from two different user clusters harvest RF energy from the selected relay to transmit their messages to a destination with the help of a relay cluster in the presence of a passive eavesdropper. To enhance the PLS performance of the considered system, we propose a relay and user selection scheme and an optimal algorithm to find the best system parameter set including time switching ratio and power allocation ratio, which can bring the best secrecy performance for the system. Accordingly, to evaluate the secrecy performance, the closed-form expressions of secrecy outage probability are derived. Moreover, the impacts of the network parameters on the secrecy performance are investigated to achieve more insight into the behavior of NOMA relaying network with RF EH. Finally, the accuracy of our analysis is verified by Monte-Carlo simulation results.
Chapter
In this study, we investigate the security offloading scenario in the NOMA heterogeneous mobile edge computing (Het-MEC) network over the Rayleigh fading channel. Specifically, we propose a system model consisting of an edge user and a pair of MEC access points, in which the user offloads its task to these heterogeneous wireless access points in the presence of a passive eavesdropper. Accordingly, we propose a four-phase secure offloading protocol based on NOMA (SONOMA) to ensure system security. Next, we derive the closed-form expression for the system performance metric: the secrecy successful computation probability (SSCP). The numerical results illustrate the effects of essential system parameters such as the average transmit power, power allocation coefficient, bandwidth, CPU frequency, and the task length of SONOMA. The Monte-Carlo simulation has verified the correctness of our study.
Chapter
This paper studies a security offloading scheme in radio frequency energy harvesting (RF EH) non-orthogonal multiple access (NOMA) enabled heterogeneous mobile edge computing (Het-MEC) network over Rayleigh fading channel. Specifically, we investigate the model of a single mobile user (MU) offloading tasks to Het-MEC servers located at neighboring access points (APs) in the presence of a passive eavesdropper. In addition, the MU collects radio energy from a power station to ensure power throughout the offloading process. Accordingly, a four-phase energy-secrecy-offloading scheme is proposed under latency constraint, namely NOLES. We derive the exact close-form secrecy successful computation probability (SSCP) to evaluate the system performance. Numerical results under the Monte-Carlo simulation demonstrate the effective performance of our proposed framework.
Chapter
Mobile edge computing (MEC) is an emerging cloud computing trend that enables terminal users with limited computing ability to offload their tasks to the edge servers. In this paper, we study the performance of the MEC system using non-orthogonal multiple access (NOMA) and radio frequency energy harvesting techniques (RF EH). Specifically, a user harvests energy from a hybrid access point (HAP) and offloads tasks to the edge servers using the NOMA scheme over wireless channels. The protocol, specifically NOMA-MEC, is proposed for this considered system, and the closed-form expression of successful computation probability (SCP) is derived to evaluate the system performance. In addition, an OMA-based reference protocol, namely OMA-MEC, was used to compare with the proposed solution. The numerical results show the superior performance of NOMA-MEC over OMA-MEC in terms of SCP. Furthermore, system behaviors were clarified by investigating SCP using Monte-Carlo simulation through critical parameters such as time switching ratio, power allocation coefficient, task length, and transmit power.
Article
Recent years have witnessed the computing process gradually move to the edge network, close to the physical data source, to serve applications that require large computations with very little latency. However, the terminal wireless devices’ limited computing and energy resources pose obstacles to the practical implementation of these applications. Mobile Edge Computing (MEC) based non-orthogonal multiple access (NOMA) technology is solving this problem well thanks to its ability to serve many users with high data rates and spectrum utilization efficiency. This study investigates the performance and optimization of MEC surveillance systems using NOMA. Specifically, two camera units (CUs) perform the monitoring task to be accomplished by the MEC access point (AP) through Rayleigh fading wireless links. We then proposed the four-phase protocol for this system. Accordingly, we derive the closed-form exact expressions of the successful computation probability (SCP) and study the impact of the network parameters on the system performance. Furthermore, we propose and compare three meta-heuristic-based algorithms, namely MSCP-GA, MSCP-PSO, and MSCP-HGAPSO, to find the optimal parameters set to help the proposed system achieve the maximum SCP. The results show that the proposed algorithms can significantly improve the system’s performance by 40% higher than when the optimal algorithm is not used. Insights into the pros and cons of different algorithms are also discussed in this study. Finally, we use the Monte-Carlo simulation to verify the correctness of this study.
Article
Mobile edge computing (MEC) raises the problem of selfish user devices that utilize less computing resources than expected to execute offloading tasks or maliciously discard computation tasks. However, most of the existing work either focused on the task offloading or concentrated on the trust mechanism in MEC systems. By jointly considering the two challenges, in this paper, we propose a selfish-aware and learning-aided computation offloading scheme for edge-cloud collaboration network. Specifically, we first design a selfishness evaluation mechanism to evaluate the selfishness of the user devices based on the historical interaction records of the edge-cloud collaboration network. Then, we construct the task offloading model which introduces the selfishness evaluation mechanism to suppress the selfish user devices. On this basis, we further formalize the selfish-aware task offloading as an optimization problem of the weighted sum of time latency and energy consumption. Thereafter, we take one step further formalizing the optimization problem as a Markov Decision Process (MDP), and design a task offloading algorithm based on deep reinforcement learning (DRL) to find the optimized task offloading decision. The simulation results demonstrate that our work can decrease the time latency and energy consumption as well as suppress the selfish user devices.
Chapter
This paper considers the efficient offloading and computation design for radio frequency energy harvesting (RF EH) uplink non-orthogonal multiple access (NOMA) industrial Internet of Thing (IIoT) network. Specifically, the system contains multiple energy-constrained devices classified into two clusters and a MEC server deployed in a wireless access point (AP). We propose a four-phase communication protocol, namely EOCD, consisting of EH, task offloading, task computation, and information feedback transmission. Cluster head (CH) scheme is applied based on the channel information state to harvest RF energy from the AP in the first phase. In the second phase, CHs offload their workload to the AP using NOMA. The AP decodes the information signal and supports the computation of offload tasks in the third phase. Finally, AP feedbacks the result to each CH. Accordingly, we derive the closed-form expressions for the successful computation probability (SCP) of the considered system and CHs. We use Monte Carlo simulations to verify the results of the mathematical analysis. The numerical results demonstrate the effects of critical system parameters such as the time switching ratio, the transmit power, the number of devices in the cluster, and the task length of our proposed EOCD scheme compared to the conventional orthogonal multiple access (OMA) schemes.
Article
Full-text available
Non-orthogonal multiple access (NOMA) based mobile edge computing (MEC) networks can enhance delay-constrained computation. Most of the existing works focus on the energy or delay minimization, and the study on NOMA based MEC in terms of successful computation probability has been limited, which motivates this work. In particular, randomly deployed edge computing users are modeled as the homogeneous Poisson Point Process and are divided into two groups namely center group (C-group) and edge group (E-group) for uplink NOMA grouping. We propose a new hybrid offloading scheme in a NOMA-based MEC network that can operate in three different modes, namely partial offloading, complete local computation, and complete offloading. We firstly consider a NOMA grouping scenario where a user from the C-group and a user from the E-group are each given a fixed location. The probability that the computation can be completed within the given delay budget is derived and the optimal parameters, i.e., the time for offloading, the power allocation, and the offloading ratios for the two fixed users, are obtained. It reveals that the optimal offloading ratios are determined by the difference of the computational capability between the edge computing user and the MEC server, and that the locations of users have a big impact on the successful computation probability. Inspired by this, we further study three distance-dependent NOMA grouping schemes in the MEC offloading. Specifically, we provide closed-form mathematical expressions of the successful computation probability and its partial optimal solutions for these three schemes. Simulation results verify the accuracy of the analytical results and compare the performance of the proposed offloading scheme with the existing schemes. Insights on the pros and the cons of different user selection schemes are also provided. Index Terms Non-orthogonal multiple access based mobile edge computing, offloading scheme, successful computation probability, grouping schemes.
Article
Full-text available
In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that combines with a two-layer model is proposed to realize authentications for a large number of resource-constrained terminals under the mobile edge computing (MEC) scenario without relying on encryption-based methods. In the first layer, signal collection, extraction of RF fingerprint features, dynamic feature database storage, and access authentication decision are carried out by the MEC devices. In the second layer, learning features, generating decision models, and implementing machine learning algorithms for recognition are performed by the remote cloud. By this means, the authentication rate can be improved by taking advantage of the machine-learning training methods and computing resource support of the cloud. Extensive simulations are performed under the IoT application scenario. The results show that the novel method can achieve higher recognition rate than that of traditional RFFID method by using wavelet feature effectively, which demonstrates the efficiency of our proposed method.
Article
Full-text available
Mobile edge computing (MEC) is an innovative computing paradigm to enhance the computing capacity of mobile devices (MDs) by offloading computation-intensive tasks to MEC servers. With the widespread deployment of wireless local area networks, each MD can offload computation task to server via multiple wireless access points (WAPs). However, computation offloading can bring a higher system cost if all users select the same access points to offload their tasks. This study proposes a computation offloading strategy and resource allocation optimisation scheme in a multiple wireless access points network with MEC, which aims to minimise the system cost by providing the optimal computation offloading strategy, transmission power allocation, bandwidth assignment, and computation resource scheduling. The proposed scheme decouples the optimisation problem into subproblems of offloading strategy and resource allocation since the problem is NP-hard. The offloading strategy involves the optimal access point selection, which is analysed by the potential game. The resource allocation is obtained using Lagrange multiplier. The authors' analysis and simulation results verify the convergence performance of the proposed scheme, and the proposed scheme outperforms the simple resource allocation scheme and the offloading strategy optimisation scheme in terms of the system cost.
Article
Full-text available
This paper proposes a new algorithm to evaluate the performance of the mobile edge computing system. Specifically, a new metric called computation efficiency, which is defined as the number of calculated data bits divided by the corresponding energy consumption, is defined. In order to compute the required data timely, we combine two schemes, local computing and data offloading, into a joint computation algorithm. An optimization problem is formulated with the objective to maximize the sum of user computation efficiency with weighting factors. With iterative and gradient descent method, the problem can be solved efficiently. Simulation results show that the proposed scheme outperforms the traditional approaches. In addition, the trade off study between local computing and data offloading reveals that when data size is small, local computing plays a more important and when the size grows, data offloading becomes preferable.
Article
The past decades have witnessed an explosive growth of Internet of Things (IoT) services requiring intensive computation-resources. Conventional IoT devices, however, are usually equipped with very limited computation-resources, which results in degraded quality of experience when executing the resource-hungry applications. Mobile edge computing (MEC), which enables smart terminals (STs) to offload parts of their computation-workloads to the edge-servers located at cellular base stations (BSs), has provided a promising approach to address this issue. In this paper, we investigate the non-orthogonal multiple access (NOMA) enabled multi-access MEC. Specifically, by exploiting the advanced NOMA, an ST can simultaneously offload its computation-workloads to different edge servers (ESs), which thus reduces the overall-delay in completing the ST’s computation-workloads. To study this problem, we formulate a joint optimization of the computation-resource allocations at the ESs, the ST’s offloaded workloads and its radio resource allocations for NOMA-transmission, with the objective of minimizing a system-wise cost that accounts for the overall-delay in finishing the ST’s total computation-workload and the total computation-resource usage cost at the ESs. Despite the non-convexity of the joint optimization problem, we exploit its layered structure and propose an efficient layered-algorithm to find the optimal solution. By exploiting the optimal offloading solution of a single ST, we further investigate the scenario of multiple STs and propose two algorithms to determine the optimal grouping among different ESs for serving the STs, with one algorithm aiming at minimizing the total cost of all STs and the other algorithm aiming at determining the Nash-stable grouping for the ESs. Numerical results are presented to validate the effectiveness of our proposed algorithms and show the performance gain of our proposed NOMA-enabled multi-access computation offloading.
Article
We study the computation resource management problem in mobile edge-cloud computing networks. Mobile edge servers shall first satisfy the computation requirements of mobile users and IoT devices, and then wholesale redundant computation resources to the cloud networks to maximize their profit. Due to the coarse time granularity of wholesales, computation resource buyback may happen occasionally to deal with traffic bursts. Thus, the mobile edge servers need to make a tradeoff between the wholesale profit and the buyback cost. In this paper, the computation resource management problem is modeled as profit maximization. To solve this problem, we first analyze the relationship among the reserved computation resources, the computation tasks of mobile users and IoT devices, and the buyback cost. Then, we design an efficient wholesale scheme to determine the amount of the wholesaled computation resources, by which the total expected profit of the mobile edge server can be maximized. Given the reserved computation resources, we also propose a fast-convergent realtime buyback scheme for mobile edge servers to minimize the buyback cost. Finally, the simulation results show that our proposed efficient wholesale and buyback scheme (EWBS) can increase the total profit while guaranteeing the computation delay of all the computation tasks, especially when the computation workloads are time-varying.