Secrecy Performance Analysis and Optimization for UAV-Relay-Enabled WPT and Cooperative NOMA MEC in IoT Networks

被引:6
|
作者
Nguyen, Anh-Nhat [1 ,2 ]
Ha, Dac-Binh [3 ]
Truong, Truong Van [3 ]
Vo, Van Nhan [4 ,5 ]
Sanguanpong, Surasak [6 ]
So-In, Chakchai [1 ]
机构
[1] Khon Kaen Univ, Coll Comp, Dept Comp Sci, Appl Network Technol ANT, Khon Kaen 40002, Thailand
[2] FPT Univ, Dept Informat & Commun, Hanoi 10000, Vietnam
[3] Duy Tan Univ, Fac Elect & Elect Engn, Da Nang 550000, Vietnam
[4] Duy Tan Univ, Fac Informat Technol, Da Nang 550000, Vietnam
[5] Duy Tan Univ, Inst Res & Dev, Da Nang 550000, Vietnam
[6] Kasetsart Univ, Fac Engn, Dept Comp Engn, Bangkok 10900, Thailand
关键词
Internet of Things; unmanned aerial vehicles; energy harvesting; wireless power transfer; non-orthogonal multiple access; mobile edge computing; physical layer security; NONORTHOGONAL MULTIPLE-ACCESS; PHYSICAL LAYER SECURITY; SWIPT NETWORKS; POWER; COMMUNICATION; MAXIMIZATION; ALLOCATION; SYSTEMS; DESIGN; USERS;
D O I
10.1109/ACCESS.2023.3331752
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates a system for unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) and non-orthogonal multiple access (NOMA) mobile edge computing (MEC) in the Internet of Things (IoT) -UWNMI, wherein a UAV equipped with an energy transmitter (ET) acts as a relay. In particular, we consider a situation involving two clusters of IoT devices (IDs) that have limited resources and therefore are unable to compute their own tasks and must instead offload them to a base station (BS) via the UAV relay (UR) in the presence of a passive eavesdropper. In the UWNMI system, the effects of imperfect channel state information (ICSI) and imperfect successive interference cancellation (ISIC) are considered, along with the usage of artificial noise (AN) to improve the physical layer security (PLS) of the system. We derive closed-form expressions for the successful computation probability (SCP) and secrecy outage probability (SOP) under the Nakagami-m fading channel model in order to evaluate the performance of the system. Moreover, we present optimization problems with the objectives of optimizing the position and height of the UR, the time switching ratio (TSR), and the power allocation for the AN in order to maximize the SCP and minimize the SOP. These problems are solved using a particle swarm optimization (PSO)-based algorithm. In addition, Monte Carlo simulation results are presented to validate the accuracy of our analysis based on simulations of the system performance under different values of the system parameters, including the number of antennas at the BS, the number of IDs in each cluster, the TSR, and the position and height of the UR.
引用
收藏
页码:127800 / 127816
页数:17
相关论文
共 50 条
  • [21] Secrecy Offloading Analysis of NOMA-based UAVaided MEC in IoT Networks with Imperfect CSI and SIC
    Nguyen, Anh-Nhat
    Ngo, Tung-Son
    Bui, Ngoc-Anh
    Le, Phuong-Chi
    Hoang, Manh-Duc
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2025, 12 (01):
  • [22] Performance analysis and optimization for cellular two-way relay networks with cooperative NOMA transmission
    Fang, Zhaoxi
    Lu, Yingzhi
    Fan, En
    Hu, Keli
    Zhou, Haiping
    ICT EXPRESS, 2023, 9 (04): : 614 - 618
  • [23] Secrecy Analysis for Cooperative NOMA Networks With Multi-Antenna Full-Duplex Relay
    Cao, Yang
    Zhao, Nan
    Pan, Gaofeng
    Chen, Yunfei
    Fan, Lisheng
    Jin, Minglu
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (08) : 5574 - 5587
  • [24] Performance Analysis of NOMA-Based Cooperative Networks with Relay Selection
    Ronglan Huang
    Dehuan Wan
    Fei Ji
    Hua Qing
    Jie Li
    Hua Yu
    Fangjiong Chen
    中国通信, 2020, 17 (11) : 111 - 119
  • [25] Performance Analysis of NOMA-Based Cooperative Networks with Relay Selection
    Huang, Ronglan
    Wan, Dehuan
    Ji, Fei
    Qing, Hua
    Li, Jie
    Yu, Hua
    Chen, Fangjiong
    CHINA COMMUNICATIONS, 2020, 17 (11) : 111 - 119
  • [26] Secrecy Performance Analysis of Cooperative NOMA Networks With Active Protection under α - μ Fading
    Tung Pham Huu
    Van Nhan Vo
    Hung Tran
    Truong Xuan Quach
    Viet Nguyen Dinh
    2019 12TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC 2019), 2019, : 215 - 220
  • [27] Cooperative Computation and Cache Scheduling for UAV-Enabled MEC Networks
    Bao, Lingyan
    Luo, Jia
    Bao, Huiqi
    Hao, Yuyu
    Zhao, Mingxiong
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (02): : 965 - 978
  • [28] Secrecy analysis of a cooperative NOMA network using an EH untrusted relay
    Thi Anh Le
    Kong, H. Y.
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2019, 106 (06) : 799 - 815
  • [29] Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes
    Lei, Hongjiang
    Yang, Zixuan
    Park, Ki-Hong
    Ansarie, Huran Shafique
    Guo, Yongcai
    Pan, Gaofeng
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (09) : 6282 - 6298
  • [30] Secrecy Performance Analysis of Cooperative Nonorthogonal Multiple Access in IoT Networks
    Rauniyar, Ashish
    Osterbo, Olav N.
    Hakegard, Jan Erik
    Engelstad, Paal E.
    IEEE SENSORS JOURNAL, 2022, 22 (19) : 19030 - 19045