Abstract
In this paper, physical layer security (PLS) in a non-orthogonal multiple access (NOMA)-based mobile edge computing (MEC) system is investigated, where hybrid successive interference cancellation (SIC) decoding is considered. Specifically, users intend to complete confidential tasks with the help of the MEC server, while an eavesdropper attempts to intercept the offloaded tasks. By jointly designing computational resource allocation, task assignment, and power allocation, a latency minimization problem is formulated. Based on the interactions between local computing time and MEC processing time, the closed-from solutions of computational resource allocation and task assignment are derived. After that, a strategy selection mechanism is established to select offloading strategies based on the corresponding conditions. Moreover, according to the analysis of hybrid SIC decoding, the conditions of different decoding orders in secure NOMA networks are derived. Furthermore, a reinforcement learning based algorithm is proposed to solve the power allocation problems for NOMA and OMA offloading strategies. This work is extended to a multi-user scenario, in which a matching-based algorithm is proposed to solve the formulated sub-channel assignment problem. Simulation results indicate that: i) the proposed solution can significantly reduce the latency and provide dynamic strategy selection for various scenarios; ii) the NOMA offloading strategy with hybrid SIC decoding can outperform other strategies in the considered system.
| Original language | British English |
|---|---|
| Pages (from-to) | 408-422 |
| Number of pages | 15 |
| Journal | IEEE Transactions on Wireless Communications |
| Volume | 22 |
| Issue number | 1 |
| DOIs | |
| State | Published - 1 Jan 2023 |
Keywords
- Mobile edge computing (MEC)
- non-orthogonal multiple access (NOMA)
- physical layer security (PLS)
- reinforcement learning
- sub-channel assignment
Fingerprint
Dive into the research topics of 'Reinforcement Learning Based Latency Minimization in Secure NOMA-MEC Systems with Hybrid SIC'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver