About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Industrial Networks and Intelligent Systems. 10th EAI International Conference, INISCOM 2024, Da Nang, Vietnam, February 20–21, 2024, Proceedings

Research Article

Joint Secrecy and Latency Performance Analysis for UAV-Assisted Uplink NOMA-Based IoT Network with Mobile Edge Computing

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-67357-3_17,
        author={Quoc-Huy Nguyen-Anh and Anh-Nhat Nguyen and Dac-Binh Ha},
        title={Joint Secrecy and Latency Performance Analysis for UAV-Assisted Uplink NOMA-Based IoT Network with Mobile Edge Computing},
        proceedings={Industrial Networks and Intelligent Systems. 10th EAI International Conference, INISCOM 2024, Da Nang, Vietnam, February 20--21, 2024, Proceedings},
        proceedings_a={INISCOM},
        year={2024},
        month={7},
        keywords={Internet of Things unmanned aerial vehicles nonorthogonal multiple access mobile edge computing physical layer secrecy},
        doi={10.1007/978-3-031-67357-3_17}
    }
    
  • Quoc-Huy Nguyen-Anh
    Anh-Nhat Nguyen
    Dac-Binh Ha
    Year: 2024
    Joint Secrecy and Latency Performance Analysis for UAV-Assisted Uplink NOMA-Based IoT Network with Mobile Edge Computing
    INISCOM
    Springer
    DOI: 10.1007/978-3-031-67357-3_17
Quoc-Huy Nguyen-Anh1, Anh-Nhat Nguyen2, Dac-Binh Ha1,*
  • 1: Faculty of Electrical-Electronic Engineering, Duy Tan University
  • 2: Department of Computing Fundamentals, FPT University
*Contact email: hadacbinh@duytan.edu.vn

Abstract

This study jointly investigates the secrecy and latency performance of uplink nonorthogonal multiple access (NOMA)-based mobileedge computing (MEC) Internet of Things (IoT) system employing unmanned aerial vehicle (UAV). Specifically, this proposed system consists of two resource-limited edge devices (ED) that seek to offload their tasks to a UAV equipped with one MEC server in the presence of a passive eavesdropper. To evaluate the system’s secrecy and latency performance, we derive the closed-form expressions of secrecy successful computation probability (SSCP) and its upper bound. The Monte Carlo simulation results supported the accuracy of our study based on computer simulations according to various system parameters such as the average transmit signal-to-noise ratio (SNR), power allocation ratio, and altitude of UAV.

Keywords
Internet of Things unmanned aerial vehicles nonorthogonal multiple access mobile edge computing physical layer secrecy
Published
2024-07-31
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-67357-3_17
Copyright © 2024–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL