
Research Article
Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper
@ARTICLE{10.4108/eetinis.v12i3.8889, author={Van Long Nguyen and Duy-Hung Ha and Van Truong Truong and Thanh Truc Tran and Dac Binh Ha}, title={Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper}, journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems}, volume={12}, number={3}, publisher={EAI}, journal_a={INIS}, year={2025}, month={10}, keywords={physical layer security, Internet of Things, mobile edge computing, unmanned aerial vehicle, RF energy harvesting, secrecy successful computation probability}, doi={10.4108/eetinis.v12i3.8889} }- Van Long Nguyen
Duy-Hung Ha
Van Truong Truong
Thanh Truc Tran
Dac Binh Ha
Year: 2025
Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper
INIS
EAI
DOI: 10.4108/eetinis.v12i3.8889
Abstract
The perception layer security (PLS) is crucial for ensuring that the data collected by Internet of Things (IoT) devices is accurate, reliable, and protected against various security threats. It helps maintain the overall integrity of the IoT ecosystem and builds trust in its applications. Our work explores the integration of network and PLS in a UAV-enabled mobile edge computing (MEC) system for IoT. This system supports multiple users with a combined non-orthogonal and time-division multiple access (NOTDMA) scheme and is based on backscatter communication (BC). In this system, the UAV-mounted server functions as a hybrid access point (HAP) and hovers over a cluster of energy-constrained IoT devices to transmit RF energy and assist them in performing tasks by employing BC. The IoT devices apply the combined NOTDMA scheme to offload their tasks to the HAP. A mobile passive eavesdropper attempts to intercept information from IoT devices without actively launching any attacks. A partial offloading scheme with various encryption algorithms is proposed to improve the system’s secrecy, which adapts to the users’ non-linear harvested energy levels. In addition, considering the network and physical security, we derive a approximation expression for the secrecy successful computation probability (SSCP). This expression incorporates factors such as harvested energy, local computing and encryption latency, edge offloading latency, processing, decryption, and the associated secrecy costs. The optimization problem for maximizing SSCP is formulated and solved using an Immune algorithm to find the optimal set of device parameters and UAV altitude. Key parameters affecting secrecy and latency performance are analyzed to better understand the system’s behavior. Numerical simulations are provided to validate the accuracy of our analysis.
Copyright © 2025 Van-Long Nguyen et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.


