About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
inis 25(3):

Research Article

Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper

Download9 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eetinis.v12i3.8889,
        author={Van Long Nguyen and Duy-Hung Ha and Van Truong Truong and Thanh Truc Tran and Dac Binh Ha},
        title={Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems},
        volume={12},
        number={3},
        publisher={EAI},
        journal_a={INIS},
        year={2025},
        month={10},
        keywords={physical layer security, Internet of Things, mobile edge computing, unmanned aerial vehicle, RF energy harvesting, secrecy successful computation probability},
        doi={10.4108/eetinis.v12i3.8889}
    }
    
  • Van Long Nguyen
    Duy-Hung Ha
    Van Truong Truong
    Thanh Truc Tran
    Dac Binh Ha
    Year: 2025
    Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper
    INIS
    EAI
    DOI: 10.4108/eetinis.v12i3.8889
Van Long Nguyen1, Duy-Hung Ha2,*, Van Truong Truong1, Thanh Truc Tran3, Dac Binh Ha1
  • 1: Duy Tan University
  • 2: Ton Duc Thang University
  • 3: FPT University
*Contact email: haduyhung@tdtu.edu.vn

Abstract

The perception layer security (PLS) is crucial for ensuring that the data collected by Internet of Things (IoT) devices is accurate, reliable, and protected against various security threats. It helps maintain the overall integrity of the IoT ecosystem and builds trust in its applications. Our work explores the integration of network and PLS in a UAV-enabled mobile edge computing (MEC) system for IoT. This system supports multiple users with a combined non-orthogonal and time-division multiple access (NOTDMA) scheme and is based on backscatter communication (BC). In this system, the UAV-mounted server functions as a hybrid access point (HAP) and hovers over a cluster of energy-constrained IoT devices to transmit RF energy and assist them in performing tasks by employing BC. The IoT devices apply the combined NOTDMA scheme to offload their tasks to the HAP. A mobile passive eavesdropper attempts to intercept information from IoT devices without actively launching any attacks. A partial offloading scheme with various encryption algorithms is proposed to improve the system’s secrecy, which adapts to the users’ non-linear harvested energy levels. In addition, considering the network and physical security, we derive a approximation expression for the secrecy successful computation probability (SSCP). This expression incorporates factors such as harvested energy, local computing and encryption latency, edge offloading latency, processing, decryption, and the associated secrecy costs. The optimization problem for maximizing SSCP is formulated and solved using an Immune algorithm to find the optimal set of device parameters and UAV altitude. Key parameters affecting secrecy and latency performance are analyzed to better understand the system’s behavior. Numerical simulations are provided to validate the accuracy of our analysis.

Keywords
physical layer security, Internet of Things, mobile edge computing, unmanned aerial vehicle, RF energy harvesting, secrecy successful computation probability
Received
2025-03-12
Accepted
2025-04-27
Published
2025-10-23
Publisher
EAI
http://dx.doi.org/10.4108/eetinis.v12i3.8889

Copyright © 2025 Van-Long Nguyen et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL