Abstract
Computational offloading and nonorthogonal multiple access (NOMA) are two promising technologies for alleviating the problems of limited battery capacity, insufficient computational capability, and massive deployment of terminal equipment in the Internet of Things (IoT) era. However, offloading data may be threatened by malicious eavesdroppers, which leads to more energy consumptions to avoid being eavesdropped. In this work, we study the energy-efficient way of computational offloading under the condition of certain security requirement in a secure NOMA-enabled mobile-edge computing (MEC) networks, where end users are intended to offload their data to the -antenna access point (AP) through the same resource block under the threat of an eavesdropper. We first address energy-efficient local resource allocation by minimizing sum-energy consumption of end users, subject to CPU frequencies, offloading bits, secrecy offloading rate, and transmit power. We then optimize the local resources to obtain the minimum computation latency of task for each end user, with the constraint of certain energy budget. The solutions to the above two optimization problems are given and demonstrated numerically by a 3-user scenario.
1. Introduction
Research shows that the contradiction between the limited resources of mobile terminal equipment and its explosive development of business and application requirements has become the most challenging tasks in the field of mobile Internet and Internet of Things (IoT) [1]. The resources of the terminal equipment are mainly reflected in the computational capability of the processor and the battery capacity. According to the theory of integrated circuits, the power consumption of the CPU is proportional to the cube of its frequency [2]. The stronger computing power, the shorter battery life.
The newly developed mobile-edge computing (MEC) [3] technology helps to resolve the above contradiction. It allows terminal devices to migrate data to the MEC server for computing-computational offloading [4]. Although MEC effectively solves the contradictions faced by the terminal and improves the service experience, there are still problems of security and high energy consumption [5].
In recent years, most of the research on MEC computational offloading focuses on the optimization of energy consumption or/and time delay without considering the security threat. Some [6–9] investigated how to save energy, some [10–14] studied from the perspective of improving real-time performance, and [15] took into account both energy consumption and computation latency. Although many achievements have been received in the optimization of computational offloading performance under the condition of no security threat, in practical applications, data offloading often needs to consider information security issues. Whether it is IoT data, Internet of Vehicles (IoV) data, video streaming analysis data, or other data with high computational intensity [16], data leakage needs to be avoided. After security processing, such as encrypting and decrypting data in the terminal and MEC server, the computational offloading process inevitably increases energy consumption and computation latency, resulting in distortion of the existing performance optimization research results. To this end, security should be considered when studying the performance of computational offloading in practical applications.
The research on the security of the computational offloading process can mainly be divided into two categories: one is based on the traditional cryptography; the other is based on the physical layer security. [17, 18] studied the energy efficiency of computational offloading based on cryptographic encryption, taking into account the delay and energy consumption caused by encryption, making energy efficiency evaluation closer to practical applications. [17] compared the energy consumption results of computational offloading with encryption and without encryption. As expected the energy consumption with encryption is greater than that without encryption. In turn, the authors further considered compressing the data to reduce the total amount of data, shorten the transmission delay and energy consumption, and achieve desired results.
Compared with traditional cryptography, computational offloading based on physical layer security is more attractive to researchers. The physical layer security is keyless, which avoids the network vulnerability problem caused by key distribution and management [19]; on the other hand, the physical layer security has been proved to be reliable from the perspective of information theory [20]. In addition, the physical layer security and traditional cryptography technology belong to different layers in the network system, and there is no replacement relationship between them, and the existing traditional security system can still be retained. Presently, the research combining physical layer security with MEC computational offloading energy efficiency is still in its infancy, and there are not many related studies. Most of them focus on secrecy offloading rate improvement and secrecy offloading resource allocation.
The most effective way to improve the energy efficiency of the terminal side is to increase the secrecy offloading rate without increasing the transmit power, shorten the data offloading time, and then reduce the offloading energy consumption of the terminal. Therefore, the related secrecy capacity enhancement techniques in the physical layer security can be applied, such as improving the main channel through relays; or deteriorating the eavesdropper’s channel through artificial noise; or enhancing the main capacity through nonorthogonal multiple access technology. [21] studies the use of relay to improve the offloading rate. Since the relay is untrustworthy, the MEC server needs to interfere with it accordingly. [22] uses full-duplex artificial noise to deteriorate the eavesdropper’s channel, that is, the MEC server sends out interference signals, which does not interfere with the legitimate receiver, but can influence the eavesdropper. Cooperative jamming assisted scheme via cooperative NOMA transmission was studied in [23]. A novel jamming signal scheme was designed to multiuser multiserver MEC-enabled IoT in [15, 24] adopts nonorthogonal multiple access technology to improve the terminal’s antieavesdropping capability. [25–27] takes unmanned aerial vehicle (UAV) as the target of MEC data offloading and improves the secrecy capacity of end users by adjusting the position and power of UAV.
As for secure offloading resource allocation, there are two sides: terminal side and MEC side. The terminalside resources include CPU frequency, transmit power, transmission rate, and for the data “partial offloading” mode, also include the data partition ratio. MEC side resources include server CPU frequency, channel resources, and the like. [28] optimizes energy consumption by taking the proportion of data offloading and transmit power as resource allocation objects, that is, minimizing the energy consumption of the terminal by reasonably adjusting the data ratio of local computing and offloading computing and offloading power. The scenario is extended from single user to multiuser [29, 30], and the weighted total power is minimized by rationally distributing the data offloading ratio and transmit power of each user. Since the state-of-the-art CPU architecture used by most terminal devices adopts dynamic frequency and voltage scaling (DVFS) technique, the energy consumption can be controlled by flexibly adjusting the frequency or voltage of the CPU, so the local CPU frequency can be further included in the resource optimization object. [31–33] include channel resources (such as time slots and frequencies) into optimization objects while considering local resources. In addition, [34, 35] also studied dividing the data into several parts and offloading them to different MEC servers for computation.
In this work, we further investigate terminal-side resource allocation for multiterminal energy efficiency of a secure MEC system enabled with NOMA, which is of high spectral efficiency and can accommodate massive devices. Zero-forcing (ZF) combined with successive interference cancelation (ZF-SIC) is adopted on the side of AP. Different from MMSE, ZF is less complex and more energy-efficient. We consider “partial offloading” mode and take more practical secrecy performance metric of secrecy outage probability (SOP) during offloading. Although [30] has studied energy-efficient resource allocation in secure NOMA-enabled mobile MEC networks, the authors only addressed the scenario of two user NOMA and one single antenna at the AP associated with the MEC server for simplicity. In this paper, we generalize the model of secure NOMA-enabled MEC with multiple users and multiple antennas at AP and tackle the efficient problem of energy and latency via local resource allocation. The major challenges of this work are (1) modeling wiretap channel and partial offloading mode and giving the closed-form expressions; (2) formulating sum-energy consumption minimization problem and computation latency minimization problem; (3) transforming minimization problems with multiple variables into a single variable one and giving the optimal solutions.
We adopt SOP as the secure QoS metric rather than secrecy capacity or ergodic secrecy capacity based on the following considerations: (1) more favorable main channel than eavesdropper channel is not always available; (2) the eavesdropper is always passive, which implies the CSI of eavesdropper channel is not available; (3) ergodic secrecy capacity needs to encode over a long period of time over all channel realizations, which incurs long delay and is suitable only for delay-tolerant applications; (4) secrecy outage is suitable for encoding confidential message over a single coherence interval or channel block.
The main contributions of the paper are summarized as follows: (1)We generalize the model of NOMA-enabled MEC networks against an external eavesdropper by users and antennas at AP associated with MEC server. A novel design framework is introduced by adopting zero forcing plus successive interference cancelation at the AP, jointly optimizing the number of offloading bits, local CPU frequency, and transmit power, targeting at end users’ energy and latency(2)Aiming at energy-efficient design, we characterize the optimization problem of sum energy of end users under certain SOP and latency requirement in the secure NOMA-enabled MEC networks, subject to CPU frequency, offloading bits, secrecy offloading rate, and transmit power of each user. We transform the complex and nonconvex problem into a single-variable one and give solution by numerical-finding(3)Aiming at latency-efficient design, we investigate the problem of minimizing the computation latency of each user’s task under certain SOP and energy budget requirement, with the constraint of CPU frequency, offloading bits, secrecy offloading rate, and transmit power. Similarly, the algorithm of the solution is given by transforming the original complex problem into a single-variable one
The rest of the paper is organized as follows. In the following section, we model the multiuser secure NOMA-enabled mobile MEC system and derive the closed-form expression of the secrecy outage probability of an individual user. In the third section, the optimization problem of sum-energy consumption of end users under certain SOP and latency requirement is characterized, and the algorithm of the solution is given. The problem of minimizing the computation latency of each user’s task under certain SOP and energy budget requirement is addressed and solved in the fourth section. Numerical results are presented in the section of “Numerical Results” to confirm the efficient design done in the previous sections. Finally, a conclusion is drawn in the last section.
2. System Model
As depicted in Figure 1, we consider a secure uplink NOMA-enabled MEC networks, where single-antenna users are intended to offload their computation-intensive tasks to the -antenna access point (AP) (with an MEC server integrated) by sharing the same radio resource (such as frequency and/or time) at the presence of an eavesdropper (Eve) which is equipped with a single antenna. Here, is assumed.

All the channels are experiencing quasistatic Rayleigh fading. To user , the symbols used hereinafter are listed in Table 1.
Therefore, the instantaneous composite signals received at the AP and Eve are given by where and and .
2.1. Wiretap Channel Model
Similar to [36], successive interference cancelation (SIC) combined with zero forcing (ZF) is employed at the AP, without loss of generality, to a specific user , its aggregate signal left before decoding can be expressed as where , indicating is decoded just before these users in set (index) during an SIC process.
After applying zero-forcing, the SINR of user at the AP is given by where is a by matrix whose rows are the orthonormal basis of the null space of the subspace spanned by the vector set .
According to [37], obeys a chi-squared distribution with degrees of freedom and has nothing to do with the specific users in set but its cardinality . Specifically, , where . For the ease of presentation, we denote the cardinality of by and rewrite by , whose probability density function (pdf) is given by
As for the SINR of user (denoted as ) at eve, we adopt the conservative assumption that all user interference can be canceled out by Eve. Therefore, obeys an exponential distribution with parameter , i.e., , whose cumulative distribution function (CDF) is given by
2.2. Partial Offloading Model
We assume the task for each user can be partitioned into two parts with an arbitrary ratio. Let and be the total number of bits to be processed and the number of bits to be offloaded to the AP.
We consider a more practical scenario that the eavesdropper is passive and the AP only has the statistical characteristics of eavesdropper’s channels. To this end, we adopt the secrecy outage probability (SOP) for quantifying the quality-of-service (QoS) of secure transmissions.
Suppose is the secrecy rate for transmit power that satisfies the targeted secure QoS for user . Therefore, the energy consumption of offloading can be formulated as where and refer to offloading duration and the bandwidth of the channel, respectively.
We present the closed-form expression of SOP in form of theorem as follows.
Theorem 1. The secrecy outage probability of user for the required secrecy rate at the presence of -user interference can be expressed as where and are the incomplete Gamma function and its complement, respectively.
Proof. See Appendix.
2.3. Local Computation Model
Let be the computation intensity in CPU cycles per bit for user . The total number of cycles for computing local part of task is . Each user adopts the advanced dynamic frequency and voltage scaling (DVFS) technique to control the energy consumption. According to [1], the energy consumption of a CPU cycle is given by , where is a constant associated with the hardware architecture, and is the CPU frequency for user . For the local computation task of cycles, the energy consumption can be derived:
The corresponding computation time for user can be given by
3. Sum-Energy Consumption Minimization
3.1. Problem Formulation
In this section, we focus on the problem of the sum-energy consumption minimization over transmit power , offloading bits , secrecy offloading rate , and CPU frequency , subject to the task for each user.
By convention, we ignore the time of the data processing at the MEC as well as that of downlink transmission, due to the fact that the MEC processing speed is very fast and the processed result usually has fewer bits. Without loss of generality, the AP decodes the users’ signals in the SIC order of user 1, user 2, ..., user . As such, the number of user interferers for user is .
Mathematically, the minimization problem of sum-energy consumption can be formulated as where , , , and refer to the CPU frequency vector, the offloading bit vector, the transmit power vector, and secrecy offloading rate vector, respectively; is the computation latency, and denotes the upper bound of CPU frequency for user .
3.2. Solution to Problem ()
The problem () is complicated and nonconvex due to the nonconvex nature of constraints (13d). Although the closed-form expression of the optimal solution is not available, we can obtain a suboptimal solution numerically by (1) simplifying constraints, (2) relaxing and transforming the multivariable problem into a single variable problem, and (3) giving the solution numerically.
We first simplify the constraints by the following lemma.
Lemma 2. The constraint (13b) and (13d) are strictly binding for the optimal solution of problem (), i.e.,
Proof. Observing the first term in (13a), the local computation energy consumption is an increasing function of . Obviously, the lowest CPU frequency that satisfies the condition achieves the minimum energy consumption.
According to the property of the SOP, is an increasing function of . The maximum that satisfies (13d) is the -outage secrecy capacity which makes hold. This completes the proof.
The problem () in (13a) is still complex and nonconvex. We continue to transform the problem by relaxing offloading duration with , i.e., where .
Since the transmit power increases with , achieves the minimum energy consumption for fixing other parameters. Moreover, can be expressed as a function of from (16c). As such, we can further transform the problem into the one only having a single variable. where is the expression of the function for derived from .
Although we cannot get a closed-form solution to this problem, the optimal solution can be found numerically. The numerical solution to problem is shown in Algorithm 1. Obviously, the solution to problem is equivalent to minimize the energy consumption of each user over offloading bit independently. We will demonstrate it numerically in detail in Section.
|
3.3. Discussion
3.3.1. Local Computation Only Mode
The energy consumption of local computation only mode for user is by setting . However, the local computation only mode is not always available unless is satisfied.
3.3.2. Full Offloading Mode
Similarly, the full offloading mode is not always achievable as given the SOP requirement each user has its asymptotic secrecy rate, which is explained by the following theorem.
Theorem 3. Given the SOP of , the limited value of secrecy rate for user at the presence of -user interference is .
Proof. makes and approach to 0 while their ratio keep as a limited value. Then, the asymptotic secrecy outage probability for (8) can be formulated as In turn, the asymptotic -outage secrecy capacity is This completes the proof.
If , the asymptotic-outage secrecy capacity can be further expressed as
To achieve full offloading mode, the following inequality must be satisfied.
3.3.3. Computational Complexity
Observing Algorithm 1, there roughly exist five nesting steps in the process of numerical-finding: (1) calculate SOP with variable and find the -outage secrecy capacity; (2) calculate -outage secrecy capacity with variable transmit power and search optimal transmit power with certain ; (3) calculate total energy consumption and search for the optimal to achieve minimum total energy consumption; (4) loop from user 1 to user . Therefore, the computational complexity is (here, refers to the computational complexity of SOP.).
4. Computation Latency Minimization
4.1. Problem Formulation
We continue to study the optimization problem of task computation latency over transmit power , offloading bits , secrecy offloading rate , and CPU frequency for user with the constraint of certain energy budget in this section.
All the assumptions and notations are the same as in section. We form the problem as follows where and according to the definitions in section, and refers to the energy budget of user for its task.
4.2. Solution to Problem ()
Before solving problem () numerically, we need to simplify the problem via the following lemma.
Lemma 4. The optimal solution of the variables , , , and should make .
Proof. We prove this lemma via contradiction. Let , , , and be the jointly optimal values of , , , and . We assume . One can find by keeping and fixed, reducing makes and decline. Although increases with decreasing ( fixed), the increase in can be compensated by the decrease in . Therefore, there exists another , where and is a small positive value, making . Similarly, if is supposed, there exists another that makes hold, where .
We complete the proof.
Combined with Lemma 2 and Lemma 4, we transform the problem () into the following form.
The problem is changed into the form with a single variable, and we can find the optimal solution numerically, the algorithm of which is shown in Algorithm 2.
Different from Algorithm 1, Algorithm 2 has one more nesting step in the process of numerical-finding: Search for the minimum for the fixed , which makes its computational complexity be .
|
5. Numerical Results
In this section, numerical results are presented to further validate the previous research results of the energy-efficient computational offloading design in this secure uplink NOMA-enabled MEC networks.
To demonstrate the numerical results more clearly, we take a 3-user scenario for instance, the layout of which is shown in Figure 2. The distances (grid) between each user and the AP as well as eve are listed in Table 2. Each grid is supposed to be 20 meters, thus, the distance from user 1 to the AP is 80 meters and about 152.3 meters to eve.

We assume the number of antennas equipped at the AP is 10, i.e., , the path loss in dB is expressed as , where the path loss exponent is set to 3.76 according to 3GPP urban path loss model. The bandwidth MHz and the equal AWGN power of the AP and eve are supposed, i.e., , where dBm/Hz is the AWGN power spectral density.
For simplicity, we assume each end user has the same performance and tasks to process. The total bits of task for each user is Mbits. The computation intensity is cycles/bit. The maximum CPU frequency is 2 GHz. The effective capacitance coefficient is set as . Without loss of generality, the SIC order is from user 1 to user 2 to user 3.
5.1. Energy Consumption Minimization
Based on the above assumptions, the curves of the energy consumption versus offloading bits (Mbits) for each end user are shown in Figure 3, where the computation latency s and the secrecy outage probability .

We note each curve starts from the same value (0.015 Joule) due to the similar parameter assumption for each user, goes down until the minimum energy consumption, then rises up, with the increase of offloading bits. means local computation only mode, and Mbits specifies full offloading mode. In this case, both modes cannot obtain the minimum energy consumption. The minimum energy consumptions for user 1, user 2, and user 3 are 0.0096 Joule, 0.0071 Joule, and 0.012 Joule, respectively. The corresponding offloading bits are Mbits, Mbits, and Mbits. Here, the resolution of offloading bits is 0.1 Mbits.
Although user 1 and user 3 have the same distances to the AP, due to the different distances to eve and the different SIC order, which result in the different secrecy outage capacities, user 1 has less energy consumption than user 3. Specifically, user 3 needs 0.0024 Joule more energy to overcome the distance difference of eve. Yet, user 2 has the least energy consumption even if it is not SIC decoded at last.
By the way, each user has an asymptotic -secrecy outage capacity. They are bps/Hz, bps/Hz, and bps/Hz. The asymptotic offloading bits for user 3 is about 1.86 Mbits, which indicates user 3 cannot conduct full offloading mode as the total bits of the task are 3 Mbits.
We continue to study the impacts of the latency and the secrecy outage probability on the minimum energy consumptions for each user and their sum.
We first illustrate the curves of the minimum energy consumption versus latency from s to s in Figure 4. For each user, the minimum energy consumption decreases with the increase of . When s, the minimum energy consumptions for user 1, user 2, user 3, and their sum are 0.015 Joule, 0.011 Joule, 0.023 Joule, and 0.049 Joule, respectively, while they are reduced to 0.007 Joule, 0.0054 Joule, 0.0078 Joule, and 0.0202 Joule when s. The values for s are the same as those achieved in Figure 3, which also confirms the reliability of the numerical results in Figure 4. As expected, user 2 has the least energy consumptions for the same , while user 3 needs more energy consumption than user 1, just as in Figure 3.

Figure 5 depicts the curves of the minimum energy consumptions versus secrecy outage probability for each user and their sum from to . It is easy to confirm the reliability of the numerical results in Figure 5 by observing the values for . Similar to the impact of latency , the minimum energy consumptions decline with the secrecy outage probability increasing from 0.0106 Joule, 0.0079 Joule, 0.0142 Joule, 0.0327 Joule for to 0.008 Joule, 0.0058 Joule, 0.0087 Joule, and 0.0225 Joule for . We note the minimum energy consumption for user 3 at (0.0142 Joule) is very close to that of local computation only mode (0.015 Joule), which points out offloading is not always necessary especially when the eavesdropper’s channel is much better than the legal channel.

5.2. Latency Minimization
Figure 6 shows the latency of the three end users versus offloading bits. The curves are generated on the assumption of the secrecy outage probability and the energy budget Joule. The resolutions of the latency and offloading bits are 0.005 s and 0.05 Mbits, respectively. One can note each curve declines first and then climbs up, which indicates there exists an optimal value. In this case, the minimum values of the latency for user 1, user 2, and user 3 are 0.06 s, 0.055 s, and 0.09 s, respectively, which are achieved by setting offloading bit Mbits, Mbits, and Mbits, respectively. As such, MHz, MHz, MHz; bps/Hz, bps/Hz, bps/Hz; and mW, mW, mW.

Figure 7 shows the minimum latency versus the energy budget from Joule to Joule. As expected, the minimum latency decreases with the energy budget increasing. However, the decrease is significant from Joule to Joule, where the minimum latency for user 1 is reduced from 0.145 s to 0.05 s. For user 3 whose channel condition is not good enough, the reduction is still effective when is greater than 0.04 Joule. Meanwhile, the curves of user 1 and user 2 evert such that the minimum latency of user 2 is greater than that of user 1 from .

Here so far, all these numeric results and observations in this section are consistent with the expectations.
6. Conclusion
In this work, we investigated a secure uplink NOMA-enabled MEC network under the threat of an eavesdropper, where end users simultaneously offload their partial computation-intensive tasks to the MEC server in the same resource block and ZF-SIC is adopted at the multiantenna AP associated with MEC server. We first derived the closed-form expression of individual SOP for an arbitrary SIC order. We then characterize the optimization problem of sum-energy consumption subject to offloading bits, secrecy offloading rate, local CPU frequency, and transmit power and gave the solution. We further studied the problem of minimizing computation latency under condition of certain SOP requirement and energy budget through proving the equality of local computing time and offloading duration and transforming it into a single-variable problem. All the solutions are demonstrated and validated numerically by a 3-user case of a secure NOMA-enabled MEC network.
Appendix
Proof of Theorem 1
Given (5) and (6), jointly with the independence of and , the process of the derivation for the secrecy outage probability of user is shown as follows,
The following integral result is applied [[38], Eq. (3.381.9)] during the above derivation,
The proof is completed.
Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was supported by the General Scientific Research Projects of Zhejiang Education Department (Grant no. Y202147949).