Research Article

Energy-Efficient Computational Offloading for Secure NOMA-Enabled Mobile Edge Computing Networks

Algorithm 2

Optimal solution to problem ().
1: Setting: , , , , , , ;
2: Repeat
3: Setting: , , , , , , ;
4: Initialization: , ;
5: Repeat
6:  Repeat
7:   Repeat
8:    Search with certain and via constraint of (22c);
9:   Until SOP converges to within a prescribed accuracy;
10:   Calculate ;
11:  Until satisfies the condition in (23b)
12: Until
13: Search to make the least;
14: Calculate , , ;
15: Output: , , , ;
16:Until