NOMA-Assisted Secure Offloading for Vehicular Edge Computing Networks With Asynchronous Deep Reinforcement Learning

Document Type

Article

Publication Title

IEEE Transactions on Intelligent Transportation Systems

Abstract

Mobile edge computing (MEC) offers promising solutions for various delay-sensitive vehicular applications by providing high-speed computing services for a large number of user vehicles simultaneously. In this paper, we investigate non-orthogonal multiple access (NOMA) assisted secure offloading for vehicular edge computing (VEC) networks in the presence of multiple malicious eavesdropper vehicles. To secure the wireless offloading from the user vehicles to the MEC server at the base station, the physical layer security (PLS) technology is leveraged, where a group of jammer vehicles is scheduled to form a NOMA cluster with each user vehicle for providing jamming signals to the eavesdropper vehicles while not interfering with the legitimate offloading of the user vehicle. We formulate a joint optimization of the transmit power, the computation resource allocation and the selection of jammer vehicles in each NOMA cluster, with the objective of minimizing the system energy consumption while subjecting to the computation delay constraint. Due to the dynamic characteristics of the wireless fading channel and the high mobility of the vehicles, the joint optimization is formulated as a Markov decision process (MDP). Therefore, we propose an asynchronous advantage actor-critic (A3C) learning algorithm-based energy-efficiency secure offloading (EESO) scheme to solve the MDP problem. Simulation results demonstrate that the agent adopting the A3C-based EESO scheme can rapidly adapt to the highly dynamic VEC networks and improve the system energy efficiency on the premise of ensuring offloading information security and low computation delay.

First Page

2627

Last Page

2640

DOI

10.1109/TITS.2023.3320861

Publication Date

10-13-2023

Keywords

NOMA, Jamming, Vehicle dynamics, Servers, Energy consumption, Task analysis, Security

Comments

IR conditions: non-described

Share

COinS