[en] Mobile edge computing (MEC) has emerged as a promising technology to extend the functionality of end-users’ wireless devices while prolonging their battery life by offloading computationally intensive tasks to remote edge servers. However, the inherent broadcast nature of wireless transmission during offloading introduces notable security challenges. To address this issue, we propose leveraging intelligent reflecting surface (IRS) technology to enhance physical layer security (PLS). Nevertheless, attaining high PLS for all users in dense networks with multiple malicious terminals is challenging. In this paper, we investigate the physical layer encryption (PLE) to complement the PLS in enabling secure wireless transmission. Since such encryption and decryption processes require computation resources, we aim to optimize the encryption decision, offloading decision, as well as wireless and computing resource allocations. Our objective is to minimize the maximum weighted energy consumption while satisfying practical constraints, including limited computing and wireless resources, fulfilling minimum user rate requirements, and complying with IRS conditions. To tackle the non-convex objective and constraints, we explore the utilization of bisection search and successive convex approximation (SCA) methods. Our numerical results confirm the efficiency of the proposed design in terms of energy consumption and network capacity within a secure MEC network.
Disciplines :
Electrical & electronics engineering
Author, co-author :
NGUYEN, Ti Ti ✱; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
HA, Vu Nguyen ✱; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
LE, Thanh-Dung ✱; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
Tran, Duc-Dung ✱; Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg
CHATZINOTAS, Symeon ✱; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
Nguyen, Kim-Khoa ✱; Ecole de Technologie Supérieure, Canada
✱ These authors have contributed equally to this work.
External co-authors :
yes
Language :
English
Title :
Reliable Intelligent Reflecting Surface-Assisted Mobile Edge Computing Systems: A Physical Layer Security and Encryption Design
Publication date :
2025
Journal title :
IEEE Transactions on Mobile Computing
ISSN :
1536-1233
Publisher :
Institute of Electrical and Electronics Engineers Inc.
T. T. Nguyen, L. B. Le, and Q. Le-Trung, “Computation offloading in MIMO based mobile edge computing systems under perfect and imperfect CSI estimation,” IEEE Trans. Services Computing, vol. 14, no. 6, pp. 2011–2025, 2019.
T. T. Nguyen, V. N. Ha, L. B. Le, and R. Schober, “Joint data compression and computation offloading in hierarchical fog-cloud systems,” IEEE Trans. Wireless Commun., vol. 19, no. 1, pp. 293–309, 2019.
C. Pham, D. T. Nguyen, Y. Njah, N. H. Tran, K. K. Nguyen, and M. Cheriet, “Share-to-run IoT services in edge cloud computing,” IEEE Internet Things J., vol. 9, no. 1, pp. 497–509, 2021.
E. El Haber, M. Elhattab, C. Assi, S. Sharafeddine, and K. K. Nguyen, “Latency and reliability aware edge computation offloading via an intelligent reflecting surface,” IEEE Commun. Letters, vol. 25, no. 12, pp. 3947–3951, 2021.
T. M. Ho and K.-K. Nguyen, “Joint server selection, cooperative offloading and handover in multi-access edge computing wireless network: A deep reinforcement learning approach,” IEEE Trans. Mobile Computing, vol. 21, no. 7, pp. 2421–2435, 2020.
M. Wang, S. Shi, D. Zhang, C. Wu, and Y. Wang, “Joint computation offloading and resource allocation for MIMO-NOMA assisted multi-user MEC systems,” IEEE Trans. Commun., 2023.
P. Chen, B. Lyu, Y. Liu, H. Guo, and Z. Yang, “Multi-IRS assisted wireless-powered mobile edge computing for internet of things,” IEEE Trans. Green Commun. Network., vol. 7, no. 1, pp. 130–144, 2022.
C. Ding, J.-B. Wang, H. Zhang, M. Lin, and J. Wang, “Joint MU-MIMO precoding and resource allocation for mobile-edge computing,” IEEE Trans. Wireless Commun., vol. 20, no. 3, pp. 1639–1654, 2020.
X. Qi, M. Peng, and H. Zhang, “Joint mmWave beamforming and resource allocation in NOMA-MEC network for internet of things,” IEEE Trans. Veh. Technol., vol. 72, no. 4, pp. 4969–4980, 2023.
F. Naeem, M. Ali, G. Kaddoum, C. Huang, and C. Yuen, “Security and privacy for reconfigurable intelligent surface in 6G: A review of prospective applications and challenges,” IEEE Open J. Commun. Society, vol. 4, pp. 1196–1217, 2023.
R. Kaur, B. Bansal, S. Majhi, S. Jain, C. Huang, and C. Yuen, “A survey on reconfigurable intelligent surface for physical layer security of next-generation wireless communications,” IEEE open journal of vehicular technology, vol. 5, pp. 172–199, 2024.
A. Chorti, A. N. Barreto, S. Köpsell, M. Zoli, M. Chafii, P. Sehier, G. Fettweis, and H. V. Poor, “Context-aware security for 6G wireless: The role of physical layer security,” IEEE Commun. Standards Mag., vol. 6, no. 1, pp. 102–108, 2022.
S. Hong, C. Pan, H. Ren, K. Wang, and A. Nallanathan, “Artificial-noise-aided secure MIMO wireless communications via intelligent reflecting surface,” IEEE Trans. Commun., vol. 68, no. 12, pp. 7851–7866, 2020.
X. He, R. Jin, and H. Dai, “Physical-layer assisted secure offloading in mobile-edge computing,” IEEE Trans. Wireless Commun., vol. 19, no. 6, pp. 4054–4066, 2020.
Y. Liu, W. Wang, H.-H. Chen, F. Lyu, L. Wang, W. Meng, and X. Shen, “Physical layer security assisted computation offloading in intelligently connected vehicle networks,” IEEE Trans. Wireless Commun., vol. 20, no. 6, pp. 3555–3570, 2021.
Y. Chen, K. Zhao, H. Zhang, and S. He, “A comprehensive physical layer security mechanism for mobile edge computing,” IEEE Internet Things J., 2023.
L. P. Qian, Y. Wu, N. Yu, D. Wang, F. Jiang, and W. Jia, “Energy-efficient multi-access mobile edge computing with secrecy provisioning,” IEEE Transactions on Mobile Computing, vol. 22, no. 1, pp. 237–252, 2021.
Z. Tang, T. Hou, Y. Liu, J. Zhang, and L. Hanzo, “Physical layer security of intelligent reflective surface aided NOMA networks,” IEEE Trans. Vehicular Technol., vol. 71, no. 7, pp. 7821–7834, 2022.
M. Cui, G. Zhang, and R. Zhang, “Secure wireless communication via intelligent reflecting surface,” IEEE Wireless Commun. Letters, vol. 8, no. 5, pp. 1410–1414, 2019.
Y. Xiu, J. Zhao, C. Yuen, Z. Zhang, and G. Gui, “Secure beamforming for multiple intelligent reflecting surfaces aided mmwave systems,” IEEE Commun. Letters, vol. 25, no. 2, pp. 417–421, 2020.
Y. Gao, Z. Wang, Y. Zhang, W. Lu, J. Tang, N. Zhao, and F. Gao, “Multi-IRS-aided secure communication in UAV-MEC networks,” IEEE Trans. Veh. Technol., 2025.
H. Zhang, Y. Huang, Z. Zhang, K. Guo, Z. Lin, and X. Lu, “RIS-assisted green and secure symbiotic UAV-MEC network,” IEEE Trans. Commun., 2025.
W. Wang, W. Ni, H. Tian, and L. Song, “Intelligent omni-surface enhanced aerial secure offloading,” IEEE Trans. Veh. Technol., vol. 71, no. 5, pp. 5007–5022, 2022.
S. Mao, L. Liu, N. Zhang, M. Dong, J. Zhao, J. Wu, and V. C. Leung, “Reconfigurable intelligent surface-assisted secure mobile edge computing networks,” IEEE Trans. Veh. Technol., vol. 71, no. 6, pp. 6647–6660, 2022.
B. L. J. Liao, W. Wu, and Y. Li, “Intelligent reflecting surface assisted secure computation of wireless powered MEC system,” IEEE Trans. Mobile Computing, 2023.
B. Li, W. Wu, Y. Li, and W. Zhao, “Intelligent reflecting surface and artificial-noise-assisted secure transmission of MEC system,” IEEE Internet Things J., vol. 9, no. 13, pp. 11 477–11 488, 2021.
T. Sadig, M. Maleki, N. H. Tran, and H. R. Bahrami, “An encryption-aware PHY security framework for 4-node Gaussian wiretap channels with joint power constraint,” IEEE Trans. Commun., vol. 68, no. 12, pp. 7837–7850, 2020.
L. Xiao, S. Hong, S. Xu, H. Yang, and X. Ji, “IRS-aided energy-efficient secure WBAN transmission based on deep reinforcement learning,” IEEE Trans. Commun., vol. 70, no. 6, pp. 4162–4174, 2022.
D. Puthal, X. Wu, N. Surya, R. Ranjan, and J. Chen, “SEEN: A selective encryption method to ensure confidentiality for big sensing data streams,” IEEE Trans. Big Data, vol. 5, no. 3, pp. 379–392, 2017.
W. Wang, M. Hempel, D. Peng, H. Wang, H. Sharif, and H.-H. Chen, “On energy efficient encryption for video streaming in wireless sensor networks,” IEEE Trans. Multimedia, vol. 12, no. 5, pp. 417–426, 2010.
M. Mitev, A. Chorti, H. V. Poor, and G. Fettweis, “What physical layer security can do for 6G security,” IEEE Open J. Veh. Technol., 2023.
D. Wang, P. Ren, J. Cheng, and Y. Wang, “Achieving full secrecy rate with energy-efficient transmission control,” IEEE Trans. Commun., vol. 65, no. 12, pp. 5386–5400, 2017.
Z. Li, M. Hua, Q. Wang, and Q. Song, “Weighted sum-rate maximization for multi-irs aided cooperative transmission,” IEEE Wireless Commun. Letters, vol. 9, no. 10, pp. 1620–1624, 2020.
M. A. Saeidi, M. J. Emadi, H. Masoumi, M. R. Mili, D. W. K. Ng, and I. Krikidis, “Weighted sum-rate maximization for multi-irs-assisted full-duplex systems with hardware impairments,” IEEE Trans. Cognitive Commun. Network., vol. 7, no. 2, pp. 466–481, 2021.
D. Gündüz, M. A. Wigger, T.-Y. Tung, P. Zhang, and Y. Xiao, “Joint source–channel coding: Fundamentals and recent progress in practical designs,” Proceedings of the IEEE, 2024.
C. E. Shannon, “A mathematical theory of communication,” The Bell System Tech. J., vol. 27, no. 3, pp. 379–423, 1948.
Y. Liu, H.-H. Chen, and L. Wang, “Physical layer security for next generation wireless networks: Theories, technologies, and challenges,” IEEE Commun. Surveys & Tuts., vol. 19, no. 1, pp. 347–376, 2016.
C.-H. Nguyen, Y. M. Saputra, D. T. Hoang, D. N. Nguyen, V.-D. Nguyen, Y. Xiao, and E. Dutkiewicz, “Encrypted data caching and learning framework for robust federated learning-based mobile edge computing,” IEEE/ACM Transactions on Networking, vol. 32, no. 3, pp. 2705–2720, 2024.
R. Venkataramanan, V. N. Swamy, and K. Ramchandran, “Low-complexity interactive algorithms for synchronization from deletions, insertions, and substitutions,” IEEE Trans. Informat. Theory, vol. 61, no. 10, pp. 5670–5689, 2015.
E. M. Abadi, C. Goken, C. Ozturk, and S. Gezici, “Optimal power allocation and optimal linear encoding for parameter estimation in the presence of a smart eavesdropper,” IEEE Trans. Signal Process., vol. 70, pp. 4093–4108, 2022.
B. Fournier, V. V. T. Tong, and G. Guette, “Accurate measurement of the energy consumption of security functions.” in SECRYPT, 2021, pp. 487–494.
S. Posea, “Renewal periods for cryptographic keys,” Ph.D. dissertation, Eindhoven University of Technology, 2012.
L. Jin, X. Xu, S. Han, X. Chi, S. Lv, P. Zhang, and C. Liu, “Computation offloading outage probability analysis and min-max fairness optimization in RIS-assisted MEC system,” IEEE Trans. Veh. Technol., vol. 72, no. 4, pp. 4615–4627, 2022.
Z. Wan, W. Jiang, J. Nie, D. Niyato, C. Pan, and Z. Xiong, “Min-max fairness based joint optimal designfor IRS-assisted MEC systems,” IEEE Trans. Veh. Technol., 2024.
L. You, J. Xiong, Y. Huang, D. W. K. Ng, C. Pan, W. Wang, and X. Gao, “Reconfigurable intelligent surfaces-assisted multiuser MIMO uplink transmission with partial CSI,” IEEE Trans. Wireless Commun., vol. 20, no. 9, pp. 5613–5627, 2021.
M. Sadek, A. Tarighat, and A. H. Sayed, “Active antenna selection in multiuser MIMO communications,” IEEE Trans. Signal Process., vol. 55, no. 4, pp. 1498–1510, 2007.
J. Zhao, Y. Liu, K. K. Chai, Y. Chen, and M. Elkashlan, “Many-to-many matching with externalities for device-to-device communications,” IEEE Wireless Commun. letters, vol. 6, no. 1, pp. 138–141, 2016.
J. C. Bezdek and R. J. Hathaway, “Convergence of alternating optimization,” Neural, Parallel & Scientific Computations, vol. 11, no. 4, pp. 351–368, 2003.
T. T. Nguyen and K.-K. Nguyen, “Channel estimation in IRS-assisted multi-cast multi-group communication systems,” in IEEE Int. Conf. Commun. (ICC). IEEE, 2023, pp. 1–6.
M. Mitchell, An introduction to genetic algorithms. MIT press, 1998.
Y. Rabinovich and A. Wigderson, “Techniques for bounding the convergence rate of genetic algorithms,” Random Structures & Algorithms, vol. 14, no. 2, pp. 111–138, 1999.
T. Bäck, J. N. Kok, and G. Rozenberg, Handbook of natural computing. Springer, Heidelberg, 2012.