{"id":"https://openalex.org/W4414165923","doi":"https://doi.org/10.1109/tmc.2025.3607599","title":"Reliable Intelligent Reflecting Surface-Assisted Mobile Edge Computing Systems: A Physical Layer Security and Encryption Design","display_name":"Reliable Intelligent Reflecting Surface-Assisted Mobile Edge Computing Systems: A Physical Layer Security and Encryption Design","publication_year":2025,"publication_date":"2025-09-09","ids":{"openalex":"https://openalex.org/W4414165923","doi":"https://doi.org/10.1109/tmc.2025.3607599"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2025.3607599","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3607599","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://orbilu.uni.lu/bitstream/10993/66124/1/Reliable_Intelligent_Reflecting_Surface-Assisted_Mobile_Edge_Computing_Systems_A_Physical_Layer_Security_and_Encryption_Design.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050608070","display_name":"Ti Ti Nguyen","orcid":"https://orcid.org/0000-0003-3933-2486"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Ti Ti Nguyen","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060290096","display_name":"Vu Nguyen Ha","orcid":"https://orcid.org/0000-0003-1325-3480"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Vu Nguyen Ha","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077893538","display_name":"Thanh-Dung Le","orcid":"https://orcid.org/0000-0003-0782-8698"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Thanh-Dung Le","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027473030","display_name":"Duc\u2010Dung Tran","orcid":"https://orcid.org/0000-0002-0040-3921"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Duc-Dung Tran","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016154330","display_name":"Symeon Chatzinotas","orcid":"https://orcid.org/0000-0001-5122-0001"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Symeon Chatzinotas","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Esch-Belval Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019659545","display_name":"Kim Khoa Nguyen","orcid":"https://orcid.org/0000-0002-9354-7544"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Kim-Khoa Nguyen","raw_affiliation_strings":["&#x00C9;cole de Technologie Sup&#x00E9;rieure, Montreal, QC, Canada","Ecole de Technologie Sup&#x00E9;rieure, Canada"],"affiliations":[{"raw_affiliation_string":"&#x00C9;cole de Technologie Sup&#x00E9;rieure, Montreal, QC, Canada","institution_ids":["https://openalex.org/I9736820"]},{"raw_affiliation_string":"Ecole de Technologie Sup&#x00E9;rieure, Canada","institution_ids":["https://openalex.org/I9736820"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5050608070"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25225512,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"2","first_page":"1950","last_page":"1966"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9330000281333923,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9330000281333923,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9266999959945679,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6173999905586243},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6146000027656555},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.546999990940094},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5109000205993652},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.46700000762939453},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.44839999079704285},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4124999940395355},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4009000062942505},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.38989999890327454}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8634999990463257},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6173999905586243},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6146000027656555},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5843999981880188},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.546999990940094},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5109000205993652},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4830000102519989},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.46700000762939453},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.44839999079704285},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4124999940395355},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4009000062942505},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38989999890327454},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.388700008392334},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3862000107765198},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3806000053882599},{"id":"https://openalex.org/C2781041963","wikidata":"https://www.wikidata.org/wiki/Q18348618","display_name":"Computation offloading","level":4,"score":0.37130001187324524},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.3215000033378601},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3118000030517578},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.30329999327659607},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.289900004863739},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.2676999866962433},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.2635999917984009},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.2533999979496002},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tmc.2025.3607599","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3607599","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:orbilu.uni.lu:10993/66124","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/66124","pdf_url":"https://orbilu.uni.lu/bitstream/10993/66124/1/Reliable_Intelligent_Reflecting_Surface-Assisted_Mobile_Edge_Computing_Systems_A_Physical_Layer_Security_and_Encryption_Design.pdf","source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Mobile Computing, 1-15 (2025)","raw_type":"peer reviewed"},{"id":"pmh:oai:espace2.etsmtl.ca:32545","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402392","display_name":"Espace \u00c9TS (ETS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1341030882","host_organization_name":"Educational Testing Service","host_organization_lineage":["https://openalex.org/I1341030882"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Non \u00e9valu\u00e9 par les pairs"}],"best_oa_location":{"id":"pmh:oai:orbilu.uni.lu:10993/66124","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/66124","pdf_url":"https://orbilu.uni.lu/bitstream/10993/66124/1/Reliable_Intelligent_Reflecting_Surface-Assisted_Mobile_Edge_Computing_Systems_A_Physical_Layer_Security_and_Encryption_Design.pdf","source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Mobile Computing, 1-15 (2025)","raw_type":"peer reviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414165923.pdf","grobid_xml":"https://content.openalex.org/works/W4414165923.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Mobile":[0],"edge":[1,30],"computing":[2,122,141],"(MEC)":[3],"has":[4],"emerged":[5],"as":[6,117,119],"a":[7,194],"promising":[8],"technology":[9,57],"to":[10,28,58,90,110,128],"extend":[11],"the":[12,33,85,92,112,130,157,164,179,182],"functionality":[13],"of":[14,37,166,181,187],"end-users'":[15],"wireless":[16,38,97,120,143],"devices":[17],"while":[18,135],"prolonging":[19],"their":[20],"battery":[21],"life":[22],"by":[23],"offloading":[24,41,115],"computationally":[25],"intensive":[26],"tasks":[27],"remote":[29],"servers.":[31],"However,":[32],"inherent":[34],"broadcast":[35],"nature":[36],"transmission":[39],"during":[40],"introduces":[42],"notable":[43],"security":[44,62],"challenges.":[45],"To":[46,155],"address":[47],"this":[48,81],"issue,":[49],"we":[50,83,108,162],"propose":[51],"leveraging":[52],"intelligent":[53],"reflecting":[54],"surface":[55],"(IRS)":[56],"enhance":[59],"physical":[60,86],"layer":[61,87],"(PLS).":[63],"Nevertheless,":[64],"attaining":[65],"high":[66],"PLS":[67,93],"for":[68],"all":[69],"users":[70],"in":[71,94,185],"dense":[72],"networks":[73],"with":[74,152],"multiple":[75],"malicious":[76],"terminals":[77],"is":[78,127],"challenging.":[79],"In":[80],"paper,":[82],"investigate":[84],"encryption":[88,101,113],"(PLE)":[89],"complement":[91],"enabling":[95],"secure":[96,195],"transmission.":[98],"Since":[99],"such":[100],"and":[102,121,142,150,160,169,190],"decryption":[103],"processes":[104],"require":[105],"computation":[106],"resources,":[107,144],"aim":[109],"optimize":[111],"decision,":[114,116],"well":[118],"resource":[123],"allocations.":[124],"Our":[125,175],"objective":[126,159],"minimize":[129],"maximum":[131],"weighted":[132],"energy":[133,188],"consumption":[134,189],"satisfying":[136],"practical":[137],"constraints,":[138,161],"including":[139],"limited":[140],"fulfilling":[145],"minimum":[146],"user":[147],"rate":[148],"requirements,":[149],"complying":[151],"IRS":[153],"conditions.":[154],"tackle":[156],"non-convex":[158],"explore":[163],"utilization":[165],"bisection":[167],"search":[168],"successive":[170],"convex":[171],"approximation":[172],"(SCA)":[173],"methods.":[174],"numerical":[176],"results":[177],"confirm":[178],"efficiency":[180],"proposed":[183],"design":[184],"terms":[186],"network":[191],"capacity":[192],"within":[193],"MEC":[196],"network.":[197]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
