{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:03:08Z","timestamp":1770282188097,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s11277-025-11806-3","type":"journal-article","created":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T03:02:49Z","timestamp":1754967769000},"page":"237-262","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secrecy Offloading of UAV-Assisted MEC Cooperative Hybrid NOMA-TDMA Framework with Friendly Jammer in IoT Network"],"prefix":"10.1007","volume":"142","author":[{"given":"Gia-Huy","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anh-Nhat","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Khai","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tung-Son","family":"Ngo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ngoc-Anh","family":"Bui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Phuong-Chi","family":"Le","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manh-Duc","family":"Hoang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tien-Dat","family":"Trinh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tuan-Anh","family":"Hoang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,8,12]]},"reference":[{"key":"11806_CR1","doi-asserted-by":"crossref","unstructured":"Song, X., Yin, Z., Li, Y., Li, X., Wang, J., & Jing, M. (2023). A collision probability based multi-user grant-free scheduling method for ultra-reliable and low latency communications. VTC2023-Spring. 10.1109\/VTC2023-Spring57618.2023.10199833","DOI":"10.1109\/VTC2023-Spring57618.2023.10199833"},{"key":"11806_CR2","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1109\/OJVT.2024.3466858","volume":"5","author":"SK Das","year":"2024","unstructured":"Das, S. K., Mudi, R., Rahman, M. S., Rabie, K. M., & Li, X. (2024). Federated reinforcement learning for wireless networks: Fundamentals, challenges and future research trends. IEEE Open Journal of Vehicular Technology, 5, 1400\u20131440. https:\/\/doi.org\/10.1109\/OJVT.2024.3466858","journal-title":"IEEE Open Journal of Vehicular Technology"},{"issue":"4","key":"11806_CR3","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/LWC.2024.3362898","volume":"13","author":"B Chen","year":"2024","unstructured":"Chen, B., & Xu, D. (2024). Performance analysis of NOMA-based MEC systems with semi-grant-free transmission. IEEE Wireless Communications Letters, 13(4), 1123\u20131127. https:\/\/doi.org\/10.1109\/LWC.2024.3362898","journal-title":"IEEE Wireless Communications Letters"},{"issue":"1","key":"11806_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4108\/eetsis.4664","volume":"12","author":"A-N Nguyen","year":"2024","unstructured":"Nguyen, A.-N., Ngo, T.-S., Bui, N.-A., Le, P.-C., & Hoang, M.-D. (2024). Secrecy offloading analysis of NOMA-based UAV-aided MEC in IoT networks with imperfect CSI and SIC. EAI Endorsed Transactions on Scalable Information Systems, 12(1), 1\u201310. https:\/\/doi.org\/10.4108\/eetsis.4664","journal-title":"EAI Endorsed Transactions on Scalable Information Systems"},{"issue":"1","key":"11806_CR5","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/TVT.2023.3309619","volume":"73","author":"CK Singh","year":"2024","unstructured":"Singh, C. K., Upadhyay, P. K., Lehtomaki, J., & Juntti, M. (2024). Performance analysis with deep learning assay for cooperative UAV-Borne IRS NOMA networks under non-ideal system imperfections. IEEE Transactions on Vehicular Technology, 73(1), 1065\u20131083. https:\/\/doi.org\/10.1109\/TVT.2023.3309619","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"11806_CR6","doi-asserted-by":"publisher","first-page":"127800","DOI":"10.1109\/ACCESS.2023.3331752","volume":"11","author":"A-N Nguyen","year":"2023","unstructured":"Nguyen, A.-N., Ha, D.-B., Truong, T.-V., Sanguanpong, S., & So-In, C. (2023). Secrecy performance analysis and optimization for UAV-relay-enabled WPT and cooperative NOMA MEC in IoT networks. IEEE Access, 11, 127800\u2013127816. https:\/\/doi.org\/10.1109\/ACCESS.2023.3331752","journal-title":"IEEE Access"},{"issue":"1","key":"11806_CR7","doi-asserted-by":"publisher","first-page":"111","DOI":"10.37868\/hsd.v6i1.389","volume":"6","author":"HR Abdulshaheed","year":"2024","unstructured":"Abdulshaheed, H. R., Penubadi, H. R., Tawfeq, J. F., Abdulbaq, A. S., Radhi, A. D., Shah, P., Gheni, H. M., Khatwani, R., Nanda, N., Mitra, P. K., Aanand, S., & Niu, Y. (2024). Sustainable optimizing WMN performance through meta-heuristic TDMA link scheduling and routing. Heritage and Sustainable Development, 6(1), 111\u2013126. https:\/\/doi.org\/10.37868\/hsd.v6i1.389","journal-title":"Heritage and Sustainable Development"},{"key":"11806_CR8","doi-asserted-by":"publisher","first-page":"1944","DOI":"10.1007\/s11082-024-07737-1","volume":"56","author":"S Dheenathayalan","year":"2024","unstructured":"Dheenathayalan, S., Bukkawar, S., Hari Krishna, E., & Tiwari, S. (2024). Optimized TDMA framework for channel interference mitigation in IWSN based on self-adaptive affinity propagation clustering. Optical and Quantum Electronics, 56, 1944. https:\/\/doi.org\/10.1007\/s11082-024-07737-1","journal-title":"Optical and Quantum Electronics"},{"issue":"21","key":"11806_CR9","doi-asserted-by":"publisher","first-page":"4240","DOI":"10.3390\/electronics13214240","volume":"13","author":"S Wang","year":"2024","unstructured":"Wang, S., & Luo, Z. (2024). An energy-efficient scheme design for NOMA-based UAV-assisted MEC systems. Electronics, 13(21), 4240. https:\/\/doi.org\/10.3390\/electronics13214240","journal-title":"Electronics"},{"key":"11806_CR10","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1109\/OJCOMS.2024.3358064","volume":"5","author":"Y Li","year":"2024","unstructured":"Li, Y., Zhang, X., Lei, B., Zhao, Q., Wei, M., Qu, Z., & Wang, W. (2024). Computation rate maximization for wireless-powered edge computing with multi-user cooperation. IEEE Open Journal of the Communications Society, 5, 965\u2013981. https:\/\/doi.org\/10.1109\/OJCOMS.2024.3358064","journal-title":"IEEE Open Journal of the Communications Society"},{"key":"11806_CR11","doi-asserted-by":"publisher","unstructured":"Qaiser, M. T., Sohail, M. S., Shafqat, M., Ullah, S. A., Jung, H., & Hassan, S. A. (2024). Optimizing resource allocation in MEC-enabled CR-NOMA-assisted IoT networks: A DRL-driven strategy. IEEE Wireless Communications and Networking Conference (WCNC). https:\/\/doi.org\/10.1109\/WCNC57260.2024.10570963","DOI":"10.1109\/WCNC57260.2024.10570963"},{"key":"11806_CR12","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-3-031-75593-4_23","volume":"229","author":"G-H Nguyen","year":"2024","unstructured":"Nguyen, G.-H., Nguyen, A.-N., Ngo, T.-S., Bui, N.-A., Le, P.-C., Hoang, M.-D., Trinh, T.-D., Nguyen, K., & Nguyen, M.-S. (2024). Performance analysis of an UAV-assisted NOMA-based on MEC in IoT network with wireless power transfer. Lecture Notes on Data Engineering and Communications, 229, 381\u2013392. https:\/\/doi.org\/10.1007\/978-3-031-75593-4_23","journal-title":"Lecture Notes on Data Engineering and Communications"},{"key":"11806_CR13","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-981-97-2082-8_28","volume":"969","author":"A-N Nguyen","year":"2023","unstructured":"Nguyen, A.-N., Do, T.-D., Nguyen, G.-H., & Le, H.-H. (2023). UAV relay-assisted NOMA MEC in IoT networks: offloading performance and optimization. Lecture Notes in Networks and Systems, 969, 393\u2013408. https:\/\/doi.org\/10.1007\/978-981-97-2082-8_28","journal-title":"Lecture Notes in Networks and Systems"},{"key":"11806_CR14","doi-asserted-by":"publisher","unstructured":"Nguyen, A.-N., Nguyen, G.-H., Ngo, T.-S., Bui, N.-A., Le, P.-C., & Hoang, M.-D. (2024). Secrecy offloading analysis of UAV-assisted NOMA-MEC incorporating WPT in IoT networks. In 28th International Computer Science and Engineering Conference (ICSEC). https:\/\/doi.org\/10.1109\/ICSEC62781.2024.10770735","DOI":"10.1109\/ICSEC62781.2024.10770735"},{"key":"11806_CR15","doi-asserted-by":"publisher","unstructured":"Nguyen, A.-N., Nguyen, G.-H., Ngo, T.-S., Bui, N.-A., Le, P.-C., & Hoang, M.-D. (2024). Secrecy offloading performance analysis for UAV relay-assisted NOMA MEC system. In 28th International Computer Science and Engineering Conference (ICSEC). https:\/\/doi.org\/10.1109\/ICSEC62781.2024.10770707","DOI":"10.1109\/ICSEC62781.2024.10770707"},{"issue":"3","key":"11806_CR16","doi-asserted-by":"publisher","first-page":"865","DOI":"10.3390\/s22030865","volume":"22","author":"G-H Jeon","year":"2022","unstructured":"Jeon, G.-H., Lee, J.-H., Sung, Y.-S., Park, H.-J., Lee, Y.-J., Yun, S.-W., & Lee, I.-G. (2022). Cooperative friendly jamming techniques for drone-based mobile secure zone. Sensors, 22(3), 865. https:\/\/doi.org\/10.3390\/s22030865","journal-title":"Sensors"},{"key":"11806_CR17","doi-asserted-by":"publisher","unstructured":"Nguyen, K., Nguyen, A.-N., Nguyen, G.-H., & Nguyen, M.-S. (2024). Computation offloading analysis of IoT networks with UAV-enabled MEC with NOMA and WPT. In 28th International Computer Science and Engineering Conference (ICSEC). https:\/\/doi.org\/10.1109\/ICSEC62781.2024.10770747","DOI":"10.1109\/ICSEC62781.2024.10770747"},{"issue":"12","key":"11806_CR18","doi-asserted-by":"publisher","first-page":"1756","DOI":"10.3390\/e24121756","volume":"24","author":"D-H Chen","year":"2022","unstructured":"Chen, D.-H., & Jiang, E.-H. (2022). Joint power and time allocation in hybrid NoMA\/OMA IoT networks for two-way communications. Entropy, 24(12), 1756. https:\/\/doi.org\/10.3390\/e24121756","journal-title":"Entropy"},{"issue":"5","key":"11806_CR19","doi-asserted-by":"publisher","first-page":"3006","DOI":"10.1109\/TWC.2022.3215450","volume":"22","author":"Y Zhu","year":"2023","unstructured":"Zhu, Y., Yuan, X., Hu, Y., Wang, T., Gursoy, M. C., & Schmeink, A. (2023). Low-latency hybrid NOMA-TDMA: QoS-driven design framework. IEEE Transactions on Wireless Communications, 22(5), 3006\u20133021. https:\/\/doi.org\/10.1109\/TWC.2022.3215450","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"11806_CR20","doi-asserted-by":"publisher","first-page":"65241","DOI":"10.1109\/ACCESS.2024.3396497","volume":"12","author":"A Afridi","year":"2024","unstructured":"Afridi, A., Hameed, I., Garca, C. E., & Koo, I. (2024). Throughput maximization of wireless powered IoT network with hybrid NOMA-TDMA scheme: A genetic algorithm approach. IEEE Access, 12, 65241\u201365253. https:\/\/doi.org\/10.1109\/ACCESS.2024.3396497","journal-title":"IEEE Access"},{"key":"11806_CR21","doi-asserted-by":"publisher","unstructured":"Nguyen, A.-N., Ngo, T.-S., Bui, N.-A., Le, P.-C., & Nguyen, G.-H. (2023). UAV-aided uplink NOMA based on MEC in IoT networks: Secrecy offloading and optimization. EAI\/Springer Innovations in Communication and Computing,131\u2013146. https:\/\/doi.org\/10.1007\/978-3-031-53028-9_8","DOI":"10.1007\/978-3-031-53028-9_8"},{"key":"11806_CR22","doi-asserted-by":"publisher","first-page":"7878","DOI":"10.1109\/OJCOMS.2024.3510887","volume":"5","author":"CK Singh","year":"2024","unstructured":"Singh, C. K., Kumar, D., Lehtomaki, J. J., Khan, Z., Aho, M. L., & Upadhyay, P. K. (2024). Analysis with deep learning of robust UAV-mounted active IRS NOMA networks with imperfections. IEEE Open Journal of the Communications Society, 5, 7878\u20137899. https:\/\/doi.org\/10.1109\/OJCOMS.2024.3510887","journal-title":"IEEE Open Journal of the Communications Society"},{"issue":"1","key":"11806_CR23","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/TNSM.2025.3535094","volume":"22","author":"S Barick","year":"2025","unstructured":"Barick, S., & Singhal, C. (2025). UAV-assisted MEC architecture for collaborative task offloading in urban IoT environment. IEEE Transactions on Network and Service Management, 22(1), 732\u2013743. https:\/\/doi.org\/10.1109\/TNSM.2025.3535094","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"9","key":"11806_CR24","doi-asserted-by":"publisher","first-page":"510","DOI":"10.3390\/drones8090510","volume":"8","author":"M Wang","year":"2024","unstructured":"Wang, M., Li, R., Jing, F., & Gao, M. (2024). Multi-UAV assisted air-ground collaborative MEC system: DRL-based joint task offloading and resource allocation and 3D UAV trajectory optimization. Drones, 8(9), 510. https:\/\/doi.org\/10.3390\/drones8090510","journal-title":"Drones"},{"issue":"5","key":"11806_CR25","doi-asserted-by":"publisher","first-page":"8297","DOI":"10.3390\/drones8090510","volume":"74","author":"CK Singh","year":"2025","unstructured":"Singh, C. K., Kumar, D., Lehtomaki, J., Khan, Z., Aho, M. L., & Upadhyay, P. K. (2025). Robust UAV-integrated active STAR-RIS RSMA networks: Analysis with deep learning techniques. IEEE Transactions on Vehicular Technology, 74(5), 8297\u20138302. https:\/\/doi.org\/10.3390\/drones8090510","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"12","key":"11806_CR26","doi-asserted-by":"publisher","first-page":"19432","DOI":"10.1109\/TVT.2024.3434354","volume":"73","author":"L Zhong","year":"2024","unstructured":"Zhong, L., Liu, Y., Deng, X., Wu, C., Liu, S., & Yang, L. T. (2024). Distributed optimization of multi-role UAV functionality switching and trajectory for security task offloading in UAV-assisted MEC. IEEE Transactions on Communications, 73(12), 19432\u201319447. https:\/\/doi.org\/10.1109\/TVT.2024.3434354","journal-title":"IEEE Transactions on Communications"},{"key":"11806_CR27","doi-asserted-by":"publisher","first-page":"2531","DOI":"10.1109\/ACCESS.2023.3233947","volume":"11","author":"A Benaya","year":"2023","unstructured":"Benaya, A., Ismail, M. H., Ibrahim, A. S., & Abdalaziz, A. (2023). physical layer security enhancement via intelligent omni-surfaces and UAV-friendly jamming. IEEE Access, 11, 2531\u20132544. https:\/\/doi.org\/10.1109\/ACCESS.2023.3233947","journal-title":"IEEE Access"},{"key":"11806_CR28","doi-asserted-by":"publisher","unstructured":"Aghdam, M. R. G., Abdolee, R., Azhiri, F. A., & Tazehkand, B. M. (2018). Random user pairing in massive-MIMO-NOMA transmission systems based on mmWave. In IEEE 88th Vehicular Technology Conference (VTC-Fall). https:\/\/doi.org\/10.1109\/VTCFall.2018.8690578","DOI":"10.1109\/VTCFall.2018.8690578"},{"issue":"5","key":"11806_CR29","doi-asserted-by":"publisher","first-page":"3364","DOI":"10.1109\/TCOMM.2022.3159703","volume":"70","author":"W Lu","year":"2022","unstructured":"Lu, W., Ding, Y., Gao, Y., Chen, Y., Zhao, N., Ding, Z., & Nallanathan, A. (2022). Secure NOMA-based UAV-MEC network towards a flying eavesdropper. IEEE Transactions on Communications, 70(5), 3364\u20133376. https:\/\/doi.org\/10.1109\/TCOMM.2022.3159703","journal-title":"IEEE Transactions on Communications"},{"key":"11806_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2025.102707","volume":"72","author":"A-N Nguyen","year":"2025","unstructured":"Nguyen, A.-N., Hoang, D.-C., Bui, N.-A., Le, P.-C., Hoang, M.-D., Trinh, T.-D., & So-In, C. (2025). Secure task offloading and optimization for UAV-assisted NOMA-MEC system with friendly jamming. Physical Communication, 72, Article 102707. https:\/\/doi.org\/10.1016\/j.phycom.2025.102707","journal-title":"Physical Communication"},{"key":"11806_CR31","doi-asserted-by":"crossref","unstructured":"Agarwal, N., Shrivastava, N., & Pradhan, M. K. (2021). Ananya algorithm: A simple and new optimization algorithm for engineering optimization. in 4th biennial international conference on nascent technologies in engineering (icnte). https:\/\/doi.org\/10.1109\/ICNTE51185.2021.9487788","DOI":"10.1109\/ICNTE51185.2021.9487788"},{"key":"11806_CR32","doi-asserted-by":"publisher","unstructured":"Hashesh, A. O., Eldien, A. S. T., Fouda, M. M., & Zaki, R. M. (2023). Best height of UAV-aided NOMA using ML and optimization techniques. Intelligent methods, systems, and applications (IMSA). https:\/\/doi.org\/10.1109\/IMSA58542.2023.10217431","DOI":"10.1109\/IMSA58542.2023.10217431"},{"key":"11806_CR33","volume-title":"Table of integrals, series, and products","author":"IS Gradshteyn","year":"2014","unstructured":"Gradshteyn, I. S., & Ryzhik, I. M. (2014). Table of integrals, series, and products. Academic Press."},{"key":"11806_CR34","unstructured":"K. L. Judd (2011). Quadrature methods. University of Chicago\u2019s Initiative for Computational Economics (ICE)."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-025-11806-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-025-11806-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-025-11806-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T16:04:22Z","timestamp":1764000262000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-025-11806-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":34,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["11806"],"URL":"https:\/\/doi.org\/10.1007\/s11277-025-11806-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]},"assertion":[{"value":"25 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest for this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics, Consent to Participate, and Consent to Publish"}}]}}