{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:29Z","timestamp":1740149069122,"version":"3.37.3"},"reference-count":22,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,7,10]],"date-time":"2021-07-10T00:00:00Z","timestamp":1625875200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2020JQ-844","61901367","62001357","61871321","U1965102","2017KCT-30-02","2016ZX03001016","6142104200412"],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2020JQ-844","61901367","62001357","61871321","U1965102","2017KCT-30-02","2016ZX03001016","6142104200412"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Innovation Team of Shaanxi Province for Broadband Wireless and Application","award":["2020JQ-844","61901367","62001357","61871321","U1965102","2017KCT-30-02","2016ZX03001016","6142104200412"]},{"DOI":"10.13039\/501100018537","name":"National Science and Technology Major Project","doi-asserted-by":"crossref","award":["2020JQ-844","61901367","62001357","61871321","U1965102","2017KCT-30-02","2016ZX03001016","6142104200412"],"id":[{"id":"10.13039\/501100018537","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Project of Key Labortary of Science and Technology on Communication Network","award":["2020JQ-844","61901367","62001357","61871321","U1965102","2017KCT-30-02","2016ZX03001016","6142104200412"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,7,10]]},"abstract":"Blockchain technology has been widely used in many fields. However, the proof of work (PoW) problem in the mining process of mobile devices requires a large amount of computing resources and energy consumption, which brings huge challenges to mobile devices. Mobile edge computing (MEC) can effectively solve the above problems, allowing mobile devices to offload tasks to edge servers to relieve the pressure of limited computing resources on mobile devices. Nonorthogonal multiple access (NOMA) is good at improving spectrum efficiency, so that the system can accommodate more users. In this paper, we propose a new NOMA-based MEC-enabled blockchain framework. Under the conditions of a given task execution deadline, the decision of offloading, local computing resource allocation, user clustering and admission control, and transmit power control is jointly optimized to minimize the total cost of the system. Since the problem is hard to solve, we decouple it into subproblems for low-complexity solutions. First, we propose two heuristic algorithms to obtain the binary offloading decision and user association, and then closed-form solutions of local resource allocation and transmit power control are obtained under the required delay constraints. Simulation results show that our proposed algorithms perform good in cost reduction compared with other baseline algorithms.<\/jats:p>","DOI":"10.1155\/2021\/8259817","type":"journal-article","created":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T20:05:30Z","timestamp":1626120330000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["Cost-Effective Optimization for Blockchain-Enabled NOMA-Based MEC Networks"],"prefix":"10.1155","volume":"2021","author":[{"given":"Jianbo","family":"Du","sequence":"first","affiliation":[{"name":"Shaanxi Key Laboratory of Information Communication Network and Security, School of Communications and Information Engineering, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"}]},{"given":"Yan","family":"Sun","sequence":"additional","affiliation":[{"name":"Shaanxi Key Laboratory of Information Communication Network and Security, School of Communications and Information Engineering, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7978-4060","authenticated-orcid":true,"given":"Aijing","family":"Sun","sequence":"additional","affiliation":[{"name":"Shaanxi Key Laboratory of Information Communication Network and Security, School of Communications and Information Engineering, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3938-9207","authenticated-orcid":true,"given":"Guangyue","family":"Lu","sequence":"additional","affiliation":[{"name":"Shaanxi Key Laboratory of Information Communication Network and Security, School of Communications and Information Engineering, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"}]},{"given":"Zhixian","family":"Chang","sequence":"additional","affiliation":[{"name":"Shaanxi Key Laboratory of Information Communication Network and Security, School of Communications and Information Engineering, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China"}]},{"given":"Haotong","family":"Cao","sequence":"additional","affiliation":[{"name":"Jiangsu Key Laboratory of Wireless Communications, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Jie","family":"Feng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks, School of Telecommunications Engineering, Xidian University, Xi\u2019an, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2842685"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2961707"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2883156"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2924513"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/jstsp.2019.2898643"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2018.2881314"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2816597"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2017.2778106"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/iccc49849.2020.9238904"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3033521"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/smartiot.2019.00043"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120698"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3018809"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2020.3020068"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2019.2907253"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2950393"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2773489"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2019.2947670"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3006478"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2018.2866365"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2020.2982627"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3003449"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8259817.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8259817.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8259817.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T20:05:40Z","timestamp":1626120340000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/8259817\/"}},"subtitle":[],"editor":[{"given":"Mohamed Amine","family":"Ferrag","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,7,10]]},"references-count":22,"alternative-id":["8259817","8259817"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8259817","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,7,10]]}}}