File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TCOMM.2020.3025910
- Scopus: eid_2-s2.0-85099772191
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Joint Resource and Trajectory Optimization for Security in UAV-Assisted MEC Systems
Title | Joint Resource and Trajectory Optimization for Security in UAV-Assisted MEC Systems |
---|---|
Authors | |
Keywords | Mobile edge computing non-orthogonal multiple access physical layer security trajectory optimization unmanned aerial vehicle |
Issue Date | 2021 |
Citation | IEEE Transactions on Communications, 2021, v. 69, n. 1, p. 573-588 How to Cite? |
Abstract | Unmanned aerial vehicle (UAV) has been widely applied in internet-of-things (IoT) scenarios while the security for UAV communications remains a challenging problem due to the broadcast nature of the line-of-sight (LoS) wireless channels. This article investigates the security problems for dual UAV-assisted mobile edge computing (MEC) systems, where one UAV is invoked to help the ground terminal devices (TDs) to compute the offloaded tasks and the other one acts as a jammer to suppress the vicious eavesdroppers. In our framework, minimum secure computing capacity maximization problems are proposed for both the time division multiple access (TDMA) scheme and non-orthogonal multiple access (NOMA) scheme by jointly optimizing the communication resources, computation resources, and UAVs' trajectories. The formulated problems are non-trivial and challenging to be solved due to the highly coupled variables. To tackle these problems, we first transform them into more tractable ones then a block coordinate descent based algorithm and a penalized block coordinate descent based algorithm are proposed to solve the problems for TDMA and NOMA schemes, respectively. Finally, numerical results show that the security computing capacity performance of the systems is enhanced by the proposed algorithms as compared with the benchmarks. Meanwhile, the NOMA scheme is superior to the TDMA scheme for security improvement. |
Persistent Identifier | http://hdl.handle.net/10722/349515 |
ISSN | 2023 Impact Factor: 7.2 2020 SCImago Journal Rankings: 1.468 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xu, Yu | - |
dc.contributor.author | Zhang, Tiankui | - |
dc.contributor.author | Yang, Dingcheng | - |
dc.contributor.author | Liu, Yuanwei | - |
dc.contributor.author | Tao, Meixia | - |
dc.date.accessioned | 2024-10-17T06:59:02Z | - |
dc.date.available | 2024-10-17T06:59:02Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | IEEE Transactions on Communications, 2021, v. 69, n. 1, p. 573-588 | - |
dc.identifier.issn | 0090-6778 | - |
dc.identifier.uri | http://hdl.handle.net/10722/349515 | - |
dc.description.abstract | Unmanned aerial vehicle (UAV) has been widely applied in internet-of-things (IoT) scenarios while the security for UAV communications remains a challenging problem due to the broadcast nature of the line-of-sight (LoS) wireless channels. This article investigates the security problems for dual UAV-assisted mobile edge computing (MEC) systems, where one UAV is invoked to help the ground terminal devices (TDs) to compute the offloaded tasks and the other one acts as a jammer to suppress the vicious eavesdroppers. In our framework, minimum secure computing capacity maximization problems are proposed for both the time division multiple access (TDMA) scheme and non-orthogonal multiple access (NOMA) scheme by jointly optimizing the communication resources, computation resources, and UAVs' trajectories. The formulated problems are non-trivial and challenging to be solved due to the highly coupled variables. To tackle these problems, we first transform them into more tractable ones then a block coordinate descent based algorithm and a penalized block coordinate descent based algorithm are proposed to solve the problems for TDMA and NOMA schemes, respectively. Finally, numerical results show that the security computing capacity performance of the systems is enhanced by the proposed algorithms as compared with the benchmarks. Meanwhile, the NOMA scheme is superior to the TDMA scheme for security improvement. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Communications | - |
dc.subject | Mobile edge computing | - |
dc.subject | non-orthogonal multiple access | - |
dc.subject | physical layer security | - |
dc.subject | trajectory optimization | - |
dc.subject | unmanned aerial vehicle | - |
dc.title | Joint Resource and Trajectory Optimization for Security in UAV-Assisted MEC Systems | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TCOMM.2020.3025910 | - |
dc.identifier.scopus | eid_2-s2.0-85099772191 | - |
dc.identifier.volume | 69 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | 573 | - |
dc.identifier.epage | 588 | - |
dc.identifier.eissn | 1558-0857 | - |