File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Joint Resource and Trajectory Optimization for Security in UAV-Assisted MEC Systems

TitleJoint Resource and Trajectory Optimization for Security in UAV-Assisted MEC Systems
Authors
KeywordsMobile edge computing
non-orthogonal multiple access
physical layer security
trajectory optimization
unmanned aerial vehicle
Issue Date2021
Citation
IEEE Transactions on Communications, 2021, v. 69, n. 1, p. 573-588 How to Cite?
AbstractUnmanned aerial vehicle (UAV) has been widely applied in internet-of-things (IoT) scenarios while the security for UAV communications remains a challenging problem due to the broadcast nature of the line-of-sight (LoS) wireless channels. This article investigates the security problems for dual UAV-assisted mobile edge computing (MEC) systems, where one UAV is invoked to help the ground terminal devices (TDs) to compute the offloaded tasks and the other one acts as a jammer to suppress the vicious eavesdroppers. In our framework, minimum secure computing capacity maximization problems are proposed for both the time division multiple access (TDMA) scheme and non-orthogonal multiple access (NOMA) scheme by jointly optimizing the communication resources, computation resources, and UAVs' trajectories. The formulated problems are non-trivial and challenging to be solved due to the highly coupled variables. To tackle these problems, we first transform them into more tractable ones then a block coordinate descent based algorithm and a penalized block coordinate descent based algorithm are proposed to solve the problems for TDMA and NOMA schemes, respectively. Finally, numerical results show that the security computing capacity performance of the systems is enhanced by the proposed algorithms as compared with the benchmarks. Meanwhile, the NOMA scheme is superior to the TDMA scheme for security improvement.
Persistent Identifierhttp://hdl.handle.net/10722/349515
ISSN
2023 Impact Factor: 7.2
2020 SCImago Journal Rankings: 1.468

 

DC FieldValueLanguage
dc.contributor.authorXu, Yu-
dc.contributor.authorZhang, Tiankui-
dc.contributor.authorYang, Dingcheng-
dc.contributor.authorLiu, Yuanwei-
dc.contributor.authorTao, Meixia-
dc.date.accessioned2024-10-17T06:59:02Z-
dc.date.available2024-10-17T06:59:02Z-
dc.date.issued2021-
dc.identifier.citationIEEE Transactions on Communications, 2021, v. 69, n. 1, p. 573-588-
dc.identifier.issn0090-6778-
dc.identifier.urihttp://hdl.handle.net/10722/349515-
dc.description.abstractUnmanned aerial vehicle (UAV) has been widely applied in internet-of-things (IoT) scenarios while the security for UAV communications remains a challenging problem due to the broadcast nature of the line-of-sight (LoS) wireless channels. This article investigates the security problems for dual UAV-assisted mobile edge computing (MEC) systems, where one UAV is invoked to help the ground terminal devices (TDs) to compute the offloaded tasks and the other one acts as a jammer to suppress the vicious eavesdroppers. In our framework, minimum secure computing capacity maximization problems are proposed for both the time division multiple access (TDMA) scheme and non-orthogonal multiple access (NOMA) scheme by jointly optimizing the communication resources, computation resources, and UAVs' trajectories. The formulated problems are non-trivial and challenging to be solved due to the highly coupled variables. To tackle these problems, we first transform them into more tractable ones then a block coordinate descent based algorithm and a penalized block coordinate descent based algorithm are proposed to solve the problems for TDMA and NOMA schemes, respectively. Finally, numerical results show that the security computing capacity performance of the systems is enhanced by the proposed algorithms as compared with the benchmarks. Meanwhile, the NOMA scheme is superior to the TDMA scheme for security improvement.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Communications-
dc.subjectMobile edge computing-
dc.subjectnon-orthogonal multiple access-
dc.subjectphysical layer security-
dc.subjecttrajectory optimization-
dc.subjectunmanned aerial vehicle-
dc.titleJoint Resource and Trajectory Optimization for Security in UAV-Assisted MEC Systems-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TCOMM.2020.3025910-
dc.identifier.scopuseid_2-s2.0-85099772191-
dc.identifier.volume69-
dc.identifier.issue1-
dc.identifier.spage573-
dc.identifier.epage588-
dc.identifier.eissn1558-0857-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats