Against Mobile Collusive Eavesdroppers: Cooperative Secure Transmission and Computation in UAV-Assisted MEC Networks

被引:2
作者
Zhao, Mingxiong [1 ,2 ,3 ,4 ,5 ]
Wang, Zirui [1 ]
Guo, Kun [6 ]
Zhang, Rongqian [7 ]
Quek, Tony Q. S. [8 ]
机构
[1] Yunnan Univ, Natl Pilot Sch Software, Kunming 650500, Peoples R China
[2] Minist Educ, Engn Res Ctr Integrat & Applicat Digital Learning, Beijing 100039, Peoples R China
[3] Minist Educ, Engn Res Ctr Cyberspace, Kunming 650504, Peoples R China
[4] Yunnan Univ Finance & Econ, Yunnan Key Lab Serv Comp, Kunming 650221, Peoples R China
[5] Yunnan Univ, Yunnan Key Lab Software Engn, Kunming 650091, Peoples R China
[6] East China Normal Univ, Sch Commun & Elect Engn, Shanghai Key Lab Multidimens Informat Proc, Shanghai 200241, Peoples R China
[7] Yunnan Univ, Sch Informat Sci & Engn, Kunming 650500, Peoples R China
[8] Singapore Univ Technol & Design, Informat Syst Technol & Design, Singapore 487372, Singapore
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Autonomous aerial vehicles; Security; Jamming; Eavesdropping; Trajectory; Processor scheduling; Interference; Real-time systems; Relays; Servers; UAV-assisted MEC networks; secure transmission; computation scheduling; mobile collusive eavesdroppers; RESOURCE-ALLOCATION; RATE MAXIMIZATION; ENERGY-EFFICIENT; COMMUNICATION; INTERFERENCE; OPTIMIZATION; DESIGN;
D O I
10.1109/TMC.2025.3529929
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Uncrewed Aerial Vehicle (UAV)-assisted Mobile Edge Computing (MEC) networks, the security of transmission faces significant challenges due to the vulnerabilities of line-of-sight links and potential eavesdropping on two-hop links. This paper addresses these challenges with an innovative Cooperative Secure Transmission and Computation strategy (CSTC), specifically engineered for time-slotted UAV-assisted MEC networks plagued by mobile collusive eavesdroppers. These eavesdroppers significantly bolster their interception capabilities through coordinated and optimized movements, escalating the security threats. To neutralize these risks, the proposed CSTC employs the UAV and remote devices as helper nodes to emit jamming signals, thereby thwarting eavesdropping activities, while simultaneously facilitating the efficient relay of users' tasks to the base station for advanced processing. The CSTC aims to maximize the sum Secrecy Transmission Rate (STR) satisfying task latency constraints. It involves a joint optimization of UAV trajectory, jamming beamformers, transmit power, and data offloading strategy to expedite task transmission. Additionally, a real-time computation scheduling approach is developed based on a newly defined metric, the Urgency Degree of Users (UDoU), to enhance task processing efficiency. Our extensive simulations validate that the CSTC not only elevates the sum STR but also consistently meets latency constraints, demonstrating its robustness against advanced mobile eavesdropping techniques.
引用
收藏
页码:5280 / 5297
页数:18
相关论文
共 43 条
[1]  
[Anonymous], 2007, Computer networking: A top-down (approach edition)
[2]   A survey of mobility models for ad hoc network research [J].
Camp, T ;
Boleng, J ;
Davies, V .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05) :483-502
[3]   Secure Task Offloading for Rural Area Surveillance Based on UAV-UGV Collaborations [J].
Chen, Peipei ;
Luo, Lailong ;
Guo, Deke ;
Luo, Xueshan ;
Li, Xinyi ;
Sun, Yuchen .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (01) :923-937
[4]   Secure Task Offloading for MEC-Aided-UAV System [J].
Chen, Peipei ;
Luo, Xueshan ;
Guo, Deke ;
Sun, Yuchen ;
Xie, Junjie ;
Zhao, Yawei ;
Zhou, Rui .
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2023, 8 (05) :3444-3457
[5]   Secure Wireless Communication via Intelligent Reflecting Surface [J].
Cui, Miao ;
Zhang, Guangchi ;
Zhang, Rui .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (05) :1410-1414
[6]   Online Edge Learning Offloading and Resource Management for UAV-Assisted MEC Secure Communications [J].
Ding, Yu ;
Feng, Yunqi ;
Lu, Weidang ;
Zheng, Shilian ;
Zhao, Nan ;
Meng, Limin ;
Nallanathan, Arumugam ;
Yang, Xiaoniu .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2023, 17 (01) :54-65
[7]   Time-Slotted Task Offloading and Resource Allocation for Cloud-Edge-End Cooperative Computing Networks [J].
Fan, Wenhao ;
Liu, Xun ;
Yuan, Hao ;
Li, Nan ;
Liu, Yuan'an .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (08) :8225-8241
[8]   Matching while Learning: Wireless Scheduling for Age of Information Optimization at the Edge [J].
Guo, Kun ;
Yang, Hao ;
Yang, Peng ;
Feng, Wei ;
Quek, Tony Q. S. .
CHINA COMMUNICATIONS, 2023, 20 (03) :347-360
[9]   Opportunistic Spectrum Sharing in Relay-Assisted Cognitive Systems With Imperfect CSI [J].
Hamdi, Karama ;
Hasna, Mazen O. ;
Ghrayeb, Ali ;
Ben Letaief, Khaled .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (05) :2224-2235
[10]   Energy Efficient Secure Computation Offloading in NOMA-Based mMTC Networks for IoT [J].
Han, Shujun ;
Xu, Xiaodong ;
Fang, Sisai ;
Sun, Yan ;
Cao, Yue ;
Tao, Xiaofeng ;
Zhang, Ping .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :5674-5690