Secure Task Offloading for MEC-Aided-UAV System

被引:24
作者
Chen, Peipei [1 ]
Luo, Xueshan [1 ]
Guo, Deke [1 ]
Sun, Yuchen [1 ]
Xie, Junjie [2 ]
Zhao, Yawei [3 ]
Zhou, Rui [4 ]
机构
[1] Natl Univ Def Technol, Sci & Technol Informat Syst Engn Lab, Changsha 410073, Peoples R China
[2] AMS, Inst Syst Engn, Beijing 100141, Peoples R China
[3] Chinese Peoples Liberat Army Gen Hosp, Med Engn Lab, Med Big Data Res Ctr, Beijing 100039, Peoples R China
[4] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou 730000, Peoples R China
来源
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES | 2023年 / 8卷 / 05期
基金
中国国家自然科学基金;
关键词
Task analysis; Autonomous aerial vehicles; Optimization; Security; Trajectory; Servers; Wireless communication; UAV communication; mobile-edge computing; physical layer security; artificial noise; PHYSICAL LAYER SECURITY; TRAJECTORY OPTIMIZATION; LATENCY MINIMIZATION; JOINT RESOURCE; EDGE; COMMUNICATION; MANAGEMENT; NETWORKS; DESIGN; TIME;
D O I
10.1109/TIV.2022.3227367
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The promise of unmanned aerial vehicles (UAVs) combined with the mobile edge computing (MEC), named MEC-aided-UAV extends the MEC application to offer new flexible, low-latency computing services and considerable utilities for pervasive sensing of the world. In MEC, the UAV with limited on-board energy and computation resources needs to offload its tasks to resource-rich ground base stations (GBSs) servers. Because of the broadcast nature of line-of-sight (LoS) channels, one of the key challenges in task offloading is to guarantee that confidential data is offloaded safely to the GBSs without being intercepted by eavesdroppers (Eves). In this MEC-aided-UAV system, the GBSs help the UAV compute the offloaded tasks and transmit the artificial noise (AN) to suppress the vicious Eves. We make the first attempt to study the maximum-minimum average secrecy capacity problem, including joint optimization of the trajectory and transmit power of the UAV, the transmit power of AN, the local computation ratio, and the selection of GBSs with consideration of the practical constraints of completion delay of the tasks, maximum velocity, and the power consumption. The optimization issue is confirmed as a mixed-integer non-convex problem. Thereafter, a low-complexity iterative algorithm with the block coordinate descent method and successive convex approximation technique is put forward to get its suboptimal solution. In addition, the convergent solution can be achieved by solving the subproblems in turn. Evaluation results validate that the proposed secure offloading scheme significantly effectiveness the baselines by 17.4%-71.2% on the maximum-minimum average secrecy capacity.
引用
收藏
页码:3444 / 3457
页数:14
相关论文
共 45 条
[1]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[2]  
[Anonymous], 2017, P GLOBECOM 2017 2017
[3]   Latency Minimization for Intelligent Reflecting Surface Aided Mobile Edge Computing [J].
Bai, Tong ;
Pan, Cunhua ;
Deng, Yansha ;
Elkashlan, Maged ;
Nallanathan, Arumugam ;
Hanzo, Lajos .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (11) :2666-2682
[4]   Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems [J].
Bai, Tong ;
Wang, Jingjing ;
Ren, Yong ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (06) :6074-6087
[5]   Utility Aware Task Offloading for Mobile Edge Computing [J].
Bi, Ran ;
Ren, Jiankang ;
Wang, Hao ;
Liu, Qian ;
Yang, Xiuyuan .
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019, 2019, 11604 :547-555
[6]  
Chen WW, 2020, IEEE INFOCOM SER, P228, DOI [10.1109/infocom41043.2020.9155397, 10.1109/INFOCOM41043.2020.9155397]
[7]  
Eshraghi N, 2019, IEEE INFOCOM SER, P1414, DOI [10.1109/INFOCOM.2019.8737559, 10.1109/infocom.2019.8737559]
[8]   Reinforcement Learning-Based Collision Avoidance and Optimal Trajectory Planning in UAV Communication Networks [J].
Hsu, Yu-Hsin ;
Gau, Rung-Hung .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (01) :306-320
[9]   Energy Management and Trajectory Optimization for UAV-Enabled Legitimate Monitoring Systems [J].
Hu, Shuyan ;
Wu, Qingqing ;
Wang, Xin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (01) :142-155
[10]  
Lemarechal C., 2004, CONVEX OPTIMIZATION, V170