An enhanced energy efficiency scheme for secure computing in UAV-MEC networks

被引:3
作者
Qian, Jin [1 ]
Gao, Xinmei [2 ]
Gao, Qinghe [2 ]
Li, Hui [1 ]
Huo, Yan [2 ]
Xing, Xiaoshuang [3 ]
机构
[1] Taizhou Univ, Sch Informat Engn, Taizhou 225300, Peoples R China
[2] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[3] Changshu Inst Technol, Sch Comp Sci & Engn, Suzhou 215506, Peoples R China
基金
中国国家自然科学基金;
关键词
UAV-enabled mobile edge computing; physical layer security; PLS; UAV trajectory optimisation; energy efficiency; PHYSICAL LAYER SECURITY; 5G WIRELESS NETWORKS; POWER; COMMUNICATION;
D O I
10.1504/IJSNET.2024.136336
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing (MEC) mitigates terminal device computing demands by deploying cloud resources at the network's edge. In this MEC framework, unmanned aerial vehicles (UAVs) equipped with MEC servers enhance both uplink and downlink offloading due to their exceptional maneuverability and line-of-sight (LoS) connectivity. However, the wireless nature of UAV-MEC systems exposes sensitive data to potential eavesdropping. To address this concern, we formulate an optimisation challenge aimed at maximising data secrecy energy efficiency. This optimisation balances data and energy efficiency while preserving communication security. Due to the problem's time-varying and non-convex nature, we decompose it into four subproblems: terminal scheduling, local computing ratio, UAV transmit power, and UAV trajectory optimisation. Subsequently, we develop a hybrid iterative algorithm to maximise data secrecy energy efficiency during offloading. Simulations illustrate the algorithm can efficiently utilise terminal and MEC server computation capabilities, enhance system security, and improve energy efficiency while reducing energy consumption in task offloading.
引用
收藏
页码:23 / 35
页数:14
相关论文
共 30 条
[1]   A Comparative Secrecy Study of Flying and Ground Eavesdropping in UAV Based Communication Systems [J].
Abughalwa, Monir ;
Hasna, Mazen O. .
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, :416-421
[4]  
Cao Shengnan, 2021, Proceedings. 2021 7th International Symposium on Mechatronics and Industrial Informatics (ISMII), P267, DOI 10.1109/ISMII52409.2021.00063
[5]   Deep Reinforcement Learning Based Resource Allocation in Multi-UAV-Aided MEC Networks [J].
Chen, Jingxuan ;
Cao, Xianbin ;
Yang, Peng ;
Xiao, Meng ;
Ren, Siqiao ;
Zhao, Zhongliang ;
Wu, Dapeng Oliver .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (01) :296-309
[6]  
Cheng K, 2018, IEEE ICC
[7]   Mobile-Edge Computing and the Internet of Things for Consumers Extending cloud computing and services to the edge of the network [J].
Corcoran, Peter ;
Datta, Soumya Kanti .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2016, 5 (04) :73-74
[8]   Secure Swarm UAV-Assisted Communications With Cooperative Friendly Jamming [J].
Dang-Ngoc, Hanh ;
Nguyen, Diep N. ;
Ho-Van, Khuong ;
Hoang, Dinh Thai ;
Dutkiewicz, Eryk ;
Pham, Quoc-Viet ;
Hwang, Won-Joo .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (24) :25596-25611
[9]  
Gao X., 2022, Wireless Communications and Mobile Computing, P1
[10]   Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming [J].
Huo, Yan ;
Fan, Xin ;
Ma, Liran ;
Cheng, Xiuzhen ;
Tian, Zhi ;
Chen, Dechang .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (06) :3265-3280