SAC-based UAV mobile edge computing for energy minimization and secure data transmission

被引:8
作者
Zhao, Xu [1 ,2 ]
Zhao, Tianhao [3 ]
Wang, Feiyu [3 ]
Wu, Yichuan [3 ]
Li, Maozhen [4 ]
机构
[1] Xian Polytech Univ, Sch Elect & Informat, Xian 710048, Peoples R China
[2] Shaanxi Bianyun Collaborat Network Technol Co Ltd, Xian 712000, Peoples R China
[3] Xian Polytech Univ, Sch Comp Sci, Xian 710048, Peoples R China
[4] Brunel Univ, Dept Elect & Elect Engn, London UB8 3PH, England
关键词
Uav; Deep reinforcement learning; Soft actor critic; Energy optimization; Secure data transmission; RESOURCE-ALLOCATION; TRAJECTORY DESIGN; NETWORKS; OPTIMIZATION;
D O I
10.1016/j.adhoc.2024.103435
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the use of UAVs to carry mobile edge computing servers has become an emerging solution to the problem of collaborative ground -to -air communication. However, due to the limited energy consumption of UAVs and the open nature of wireless communication, UAV-based mobile edge computing faces issues such as limited operation time and the potential for insecure connections during data transmission. In this paper, we model a secure data transmission model for UAVs with the goal of minimizing energy consumption. First, we decompose the system energy consumption optimization problem into two sub -problems: ground user energy consumption overhead and UAV energy consumption overhead. We consider the limitations of UAV flight range, computational power, and transmission capability in relation to ground user and UAV, solve the energy consumption optimization problem by deep reinforcement learning, and propose a solution based on the SAC algorithm. The solution applies the idea of maximum entropy to explore the optimal policy and use efficient iterative updates to obtain the optimal policy, enhancing the exploration capability of the algorithm and improving the convergence speed of the training process by retaining all policies with high return values. Secondly, considering the existence of insecure connection nodes in practical application scenarios, a ground user data protection scheme based on Paillier encryption and blockchain is used to achieve secure data transmission. Simulation results show that the proposed method can achieve secure data offloading, effectively reduce the average energy consumption of users, and have good stability and convergence compared with existing methods.
引用
收藏
页数:13
相关论文
共 46 条
[1]   Energy-Efficient UAV-to-User Scheduling to Maximize Throughput in Wireless Networks [J].
Ahmed, Shakil ;
Chowdhury, Mostafa Zaman ;
Jang, Yeong Min .
IEEE ACCESS, 2020, 8 :21215-21225
[2]   Federated learning review: Fundamentals, enabling technologies, and future applications [J].
Banabilah, Syreen ;
Aloqaily, Moayad ;
Alsayed, Eitaa ;
Malik, Nida ;
Jararweh, Yaser .
INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (06)
[3]   An obstacle avoidance approach for UAV path planning [J].
Bashir, Nouman ;
Boudjit, Saadi ;
Dauphin, Gabriel ;
Zeadally, Sherali .
SIMULATION MODELLING PRACTICE AND THEORY, 2023, 129
[4]   Trusted Registration, Negotiation, and Service Evaluation in Multi-Agent Systems throughout the Blockchain Technology [J].
Calvaresi, Davide ;
Dubovitskaya, Alevtina ;
Retaggi, Diego ;
Dragoni, Aldo F. ;
Schumacher, Michael .
2018 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2018), 2018, :56-63
[5]   A federated deep learning framework for privacy preservation and communication efficiency [J].
Cao, Tien-Dung ;
Tram, Truong-Huu ;
Tran, Hien ;
Tran, Khanh .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 124
[6]   Security and Privacy Frameworks for Access Control Big Data Systems [J].
Centonze, Paolina .
CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (02) :361-374
[7]  
Costantino D, 2015, 2015 2ND IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR AEROSPACE (METROAEROSPACE), P351, DOI 10.1109/MetroAeroSpace.2015.7180681
[8]   Coarse Trajectory Design for Energy Minimization in UAV-Enabled [J].
Dinh-Hieu Tran ;
Vu, Thang X. ;
Chatzinotas, Symeon ;
ShahbazPanahi, Shahram ;
Ottersten, Bjorn .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) :9483-9496
[9]   Anti-Jamming 3D Trajectory Design for UAV-Enabled Wireless Sensor Networks Under Probabilistic LoS Channel [J].
Duo, Bin ;
Wu, Qingqing ;
Yuan, Xiaojun ;
Zhang, Rui .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) :16288-16293
[10]   Mobile Code Offloading: From Concept to Practice and Beyond [J].
Flores, Huber ;
Hui, Pan ;
Tarkoma, Sasu ;
Li, Yong ;
Srirama, Satish ;
Buyya, Rajkumar .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (03) :80-88