UAV-Aided Energy-Efficient Edge Computing Networks: Security Offloading Optimization

被引:60
作者
Gu, Xiaohui [1 ,2 ]
Zhang, Guoan [1 ]
Wang, Mingxing [1 ]
Duan, Wei [1 ]
Wen, Miaowen [1 ,3 ]
Ho, Pin-Han [4 ]
机构
[1] Nantong Univ, Sch Informat Sci & Technol, Nantong 226019, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[3] South China Univ Technol, Sch Elect & Informat Engn, Guangzhou 510640, Peoples R China
[4] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
基金
中国国家自然科学基金;
关键词
Task analysis; Security; Servers; Resource management; Wireless communication; Internet of Things; Edge computing; Computation offloading; multiaccess edge computing (MEC); physical-layer security (PLS); resource allocation; unmanned aerial vehicle (UAV); RESOURCE-ALLOCATION;
D O I
10.1109/JIOT.2021.3103391
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAVs) are widely applied for service provisioning in many domains, such as topographic mapping and traffic monitoring. These applications are complicated with huge computational resources and extremely low-latency requirements. However, the moderate computational capability and limited energy restrict the local data processing for the UAV. Fortunately, this impediment may be mitigated by utilizing wireless power transfer (WPT) and employing the multiaccess edge computing (MEC) paradigm for offloading demanding computational tasks from the UAV via wireless communications. Particularly, the offloaded information may become compromising by the eavesdropper (Eve) when UAVs offload the computational tasks to MEC servers. To address this issue, a UAV-MEC (UMEC) system with energy harvesting (EH) is studied, where the full-duplex protocol is considered to realize simultaneously receiving confidential data from the UAV and broadcasting the control instructions. It is worth noting that in our proposed scheme, these control instructions also serve as the artificial interference to confuse the Eve. To improve the energy efficiency for offloading, the computational communication resource allocation is optimized to minimize the energy consumption for UAV with the consumed and harvested energy. Specially, the worst case secrecy offloading rate and computation-latency constraint are considered, to further enhance the reliability and security of the proposed system. Since the objective optimization problem is nonconvex, we convert it into a convex one by analytical means. The semiclosed form expressions of the offloading time, offloading data size, and transmit power are, respectively, derived. Moreover, the conditions of nonoffloading, partial, and full offloading are also discussed from a physical perspective. With the specific conditions of activating the above-mentioned three offloading options, numerical results verify the performance of our proposed offloading strategy in various scenarios and show the superiority of our offloading strategy with the existing works in terms of the offloading capacity and energy efficiency.
引用
收藏
页码:4245 / 4258
页数:14
相关论文
共 42 条
[1]   FellowMe Cache: Fog Computing approach to enhance (QoE) in Internet of Vehicles [J].
Abar, Tasnim ;
Rachedi, Abderrezak ;
Letaifa, Asma ben ;
Fabian, Philippe ;
Asmi, Sadok el .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 :170-182
[2]   Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems [J].
Bai, Tong ;
Wang, Jingjing ;
Ren, Yong ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (06) :6074-6087
[3]   Impact of Mobility Models on Energy Consumption in Unmanned Aerial Ad-Hoc Network [J].
Bensalem, Amina ;
Boubiche, Djallel Eddine ;
Zhou, Fen ;
Rachedi, Abderrezak ;
Mellouk, Abdelhamid .
PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, :361-364
[4]  
Boyd S., 2004, CONVEX OPTIMIZATION
[5]   Minimization of Transmission Completion Time in UAV-Enabled Wireless Powered Communication Networks [J].
Chen, Zhebiao ;
Chi, Kaikai ;
Zheng, Kechen ;
Dai, Guanglin ;
Shao, Qike .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (02) :1245-1259
[6]   Robust Trajectory and Transmit Power Design for Secure UAV Communications [J].
Cui, Miao ;
Zhang, Guangchi ;
Wu, Qingqing ;
Ng, Derrick Wing Kwan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) :9042-9046
[7]   Joint Resources and Workflow Scheduling in UAV-Enabled Wirelessly-Powered MEC for IoT Systems [J].
Du, Yao ;
Yang, Kun ;
Wang, Kezhi ;
Zhang, Guopeng ;
Zhao, Yizhe ;
Chen, Dongwei .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (10) :10187-10200
[8]   Cooperative Computation Offloading in FiWi Enhanced 4G HetNets Using Self-Organizing MEC [J].
Ebrahimzadeh, Amin ;
Maier, Martin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2020, 19 (07) :4480-4493
[9]  
Hu Y. Ch., 2015, Mobile Edge Computing A key technology towards 5G
[10]   Self-Energized UAV-Assisted Scheme for Cooperative Wireless Relay Networks [J].
Jayakody, Dushantha Nalin K. ;
Perera, Tharindu Dilshan Ponnimbaduge ;
Ghrayeb, Ali ;
Hasna, Mazen O. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (01) :578-592