Joint Computation Offloading and Communication Design for Secure UAV-Enabled MEC Systems

In this paper, we investigate a secure unmanned aerial vehicle (UAV) enabled mobile edge computing (MEC) system, where multiple ground users and a UAV collaborate to complete computing tasks in the presence of multiple eavesdroppers on the ground with exact locations. The UAV acts as a computing server and users can offload part of computing tasks to the air in order to relieve calculation pressure. The total energy consumption of the UAV is minimized by jointly optimizing the task allocation, the transmit power of each user equipment, and the trajectory of UAV, subject to the secrecy offloading rate constrains, the transmit power and UAV’s trajectory constrains. To solve the difficult nonconvex optimization problem, an alternating algorithm based on the successive convex approximation is proposed to optimize the parameters iteratively. The simulation results demonstrate that the developed algorithm is effective and can decrease the energy consumption compared with other benchmark methods.

[1]  Zhiguo Ding,et al.  A Survey of Multi-Access Edge Computing in 5G and Beyond: Fundamentals, Technology Integration, and State-of-the-Art , 2019, IEEE Access.

[2]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[3]  Qingqing Wu,et al.  Accessing From the Sky: A Tutorial on UAV Communications for 5G and Beyond , 2019, Proceedings of the IEEE.

[4]  Derrick Wing Kwan Ng,et al.  Physical Layer Security in UAV Systems: Challenges and Opportunities , 2019, IEEE Wireless Communications.

[5]  Geoffrey Ye Li,et al.  Joint Offloading and Trajectory Design for UAV-Enabled Mobile Edge Computing Systems , 2019, IEEE Internet of Things Journal.

[6]  J. Loo,et al.  Joint Computation and Communication Design for UAV-Assisted Mobile Edge Computing in IoT , 2019, IEEE Transactions on Industrial Informatics.

[7]  Zhiyang Li,et al.  Joint Trajectory and Communication Design for Secure UAV Networks , 2019, IEEE Communications Letters.

[8]  Haibo Mei,et al.  Joint Trajectory-Resource Optimization in UAV-Enabled Edge-Cloud System With Virtualized Mobile Clone , 2020, IEEE Internet of Things Journal.

[9]  Jie Xu,et al.  Exploiting Physical-Layer Security for Multiuser Multicarrier Computation Offloading , 2018, IEEE Wireless Communications Letters.

[10]  Branka Vucetic,et al.  Secure Communications for UAV-Enabled Mobile Edge Computing Systems , 2020, IEEE Transactions on Communications.

[11]  Jiajia Liu,et al.  UAV-Enhanced Intelligent Offloading for Internet of Things at the Edge , 2020, IEEE Transactions on Industrial Informatics.

[12]  Wei Wu,et al.  Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks , 2022 .

[13]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[14]  Rui Zhang,et al.  Cyclical Multiple Access in UAV-Aided Communications: A Throughput-Delay Tradeoff , 2016, IEEE Wireless Communications Letters.

[15]  Zhu Han,et al.  Response Delay Optimization in Mobile Edge Computing Enabled UAV Swarm , 2020, IEEE Transactions on Vehicular Technology.