Secrecy capacity maximization for a UAV-assisted MEC system

Unmanned aerial vehicle (UAV) communication has attracted wide attentions in the mobile edge computing (MEC) system owing to its high-flexibility and simple operation auxiliary communication mode. Users can offload computing tasks to UAVs, which serves as edge nodes. Meanwhile, UAVs forward the tasks onto a cloud center or base station for processing, thereby shortening the implementation time of tasks. Nevertheless, the offloading links of an UAV-assisted MEC system adopt a radio broadcasting mode. Several eavesdroppers might be present in the environment to eavesdrop the data sent by users and UAVs, thereby causing significant effects on the secrecy performance. An optimized iterative algorithm is proposed in this paper to realize the maximum secrecy capacity of the MEC system and further improve the secrecy performance of an UAV-assisted MEC system and assure secrecy transmit. By doing so, the secrecy transmit problems of the two-staged offloading model of the UAV-assisted MEC system are solved. The maximum secrecy capacity of the system is obtained through joint optimization of the UAV positions, transmit power of the UAV, task offloading ratio, and allocation of offloading users considering the limited time and energy of an UAV. Simulation results demonstrate that the proposed iterative algorithm can effectively improve the secrecy capacity of the system.

[1]  Geoffrey Ye Li,et al.  Joint Offloading and Trajectory Design for UAV-Enabled Mobile Edge Computing Systems , 2019, IEEE Internet of Things Journal.

[2]  Tony Q. S. Quek,et al.  Secure UAV communication in the presence of active eavesdropper (invited paper) , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[3]  Rose Qingyang Hu,et al.  Computation Rate Maximization in UAV-Enabled Wireless-Powered Mobile-Edge Computing Systems , 2018, IEEE Journal on Selected Areas in Communications.

[4]  Joonhyuk Kang,et al.  Mobile Edge Computing via a UAV-Mounted Cloudlet: Optimization of Bit Allocation and Path Planning , 2016, IEEE Transactions on Vehicular Technology.

[5]  Rui Zhang,et al.  UAV-Aided Offloading for Cellular Hotspot , 2017, IEEE Transactions on Wireless Communications.

[6]  Zhi Chen,et al.  Energy-efficient trajectory planning for UAV-aided secure communication , 2018, China Communications.

[7]  Rui Zhang,et al.  Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.

[8]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[9]  Wenzhong Li,et al.  Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing , 2015, IEEE/ACM Transactions on Networking.

[10]  He Chen,et al.  Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location , 2018, IEEE Transactions on Vehicular Technology.

[11]  Mugen Peng,et al.  A Game Theory Approach for Joint Access Selection and Resource Allocation in UAV Assisted IoT Communication Networks , 2019, IEEE Internet of Things Journal.

[12]  Walid Saad,et al.  Beyond 5G With UAVs: Foundations of a 3D Wireless Cellular Network , 2018, IEEE Transactions on Wireless Communications.

[13]  Lingyang Song,et al.  Cellular UAV-to-X Communications: Design and Optimization for Multi-UAV Networks , 2018, IEEE Transactions on Wireless Communications.

[14]  Yu Xu,et al.  Secrecy Energy Efficiency Maximization for UAV-Enabled Mobile Relaying , 2018, IEEE Transactions on Green Communications and Networking.

[15]  Lingyang Song,et al.  Joint Trajectory and Power Optimization for UAV Relay Networks , 2018, IEEE Communications Letters.

[16]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure UAV Communication Systems , 2022 .

[17]  Zhiyong Chen,et al.  An energy efficient design for UAV communication with mobile edge computing , 2019, China Communications.

[18]  Fuhong Lin,et al.  Intelligent Cooperative Edge Computing in Internet of Things , 2020, IEEE Internet of Things Journal.

[19]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.

[20]  Dongsheng Han,et al.  Energy Sharing-Based Energy and User Joint Allocation Method in Heterogeneous Network , 2020, IEEE Access.

[21]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[22]  Rui Zhang,et al.  Energy-Efficient UAV Communication With Trajectory Optimization , 2016, IEEE Transactions on Wireless Communications.

[23]  Rui Zhang,et al.  Throughput Maximization for UAV-Enabled Mobile Relaying Systems , 2016, IEEE Transactions on Communications.