Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems

Characterized by their ease of deployment and bird's-eye view, unmanned aerial vehicles (UAVs) may be widely deployed both in surveillance and traffic management. However, the moderate computational capability and the short battery life restrict the local data processing at the UAV side. Fortunately, this impediment may be mitigated by employing the mobile-edge computing (MEC) paradigm for offloading demanding computational tasks from the UAV through a wireless transmission link. However, the offloaded information may become compromised by eavesdroppers. To address this issue, we conceive an energy-efficient computation offloading technique for UAV-MEC systems, with an emphasis on physical-layer security. We formulate a number of energy-efficiency problems for secure UAV-MEC systems, which are then transformed to convex problems. Finally, their optimal solutions are found for both active and passive eavesdroppers. Furthermore, the conditions of zero, partial, and full offloading are analyzed from a physical perspective. The numerical results highlight the specific conditions of activating the three abovementioned offloading options and quantify the performance of our proposed offloading strategy in various scenarios.

[1]  Chong-Yung Chi,et al.  Joint transmit beamforming and artificial noise design for QoS discrimination inwireless downlink , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[2]  Risto Wichman,et al.  In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Harald Haas,et al.  Analysis of TDD Cellular Interference Mitigation Using Busy-Bursts , 2007, IEEE Transactions on Wireless Communications.

[4]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[5]  Elisa Bertino,et al.  Robust Multi-Factor Authentication for Fragile Communications , 2014, IEEE Transactions on Dependable and Secure Computing.

[6]  Sergio Barbarossa,et al.  Communicating While Computing: Distributed mobile cloud computing over 5G heterogeneous networks , 2014, IEEE Signal Processing Magazine.

[7]  Pingyi Fan,et al.  To Smart City: Public Safety Network Design for Emergency , 2018, IEEE Access.

[8]  Sergio Barbarossa,et al.  Joint Optimization of Radio and Computational Resources for Multicell Mobile-Edge Computing , 2014, IEEE Transactions on Signal and Information Processing over Networks.

[9]  Jerome Spanier,et al.  The Incomplete Gamma Functions , 2008 .

[10]  Zhi Chen,et al.  Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.

[11]  Khaled Ben Letaief,et al.  Dynamic Computation Offloading for Mobile-Edge Computing With Energy Harvesting Devices , 2016, IEEE Journal on Selected Areas in Communications.

[12]  Inkyu Lee,et al.  UAV-Aided Secure Communications With Cooperative Jamming , 2018, IEEE Transactions on Vehicular Technology.

[13]  Arumugam Nallanathan,et al.  Joint Blocklength and Location Optimization for URLLC-Enabled UAV Relay Systems , 2019, IEEE Communications Letters.

[14]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[15]  Mehdi Bennis,et al.  UAV-Assisted Heterogeneous Networks for Capacity Enhancement , 2016, IEEE Communications Letters.

[16]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[17]  Rui Zhang,et al.  Energy-Efficient UAV Communication With Trajectory Optimization , 2016, IEEE Transactions on Wireless Communications.

[18]  F. Richard Yu,et al.  Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment , 2018, IEEE Transactions on Communications.

[19]  Xiuzhen Cheng,et al.  Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.

[20]  Wenzhong Li,et al.  Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing , 2015, IEEE/ACM Transactions on Networking.

[21]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[22]  Evsen Yanmaz,et al.  Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications Viewpoint , 2016, IEEE Communications Surveys & Tutorials.

[23]  Kaibin Huang,et al.  Energy-Efficient Resource Allocation for Mobile-Edge Computation Offloading , 2016, IEEE Transactions on Wireless Communications.

[24]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.

[25]  Huiming Wang,et al.  Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.

[26]  Mohsen Guizani,et al.  Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.

[27]  Laurence T. Yang,et al.  UAV-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles , 2018, IEEE Network.

[28]  Zhu Han,et al.  Taking Drones to the Next Level: Cooperative Distributed Unmanned-Aerial-Vehicular Networks for Small and Mini Drones , 2017, IEEE Vehicular Technology Magazine.

[29]  Xuemin Shen,et al.  Secrecy-Based Energy-Efficient Data Offloading via Dual Connectivity Over Unlicensed Spectrums , 2016, IEEE Journal on Selected Areas in Communications.

[30]  Tony Q. S. Quek,et al.  Jamming-Aided Secure Communication in Massive MIMO Rician Channels , 2015, IEEE Transactions on Wireless Communications.

[31]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[32]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[33]  Seung-Woo Seo,et al.  Cooperative Unmanned Autonomous Vehicle Control for Spatially Secure Group Communications , 2012, IEEE Journal on Selected Areas in Communications.

[34]  Shuowen Zhang,et al.  Joint Altitude and Beamwidth Optimization for UAV-Enabled Multiuser Communications , 2017, IEEE Communications Letters.

[35]  Tarik Taleb,et al.  Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.

[36]  Antonio Pascual-Iserte,et al.  Optimization of Radio and Computational Resources for Energy Efficiency in Latency-Constrained Application Offloading , 2014, IEEE Transactions on Vehicular Technology.

[37]  Yong Xiang,et al.  Cost Efficient Resource Management in Fog Computing Supported Medical Cyber-Physical System , 2017, IEEE Transactions on Emerging Topics in Computing.

[38]  Lajos Hanzo,et al.  Charging Unplugged: Will Distributed Laser Charging for Mobile Wireless Power Transfer Work? , 2016, IEEE Vehicular Technology Magazine.

[39]  Tao Li,et al.  A Framework for Partitioning and Execution of Data Stream Applications in Mobile Cloud Computing , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[40]  Gan Zheng,et al.  Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes , 2018, IEEE Journal on Selected Areas in Communications.

[41]  Min Sheng,et al.  Mobile-Edge Computing: Partial Computation Offloading Using Dynamic Voltage Scaling , 2016, IEEE Transactions on Communications.

[42]  Eugenio Cusumano,et al.  Emptying the sea with a spoon? Non-governmental providers of migrants search and rescue in the Mediterranean , 2017 .

[43]  James Nightingale,et al.  A UAV-Cloud System for Disaster Sensing Applications , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[44]  Rui Zhang,et al.  Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.

[45]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[46]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[47]  Tarik Taleb,et al.  UAV-Based IoT Platform: A Crowd Surveillance Use Case , 2017, IEEE Communications Magazine.

[48]  Lajos Hanzo,et al.  Beamforming-Aided NOMA Expedites Collaborative Multiuser Computational Offloading , 2018, IEEE Transactions on Vehicular Technology.