Secrecy capacity maximization for a UAV-assisted MEC system
Unmanned aerial vehicle (UAV) communication has attracted wide attentions in the mobile edge computing (MEC) system owing to its high-flexibility and simple operation auxiliary communication mode. Users can offload computing tasks to UAVs, which serves as edge nodes. Meanwhile, UAVs forward the task...
Saved in:
Published in | China communications Vol. 17; no. 10; pp. 64 - 81 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
China Institute of Communications
01.10.2020
Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Unmanned aerial vehicle (UAV) communication has attracted wide attentions in the mobile edge computing (MEC) system owing to its high-flexibility and simple operation auxiliary communication mode. Users can offload computing tasks to UAVs, which serves as edge nodes. Meanwhile, UAVs forward the tasks onto a cloud center or base station for processing, thereby shortening the implementation time of tasks. Nevertheless, the offloading links of an UAV-assisted MEC system adopt a radio broadcasting mode. Several eavesdroppers might be present in the environment to eavesdrop the data sent by users and UAVs, thereby causing significant effects on the secrecy performance. An optimized iterative algorithm is proposed in this paper to realize the maximum secrecy capacity of the MEC system and further improve the secrecy performance of an UAV-assisted MEC system and assure secrecy transmit. By doing so, the secrecy transmit problems of the two-staged offloading model of the UAV-assisted MEC system are solved. The maximum secrecy capacity of the system is obtained through joint optimization of the UAV positions, transmit power of the UAV, task offloading ratio, and allocation of offloading users considering the limited time and energy of an UAV. Simulation results demonstrate that the proposed iterative algorithm can effectively improve the secrecy capacity of the system. |
---|---|
AbstractList | Unmanned aerial vehicle (UAV) communication has attracted wide attentions in the mobile edge computing (MEC) system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computing tasks to UAVs,which serves as edge nodes.Meanwhile,UAVs forward the tasks onto a cloud center or base station for processing,thereby shortening the implementation time of tasks.Nevertheless,the offloading links of an UAV-assisted MEC system adopt a radio broadcasting mode.Several eavesdroppers might be present in the environment to eavesdrop the data sent by users and UAVs,thereby causing significant effects on the secrecy performance.An optimized iterative algorithm is proposed in this paper to realize the maximum secrecy capacity of the MEC system and further improve the secrecy performance of an UAV-assisted MEC system and assure secrecy transmit.By doing so,the secrecy transmit problems of the two-staged offloading model of the UAV-assisted MEC system are solved.The maximum secrecy capacity of the system is obtained through joint optimization of the UAV positions,transmit power of the UAV,task offloading ratio,and allocation of offloading users considering the limited time and energy of an UAV.Simulation results demonstrate that the proposed iterative algorithm can effectively improve the secrecy capacity of the system. |
Author | Shi, Tianhao Han, Dongsheng |
AuthorAffiliation | Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China |
AuthorAffiliation_xml | – name: Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China |
Author_xml | – sequence: 1 givenname: Dongsheng surname: Han fullname: Han, Dongsheng organization: Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China – sequence: 2 givenname: Tianhao surname: Shi fullname: Shi, Tianhao organization: Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China |
BookMark | eNp9kD1PwzAQhj0UiVK6I7F4YUzxV2xHTFVUvlTEAGW1XMeuXDVJZQfR9NfjtoiBgRvuTqd77vS-F2DQtI0F4AqjCaEFLm6fy3JCEEGTNEEoH4Ah5oJmOWPiHIxjXKMUknPKyRDcvVkTrOmh0VttfNfDWu987fe6820DXRughovpR6Zj9LGzFXyZlTD2qa0vwZnTm2jHP3UEFvez9_Ixm78-PJXTeWZIQbvMOEa1Y7JiBTFECMmxobSiMiWmHRcyd0tHq3wpkXSCU-eMqDRBli8pNzkdgZvT3S_dON2s1Lr9DE36qParbneQipMinvbQac-ENsZgndoGX-vQK4zU0RuVvFEH4DBJ3iSE_0GSB0fpXdB-8x94fQK9tfb3T0GYzLGg333hc6E |
CODEN | CCHOBE |
CitedBy_id | crossref_primary_10_1049_cmu2_12680 crossref_primary_10_1088_1742_6596_2861_1_012011 crossref_primary_10_3390_info15010038 crossref_primary_10_1016_j_dcan_2024_01_003 crossref_primary_10_1109_TAES_2023_3332588 crossref_primary_10_1155_2022_5230594 crossref_primary_10_1109_TII_2021_3087726 crossref_primary_10_1002_sat_1436 crossref_primary_10_1109_TNSE_2022_3185130 crossref_primary_10_1145_3673225 crossref_primary_10_1007_s11276_023_03370_0 crossref_primary_10_1016_j_comcom_2022_05_004 crossref_primary_10_1109_JIOT_2023_3288213 crossref_primary_10_1016_j_jnca_2022_103341 crossref_primary_10_1109_ACCESS_2024_3431922 crossref_primary_10_1109_JIOT_2024_3430976 crossref_primary_10_3390_electronics11203306 crossref_primary_10_1049_cmu2_12449 crossref_primary_10_1109_TMC_2024_3439016 |
ContentType | Journal Article |
Copyright | Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
Copyright_xml | – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
DBID | 97E RIA RIE AAYXX CITATION 2B. 4A8 92I 93N PSX TCJ |
DOI | 10.23919/JCC.2020.10.005 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Wanfang Data Journals - Hong Kong WANFANG Data Centre Wanfang Data Journals 万方数据期刊 - 香港版 China Online Journals (COJ) China Online Journals (COJ) |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Economics |
EndPage | 81 |
ExternalDocumentID | zgtx202010006 10_23919_JCC_2020_10_005 9248517 |
Genre | orig-research |
GrantInformation_xml | – fundername: (This work was supported in part by the National Natural Science Foundation of China ); (The Natural Science Foundation of Hebei Province ); (The Fundamental Research Funds for the Central Universities ) funderid: (This work was supported in part by the National Natural Science Foundation of China ); (The Natural Science Foundation of Hebei Province ); (The Fundamental Research Funds for the Central Universities ) |
GroupedDBID | -SI -SJ -S~ 0R~ 29B 4.4 5GY 6IK 92H 92I 97E AAHTB AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABPEJ ABQJQ ABVLG AENEX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CAJEI CAJEJ EBS EJD HZ~ IFIPE IPLJI JAVBF M43 O9- OCL Q-- Q-9 RIA RIE RNS TCJ TGT U1G U5S U5T AAYXX CITATION RIG 2B. 4A8 93N PSX |
ID | FETCH-LOGICAL-c293t-cf43af48d492c277861c33d3833d4af6785fbf3d5b808f763ffc7da20e6b36c53 |
IEDL.DBID | RIE |
ISSN | 1673-5447 |
IngestDate | Thu May 29 03:54:25 EDT 2025 Sun Jul 27 03:07:11 EDT 2025 Thu Apr 24 23:12:13 EDT 2025 Wed Aug 27 02:17:10 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Keywords | UAV communication trajectory optimization MEC physical layer secrecy secrecy capacity |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-cf43af48d492c277861c33d3833d4af6785fbf3d5b808f763ffc7da20e6b36c53 |
PageCount | 18 |
ParticipantIDs | wanfang_journals_zgtx202010006 crossref_primary_10_23919_JCC_2020_10_005 crossref_citationtrail_10_23919_JCC_2020_10_005 ieee_primary_9248517 |
PublicationCentury | 2000 |
PublicationDate | 2020-10-01 |
PublicationDateYYYYMMDD | 2020-10-01 |
PublicationDate_xml | – month: 10 year: 2020 text: 2020-10-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | China communications |
PublicationTitleAbbrev | ChinaComm |
PublicationTitle_FL | China Communications |
PublicationYear | 2020 |
Publisher | China Institute of Communications Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China |
Publisher_xml | – name: China Institute of Communications – name: Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China |
SSID | ssj0000866362 |
Score | 2.3083234 |
Snippet | Unmanned aerial vehicle (UAV) communication has attracted wide attentions in the mobile edge computing (MEC) system owing to its high-flexibility and simple... |
SourceID | wanfang crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 64 |
SubjectTerms | Delays MEC Optimization physical layer secrecy secrecy capacity Servers Task analysis Trajectory trajectory optimization UAV communication Unmanned aerial vehicles Wireless communication |
Title | Secrecy capacity maximization for a UAV-assisted MEC system |
URI | https://ieeexplore.ieee.org/document/9248517 https://d.wanfangdata.com.cn/periodical/zgtx202010006 |
Volume | 17 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_MXfTi1xTnx8jBi2D30bRpi6dRNsZgXnSyW0nTZIiuE9fB3F_ve203hoh4KyWBkJfk93t5eb8HcOvrti0RGiwjjEcOirIQ121LCKWVq2TiBZSNPHoUg7EznLiTCtxvc2G01vnjM92kzzyWn8zVkq7KWgHpb3W8PdhDx63I1drepyA1FzyvH9oRHsX7Ha-ISto86AStYRiiM2iTt9psU626HRTKy6rkSTupkel0B1_6RzDajKx4VvLWXGZxU61_iDb-d-jHcFgSTdYtVsYJVHR6CvubPORFDR6eiDGqL6YQLxWScTaTq9dZmZfJkMwyycbdFwvpNa2FhI16ISuUn89g3O89hwOrLKVgKcTzzFLG4dI4fuIEtrJJM66jOE_QPeWJIw0ilmtiwxM39tu-wTPHGOUl0m5rEXOhXH4O1XSe6gtgPrrfnvEdyZEa-CSfhvwczYpHQ-wFQtehtZnaSJU641Tu4j1CfyM3RoTGiMgY9AeNUYe7bY-PQmPjj7Y1mtxtu3Je69AorReVe3ARrafZinpSBENc_t7vCg6oSfE67xqq2edS3yDLyOJGvry-ARpEyzE |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_4cZgXv6Y4P2YOXgS7rU2btniSoUzddnGT3UqaJkPUKq6D6V_ve203hoh4KyWBkJfk93t5eb8HcBboliMRGiwjjE8OirIQ1x1LCKWVp2Tih5SN3OuLztC9G3mjFbhY5MJorfPHZ7pBn3ksP3lTU7oqa4akv2X7q7COuO_ZRbbW4kYFybngeQVRW_gU8Xf9Ii7p8NAOm3ftNrqDDvmrjRZVq1vCobywSp62kxqZjpcQ5mYLevOxFQ9LnhvTLG6orx-yjf8d_DZsllSTXRVrYwdWdLoLlXkm8qQKlw_EGdUnU4iYCuk4e5Wzp9cyM5MhnWWSDa8eLSTYtBoS1rtus0L7eQ-GN9eDdscqiylYChE9s5RxuTRukLihoxxSjbMV5wk6qDxxpUHM8kxseOLFQSsweOoYo_xEOi0tYi6Ux_dhLX1L9QGwAB1w3wSu5EgOAhJQQ4aOhsXDIfZDoWvQnE9tpEqlcSp48RKhx5EbI0JjRGQM-oPGqMH5osd7obLxR9sqTe6iXTmvNaiX1ovKXTiJvsbZjHpSDEMc_t7vFCqdQa8bdW_790ewQc2Lt3rHsJZ9TPUJco4srudL7RvkJ856 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secrecy+capacity+maximization+for+a+UAV-assisted+MEC+system&rft.jtitle=China+communications&rft.au=Han%2C+Dongsheng&rft.au=Shi%2C+Tianhao&rft.date=2020-10-01&rft.issn=1673-5447&rft.volume=17&rft.issue=10&rft.spage=64&rft.epage=81&rft_id=info:doi/10.23919%2FJCC.2020.10.005&rft.externalDBID=n%2Fa&rft.externalDocID=10_23919_JCC_2020_10_005 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fzgtx%2Fzgtx.jpg |