Secrecy capacity maximization for a UAV-assisted MEC system

Unmanned aerial vehicle (UAV) communication has attracted wide attentions in the mobile edge computing (MEC) system owing to its high-flexibility and simple operation auxiliary communication mode. Users can offload computing tasks to UAVs, which serves as edge nodes. Meanwhile, UAVs forward the task...

Full description

Saved in:
Bibliographic Details
Published inChina communications Vol. 17; no. 10; pp. 64 - 81
Main Authors Han, Dongsheng, Shi, Tianhao
Format Journal Article
LanguageEnglish
Published China Institute of Communications 01.10.2020
Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Unmanned aerial vehicle (UAV) communication has attracted wide attentions in the mobile edge computing (MEC) system owing to its high-flexibility and simple operation auxiliary communication mode. Users can offload computing tasks to UAVs, which serves as edge nodes. Meanwhile, UAVs forward the tasks onto a cloud center or base station for processing, thereby shortening the implementation time of tasks. Nevertheless, the offloading links of an UAV-assisted MEC system adopt a radio broadcasting mode. Several eavesdroppers might be present in the environment to eavesdrop the data sent by users and UAVs, thereby causing significant effects on the secrecy performance. An optimized iterative algorithm is proposed in this paper to realize the maximum secrecy capacity of the MEC system and further improve the secrecy performance of an UAV-assisted MEC system and assure secrecy transmit. By doing so, the secrecy transmit problems of the two-staged offloading model of the UAV-assisted MEC system are solved. The maximum secrecy capacity of the system is obtained through joint optimization of the UAV positions, transmit power of the UAV, task offloading ratio, and allocation of offloading users considering the limited time and energy of an UAV. Simulation results demonstrate that the proposed iterative algorithm can effectively improve the secrecy capacity of the system.
AbstractList Unmanned aerial vehicle (UAV) communication has attracted wide attentions in the mobile edge computing (MEC) system owing to its high-flexibility and simple operation auxiliary communication mode.Users can offload computing tasks to UAVs,which serves as edge nodes.Meanwhile,UAVs forward the tasks onto a cloud center or base station for processing,thereby shortening the implementation time of tasks.Nevertheless,the offloading links of an UAV-assisted MEC system adopt a radio broadcasting mode.Several eavesdroppers might be present in the environment to eavesdrop the data sent by users and UAVs,thereby causing significant effects on the secrecy performance.An optimized iterative algorithm is proposed in this paper to realize the maximum secrecy capacity of the MEC system and further improve the secrecy performance of an UAV-assisted MEC system and assure secrecy transmit.By doing so,the secrecy transmit problems of the two-staged offloading model of the UAV-assisted MEC system are solved.The maximum secrecy capacity of the system is obtained through joint optimization of the UAV positions,transmit power of the UAV,task offloading ratio,and allocation of offloading users considering the limited time and energy of an UAV.Simulation results demonstrate that the proposed iterative algorithm can effectively improve the secrecy capacity of the system.
Author Shi, Tianhao
Han, Dongsheng
AuthorAffiliation Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China
AuthorAffiliation_xml – name: Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China
Author_xml – sequence: 1
  givenname: Dongsheng
  surname: Han
  fullname: Han, Dongsheng
  organization: Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China
– sequence: 2
  givenname: Tianhao
  surname: Shi
  fullname: Shi, Tianhao
  organization: Department of Electronic and Communication Engineering, North China Electric Power University, Baoding 071003, China
BookMark eNp9kD1PwzAQhj0UiVK6I7F4YUzxV2xHTFVUvlTEAGW1XMeuXDVJZQfR9NfjtoiBgRvuTqd77vS-F2DQtI0F4AqjCaEFLm6fy3JCEEGTNEEoH4Ah5oJmOWPiHIxjXKMUknPKyRDcvVkTrOmh0VttfNfDWu987fe6820DXRughovpR6Zj9LGzFXyZlTD2qa0vwZnTm2jHP3UEFvez9_Ixm78-PJXTeWZIQbvMOEa1Y7JiBTFECMmxobSiMiWmHRcyd0tHq3wpkXSCU-eMqDRBli8pNzkdgZvT3S_dON2s1Lr9DE36qParbneQipMinvbQac-ENsZgndoGX-vQK4zU0RuVvFEH4DBJ3iSE_0GSB0fpXdB-8x94fQK9tfb3T0GYzLGg333hc6E
CODEN CCHOBE
CitedBy_id crossref_primary_10_1049_cmu2_12680
crossref_primary_10_1088_1742_6596_2861_1_012011
crossref_primary_10_3390_info15010038
crossref_primary_10_1016_j_dcan_2024_01_003
crossref_primary_10_1109_TAES_2023_3332588
crossref_primary_10_1155_2022_5230594
crossref_primary_10_1109_TII_2021_3087726
crossref_primary_10_1002_sat_1436
crossref_primary_10_1109_TNSE_2022_3185130
crossref_primary_10_1145_3673225
crossref_primary_10_1007_s11276_023_03370_0
crossref_primary_10_1016_j_comcom_2022_05_004
crossref_primary_10_1109_JIOT_2023_3288213
crossref_primary_10_1016_j_jnca_2022_103341
crossref_primary_10_1109_ACCESS_2024_3431922
crossref_primary_10_1109_JIOT_2024_3430976
crossref_primary_10_3390_electronics11203306
crossref_primary_10_1049_cmu2_12449
crossref_primary_10_1109_TMC_2024_3439016
ContentType Journal Article
Copyright Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
Copyright_xml – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
DBID 97E
RIA
RIE
AAYXX
CITATION
2B.
4A8
92I
93N
PSX
TCJ
DOI 10.23919/JCC.2020.10.005
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
Wanfang Data Journals - Hong Kong
WANFANG Data Centre
Wanfang Data Journals
万方数据期刊 - 香港版
China Online Journals (COJ)
China Online Journals (COJ)
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Economics
EndPage 81
ExternalDocumentID zgtx202010006
10_23919_JCC_2020_10_005
9248517
Genre orig-research
GrantInformation_xml – fundername: (This work was supported in part by the National Natural Science Foundation of China ); (The Natural Science Foundation of Hebei Province ); (The Fundamental Research Funds for the Central Universities )
  funderid: (This work was supported in part by the National Natural Science Foundation of China ); (The Natural Science Foundation of Hebei Province ); (The Fundamental Research Funds for the Central Universities )
GroupedDBID -SI
-SJ
-S~
0R~
29B
4.4
5GY
6IK
92H
92I
97E
AAHTB
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABPEJ
ABQJQ
ABVLG
AENEX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CAJEI
CAJEJ
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
Q--
Q-9
RIA
RIE
RNS
TCJ
TGT
U1G
U5S
U5T
AAYXX
CITATION
RIG
2B.
4A8
93N
PSX
ID FETCH-LOGICAL-c293t-cf43af48d492c277861c33d3833d4af6785fbf3d5b808f763ffc7da20e6b36c53
IEDL.DBID RIE
ISSN 1673-5447
IngestDate Thu May 29 03:54:25 EDT 2025
Sun Jul 27 03:07:11 EDT 2025
Thu Apr 24 23:12:13 EDT 2025
Wed Aug 27 02:17:10 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 10
Keywords UAV communication
trajectory optimization
MEC
physical layer secrecy
secrecy capacity
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-cf43af48d492c277861c33d3833d4af6785fbf3d5b808f763ffc7da20e6b36c53
PageCount 18
ParticipantIDs wanfang_journals_zgtx202010006
crossref_primary_10_23919_JCC_2020_10_005
crossref_citationtrail_10_23919_JCC_2020_10_005
ieee_primary_9248517
PublicationCentury 2000
PublicationDate 2020-10-01
PublicationDateYYYYMMDD 2020-10-01
PublicationDate_xml – month: 10
  year: 2020
  text: 2020-10-01
  day: 01
PublicationDecade 2020
PublicationTitle China communications
PublicationTitleAbbrev ChinaComm
PublicationTitle_FL China Communications
PublicationYear 2020
Publisher China Institute of Communications
Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China
Publisher_xml – name: China Institute of Communications
– name: Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China
SSID ssj0000866362
Score 2.3083234
Snippet Unmanned aerial vehicle (UAV) communication has attracted wide attentions in the mobile edge computing (MEC) system owing to its high-flexibility and simple...
SourceID wanfang
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 64
SubjectTerms Delays
MEC
Optimization
physical layer secrecy
secrecy capacity
Servers
Task analysis
Trajectory
trajectory optimization
UAV communication
Unmanned aerial vehicles
Wireless communication
Title Secrecy capacity maximization for a UAV-assisted MEC system
URI https://ieeexplore.ieee.org/document/9248517
https://d.wanfangdata.com.cn/periodical/zgtx202010006
Volume 17
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_MXfTi1xTnx8jBi2D30bRpi6dRNsZgXnSyW0nTZIiuE9fB3F_ve203hoh4KyWBkJfk93t5eb8HcOvrti0RGiwjjEcOirIQ121LCKWVq2TiBZSNPHoUg7EznLiTCtxvc2G01vnjM92kzzyWn8zVkq7KWgHpb3W8PdhDx63I1drepyA1FzyvH9oRHsX7Ha-ISto86AStYRiiM2iTt9psU626HRTKy6rkSTupkel0B1_6RzDajKx4VvLWXGZxU61_iDb-d-jHcFgSTdYtVsYJVHR6CvubPORFDR6eiDGqL6YQLxWScTaTq9dZmZfJkMwyycbdFwvpNa2FhI16ISuUn89g3O89hwOrLKVgKcTzzFLG4dI4fuIEtrJJM66jOE_QPeWJIw0ilmtiwxM39tu-wTPHGOUl0m5rEXOhXH4O1XSe6gtgPrrfnvEdyZEa-CSfhvwczYpHQ-wFQtehtZnaSJU641Tu4j1CfyM3RoTGiMgY9AeNUYe7bY-PQmPjj7Y1mtxtu3Je69AorReVe3ARrafZinpSBENc_t7vCg6oSfE67xqq2edS3yDLyOJGvry-ARpEyzE
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_4cZgXv6Y4P2YOXgS7rU2btniSoUzddnGT3UqaJkPUKq6D6V_ve203hoh4KyWBkJfk93t5eb8HcBboliMRGiwjjE8OirIQ1x1LCKWVp2Tih5SN3OuLztC9G3mjFbhY5MJorfPHZ7pBn3ksP3lTU7oqa4akv2X7q7COuO_ZRbbW4kYFybngeQVRW_gU8Xf9Ii7p8NAOm3ftNrqDDvmrjRZVq1vCobywSp62kxqZjpcQ5mYLevOxFQ9LnhvTLG6orx-yjf8d_DZsllSTXRVrYwdWdLoLlXkm8qQKlw_EGdUnU4iYCuk4e5Wzp9cyM5MhnWWSDa8eLSTYtBoS1rtus0L7eQ-GN9eDdscqiylYChE9s5RxuTRukLihoxxSjbMV5wk6qDxxpUHM8kxseOLFQSsweOoYo_xEOi0tYi6Ux_dhLX1L9QGwAB1w3wSu5EgOAhJQQ4aOhsXDIfZDoWvQnE9tpEqlcSp48RKhx5EbI0JjRGQM-oPGqMH5osd7obLxR9sqTe6iXTmvNaiX1ovKXTiJvsbZjHpSDEMc_t7vFCqdQa8bdW_790ewQc2Lt3rHsJZ9TPUJco4srudL7RvkJ856
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secrecy+capacity+maximization+for+a+UAV-assisted+MEC+system&rft.jtitle=China+communications&rft.au=Han%2C+Dongsheng&rft.au=Shi%2C+Tianhao&rft.date=2020-10-01&rft.issn=1673-5447&rft.volume=17&rft.issue=10&rft.spage=64&rft.epage=81&rft_id=info:doi/10.23919%2FJCC.2020.10.005&rft.externalDBID=n%2Fa&rft.externalDocID=10_23919_JCC_2020_10_005
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fzgtx%2Fzgtx.jpg