Security communication and energy efficiency optimization strategy in UAV-aided edge computing
The flexible mobility of the unmanned aerial vehicle (UAV) has attracted widespread attention in the mobile edge computing (MEC) system.However, the existence of eavesdroppers in the air makes it a huge challenge for its secure transmission.In order to solve the contradiction between high safe commu...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2023-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023032/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841540050654855168 |
---|---|
author | Xueyong YU Lixiang QIU Jianing SONG Hongbo ZHU |
author_facet | Xueyong YU Lixiang QIU Jianing SONG Hongbo ZHU |
author_sort | Xueyong YU |
collection | DOAJ |
description | The flexible mobility of the unmanned aerial vehicle (UAV) has attracted widespread attention in the mobile edge computing (MEC) system.However, the existence of eavesdroppers in the air makes it a huge challenge for its secure transmission.In order to solve the contradiction between high safe communication rate and low energy consumption, the concept of security communication energy efficiency was introduced, that was, the ratio between UAV safe communication transmission rate and UAV energy consumption.Firstly, to subject the task delay constraint, limited UAV CPU frequency and task offloading rate constraint, an offloading strategy was proposed to maximize the energy efficiency of secure communication by jointly optimizing the legal UAV hover location, CPU frequency allocation and distinguishing the complexity of computing tasks, while improving the security communication in the UAV-MEC scenario from the perspective of physical layer security.Secondly, to address the non-convex optimization problem, it was decomposed into three sub-problems that were solved with block coordinate descent and the successive convex approximation (SCA) methods respectively.The simulation results show that, with different task complexity, the proposed strategy can balance the relationship between the overall secure communication performance and energy consumption, while meeting the offloading requirements of ground terminals.And then it improves secrecy energy efficiency. |
format | Article |
id | doaj-art-794048643793468eb8a8e4e68b68a29d |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2023-03-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-794048643793468eb8a8e4e68b68a29d2025-01-14T06:23:15ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2023-03-0144455459387486Security communication and energy efficiency optimization strategy in UAV-aided edge computingXueyong YULixiang QIUJianing SONGHongbo ZHUThe flexible mobility of the unmanned aerial vehicle (UAV) has attracted widespread attention in the mobile edge computing (MEC) system.However, the existence of eavesdroppers in the air makes it a huge challenge for its secure transmission.In order to solve the contradiction between high safe communication rate and low energy consumption, the concept of security communication energy efficiency was introduced, that was, the ratio between UAV safe communication transmission rate and UAV energy consumption.Firstly, to subject the task delay constraint, limited UAV CPU frequency and task offloading rate constraint, an offloading strategy was proposed to maximize the energy efficiency of secure communication by jointly optimizing the legal UAV hover location, CPU frequency allocation and distinguishing the complexity of computing tasks, while improving the security communication in the UAV-MEC scenario from the perspective of physical layer security.Secondly, to address the non-convex optimization problem, it was decomposed into three sub-problems that were solved with block coordinate descent and the successive convex approximation (SCA) methods respectively.The simulation results show that, with different task complexity, the proposed strategy can balance the relationship between the overall secure communication performance and energy consumption, while meeting the offloading requirements of ground terminals.And then it improves secrecy energy efficiency.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023032/mobile edge computingUAV secure communicationenergy consumption optimizationresource allocationlocation optimizing |
spellingShingle | Xueyong YU Lixiang QIU Jianing SONG Hongbo ZHU Security communication and energy efficiency optimization strategy in UAV-aided edge computing Tongxin xuebao mobile edge computing UAV secure communication energy consumption optimization resource allocation location optimizing |
title | Security communication and energy efficiency optimization strategy in UAV-aided edge computing |
title_full | Security communication and energy efficiency optimization strategy in UAV-aided edge computing |
title_fullStr | Security communication and energy efficiency optimization strategy in UAV-aided edge computing |
title_full_unstemmed | Security communication and energy efficiency optimization strategy in UAV-aided edge computing |
title_short | Security communication and energy efficiency optimization strategy in UAV-aided edge computing |
title_sort | security communication and energy efficiency optimization strategy in uav aided edge computing |
topic | mobile edge computing UAV secure communication energy consumption optimization resource allocation location optimizing |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023032/ |
work_keys_str_mv | AT xueyongyu securitycommunicationandenergyefficiencyoptimizationstrategyinuavaidededgecomputing AT lixiangqiu securitycommunicationandenergyefficiencyoptimizationstrategyinuavaidededgecomputing AT jianingsong securitycommunicationandenergyefficiencyoptimizationstrategyinuavaidededgecomputing AT hongbozhu securitycommunicationandenergyefficiencyoptimizationstrategyinuavaidededgecomputing |