Security communication and energy efficiency optimization strategy in UAV-aided edge computing

The flexible mobility of the unmanned aerial vehicle (UAV) has attracted widespread attention in the mobile edge computing (MEC) system.However, the existence of eavesdroppers in the air makes it a huge challenge for its secure transmission.In order to solve the contradiction between high safe commu...

Full description

Saved in:
Bibliographic Details
Main Authors: Xueyong YU, Lixiang QIU, Jianing SONG, Hongbo ZHU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2023-03-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023032/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841540050654855168
author Xueyong YU
Lixiang QIU
Jianing SONG
Hongbo ZHU
author_facet Xueyong YU
Lixiang QIU
Jianing SONG
Hongbo ZHU
author_sort Xueyong YU
collection DOAJ
description The flexible mobility of the unmanned aerial vehicle (UAV) has attracted widespread attention in the mobile edge computing (MEC) system.However, the existence of eavesdroppers in the air makes it a huge challenge for its secure transmission.In order to solve the contradiction between high safe communication rate and low energy consumption, the concept of security communication energy efficiency was introduced, that was, the ratio between UAV safe communication transmission rate and UAV energy consumption.Firstly, to subject the task delay constraint, limited UAV CPU frequency and task offloading rate constraint, an offloading strategy was proposed to maximize the energy efficiency of secure communication by jointly optimizing the legal UAV hover location, CPU frequency allocation and distinguishing the complexity of computing tasks, while improving the security communication in the UAV-MEC scenario from the perspective of physical layer security.Secondly, to address the non-convex optimization problem, it was decomposed into three sub-problems that were solved with block coordinate descent and the successive convex approximation (SCA) methods respectively.The simulation results show that, with different task complexity, the proposed strategy can balance the relationship between the overall secure communication performance and energy consumption, while meeting the offloading requirements of ground terminals.And then it improves secrecy energy efficiency.
format Article
id doaj-art-794048643793468eb8a8e4e68b68a29d
institution Kabale University
issn 1000-436X
language zho
publishDate 2023-03-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-794048643793468eb8a8e4e68b68a29d2025-01-14T06:23:15ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2023-03-0144455459387486Security communication and energy efficiency optimization strategy in UAV-aided edge computingXueyong YULixiang QIUJianing SONGHongbo ZHUThe flexible mobility of the unmanned aerial vehicle (UAV) has attracted widespread attention in the mobile edge computing (MEC) system.However, the existence of eavesdroppers in the air makes it a huge challenge for its secure transmission.In order to solve the contradiction between high safe communication rate and low energy consumption, the concept of security communication energy efficiency was introduced, that was, the ratio between UAV safe communication transmission rate and UAV energy consumption.Firstly, to subject the task delay constraint, limited UAV CPU frequency and task offloading rate constraint, an offloading strategy was proposed to maximize the energy efficiency of secure communication by jointly optimizing the legal UAV hover location, CPU frequency allocation and distinguishing the complexity of computing tasks, while improving the security communication in the UAV-MEC scenario from the perspective of physical layer security.Secondly, to address the non-convex optimization problem, it was decomposed into three sub-problems that were solved with block coordinate descent and the successive convex approximation (SCA) methods respectively.The simulation results show that, with different task complexity, the proposed strategy can balance the relationship between the overall secure communication performance and energy consumption, while meeting the offloading requirements of ground terminals.And then it improves secrecy energy efficiency.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023032/mobile edge computingUAV secure communicationenergy consumption optimizationresource allocationlocation optimizing
spellingShingle Xueyong YU
Lixiang QIU
Jianing SONG
Hongbo ZHU
Security communication and energy efficiency optimization strategy in UAV-aided edge computing
Tongxin xuebao
mobile edge computing
UAV secure communication
energy consumption optimization
resource allocation
location optimizing
title Security communication and energy efficiency optimization strategy in UAV-aided edge computing
title_full Security communication and energy efficiency optimization strategy in UAV-aided edge computing
title_fullStr Security communication and energy efficiency optimization strategy in UAV-aided edge computing
title_full_unstemmed Security communication and energy efficiency optimization strategy in UAV-aided edge computing
title_short Security communication and energy efficiency optimization strategy in UAV-aided edge computing
title_sort security communication and energy efficiency optimization strategy in uav aided edge computing
topic mobile edge computing
UAV secure communication
energy consumption optimization
resource allocation
location optimizing
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023032/
work_keys_str_mv AT xueyongyu securitycommunicationandenergyefficiencyoptimizationstrategyinuavaidededgecomputing
AT lixiangqiu securitycommunicationandenergyefficiencyoptimizationstrategyinuavaidededgecomputing
AT jianingsong securitycommunicationandenergyefficiencyoptimizationstrategyinuavaidededgecomputing
AT hongbozhu securitycommunicationandenergyefficiencyoptimizationstrategyinuavaidededgecomputing