Yu Ding;Qingqing Zhang;Weidang Lu;Nan Zhao;Arumugam Nallanathan;Xianbin Wang;Xiaoniu Yang
{"title":"Collaborative Communication and Computation for Secure UAV-Enabled MEC Against Active Aerial Eavesdropping","authors":"Yu Ding;Qingqing Zhang;Weidang Lu;Nan Zhao;Arumugam Nallanathan;Xianbin Wang;Xiaoniu Yang","doi":"10.1109/TWC.2024.3435017","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) can provide flexible computing service for terminal-devices (TDs). However, malicious active aerial eavesdroppers can perform air-to-ground eavesdropping and air-to-air attacking, which makes TDs’ tasks offloading computation more vulnerable, posing significantly secure threats to UAV-enabled MEC. To overcome this challenge, we aim to design collaborative communication and computation schemes for the secure UAV-enabled MEC system, where an active aerial eavesdropper is capable of wiretapping the tasks information offloaded from TDs and transmitting attack signals to the legitimate network. The total weighted energy consumption of the system is minimized via optimizing time allocation, transmit power, local and offloading computation bits, as well as UAV trajectory. First, considering the given number of computational tasks of TDs, a block coordinate descent (BCD)-based scheme is proposed to decompose the original multi-variables-coupling and close-form-lacking problem into several tractable subproblems that can be addressed by iterations. Next, considering that there are dynamic and random tasks arriving to TDs’ original tasks, a deep reinforcement learning (DRL)-based scheme is proposed to maintain the stability of tasks, where the solution of computation, communication and trajectory optimization is intelligently obtained by adopting double-deep Q-learning (DDQN). Simulation results demonstrate that the proposed schemes outperform the respective benchmarks for secure UAV-enabled MEC against active aerial eavesdropping.","PeriodicalId":13431,"journal":{"name":"IEEE Transactions on Wireless Communications","volume":"23 11","pages":"15915-15929"},"PeriodicalIF":8.9000,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Wireless Communications","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10623420/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) can provide flexible computing service for terminal-devices (TDs). However, malicious active aerial eavesdroppers can perform air-to-ground eavesdropping and air-to-air attacking, which makes TDs’ tasks offloading computation more vulnerable, posing significantly secure threats to UAV-enabled MEC. To overcome this challenge, we aim to design collaborative communication and computation schemes for the secure UAV-enabled MEC system, where an active aerial eavesdropper is capable of wiretapping the tasks information offloaded from TDs and transmitting attack signals to the legitimate network. The total weighted energy consumption of the system is minimized via optimizing time allocation, transmit power, local and offloading computation bits, as well as UAV trajectory. First, considering the given number of computational tasks of TDs, a block coordinate descent (BCD)-based scheme is proposed to decompose the original multi-variables-coupling and close-form-lacking problem into several tractable subproblems that can be addressed by iterations. Next, considering that there are dynamic and random tasks arriving to TDs’ original tasks, a deep reinforcement learning (DRL)-based scheme is proposed to maintain the stability of tasks, where the solution of computation, communication and trajectory optimization is intelligently obtained by adopting double-deep Q-learning (DDQN). Simulation results demonstrate that the proposed schemes outperform the respective benchmarks for secure UAV-enabled MEC against active aerial eavesdropping.
期刊介绍:
The IEEE Transactions on Wireless Communications is a prestigious publication that showcases cutting-edge advancements in wireless communications. It welcomes both theoretical and practical contributions in various areas. The scope of the Transactions encompasses a wide range of topics, including modulation and coding, detection and estimation, propagation and channel characterization, and diversity techniques. The journal also emphasizes the physical and link layer communication aspects of network architectures and protocols.
The journal is open to papers on specific topics or non-traditional topics related to specific application areas. This includes simulation tools and methodologies, orthogonal frequency division multiplexing, MIMO systems, and wireless over optical technologies.
Overall, the IEEE Transactions on Wireless Communications serves as a platform for high-quality manuscripts that push the boundaries of wireless communications and contribute to advancements in the field.