Collaborative Communication and Computation for Secure UAV-Enabled MEC Against Active Aerial Eavesdropping

IF 8.9 1区 计算机科学 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Yu Ding;Qingqing Zhang;Weidang Lu;Nan Zhao;Arumugam Nallanathan;Xianbin Wang;Xiaoniu Yang
{"title":"Collaborative Communication and Computation for Secure UAV-Enabled MEC Against Active Aerial Eavesdropping","authors":"Yu Ding;Qingqing Zhang;Weidang Lu;Nan Zhao;Arumugam Nallanathan;Xianbin Wang;Xiaoniu Yang","doi":"10.1109/TWC.2024.3435017","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) can provide flexible computing service for terminal-devices (TDs). However, malicious active aerial eavesdroppers can perform air-to-ground eavesdropping and air-to-air attacking, which makes TDs’ tasks offloading computation more vulnerable, posing significantly secure threats to UAV-enabled MEC. To overcome this challenge, we aim to design collaborative communication and computation schemes for the secure UAV-enabled MEC system, where an active aerial eavesdropper is capable of wiretapping the tasks information offloaded from TDs and transmitting attack signals to the legitimate network. The total weighted energy consumption of the system is minimized via optimizing time allocation, transmit power, local and offloading computation bits, as well as UAV trajectory. First, considering the given number of computational tasks of TDs, a block coordinate descent (BCD)-based scheme is proposed to decompose the original multi-variables-coupling and close-form-lacking problem into several tractable subproblems that can be addressed by iterations. Next, considering that there are dynamic and random tasks arriving to TDs’ original tasks, a deep reinforcement learning (DRL)-based scheme is proposed to maintain the stability of tasks, where the solution of computation, communication and trajectory optimization is intelligently obtained by adopting double-deep Q-learning (DDQN). Simulation results demonstrate that the proposed schemes outperform the respective benchmarks for secure UAV-enabled MEC against active aerial eavesdropping.","PeriodicalId":13431,"journal":{"name":"IEEE Transactions on Wireless Communications","volume":"23 11","pages":"15915-15929"},"PeriodicalIF":8.9000,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Wireless Communications","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10623420/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) can provide flexible computing service for terminal-devices (TDs). However, malicious active aerial eavesdroppers can perform air-to-ground eavesdropping and air-to-air attacking, which makes TDs’ tasks offloading computation more vulnerable, posing significantly secure threats to UAV-enabled MEC. To overcome this challenge, we aim to design collaborative communication and computation schemes for the secure UAV-enabled MEC system, where an active aerial eavesdropper is capable of wiretapping the tasks information offloaded from TDs and transmitting attack signals to the legitimate network. The total weighted energy consumption of the system is minimized via optimizing time allocation, transmit power, local and offloading computation bits, as well as UAV trajectory. First, considering the given number of computational tasks of TDs, a block coordinate descent (BCD)-based scheme is proposed to decompose the original multi-variables-coupling and close-form-lacking problem into several tractable subproblems that can be addressed by iterations. Next, considering that there are dynamic and random tasks arriving to TDs’ original tasks, a deep reinforcement learning (DRL)-based scheme is proposed to maintain the stability of tasks, where the solution of computation, communication and trajectory optimization is intelligently obtained by adopting double-deep Q-learning (DDQN). Simulation results demonstrate that the proposed schemes outperform the respective benchmarks for secure UAV-enabled MEC against active aerial eavesdropping.
针对主动空中窃听的无人机安全 MEC 的协作通信与计算
支持无人机(UAV)的移动边缘计算(MEC)可为终端设备(TD)提供灵活的计算服务。然而,恶意的主动空中窃听者可以进行空对地窃听和空对空攻击,这使得 TD 的任务卸载计算变得更加脆弱,对支持无人机的 MEC 构成了极大的安全威胁。为了克服这一挑战,我们旨在为无人机支持的安全 MEC 系统设计协同通信和计算方案,主动空中窃听者能够窃听 TD 卸载的任务信息,并向合法网络传输攻击信号。通过优化时间分配、发射功率、本地和卸载计算比特以及无人机轨迹,系统的总加权能耗最小化。首先,考虑到给定的 TD 计算任务数量,提出了一种基于块坐标下降(BCD)的方案,将原始的多变量耦合和闭式缺失问题分解为几个可通过迭代解决的可控子问题。其次,考虑到 TD 的原始任务存在动态和随机任务,提出了一种基于深度强化学习(DRL)的方案来保持任务的稳定性,通过双深度 Q 学习(DDQN)智能地获得计算、通信和轨迹优化的解决方案。仿真结果表明,在无人机支持的 MEC 安全对抗主动空中窃听方面,所提出的方案优于相应的基准。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
18.60
自引率
10.60%
发文量
708
审稿时长
5.6 months
期刊介绍: The IEEE Transactions on Wireless Communications is a prestigious publication that showcases cutting-edge advancements in wireless communications. It welcomes both theoretical and practical contributions in various areas. The scope of the Transactions encompasses a wide range of topics, including modulation and coding, detection and estimation, propagation and channel characterization, and diversity techniques. The journal also emphasizes the physical and link layer communication aspects of network architectures and protocols. The journal is open to papers on specific topics or non-traditional topics related to specific application areas. This includes simulation tools and methodologies, orthogonal frequency division multiplexing, MIMO systems, and wireless over optical technologies. Overall, the IEEE Transactions on Wireless Communications serves as a platform for high-quality manuscripts that push the boundaries of wireless communications and contribute to advancements in the field.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信