6G网络中安全数字双启用无人机辅助MEC的节能资源分配和轨迹优化方法

IF 4.6 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Varun Kumar , Ishan Budhiraja , Akansha Singh , Sahil Garg , Georges Kaddoum , Mohammad Mehedi Hassan
{"title":"6G网络中安全数字双启用无人机辅助MEC的节能资源分配和轨迹优化方法","authors":"Varun Kumar ,&nbsp;Ishan Budhiraja ,&nbsp;Akansha Singh ,&nbsp;Sahil Garg ,&nbsp;Georges Kaddoum ,&nbsp;Mohammad Mehedi Hassan","doi":"10.1016/j.comnet.2025.111679","DOIUrl":null,"url":null,"abstract":"<div><div>The future sixth generation (6G) mobile network will be a highly heterogeneous system that integrates diverse technologies and communication paradigms, encompassing diverse consumer electronics devices, including various internet of things (IoT) devices utilizing different protocols. The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) with 6G has created ground-breaking prospects for effective data processing and computation services in the IoT. Despite this improvement, the presence of an eavesdropper introduces significant security risks into the computing process of mobile devices (MDs), permitting the collection of sensitive data from MDs and perhaps affecting the correctness of offloaded computations. This study proposes an efficient technique for reducing energy usage in a secure digital twin (DT)-enabled UAV-assisted MEC metaverse network that faces the threat of a UAV eavesdropper. By ensuring the secure processing of all MDs data, the network meets its energy consumption objectives by optimizing trajectories and resources, taking into account parameters like as time, local computation, and offloading computation dispersion. Because of the complicated arrangement of the interplay of various variables and non-linear constraints, solving the problem directly is extremely difficult. To solve this complexity, an auxiliary variable is used to rearrange the problem into a more understandable format. We employ DT-enabled DRL to address this issue because traditional methods are inadequate. The empirical findings indicate that the proposed methodology achieved a reduction in energy consumption of approximately 83.32% and a decrease in time delay of roughly 11.97%, in comparison to the prevailing baseline methodologies.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111679"},"PeriodicalIF":4.6000,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Energy efficient resource allocation and trajectory optimization method for secure digital twin-enabled UAV-assisted MEC in 6G networks\",\"authors\":\"Varun Kumar ,&nbsp;Ishan Budhiraja ,&nbsp;Akansha Singh ,&nbsp;Sahil Garg ,&nbsp;Georges Kaddoum ,&nbsp;Mohammad Mehedi Hassan\",\"doi\":\"10.1016/j.comnet.2025.111679\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The future sixth generation (6G) mobile network will be a highly heterogeneous system that integrates diverse technologies and communication paradigms, encompassing diverse consumer electronics devices, including various internet of things (IoT) devices utilizing different protocols. The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) with 6G has created ground-breaking prospects for effective data processing and computation services in the IoT. Despite this improvement, the presence of an eavesdropper introduces significant security risks into the computing process of mobile devices (MDs), permitting the collection of sensitive data from MDs and perhaps affecting the correctness of offloaded computations. This study proposes an efficient technique for reducing energy usage in a secure digital twin (DT)-enabled UAV-assisted MEC metaverse network that faces the threat of a UAV eavesdropper. By ensuring the secure processing of all MDs data, the network meets its energy consumption objectives by optimizing trajectories and resources, taking into account parameters like as time, local computation, and offloading computation dispersion. Because of the complicated arrangement of the interplay of various variables and non-linear constraints, solving the problem directly is extremely difficult. To solve this complexity, an auxiliary variable is used to rearrange the problem into a more understandable format. We employ DT-enabled DRL to address this issue because traditional methods are inadequate. The empirical findings indicate that the proposed methodology achieved a reduction in energy consumption of approximately 83.32% and a decrease in time delay of roughly 11.97%, in comparison to the prevailing baseline methodologies.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"272 \",\"pages\":\"Article 111679\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625006462\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625006462","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

未来的第六代(6G)移动网络将是一个高度异构的系统,集成了多种技术和通信范式,涵盖各种消费电子设备,包括使用不同协议的各种物联网(IoT)设备。无人机(uav)和移动边缘计算(MEC)与6G的结合为物联网中有效的数据处理和计算服务创造了突破性的前景。尽管有这种改进,窃听者的存在给移动设备(MDs)的计算过程带来了重大的安全风险,允许从MDs收集敏感数据,并可能影响卸载计算的正确性。本研究提出了一种有效的技术,用于减少面临无人机窃听威胁的安全数字孪生(DT)无人机辅助MEC元宇宙网络中的能源使用。通过确保所有MDs数据的安全处理,通过优化轨迹和资源,考虑时间、本地计算和卸载计算分散等参数,实现网络的能耗目标。由于各种变量的相互作用和非线性约束的复杂安排,直接求解问题是极其困难的。为了解决这种复杂性,使用一个辅助变量将问题重新排列成更易于理解的格式。我们采用支持dt的DRL来解决这个问题,因为传统方法是不够的。实证结果表明,与现行基准方法相比,所提出的方法实现了能耗减少约83.32%,时间延迟减少约11.97%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Energy efficient resource allocation and trajectory optimization method for secure digital twin-enabled UAV-assisted MEC in 6G networks
The future sixth generation (6G) mobile network will be a highly heterogeneous system that integrates diverse technologies and communication paradigms, encompassing diverse consumer electronics devices, including various internet of things (IoT) devices utilizing different protocols. The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) with 6G has created ground-breaking prospects for effective data processing and computation services in the IoT. Despite this improvement, the presence of an eavesdropper introduces significant security risks into the computing process of mobile devices (MDs), permitting the collection of sensitive data from MDs and perhaps affecting the correctness of offloaded computations. This study proposes an efficient technique for reducing energy usage in a secure digital twin (DT)-enabled UAV-assisted MEC metaverse network that faces the threat of a UAV eavesdropper. By ensuring the secure processing of all MDs data, the network meets its energy consumption objectives by optimizing trajectories and resources, taking into account parameters like as time, local computation, and offloading computation dispersion. Because of the complicated arrangement of the interplay of various variables and non-linear constraints, solving the problem directly is extremely difficult. To solve this complexity, an auxiliary variable is used to rearrange the problem into a more understandable format. We employ DT-enabled DRL to address this issue because traditional methods are inadequate. The empirical findings indicate that the proposed methodology achieved a reduction in energy consumption of approximately 83.32% and a decrease in time delay of roughly 11.97%, in comparison to the prevailing baseline methodologies.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computer Networks
Computer Networks 工程技术-电信学
CiteScore
10.80
自引率
3.60%
发文量
434
审稿时长
8.6 months
期刊介绍: Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信