Varun Kumar , Ishan Budhiraja , Akansha Singh , Sahil Garg , Georges Kaddoum , Mohammad Mehedi Hassan
{"title":"6G网络中安全数字双启用无人机辅助MEC的节能资源分配和轨迹优化方法","authors":"Varun Kumar , Ishan Budhiraja , Akansha Singh , Sahil Garg , Georges Kaddoum , Mohammad Mehedi Hassan","doi":"10.1016/j.comnet.2025.111679","DOIUrl":null,"url":null,"abstract":"<div><div>The future sixth generation (6G) mobile network will be a highly heterogeneous system that integrates diverse technologies and communication paradigms, encompassing diverse consumer electronics devices, including various internet of things (IoT) devices utilizing different protocols. The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) with 6G has created ground-breaking prospects for effective data processing and computation services in the IoT. Despite this improvement, the presence of an eavesdropper introduces significant security risks into the computing process of mobile devices (MDs), permitting the collection of sensitive data from MDs and perhaps affecting the correctness of offloaded computations. This study proposes an efficient technique for reducing energy usage in a secure digital twin (DT)-enabled UAV-assisted MEC metaverse network that faces the threat of a UAV eavesdropper. By ensuring the secure processing of all MDs data, the network meets its energy consumption objectives by optimizing trajectories and resources, taking into account parameters like as time, local computation, and offloading computation dispersion. Because of the complicated arrangement of the interplay of various variables and non-linear constraints, solving the problem directly is extremely difficult. To solve this complexity, an auxiliary variable is used to rearrange the problem into a more understandable format. We employ DT-enabled DRL to address this issue because traditional methods are inadequate. The empirical findings indicate that the proposed methodology achieved a reduction in energy consumption of approximately 83.32% and a decrease in time delay of roughly 11.97%, in comparison to the prevailing baseline methodologies.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111679"},"PeriodicalIF":4.6000,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Energy efficient resource allocation and trajectory optimization method for secure digital twin-enabled UAV-assisted MEC in 6G networks\",\"authors\":\"Varun Kumar , Ishan Budhiraja , Akansha Singh , Sahil Garg , Georges Kaddoum , Mohammad Mehedi Hassan\",\"doi\":\"10.1016/j.comnet.2025.111679\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The future sixth generation (6G) mobile network will be a highly heterogeneous system that integrates diverse technologies and communication paradigms, encompassing diverse consumer electronics devices, including various internet of things (IoT) devices utilizing different protocols. The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) with 6G has created ground-breaking prospects for effective data processing and computation services in the IoT. Despite this improvement, the presence of an eavesdropper introduces significant security risks into the computing process of mobile devices (MDs), permitting the collection of sensitive data from MDs and perhaps affecting the correctness of offloaded computations. This study proposes an efficient technique for reducing energy usage in a secure digital twin (DT)-enabled UAV-assisted MEC metaverse network that faces the threat of a UAV eavesdropper. By ensuring the secure processing of all MDs data, the network meets its energy consumption objectives by optimizing trajectories and resources, taking into account parameters like as time, local computation, and offloading computation dispersion. Because of the complicated arrangement of the interplay of various variables and non-linear constraints, solving the problem directly is extremely difficult. To solve this complexity, an auxiliary variable is used to rearrange the problem into a more understandable format. We employ DT-enabled DRL to address this issue because traditional methods are inadequate. The empirical findings indicate that the proposed methodology achieved a reduction in energy consumption of approximately 83.32% and a decrease in time delay of roughly 11.97%, in comparison to the prevailing baseline methodologies.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"272 \",\"pages\":\"Article 111679\"},\"PeriodicalIF\":4.6000,\"publicationDate\":\"2025-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625006462\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625006462","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Energy efficient resource allocation and trajectory optimization method for secure digital twin-enabled UAV-assisted MEC in 6G networks
The future sixth generation (6G) mobile network will be a highly heterogeneous system that integrates diverse technologies and communication paradigms, encompassing diverse consumer electronics devices, including various internet of things (IoT) devices utilizing different protocols. The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) with 6G has created ground-breaking prospects for effective data processing and computation services in the IoT. Despite this improvement, the presence of an eavesdropper introduces significant security risks into the computing process of mobile devices (MDs), permitting the collection of sensitive data from MDs and perhaps affecting the correctness of offloaded computations. This study proposes an efficient technique for reducing energy usage in a secure digital twin (DT)-enabled UAV-assisted MEC metaverse network that faces the threat of a UAV eavesdropper. By ensuring the secure processing of all MDs data, the network meets its energy consumption objectives by optimizing trajectories and resources, taking into account parameters like as time, local computation, and offloading computation dispersion. Because of the complicated arrangement of the interplay of various variables and non-linear constraints, solving the problem directly is extremely difficult. To solve this complexity, an auxiliary variable is used to rearrange the problem into a more understandable format. We employ DT-enabled DRL to address this issue because traditional methods are inadequate. The empirical findings indicate that the proposed methodology achieved a reduction in energy consumption of approximately 83.32% and a decrease in time delay of roughly 11.97%, in comparison to the prevailing baseline methodologies.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.