浏览全部资源
扫码关注微信
1. 北京邮电大学电子工程学院,北京 100876
2. 北京邮电大学泛网无线通信教育部重点实验室,北京 100876
[ "崔高峰(1987- ),男,河南驻马店人, 博士,北京邮电大学副教授、博士生导师,主要研究方向为空天通信、卫星通信、卫星网络资源管理" ]
[ "徐媛媛(1996- ),女,天津人,北京邮电大学硕士生,主要研究方向为卫星通信、卫星网络资源管理、强化学习等" ]
[ "张尚宏(1993- ),男,河南郑州人,北京邮电大学博士生,主要研究方向为卫星通信、卫星网络资源管理、5G通信等" ]
[ "王卫东(1967- ),男,内蒙古包头人,博士,北京邮电大学教授、博士生导师,主要研究方向为卫星通信、移动通信、物联网等" ]
网络出版日期:2021-05,
纸质出版日期:2021-05-25
移动端阅览
崔高峰, 徐媛媛, 张尚宏, 等. 基于最小能耗的多无人机无线网络安全数据卸载策略[J]. 通信学报, 2021,42(5):51-62.
Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, et al. Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption[J]. Journal on communications, 2021, 42(5): 51-62.
崔高峰, 徐媛媛, 张尚宏, 等. 基于最小能耗的多无人机无线网络安全数据卸载策略[J]. 通信学报, 2021,42(5):51-62. DOI: 10.11959/j.issn.1000-436x.2021085.
Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, et al. Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption[J]. Journal on communications, 2021, 42(5): 51-62. DOI: 10.11959/j.issn.1000-436x.2021085.
为了解决地面用户向多无人机边缘计算网络卸载数据时存在的地面被动窃听问题,提出了一种通过联合优化用户匹配和资源分配使系统能耗最小化的安全数据卸载策略。考虑了系统时延、通信资源、计算资源的限制,采用保密中断概率对数据卸载过程的安全性能进行约束。利用块坐标下降和连续凸近似算法联合优化用户发送功率、卸载因子、无人机计算资源分配、干扰功率,并基于成对稳定的用户匹配算法最小化无人机系统总能耗。仿真数据表明,该算法可以实现数据的安全卸载,并且在能耗、时延等性能上优于传统策略。
To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network
a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay
communication resources and computing resources
the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm
the user transmission power
offload factor
UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data
and has good performance in energy consumption and delay by comparing with the conventional strategies.
WU Q Q , MEI W D , ZHANG R . Safeguarding wireless network with UAVs:a physical layer security perspective [J ] . IEEE Wireless Communications , 2019 , 26 ( 5 ): 12 - 18 .
ALZENAD M , EL-KEYI A , LAGUM F , et al . 3-D placement of an unmanned aerial vehicle base station (UAV-BS) for energy-efficient maximal coverage [J ] . IEEE Wireless Communications Letters , 2017 , 6 ( 4 ): 434 - 437 .
ZHANG B , LIU C H , TANG J , et al . Learning-based energy-efficient data collection by unmanned vehicles in smart cities [J ] . IEEE Transactions on Industrial Informatics , 2018 , 14 ( 4 ): 1666 - 1676 .
ZHAN P C , YU K , SWINDLEHURST A L . Wireless relay communications with unmanned aerial vehicles:performance and optimization [J ] . IEEE Transactions on Aerospace and Electronic Systems , 2011 , 47 ( 3 ): 2068 - 2085 .
PAN C H , REN H , DENG Y S , et al . Joint blocklength and location optimization for URLLC-enabled UAV relay systems [J ] . IEEE Communications Letters , 2019 , 23 ( 3 ): 498 - 501 .
ZHOU F H , HU R Q , LI Z , et al . Mobile edge computing in unmanned aerial vehicle networks [J ] . IEEE Wireless Communications , 2020 , 27 ( 1 ): 140 - 146 .
FAN L Y , YAN W , CHEN X H , et al . An energy efficient design for UAV communication with mobile edge computing [J ] . China Communications , 2019 , 16 ( 1 ): 26 - 36 .
PATEL M , NAUGHTON B , CHAN C , et al . Mobile-edge computing introductory technical white paper [R ] . Mobile-edge Computing (MEC) Industry Initiative ,(2014-09-18)[2020-08-28 ] .
ZENG Y , ZHANG R . Energy-efficient UAV communication with trajectory optimization [J ] . IEEE Transactions on Wireless Communications , 2017 , 16 ( 6 ): 3747 - 3760 .
ZENG F Z , HU Z Z , XIAO Z , et al . Resource allocation and trajectory optimization for QoE provisioning in energy-efficient UAV-enabled wireless networks [J ] . IEEE Transactions on Vehicular Technology , 2020 , 69 ( 7 ): 7634 - 7647 .
YANG Z H , PAN C H , WANG K Z , et al . Energy efficient resource allocation in UAV-enabled mobile edge computing networks [J ] . IEEE Transactions on Wireless Communications , 2019 , 18 ( 9 ): 4576 - 4589 .
HU Q Y , CAI Y L , YU G D , et al . Joint offloading and trajectory design for UAV-enabled mobile edge computing systems [J ] . IEEE Internet of Things Journal , 2019 , 6 ( 2 ): 1879 - 1892 .
YU Z , GONG Y M , GONG S M , et al . Joint task offloading and resource allocation in UAV-enabled mobile edge computing [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 4 ): 3147 - 3159 .
CENTONZE P . Security and privacy frameworks for access control big data systems [J ] . Computers,Materials and Continua , 2019 , 59 ( 2 ): 361 - 374 .
RAYAN R , RAMALAVANYA R . A survey on secure data offloading using auction based mechanism [C ] // 2017 International Conference on Computation of Power,Energy Information and Communication . Piscataway:IEEE Press , 2017 : 335 - 341 .
YAO Y J , ZHOU W Y , HUANG L . Joint antenna selection and cooperative communication design with physical layer security [C ] // 2016 16th International Symposium on Communications and Information Technologies . Piscataway:IEEE Press , 2016 : 514 - 519 .
LI B , FEI Z S , ZHOU C Q , et al . Physical-layer security in space information networks:a survey [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 1 ): 33 - 52 .
MA J , SHRESTHA R , ADELBERG J , et al . Security and eavesdropping in terahertz wireless links [J ] . Nature , 2018 , 563 ( 7729 ): 89 - 93 .
MIAO J S , ZHENG Z Y . Cooperative jamming for secure UAV-enabled mobile relay system [J ] . IEEE Access , 2020 , 8 : 48943 - 48957 .
BAI T , WANG J J , REN Y , et al . Energy-efficient computation offloading for secure UAV-edge-computing systems [J ] . IEEE Transactions on Vehicular Technology , 2019 , 68 ( 6 ): 6074 - 6087 .
ZHOU Y , PAN C H , YEOH P L , et al . Secure communications for UAV-enabled mobile edge computing systems [J ] . IEEE Transactions on Communications , 2020 , 68 ( 1 ): 376 - 388 .
刘毅 , 吴炯 , 杨普 , 等 . 面向OFDM的同时同频全双工双向高谱效中继方案 [J ] . 电子与信息学报 , 2019 , 41 ( 2 ): 402 - 408 .
LIU Y , WU J , YANG P , et al . High spectrum efficiency full-duplex two-way relay scheme for OFDM [J ] . Journal of Electronics and Information Technology , 2019 , 41 ( 2 ): 402 - 408 .
XU D , ZHU H B . Secure transmission for SWIPT IoT systems with full-duplex IoT devices [J ] . IEEE Internet of Things Journal , 2019 , 6 ( 6 ): 10915 - 10933 .
BECK A , TETRUASHVILI L . On the convergence of block coordinate descent type methods [J ] . SIAM Journal on Optimization , 2013 , 23 ( 4 ): 2037 - 2060 .
RAZAVIYAYN M . Successive convex approximation:analysis and applications [D ] . Minnesota:University of Minnesota , 2014 .
WU Q Q , ZENG Y , ZHANG R . Joint trajectory and communication design for multi-UAV enabled wireless networks [J ] . IEEE Transactions on Wireless Communications , 2018 , 17 ( 3 ): 2109 - 2121 .
LI Z Y , CHEN M , PAN C H , et al . Joint trajectory and communication design for secure UAV networks [J ] . IEEE Communications Letters , 2019 , 23 ( 4 ): 636 - 639 .
PLIATSIOS D , SARIGIANNIDIS P . Resource allocation combining heuristic matching and particle swarm optimization approaches:the case of downlink non-orthogonal multiple access [J ] . Information , 2019 , 10 ( 11 ): 336 .
EDELKAMP S , SCHRDL S . Heuristic search:theory and applications [M ] . California : Morgan Kaufmann , 2011 .
BODINE-BARON E , LEE C , CHONG A , et al . Peer effects and stability in matching markets [J ] . Lecture Notes in Computer Science , 2011 , 6982 : 117 - 129 .
MOZAFFARI M , SAAD W , BENNIS M , et al . Drone small cells in the clouds:design,deployment and performance analysis [C ] // 2015 IEEE Global Communications Conference . Piscataway:IEEE Press , 2015 : 1 - 6 .
0
浏览量
892
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构