Resource and trajectory optimization for secure communication in RIS assisted UAV‐MEC system
Abstract The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) is considered as a promising approach to tackle soaring computing requirements. The broadcast nature of air‐to‐ground (A2G) links makes UAV communications vulnerable to eavesdroppers, so secure UAV communicat...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2023-11-01
|
Series: | IET Communications |
Subjects: | |
Online Access: | https://doi.org/10.1049/cmu2.12680 |
_version_ | 1797635961832603648 |
---|---|
author | Shihao Liu Yangchao Huang Hang Hu Jiangbo Si Guobing Cheng Tao Huang Xiaoliang Hu |
author_facet | Shihao Liu Yangchao Huang Hang Hu Jiangbo Si Guobing Cheng Tao Huang Xiaoliang Hu |
author_sort | Shihao Liu |
collection | DOAJ |
description | Abstract The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) is considered as a promising approach to tackle soaring computing requirements. The broadcast nature of air‐to‐ground (A2G) links makes UAV communications vulnerable to eavesdroppers, so secure UAV communications remain an open question. This paper proposes a secure communication scheme for reconfigurable intelligent surface (RIS)‐assisted UAV‐MEC systems, in which the RIS assists the user in offloading data to the legitimate UAV, and the legitimate UAV provides computing services to the user. To fully expand the security computing capacity of the system, the communication link is improved by introducing RIS, and the jammer interferes with the eavesdropper. The secure computing capability of the system is maximized by optimizing communication resources and trajectories. Since the proposed problem is non‐convex, successive convex approximation (SCA) technique and block coordinate descent (BCD) technique is combined to solve the problem. The simulation results show that the proposed scheme in this paper can effectively improve the system secure computing bits compared with the benchmark scheme. |
first_indexed | 2024-03-11T12:28:30Z |
format | Article |
id | doaj.art-45e1d2d99ca44d58af5b10c2b80ec1bf |
institution | Directory Open Access Journal |
issn | 1751-8628 1751-8636 |
language | English |
last_indexed | 2024-03-11T12:28:30Z |
publishDate | 2023-11-01 |
publisher | Wiley |
record_format | Article |
series | IET Communications |
spelling | doaj.art-45e1d2d99ca44d58af5b10c2b80ec1bf2023-11-06T04:32:48ZengWileyIET Communications1751-86281751-86362023-11-0117182068207910.1049/cmu2.12680Resource and trajectory optimization for secure communication in RIS assisted UAV‐MEC systemShihao Liu0Yangchao Huang1Hang Hu2Jiangbo Si3Guobing Cheng4Tao Huang5Xiaoliang Hu6Information and Navigation College AF Engineer University Xi'an ChinaInformation and Navigation College AF Engineer University Xi'an ChinaInformation and Navigation College AF Engineer University Xi'an ChinaSchool of Telecommunications Engineering, Xidian University Xi'an ChinaInformation and Navigation College AF Engineer University Xi'an ChinaInformation and Navigation College AF Engineer University Xi'an ChinaInformation and Navigation College AF Engineer University Xi'an ChinaAbstract The combination of unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) is considered as a promising approach to tackle soaring computing requirements. The broadcast nature of air‐to‐ground (A2G) links makes UAV communications vulnerable to eavesdroppers, so secure UAV communications remain an open question. This paper proposes a secure communication scheme for reconfigurable intelligent surface (RIS)‐assisted UAV‐MEC systems, in which the RIS assists the user in offloading data to the legitimate UAV, and the legitimate UAV provides computing services to the user. To fully expand the security computing capacity of the system, the communication link is improved by introducing RIS, and the jammer interferes with the eavesdropper. The secure computing capability of the system is maximized by optimizing communication resources and trajectories. Since the proposed problem is non‐convex, successive convex approximation (SCA) technique and block coordinate descent (BCD) technique is combined to solve the problem. The simulation results show that the proposed scheme in this paper can effectively improve the system secure computing bits compared with the benchmark scheme.https://doi.org/10.1049/cmu2.12680mobile computingresource allocation |
spellingShingle | Shihao Liu Yangchao Huang Hang Hu Jiangbo Si Guobing Cheng Tao Huang Xiaoliang Hu Resource and trajectory optimization for secure communication in RIS assisted UAV‐MEC system IET Communications mobile computing resource allocation |
title | Resource and trajectory optimization for secure communication in RIS assisted UAV‐MEC system |
title_full | Resource and trajectory optimization for secure communication in RIS assisted UAV‐MEC system |
title_fullStr | Resource and trajectory optimization for secure communication in RIS assisted UAV‐MEC system |
title_full_unstemmed | Resource and trajectory optimization for secure communication in RIS assisted UAV‐MEC system |
title_short | Resource and trajectory optimization for secure communication in RIS assisted UAV‐MEC system |
title_sort | resource and trajectory optimization for secure communication in ris assisted uav mec system |
topic | mobile computing resource allocation |
url | https://doi.org/10.1049/cmu2.12680 |
work_keys_str_mv | AT shihaoliu resourceandtrajectoryoptimizationforsecurecommunicationinrisassisteduavmecsystem AT yangchaohuang resourceandtrajectoryoptimizationforsecurecommunicationinrisassisteduavmecsystem AT hanghu resourceandtrajectoryoptimizationforsecurecommunicationinrisassisteduavmecsystem AT jiangbosi resourceandtrajectoryoptimizationforsecurecommunicationinrisassisteduavmecsystem AT guobingcheng resourceandtrajectoryoptimizationforsecurecommunicationinrisassisteduavmecsystem AT taohuang resourceandtrajectoryoptimizationforsecurecommunicationinrisassisteduavmecsystem AT xiaolianghu resourceandtrajectoryoptimizationforsecurecommunicationinrisassisteduavmecsystem |