TY - JOUR
T1 - Secure Communications for UAV-Enabled Mobile Edge Computing Systems
AU - Zhou, Yi
AU - Pan, Cunhua
AU - Yeoh, Phee Lep
AU - Wang, Kezhi
AU - Elkashlan, Maged
AU - Vucetic, Branka
AU - Li, Yonghui
N1 - Research funded by Australian Research Council (DP190101988DP150104019DP190100770), ARC Laureate Fellowship (FL160100032)
PY - 2020/1
Y1 - 2020/1
N2 - In this paper, we propose a secure unmanned aerial vehicle (UAV) mobile edge computing (MEC) system where multiple ground users offload large computing tasks to a nearby legitimate UAV in the presence of multiple eavesdropping UAVs with imperfect locations. To enhance security, jamming signals are transmitted from both the full-duplex legitimate UAV and non-offloading ground users. For this system, we design a low-complexity iterative algorithm to maximize the minimum secrecy capacity subject to latency, minimum offloading and total power constraints. Specifically, we jointly optimize the UAV location, users’ transmit power, UAV jamming power, offloading ratio, UAV computing capacity, and offloading user association. Numerical results show that our proposed algorithm significantly outperforms baseline strategies over a wide range of UAV selfinterference (SI) efficiencies, locations and packet sizes of ground users. Furthermore, we show that there exists a fundamental tradeoff between the security and latency of UAV-enabled MEC systems which depends on the UAV SI efficiency and total UAV power constraints.
AB - In this paper, we propose a secure unmanned aerial vehicle (UAV) mobile edge computing (MEC) system where multiple ground users offload large computing tasks to a nearby legitimate UAV in the presence of multiple eavesdropping UAVs with imperfect locations. To enhance security, jamming signals are transmitted from both the full-duplex legitimate UAV and non-offloading ground users. For this system, we design a low-complexity iterative algorithm to maximize the minimum secrecy capacity subject to latency, minimum offloading and total power constraints. Specifically, we jointly optimize the UAV location, users’ transmit power, UAV jamming power, offloading ratio, UAV computing capacity, and offloading user association. Numerical results show that our proposed algorithm significantly outperforms baseline strategies over a wide range of UAV selfinterference (SI) efficiencies, locations and packet sizes of ground users. Furthermore, we show that there exists a fundamental tradeoff between the security and latency of UAV-enabled MEC systems which depends on the UAV SI efficiency and total UAV power constraints.
KW - Physical layer security
KW - mobile edge computing
KW - UAV communication
KW - secrecy capacity
U2 - 10.1109/TCOMM.2019.2947921
DO - 10.1109/TCOMM.2019.2947921
M3 - Article
SN - 0090-6778
VL - 68
SP - 376
EP - 388
JO - IEEE Transactions on Communications
JF - IEEE Transactions on Communications
IS - 1
ER -