Resource and Trajectory Optimization for Secure Communications in Dual Unmanned Aerial Vehicle Mobile Edge Computing Systems

Weidang Lu,Yu Ding,Yuan Gao,Su Hu,Yuan Wu,Nan Zhao,Yi Gong
DOI: https://doi.org/10.1109/tii.2021.3087726
IF: 12.3
2022-01-01
IEEE Transactions on Industrial Informatics
Abstract:With the maneuverability and mobility control of unmanned aerial vehicle (UAV), carrying mobile edge computing (MEC) servers on UAVs is able to effectively alleviate the explosive growth of data traffic pressure. However, UAV adopts line-of-sight transmission which has broadcasting characteristics. Malicious eavesdroppers can easily take advantage of the characteristics to eavesdrop information during the UAV edge computing. Therefore, the security of the UAV-MEC systems is a challenging problem. This article proposes a secure communication scheme for the dual-UAV-MEC system. In the proposed scheme, UAV server assists ground users in calculating the offloading tasks. In order to reduce the eavesdropping of offloading information by UAV eavesdropper, jammer sends interference signals on the ground. We aim to maximize the user's minimum secure calculation capacity by optimizing resources and trajectory of the UAV server. We first transform the optimization problem into a tractable form through mathematical methods and use successive convex approximation and block coordinate descent algorithms to solve it in an iterative manner. The final numerical results show that, compared with the benchmark schemes, the method proposed in this article effectively increases the secure calculation capacity of the system.
What problem does this paper attempt to address?