计算机科学 ›› 2024, Vol. 51 ›› Issue (6A): 230800032-7.doi: 10.11896/jsjkx.230800032
薛建彬, 豆俊, 王涛, 马玉玲
XUE Jianbin, DOU Jun, WANG Tao, MA Yuling
摘要: 针对无人机辅助移动边缘计算系统下用户信息容易泄露的问题,设计了一种基于非正交多址接入技术(Non-orthogonal Multiple Access,NOMA)的无人机辅助边缘计算系统的安全通信方案。在保证每个地面用户的最小安全计算要求下,通过联合优化信道系数、发射功率、中央处理单元计算频率、本地计算和无人机轨迹来最大化系统的平均安全计算能力。由于窃听者位置的不确定性、多变量的耦合以及问题的非凸性,利用逐次凸逼近和块坐标下降方法来解决该问题。仿真结果表明,与基准方案相比,所提方案在系统安全计算性能方面优于基准方案。
中图分类号:
[1]HUANG H L,SAVKIN A.A Method for Optimized Deploy-ment of Unmanned Aerial Vehicles for Maximum Coverage and MinimumInterferencein Cellular Networks[J].IEEE Transactions on Industrial Informatics,2019,15(5):2638-2647. [2]DU Y Y,KUN W,ZHANG K Z.Joint Resources and Workflow Scheduling in UAV-Enabled Wirelessly-Powered MEC for IoT Systems[J].IEEE Transactions on Vehicular Technology,2019,68(10):10187-10200. [3]HUANG F,CHEN J,WANG H C,et al.UAV-Assisted SWIPTin Internet of Things With Power Splitting:Trajectory Design and Power Allocation[J].IEEE Access,2019,7:68260-68270. [4]ZHAN C,HU H,SUI X F,et al.Completion Time and Energy Optimization in the UAV-Enabled Mobile-Edge Computing System[J].IEEE Internet of Journal,2020,7(8):7808-7822. [5]ZHOU F H,WU Y P,HU R,et al.Computation Rate Maximization in UAV-Enabled Wireless-Powered Mobile-Edge Computing Systems[J].IEEE Journal on Selected Areas in Communications,2018,36(9):1927-1941. [6]HU Q Y,CAI Y L,YU G D,et al.Joint Offloading and Trajectory Design for UAV-Enabled Mobile Edge Computing Systems[J].IEEE Internet of Things Journal,2019,6(2):1879-1892. [7]ZHANG T K,XU Y,JONATHAN L,et al.Joint Computationand Communication Design for UAV-Assisted Mobile Edge Computing in IoT[J].IEEE Transactions on Industrial Informatics,2020,16(8):5505-5516. [8]YU Z,GONG Y M,GONG S M,et al.Joint Task Offloading and Resource Allocation in UAV-Enabled Mobile Edge Computing[J].IEEE Internet of Things Journal,2020,7(4):3147-3159. [9]CUI F Y,CAI Y L,QIN Z J,et al.Multiple Access for Mobile-UAV Enabled Networks:Joint Trajectory Design and Resource Allocation[J].IEEE Transactions on Communications,2019,67(7):4980-4994. [10]NA Z Y,LIU Y,SHI J C,et al.UAV-Supported Clustered NOMA for 6G-Enabled Internet of Things:Trajectory Planning and Resource Allocation[J].IEEE Internet of Things Journal,2021,8(20):15041-15048. [11]LI S L,LI B G,ZHAO W.Joint Optimization of Caching and Computation in Multi-Server NOMA-MEC System via Reinforcement Learning[J].IEEE Access,2020,8:112762-112771. [12]WU Y,NI K J,ZHANG C,et al.NOMA-Assisted Multi-Access Mobile Edge Computing:A Joint Optimization of Computation Offloading and Time Allocation[J].IEEE Transactions on Vehicular Technology,2018,67(12):12244-12258. [13]ZHANG X C,ZHANG J,XIONG J,et al.Energy-EfficientMulti-UAV-Enabled Multiaccess Edge Computing Incorporating NOMA[J].IEEE Internet of Things Journal,2020,7(6):5613-5627. [14]CHEN X Y,YANG Z T,ZHAO N,et al.Secure Transmission via Power Allocation in NOMA-UAV Networks With Circular Trajectory[J].IEEE Transactions on Vehicular Technology,2020,69(9):10033-10045. [15]XU Y,ZHANG T K,YANG D C,et al.Joint Resource and Trajectory Optimization for Security in UAV-Assisted MEC Systems[J].IEEE Transactions on Communications,2021,69(1):573-588. [16]SUN X L,YANG W W,CAI Y M.Secure Communication inNOMA-Assisted Millimeter-Wave SWIPT UAV Networks[J].IEEE Internet of Things Journal,2020,7(3):1884-1897. [17]HU G J,CAI Y M,CAI Y L,et al.Joint Optimization of Position and Jamming Power for UAV-Aided Proactive Eavesdropping Over Multiple Suspicious Communication Links[J].IEEE Wireless Communications Letters,2020,9(12):2093-2097. [18]HUANG H L,SAVKIN A,WEI N W.Navigation of a UAV Team for Collaborative Eavesdropping on Multiple Ground Transmitters[J].IEEE Transactions on vehicular Technology,2021,70(10):10450-10460. |
|