TY - JOUR
T1 - Secure NOMA-Based UAV-MEC Network Towards a Flying Eavesdropper
AU - Lu, Weidang
AU - Ding, Yu
AU - Gao, Yuan
AU - Chen, Yunfei
AU - Zhao, Nan
AU - Ding, Zhiguo
AU - Nallanathan, Arumugam
N1 - Publisher Copyright:
© 1972-2012 IEEE.
PY - 2022/5/1
Y1 - 2022/5/1
N2 - Non-orthogonal multiple access (NOMA) allows multiple users to share link resource for higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile edge computing (MEC) networks to provide convenient offloading computing service for ground users (GUs) with large-scale access. However, due to the line-of-sight (LoS) of UAV transmission, the information can be easily eavesdropped in NOMA-based UAV-MEC networks. In this paper, we propose a secure communication scheme for the NOMA-based UAV-MEC system towards a flying eavesdropper. In the proposed scheme, the average security computation capacity of the system is maximized while guaranteeing a minimum security computation requirement for each GU. Due to the uncertainty of the eavesdropper's position, the coupling of multi-variables and the non-convexity of the problem, we first study the worst security situation through mathematical derivation. Then, the problem is solved by utilizing successive convex approximation (SCA) and block coordinate descent (BCD) methods with respect to channel coefficient, transmit power, central processing unit (CPU) computation frequency, local computation and UAV trajectory. Simulation results show that the proposed scheme is superior to the benchmarks in terms of the system security computation performance.
AB - Non-orthogonal multiple access (NOMA) allows multiple users to share link resource for higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile edge computing (MEC) networks to provide convenient offloading computing service for ground users (GUs) with large-scale access. However, due to the line-of-sight (LoS) of UAV transmission, the information can be easily eavesdropped in NOMA-based UAV-MEC networks. In this paper, we propose a secure communication scheme for the NOMA-based UAV-MEC system towards a flying eavesdropper. In the proposed scheme, the average security computation capacity of the system is maximized while guaranteeing a minimum security computation requirement for each GU. Due to the uncertainty of the eavesdropper's position, the coupling of multi-variables and the non-convexity of the problem, we first study the worst security situation through mathematical derivation. Then, the problem is solved by utilizing successive convex approximation (SCA) and block coordinate descent (BCD) methods with respect to channel coefficient, transmit power, central processing unit (CPU) computation frequency, local computation and UAV trajectory. Simulation results show that the proposed scheme is superior to the benchmarks in terms of the system security computation performance.
KW - MEC
KW - NOMA
KW - resource and trajectory optimization
KW - secure communication
KW - UAV communication
UR - http://www.scopus.com/inward/record.url?scp=85126534029&partnerID=8YFLogxK
U2 - 10.1109/TCOMM.2022.3159703
DO - 10.1109/TCOMM.2022.3159703
M3 - Article
AN - SCOPUS:85126534029
SN - 0090-6778
VL - 70
SP - 3364
EP - 3376
JO - IEEE Transactions on Communications
JF - IEEE Transactions on Communications
IS - 5
ER -