2020
DOI: 10.1109/tcomm.2019.2947921
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communications for UAV-Enabled Mobile Edge Computing Systems

Abstract: In this paper, we propose a secure unmanned aerial vehicle (UAV) mobile edge computing (MEC) system where multiple ground users offload large computing tasks to a nearby legitimate UAV in the presence of multiple eavesdropping UAVs with imperfect locations. To enhance security, jamming signals are transmitted from both the full-duplex legitimate UAV and non-offloading ground users. For this system, we design a low-complexity iterative algorithm to maximize the minimum secrecy capacity subject to latency, minim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
116
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 227 publications
(116 citation statements)
references
References 30 publications
0
116
0
Order By: Relevance
“…Alzenad et al [8] proposed an optimal placement algorithm for maximizing the number of covered users using the minimum transmit power. Furthermore, UAV served as mobile edge computing (MEC) have been studied in [9], [10]. In [9], a secure UAV system has been studied where multiple ground users offload the tasks to the UAV-enabled MEC system in the presence of several eavesdropping UAVs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Alzenad et al [8] proposed an optimal placement algorithm for maximizing the number of covered users using the minimum transmit power. Furthermore, UAV served as mobile edge computing (MEC) have been studied in [9], [10]. In [9], a secure UAV system has been studied where multiple ground users offload the tasks to the UAV-enabled MEC system in the presence of several eavesdropping UAVs.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, UAV served as mobile edge computing (MEC) have been studied in [9], [10]. In [9], a secure UAV system has been studied where multiple ground users offload the tasks to the UAV-enabled MEC system in the presence of several eavesdropping UAVs. In [10], large-scale mobile users was considered in the multi-UAV enabled MEC, where offloading decision and resource allocation were studied.…”
Section: Introductionmentioning
confidence: 99%
“…Mobile Edge Computing (MEC) provides communication services and near-user processing facilities to users and has been a promising technology for the further UAV communication [82][83][84]. UAV-enabled MEC networks are promising to increase computing efficiency and reduce execution latency.…”
Section: Uav-enabled Mobile Edge Computingmentioning
confidence: 99%
“…A novel unmanned aerial vehicle (UAV) flight trajectory optimization was studied in [12] to maximize the minimum secrecy rate of ground terminals. In [13], a secure mobile edge computing (MEC) system was proposed where ground users can offload computing tasks to the legitimate UAV in the presence of multiple eavesdropping UAVs. A novel secure transmission scheme was developed in [14] to fight against the eavesdropping in downlink multi-input single-output non-orthogonal multiple access (NOMA) networks.…”
mentioning
confidence: 99%