Secure NOMA-Based UAV-MEC Network Towards a Flying Eavesdropper

نویسندگان

چکیده

Non-orthogonal multiple access (NOMA) allows users to share link resource for higher spectrum efficiency. It can be applied unmanned aerial vehicle (UAV) and mobile edge computing (MEC) networks provide convenient offloading service ground (GUs) with large-scale access. However, due the line-of-sight (LoS) of UAV transmission, information easily eavesdropped in NOMA-based UAV-MEC networks. In this paper, we propose a secure communication scheme system towards flying eavesdropper. proposed scheme, average security computation capacity is maximized while guaranteeing minimum requirement each GU. Due uncertainty eavesdropper’s position, coupling multi-variables non-convexity problem, first study worst situation through mathematical derivation. Then, problem solved by utilizing successive convex approximation (SCA) block coordinate descent (BCD) methods respect channel coefficient, transmit power, central processing unit (CPU) frequency, local trajectory. Simulation results show that superior benchmarks terms performance.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

Nonlinear Control for Uav Formation Flying

Unmanned Aerial Vehicles (UAVs) became a technology that have attracted considerable interest in the commercial markets for the military and civilian uses, such as surveillance and reconnaissance, aerial surveys for natural sources, traffic monitoring, early forest fire detection etc. This paper deals with Nonlinear and Model Predictive Control (MPC) of Unmanned Aerial Vehicles (UAV) flying in ...

متن کامل

A Simple Control Law for UAV Formation Flying

This paper presents a Lie group setting for the problem of control of formations, as a natural outcome of the analysis of a planar two-vehicle formation control law. The vehicle trajectories are described using planar Frenet-Serret equations of motion, which capture the evolution of both the vehicle position and orientation for unit-speed motion subject to curvature (steering) control. The set ...

متن کامل

Secure distributed lossless compression with side information at the eavesdropper

This paper investigates the problem of secure distributed lossless compression in the presence of arbitrarily correlated side information at an eavesdropper. This scenario consists of two encoders (referred to as Alice and Charlie) that wish to reliably transmit their respective (correlated) sources to a legitimate receiver (referred to as Bob) while satisfying some requirement on the equivocat...

متن کامل

Towards Secure End-to-End Network Measurements

End-to-end network measurement tools are gaining increasing importance in many Internet services. This is the case since the performance and Quality-of-Service (QoS) of many online applications and services largely depend on their network characteristics. These measurement tools were designed, however, without prior security consideration which, given the current adversarial Internet, renders t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Communications

سال: 2022

ISSN: ['1558-0857', '0090-6778']

DOI: https://doi.org/10.1109/tcomm.2022.3159703