Secure NOMA-Based UAV-MEC Network Towards a Flying Eavesdropper
نویسندگان
چکیده
Non-orthogonal multiple access (NOMA) allows users to share link resource for higher spectrum efficiency. It can be applied unmanned aerial vehicle (UAV) and mobile edge computing (MEC) networks provide convenient offloading service ground (GUs) with large-scale access. However, due the line-of-sight (LoS) of UAV transmission, information easily eavesdropped in NOMA-based UAV-MEC networks. In this paper, we propose a secure communication scheme system towards flying eavesdropper. proposed scheme, average security computation capacity is maximized while guaranteeing minimum requirement each GU. Due uncertainty eavesdropper’s position, coupling multi-variables non-convexity problem, first study worst situation through mathematical derivation. Then, problem solved by utilizing successive convex approximation (SCA) block coordinate descent (BCD) methods respect channel coefficient, transmit power, central processing unit (CPU) frequency, local trajectory. Simulation results show that superior benchmarks terms performance.
منابع مشابه
New High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملNonlinear Control for Uav Formation Flying
Unmanned Aerial Vehicles (UAVs) became a technology that have attracted considerable interest in the commercial markets for the military and civilian uses, such as surveillance and reconnaissance, aerial surveys for natural sources, traffic monitoring, early forest fire detection etc. This paper deals with Nonlinear and Model Predictive Control (MPC) of Unmanned Aerial Vehicles (UAV) flying in ...
متن کاملA Simple Control Law for UAV Formation Flying
This paper presents a Lie group setting for the problem of control of formations, as a natural outcome of the analysis of a planar two-vehicle formation control law. The vehicle trajectories are described using planar Frenet-Serret equations of motion, which capture the evolution of both the vehicle position and orientation for unit-speed motion subject to curvature (steering) control. The set ...
متن کاملSecure distributed lossless compression with side information at the eavesdropper
This paper investigates the problem of secure distributed lossless compression in the presence of arbitrarily correlated side information at an eavesdropper. This scenario consists of two encoders (referred to as Alice and Charlie) that wish to reliably transmit their respective (correlated) sources to a legitimate receiver (referred to as Bob) while satisfying some requirement on the equivocat...
متن کاملTowards Secure End-to-End Network Measurements
End-to-end network measurement tools are gaining increasing importance in many Internet services. This is the case since the performance and Quality-of-Service (QoS) of many online applications and services largely depend on their network characteristics. These measurement tools were designed, however, without prior security consideration which, given the current adversarial Internet, renders t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Communications
سال: 2022
ISSN: ['1558-0857', '0090-6778']
DOI: https://doi.org/10.1109/tcomm.2022.3159703