Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Secure NOMA-based UAV-MEC network towards a flying eavesdropper

Tools
- Tools
+ Tools

Lu, Weidang, Ding, Yu, Gao, Yuan, Chen, Yunfei, Zhao, Nan, Ding, Zhiguo and Nallanathan, Arumugam (2022) Secure NOMA-based UAV-MEC network towards a flying eavesdropper. IEEE Transactions on Communications, 70 (5). pp. 3364-3376. doi:10.1109/TCOMM.2022.3159703 ISSN 0090-6778.

Research output not available from this repository.

Request-a-Copy directly from author or use local Library Get it For Me service.

Official URL: http://dx.doi.org/10.1109/TCOMM.2022.3159703

Request Changes to record.

Abstract

Non-orthogonal multiple access (NOMA) allows multiple users to share link resource for higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile edge computing (MEC) networks to provide convenient offloading computing service for ground users (GUs) with large-scale access. However, due to the line-of-sight (LoS) of UAV transmission, the information can be easily eavesdropped in NOMA-based UAV-MEC networks. In this paper, we propose a secure communication scheme for the NOMA-based UAV-MEC system towards a flying eavesdropper. In the proposed scheme, the average security computation capacity of the system is maximized while guaranteeing a minimum security computation requirement for each GU. Due to the uncertainty of the eavesdropper’s position, the coupling of multi-variables and the non-convexity of the problem, we first study the worst security situation through mathematical derivation. Then, the problem is solved by utilizing successive convex approximation (SCA) and block coordinate descent (BCD) methods with respect to channel coefficient, transmit power, central processing unit (CPU) computation frequency, local computation and UAV trajectory. Simulation results show that the proposed scheme is superior to the benchmarks in terms of the system security computation performance.

Item Type: Journal Article
Divisions: Faculty of Science, Engineering and Medicine > Engineering > Engineering
Journal or Publication Title: IEEE Transactions on Communications
Publisher: IEEE
ISSN: 0090-6778
Official Date: 14 March 2022
Dates:
DateEvent
14 March 2022Published
3 March 2022Available
10 September 2021Submitted
Volume: 70
Number: 5
Page Range: pp. 3364-3376
DOI: 10.1109/TCOMM.2022.3159703
Status: Peer Reviewed
Publication Status: Published
Access rights to Published version: Restricted or Subscription Access
Copyright Holders: IEEE
RIOXX Funder/Project Grant:
Project/Grant IDRIOXX Funder NameFunder ID
61871348[NSFC] National Natural Science Foundation of Chinahttp://dx.doi.org/10.13039/501100001809
2018B030322004Guangdong Key Laboratory of Aerospace Communication and Networking TechnologyUNSPECIFIED
Related URLs:
  • Other Repository

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item
twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us