Secure Aerial Computing: Convergence of Mobile Edge Computing and Blockchain for UAV Networks

被引:12
|
作者
Tang, Qingqing [1 ,2 ]
Fei, Zesong [1 ,2 ]
Zheng, Jianchao [3 ]
Li, Bin [4 ]
Guo, Lei [5 ]
Wang, Jing [6 ]
机构
[1] Beijing Inst Technol BIT, Sch Informat & Elect, Beijing 100081, Peoples R China
[2] BIT Chongqing Innovat Ctr, Chongqing 401135, Peoples R China
[3] Acad Mil Sci PLA, Beijing 100010, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[5] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
[6] Beijing Instituteof Technol, Sch Informat & Elect, Beijing 100081, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Unmanned aerial vehicle; mobile edge computing; blockchain; security; computation offloading; COMMUNICATION; INTERNET; MAXIMIZATION; THINGS;
D O I
10.1109/TVT.2022.3189818
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The introduction of mobile edge computing (MEC) technology in unmanned aerial vehicle (UAV) networks can provide computing services for mobile users with or without communication infrastructure coverage. However, mobile users' privacy may be leaked during the computation offloading process due to the information interaction between UAVs and the migration of computation tasks between mobile users and UAVs. To this end, we propose a secure aerial computing architecture that integrates MEC and blockchain technology for UAV networks to effectively ensure the security and privacy of computation offloading between UAVs and mobile users. Under this architecture, a problem of joint optimization of user association, UAV trajectory, block processor scheduling, and computation resource allocation is formulated to minimize the weighted sum of the energy consumption and the delay in completing computation tasks and blockchain tasks processing. To handle this intractable issue, we first decouple the optimization variables and then separate the original problem into multiple subproblems to be solved alternately. In addition, we design a block coordinate descent (BCD)-based algorithm for user association and computation resource allocation, and a successive convex approximation (SCA)-based algorithm to optimize the trajectories of UAVs. Simulation results show that the proposed algorithm has better performance.
引用
收藏
页码:12073 / 12087
页数:15
相关论文
共 50 条
  • [1] Secure efficiency maximization for UAV-assisted mobile edge computing networks
    Yan, Leibing
    Wang, Cuiqin
    Zheng, Wei
    [J]. PHYSICAL COMMUNICATION, 2022, 51
  • [2] Computation efficiency maximization for secure UAV-enabled mobile edge computing networks
    Amos, Peprah
    Li, Pei
    Wu, Wei
    Wang, Baoyun
    [J]. PHYSICAL COMMUNICATION, 2021, 46
  • [3] Blockchain-Empowered Secure Aerial Edge Computing for AIoT Devices
    Zhang, Zufan
    Zeng, Kewen
    Yi, Yinxue
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01): : 84 - 94
  • [4] Mobile Edge Computing in Unmanned Aerial Vehicle Networks
    Zhou, Fuhui
    Hu, Rose Qingyang
    Li, Zan
    Wang, Yuhao
    [J]. IEEE WIRELESS COMMUNICATIONS, 2020, 27 (01) : 140 - 146
  • [5] Blockchain: A distributed solution to UAV-enabled mobile edge computing
    Guan, Zhenyu
    Lyu, Hanzheng
    Li, Dawei
    Hei, Yiming
    Wang, Tongchen
    [J]. IET COMMUNICATIONS, 2020, 14 (15) : 2420 - 2426
  • [6] Blockchain-Aided Secure Access Control for UAV Computing Networks
    Wang, Jingjing
    Jiao, Zihan
    Chen, Jianrui
    Hou, Xiangwang
    Yang, Tingting
    Lan, Dapeng
    [J]. IEEE Transactions on Network Science and Engineering, 2024, 11 (06): : 5267 - 5279
  • [7] Blockchain-Based Secure Key Management for Mobile Edge Computing
    Li, Jiaxing
    Wu, Jigang
    Chen, Long
    Li, Jin
    Lam, Siew-Kei
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (01) : 100 - 114
  • [8] Secure UAV-Aided Mobile Edge Computing for IoT: A Review
    Michailidis, Emmanouel T.
    Maliatsos, Konstantinos
    Skoutas, Dimitrios N.
    Vouyioukas, Demosthenes
    Skianis, Charalabos
    [J]. IEEE ACCESS, 2022, 10 : 86353 - 86383
  • [9] Secure Communications for UAV-Enabled Mobile Edge Computing Systems
    Zhou, Yi
    Pan, Cunhua
    Yeoh, Phee Lep
    Wang, Kezhi
    Elkashlan, Maged
    Vucetic, Branka
    Li, Yonghui
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (01) : 376 - 388
  • [10] Blockchain Empowered Resource Trading in Mobile Edge Computing and Networks
    Qiao, Guanhua
    Leng, Supeng
    Chai, Haoye
    Asadi, Arash
    Zhang, Yan
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,