Loading [MathJax]/extensions/MathEvents.js
Secure Throughput Optimization for Cache-Enabled Multi-UAVs Networks | IEEE Journals & Magazine | IEEE Xplore

Secure Throughput Optimization for Cache-Enabled Multi-UAVs Networks


Abstract:

This article considers an ultradense heterogeneous network (UDHN) consisting of cache-enabled unmanned aerial vehicles (UAVs) and Internet of Things mobile devices (IMDs)...Show More

Abstract:

This article considers an ultradense heterogeneous network (UDHN) consisting of cache-enabled unmanned aerial vehicles (UAVs) and Internet of Things mobile devices (IMDs) receiving their requested contents via the power domain nonorthogonal multiple access (PD-NOMA) protocol. Employing the fast global {K} -means (FGKMs) algorithm, IMDs are partitioned into several clusters connecting to either other IMDs or UAV belonging to the same cluster in the presence of untrusted users, known as nonlegitimate eavesdroppers. It is assumed that users located in the cluster edge area communicate with multiple UAVs to obtain their requested contents. The main goal for such a network is to jointly optimize the number of UAVs, their 3-D placements, and the cache placement probability of contents stored in UAVs and IMDs by maximizing the secure cache throughput. Toward this goal, we prove that the objective function is nonconcave. Therefore, we decompose the optimization problem into multiple subproblems. We first employ the FGKM algorithm to optimally determine the number of employed UAVs and their horizontal placements. Then, the UAVs’ altitudes are optimized by employing the interior-point method (IPM), while the convex approximation for the objective function and its constraints are substituted. Then, we optimize the secure cache throughput of IMDs by proposing a caching placement strategy for contents stored in UAVs and IMDs via Device to Device (D2D) and UAV to Device (U2D) links, given illegal eavesdroppers’ presence. Then, we propose an iterative algorithm to achieve the near-optimal solution for the cache throughput of IMDs. Different from existing works, the closed-form expressions for the achievable secrecy rate and the successful probability of D2D communications and U2D transmissions, as well as the secure cache throughput are derived. Finally, simulation results are presented to validate the proposed caching placement strategy. It is shown that the proposed scheme ou...
Published in: IEEE Internet of Things Journal ( Volume: 9, Issue: 10, 15 May 2022)
Page(s): 7783 - 7801
Date of Publication: 21 September 2021

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.