Against Mobile Collusive Eavesdroppers: Cooperative Secure Transmission and Computation in UAV-Assisted MEC Networks | IEEE Journals & Magazine | IEEE Xplore

Against Mobile Collusive Eavesdroppers: Cooperative Secure Transmission and Computation in UAV-Assisted MEC Networks


Abstract:

In Uncrewed Aerial Vehicle (UAV)-assisted Mobile Edge Computing (MEC) networks, the security of transmission faces significant challenges due to the vulnerabilities of li...Show More

Abstract:

In Uncrewed Aerial Vehicle (UAV)-assisted Mobile Edge Computing (MEC) networks, the security of transmission faces significant challenges due to the vulnerabilities of line-of-sight links and potential eavesdropping on two-hop links. This paper addresses these challenges with an innovative Cooperative Secure Transmission and Computation strategy (CSTC), specifically engineered for time-slotted UAV-assisted MEC networks plagued by mobile collusive eavesdroppers. These eavesdroppers significantly bolster their interception capabilities through coordinated and optimized movements, escalating the security threats. To neutralize these risks, the proposed CSTC employs the UAV and remote devices as helper nodes to emit jamming signals, thereby thwarting eavesdropping activities, while simultaneously facilitating the efficient relay of users’ tasks to the base station for advanced processing. The CSTC aims to maximize the sum Secrecy Transmission Rate (STR) satisfying task latency constraints. It involves a joint optimization of UAV trajectory, jamming beamformers, transmit power, and data offloading strategy to expedite task transmission. Additionally, a real-time computation scheduling approach is developed based on a newly defined metric, the Urgency Degree of Users (UDoU), to enhance task processing efficiency. Our extensive simulations validate that the CSTC not only elevates the sum STR but also consistently meets latency constraints, demonstrating its robustness against advanced mobile eavesdropping techniques.
Published in: IEEE Transactions on Mobile Computing ( Volume: 24, Issue: 6, June 2025)
Page(s): 5280 - 5297
Date of Publication: 15 January 2025

ISSN Information:

Funding Agency:


I. Introduction

The Internet of Things (IoT) has transformed connectivity by integrating billions of intelligent devices into the global internet via cellular networks, dramatically increasing data generation. This surge has fueled the development of computation-intensive and latency-sensitive applications, exposing the limitations of devices constrained by energy and processing capacities [1]. In response, Mobile Edge Computing (MEC) emerges as a strategic solution, positioning computational resources closer to the users to reduce response times, lower energy consumption for data transmission and processing, and enhance user experience through computation offloading [2].

Contact IEEE to Subscribe

References

References is not available for this document.