Joint resource and trajectory optimization for security in UAV-assisted MEC systems

Y Xu, T Zhang, D Yang, Y Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) has been widely applied in internet-of-things (IoT)
scenarios while the security for UAV communications remains a challenging problem due to …

Secure communications for UAV-enabled mobile edge computing systems

Y Zhou, C Pan, PL Yeoh, K Wang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In this paper, we propose a secure unmanned aerial vehicle (UAV) mobile edge computing
(MEC) system where multiple ground users offload large computing tasks to a nearby …

Secure NOMA-based UAV-MEC network towards a flying eavesdropper

W Lu, Y Ding, Y Gao, Y Chen, N Zhao… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) allows multiple users to share link resource for
higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile …

Secure transmission for multi-UAV-assisted mobile edge computing based on reinforcement learning

W Lu, Y Mo, Y Feng, Y Gao, N Zhao… - … on Network Science …, 2022 - ieeexplore.ieee.org
UAV communication has received widespread attention in MEC systems due to its high
flexibility and line-of-sight transmission. Users can reduce their local computing pressures …

Resource and trajectory optimization for secure communications in dual unmanned aerial vehicle mobile edge computing systems

W Lu, Y Ding, Y Gao, S Hu, Y Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the maneuverability and mobility control of unmanned aerial vehicle (UAV), carrying
mobile edge computing (MEC) servers on UAVs is able to effectively alleviate the explosive …

Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming

W Wang, X Li, M Zhang, K Cumanan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper, we consider an energy-constrained unmanned aerial vehicle (UAV)-enabled
mobile relay assisted secure communication system in the presence of a legitimate source …

Dual-UAV-enabled secure communications: Joint trajectory design and user scheduling

Y Cai, F Cui, Q Shi, M Zhao… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
In this paper, we investigate a novel unmanned aerial vehicle (UAV)-enabled secure
communication system. Two UAVs are applied in this system where one UAV moves around …

Online edge learning offloading and resource management for UAV-assisted MEC secure communications

Y Ding, Y Feng, W Lu, S Zheng, N Zhao… - IEEE Journal of …, 2022 - ieeexplore.ieee.org
The mobile and flexible unmanned aerial vehicle (UAV) with mobile edge computing (MEC)
can effectively relieve the computing pressure of the massive data traffic in 5G Internet of …

Energy-efficient computation offloading for secure UAV-edge-computing systems

T Bai, J Wang, Y Ren, L Hanzo - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Characterized by their ease of deployment and bird's-eye view, unmanned aerial vehicles
(UAVs) may be widely deployed both in surveillance and traffic management. However, the …

Secure task offloading for MEC-aided-UAV system

P Chen, X Luo, D Guo, Y Sun, J Xie… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The promise of unmanned aerial vehicles (UAVs) combined with the mobile edge computing
(MEC), named MEC-aided-UAV extends the MEC application to offer new flexible, low …