首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
As an novel paradigm, computation offloading in the mobile edge computing (MEC) system can effectively support the resource-intensive applications for the mobile devices (MD) equipped with limited computing capability. However, the hostile radio transmission and data leakage during the offloading process may erode the MEC system’s potential. To tackle these hindrances, we investigate an IRS-assisted secure MEC system with eavesdroppers, where the intelligent reflecting surface (IRS) is deployed to enhance the communication between the MD and the AP equipped with edge servers and the malicious eavesdroppers may attack the wireless data offloaded by MD. The MD opt for offloading part of the tasks to the edge server for execution to support the computation-intensive applications. Moreover, the relevant latency minimization problem is formulated by optimizing the offloading ratio, the allocation of edge server computing capability, the multiple-user-detection (MUD) matrix and the IRS phase shift parameters, subject to the constraints of edge computation resource and practical IRS phase shifts. Then, the original problem is decouple into two subproblem, and the computing and communication subproblems are alternatively optimized by block coordinate descent (BCD) method with low complexity. Finally, simulation results demonstrate that the proposed scheme can significantly enhance the performance of secure offloading in the MEC system.  相似文献   

2.
This paper considers an unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system, in which the intelligent reflecting surface (IRS) is applied to enhance the performance of the wireless transmission. The role of the UAV is twofold: (1) It is equipped with a MEC server and receives computing tasks from ground users and IRS at the same time; (2) It sends interference signals to counter the potential eavesdropper. Here, the UAV is working as a full duplex equipment, i.e., sending and receiving meanwhile. We comprehensively considered the flight speed constraint of the UAV, the total mission data constraint and the minimum security rate constraint of multiple users on the ground. The phase matrix constraints of IRS are also considered. Our system is dedicated to maximizing the efficiency of secure computing. The formulated problem is highly non-convex, we consider to propose an alternative optimization algorithm. The simulation results show that the proposed scheme not only achieves higher safe computing efficiency, but also has better performance in terms of energy consumption and security rate.  相似文献   

3.
This work investigates the physical layer secrecy performance of a hybrid satellite/unmanned aerial vehicle (HS-UAV) terrestrial non-orthogonal multiple access (NOMA) network, where one satellite source intends to make communication with destination users via a UAV relay using NOMA protocol in the existence of spatially random eavesdroppers. All the destination users randomly distributed on the ground comply with a homogeneous Poisson point process in the basis of stochastic geometry. Adopting Shadowed-Rician fading in satellite-to-UAV and satellite-to-eavesdroppers links while Rayleigh fading in both UAV-to-users and UAV-to-eavesdroppers links, the theoretical expressions for the secrecy outage probability (SOP) of the paired NOMA users are obtained based on the distance-determined path-loss. Also, the asymptotic behaviors of SOP expressions at high signal-to-noise ratio (SNR) regime are analyzed and the system throughputs of the paired NOMA users are examined for gaining further realization of the network. Moreover, numerical results are contrasted with simulation to validate the theoretical analysis. Investigation of this work shows the comparison of SOP performance for the far and near user, pointing out the SOP performance of the network depends on the channel fading, UAV coverage airspace, distribution of eavesdroppers and some other key parameters.  相似文献   

4.
Nowadays, more and more multimedia services are supported by Mobile Edge Computing (MEC). However, the instability of the wireless environment brings a lot of uncertainty to the computational offloading. Additionally, intelligent reflecting surface (IRS) is considered as a potential technology to enhance Quality of Service (QoS). Therefore, in this paper, we establish a framework for IRS-assisted MEC computational offloading to solve this problem and take fairness optimization as a key point involving communication and computing resources. Minimize user consumption by optimizing bandwidth allocation, task offloading ratio, edge computing resources, transmission power and IRS phase shifts. Firstly, we decompose the problem into three aspects, such as bandwidth allocation, computing resource allocation, transmission power and IRS phase shifts. Then, an alternative optimization algorithm is proposed to find the optimum solution and its convergence is proved. Secondly, since the optimization problem on transmission power and IRS phase shifts is non-convex, we propose Riemann gradient descent (R-SGD) algorithm to solve it. Finally, numerical results show that our proposed algorithm performs better than other algorithms and achieves a superiority in the framework.  相似文献   

5.
In this paper, we investigate an intelligent reflecting surface (IRS)-assisted mobile edge computing (MEC) network under physical-layer security, where users can partially offload confidential and compute-intensive tasks to a computing access point (CAP) with the help of the IRS. We consider an eavesdropping environment, where an eavesdropper steals information from the communication. For the considered MEC network, we firstly design a secure data transmission rate to ensure physical-layer security. Moreover, we formulate the optimization target as minimizing the system cost linearized by the latency and energy consumption (ENCP). In further, we employ a deep deterministic policy gradient (DDPG) to optimize the system performance by allocating the offloading ratio and wireless bandwidth and computational capability to users. Finally, considering the impacts from different resources, based on DDPG, seeing our optimization strategy as one criterion, we designed other criteria with different resource allocation schemes. And some simulation results are given to demonstrate that our proposed criterion outperforms other criteria.  相似文献   

6.
In this paper, we propose an improved physical layer key generation scheme that can maximize the secret key capacity by deploying intelligent reflecting surface (IRS) near the legitimate user aiming at improving its signal-to-noise ratio (SNR). We consider the scenario of multiple input single output (MISO) against multiple relevant eavesdroppers. We elaborately design and optimize the reflection coefficient matrix of IRS elements that can improve the legitimate user’s SNR through IRS passive beamforming and deteriorate the channel quality of eavesdroppers at the same time. We first derive the lower bound expression of the achievable key capacity, then solve the optimization problem based on semi-definite relaxation (SDR) and the convex–concave procedure (CCP) to maximize the secret key capacity. Simulation results show that our proposed scheme can significantly improve the secret key capacity and reduce hardware costs compared with other benchmark schemes.  相似文献   

7.
Intelligent reflecting surface (IRS)-enhanced dynamic spectrum access (DSA) is a promising technology to enhance the performance of the mobile edge computing (MEC) system. In this paper, we consider the integration of the IRS enhanced DSA technology to a MEC system, and study the pertinent joint optimization of the phase shift coefficients of the IRS, the transmission powers, the central processing unit (CPU) frequencies, as well as the task offloading time allocations of the secondary users (SUs) to maximize the average computation bits of the SUs. Due to the non-convexity, the formulated problem is difficult to solve. In order to tackle this difficulty, we decompose the optimization problem into tractable subproblems and propose an alternating optimization algorithm to optimize the optimization variables in an iterative fashion. Numerical results are provided to show the effectiveness and the correctness of the proposed algorithm.  相似文献   

8.
When an unmanned aerial vehicle (UAV) performs tasks such as power patrol inspection, water quality detection, field scientific observation, etc., due to the limitations of the computing capacity and battery power, it cannot complete the tasks efficiently. Therefore, an effective method is to deploy edge servers near the UAV. The UAV can offload some of the computationally intensive and real-time tasks to edge servers. In this paper, a mobile edge computing offloading strategy based on reinforcement learning is proposed. Firstly, the Stackelberg game model is introduced to model the UAV and edge nodes in the network, and the utility function is used to calculate the maximization of offloading revenue. Secondly, as the problem is a mixed-integer non-linear programming (MINLP) problem, we introduce the multi-agent deep deterministic policy gradient (MADDPG) to solve it. Finally, the effects of the number of UAVs and the summation of computing resources on the total revenue of the UAVs were simulated through simulation experiments. The experimental results show that compared with other algorithms, the algorithm proposed in this paper can more effectively improve the total benefit of UAVs.  相似文献   

9.
Computational efficiency is a direction worth considering in moving edge computing (MEC) systems. However, the computational efficiency of UAV-assisted MEC systems is rarely studied. In this paper, we maximize the computational efficiency of the MEC network by optimizing offloading decisions, UAV flight paths, and allocating users’ charging and offloading time reasonably. The method of deep reinforcement learning is used to optimize the resources of UAV-assisted MEC system in complex urban environment, and the user’s computation-intensive tasks are offloaded to the UAV-mounted MEC server, so that the overloaded tasks in the whole system can be alleviated. We study and design a framework algorithm that can quickly adapt to task offload decision making and resource allocation under changing wireless channel conditions in complex urban environments. The optimal offloading decisions from state space to action space is generated through deep reinforcement learning, and then the user’s own charging time and offloading time are rationally allocated to maximize the weighted sum computation rate. Finally, combined with the radio map to optimize the UAC trajectory to improve the overall weighted sum computation rate of the system. Simulation results show that the proposed DRL+TO framework algorithm can significantly improve the weighted sum computation rate of the whole MEC system and save time. It can be seen that the MEC system resource optimization scheme proposed in this paper is feasible and has better performance than other benchmark schemes.  相似文献   

10.
In this paper, we evaluate the secrecy performance of an intelligent reflecting surface (IRS)-assisted device-to-device (D2D) communication in spectrum-shared cellular networks. To this end, we derive novel closed-form expressions for the secrecy outage probability (SOP) and the asymptotic SOP in the presence of multiple eavesdroppers. In the continue, in order to dynamically access the spectrum band of the licensed users, we define the optimization problem of secrecy spectrum resource allocation to minimize the SOP as a mixed-integer linear programming (MILP) problem. Then, the globally optimal solutions to this problem are obtained by using the Hungarian algorithm. Numerical analyses show that increasing the reflective elements of IRS can improve the secrecy performance.  相似文献   

11.
Wireless power transfer (WPT) and mobile edge computing (MEC) are two advanced technologies that could improve the computing power and range of mobile devices. However, by integrating the unmanned aerial vehicle (UAV) into wireless powered MEC systems, wireless energy transfer will be susceptible to the “double near–far” effect. Therefore, in order to further overcome the influence of the “double near–far” effect, this paper considers the optimization of time slot allocation for UAV-assisted wireless powered cooperative MEC system, which includes an access point (UAV) and two mobile devices. The purpose of the study is to minimize the total transmission energy of the UAV while satisfying the delay and size of the computational tasks, so this paper proposed a 2:1:1 time-slot optimization allocation method. The method exploits the synergy of users so that the mobile device which is closer to the UAV acts as an offloading relay, by combining power and time slot optimization to minimize the total energy consumption of the UAV. Compared with the equal time slot scheme before the improvement, this method can not only utilize the wireless transmission energy to charge the mobile device for more time in the first period, but also can save the time of data transmission of the closer device in the third period, and it can enhance the rate of data transmission of the mobile devices at the same time. The results show that the task capacity of the system computed will be increased compared to the original scheme; the total transmission rate of the whole system is also improved by the same order of magnitude. The simulation results verify the effectiveness and reliability of the algorithm of the paper, and the comprehensive performance of the system can be maximized by the flexible offloading algorithm.  相似文献   

12.
In this paper, we investigate secure uplink and downlink communications between an unmanned aerial vehicle (UAV) and multiple user equipments (UEs) in the presence of multiple ground-based eavesdroppers (EVs) and unfriendly jammers. In order to guarantee the secure uplink and downlink transmissions, we consider a novel secure transmission scheme, which involves a power splitting based downlink transmission and scheduling of uplink and downlink transmission. Explicitly, we aim to maximize the average secrecy rate (ASR) by optimizing the UAV trajectory, the transmit power of the UAV and UEs, and scheduling of uplink and downlink transmission. Although the formulated problem is nonconvex, we propose an efficient solution by jointly applying the techniques of block coordinate descent and successive convex approximation. Numerical results show that the proposed scheme achieves a better ASR than the benchmark schemes.  相似文献   

13.
Multicast hybrid precoding reaches a compromise among hardware complexity, transmission performance and wireless resource efficiency in massive MIMO systems. However, system security is extremely challenging with the appearance of eavesdroppers. Physical layer security (PLS) is a relatively effective approach to improve transmission and security performance for multicast massive MIMO wiretap systems. In this paper, we consider a transmitter with massive antennas transmits the secret signal to many legitimate users with multiple-antenna, while eavesdroppers attempt to eavesdrop the information. A fractional problem aims at maximizing sum secrecy rate is proposed to optimize secure hybrid precoding in multicast massive MIMO wiretap system. Because the proposed optimized model is an intractable non-convex problem, we equivalently transform the original problem into two suboptimal problems to separately optimize the secure analog precoding and secure digital precoding. Secure analog precoding is achieved by applying singular value decomposition (SVD) of secure channel. Then, employing semidefinite program (SDP), secure digital precoding with fixed secure analog precoding is obtained to ensure quality of service (QoS) of legitimate users and limit QoS of eavesdroppers. Complexity of the proposed SVD-SDP algorithm related to the number of transmitting antennas squared is lower compared with that of constant modulus precoding algorithm (CMPA) which is in connection with that number cubed. Simulation results illustrate that SVD-SDP algorithm brings higher sum secrecy rate than those of CMPA and SVD-SVD algorithm.  相似文献   

14.
In this paper, we consider the Intelligent reflecting surface (IRS)-assisted cognitive radio (CR) network, in which the IRS is applied to improve the spectral efficiency of secondary users. In specific, the advantages of applying IRS is double: it can not only improve the transmission rate of the secondary users, but also reduce the interference from the secondary users to the primary users, which allow the secondary users to increase the transmission power correspondingly. The original problem is formulated by simultaneously consider the maximum power limitation of the secondary users and the Quality of Service (QoS) requirement of the primary users, which expressed by the interference temperature (IT). The formulated problem is non-convex and difficult to solve directly. We apply the alternating optimization (AO) algorithm to split the original problem into two sub-problems. For the first sub-problem, we transform it into a convex problem and for the second sub-problem, we use the successive convex approximation method to obtain the corresponding results. The simulation experiments show that the performance of our proposed scheme is better than existing schemes.  相似文献   

15.
Cellular networks are expected to communicate effectively with unmanned aerial vehicles (UAVs) and support various applications. However, existing cellular networks are primarily designed to cover users on the ground; thus, coverage holes in the sky will exist. In this paper, we investigate the problem of path design for cellular-connected UAVs, taking into account the interruption performance throughout the UAV mission to minimize the completion time. Two types of connectivity constraints requirements are assumed to be available. The first is defined as the maximum continuous time interval that the UAV loses connection with base stations (BSs) below a predefined threshold. For the second, we consider the sum outage of UAV is limited during the entire UAV mission. The UAV is tasked with flying from a starting location to a final destination while minimization the mission time, satisfying the two constraints, separately. The formulated path design problem which involves continues variables and a dynamic radio environment, is not convex and thus is extremely difficult to solve directly. To tackle this challenge, a deep reinforcement learning (DRL) based trajectory design algorithm is proposed, where the Dueling Double Deep Q Network(Dueling DDQN) with multi-steps learning method is applied. Simulation results demonstrate the effectiveness of the proposed DRL algorithm and achieve a trade-off between the trajectory length of the UAV and connection quality.  相似文献   

16.
In this paper, intelligent reflecting surface (IRS) technology is employed to enhance physical layer security (PLS) for spectrum sharing communication systems with orthogonal frequency division multiplexing (OFDM). Aiming to improve the secondary users’ secrecy rates, a design problem for jointly optimizing the transmission beamforming of secondary base station (SBS), the IRS’s reflecting coefficient and the channel allocation is formulated under the constraints of the requirements of minimum data rates of primary users and the interference between users. As the scenario is highly complex, it is quite challenging to address the non-convexity of the optimization problem. Thus, a deep reinforcement learning (DRL) based approach is taken into consideration. Specifically, we use dueling double deep Q networks (D3QN) and soft Actor–Critic (SAC) to solve the discrete and continuous action space optimization problems, respectively, taking full advantage of the maximum entropy RL algorithm to explore all possible optimal paths. Finally, simulation results show that our proposed approach has a great improvement in security transmission rate compared with the scheme without IRS and OFDM, and our proposed D3QN-SAC approach is more effective than other approaches in terms of maximum security transmission rate.  相似文献   

17.
Computation offloading in mobile edge computing (MEC) systems emerges as a novel paradigm of supporting various resource-intensive applications. However, the potential capabilities of MEC cannot be fully unleashed when the communication links are blocked by obstacles. This paper investigates a double-reconfigurable-intelligent-surfaces (RISs) assisted MEC system. To efficiently utilize the limited frequency resource, the users can partially offload their computational tasks to the MEC server deployed at base station (BS) by adopting non-orthogonal multiple access (NOMA) protocol. We aim to minimize the energy consumption of users with limited resource by jointly optimizing the transmit power of users, the offloading fraction of users and the phase-shifts of RISs. Since the problem is non-convex with highly coupled variables, the block coordinate descent (BCD) method is leveraged to alternatively optimize the decomposed four subproblems. Specifically, we invoke successive convex approximation for low complexity (SCALE) and Dinkelbach technique to tackle the fractional programming of power optimization. Then the offloading fraction is obtained by closed-form solution. Further, we leverage semidefinite relaxation (SDR) and bisection method to address the phase-shifts design of double RISs. Finally, numerical results illustrate that the proposed double-RIS assisted NOMA scheme is capable of efficiently reducing the energy consumption and achieves significant performance gain over the benchmark schemes.  相似文献   

18.
Vehicular edge computing is a new computing paradigm. By introducing edge computing into the Internet of Vehicles (IoV), service providers are able to serve users with low-latency services, as edge computing deploys resources (e.g., computation, storage, and bandwidth) at the side close to the IoV users. When mobile nodes are moving and generating structured tasks, they can connect with the roadside units (RSUs) and then choose a proper time and several suitable Mobile Edge Computing (MEC) servers to offload the tasks. However, how to offload tasks in sequence efficiently is challenging. In response to this problem, in this paper, we propose a time-optimized, multi-task-offloading model adopting the principles of Optimal Stopping Theory (OST) with the objective of maximizing the probability of offloading to the optimal servers. When the server utilization is close to uniformly distributed, we propose another OST-based model with the objective of minimizing the total offloading delay. The proposed models are experimentally compared and evaluated with related OST models using simulated data sets and real data sets, and sensitivity analysis is performed. The results show that the proposed offloading models can be efficiently implemented in the mobile nodes and significantly reduce the total expected processing time of the tasks.  相似文献   

19.
Intelligent reflecting surfaces (IRSs) are anticipated to provide reconfigurable propagation environment for next generation communication systems. In this paper, we investigate a downlink IRS-aided multi-carrier (MC) non-orthogonal multiple access (NOMA) system, where the IRS is deployed to especially assist the blocked users to establish communication with the base station (BS). To maximize the system sum rate under network quality-of-service (QoS), rate fairness and successive interference cancellation (SIC) constraints, we formulate a problem for joint optimization of IRS elements, sub-channel assignment and power allocation. The formulated problem is mixed non-convex. Therefore, a novel three stage algorithm is proposed for the optimization of IRS elements, sub-channel assignment and power allocation. First, the IRS elements are optimized using the bisection method based iterative algorithm. Then, the sub-channel assignment problem is solved using one-to-one stable matching algorithm. Finally, the power allocation problem is solved under the given sub-channel and optimal number of IRS elements using Lagrangian dual-decomposition method based on Lagrangian multipliers. Moreover, in an effort to demonstrate the low-complexity of the proposed resource allocation scheme, we provide the complexity analysis of the proposed algorithms. The simulated results illustrate the various factors that impact the optimal number of IRS elements and the superiority of the proposed resource allocation approach in terms of network sum rate and user fairness. Furthermore, we analyze the proposed approach against a new performance metric called computational efficiency (CE).  相似文献   

20.
Channel secret key generation (CSKG), assisted by the new material intelligent reflecting surface (IRS), has become a new research hotspot recently. In this paper, the key extraction method in the IRS-aided low-entropy communication scenario with adjacent multi-users is investigated. Aiming at the problem of low key generation efficiency due to the high similarity of channels between users, we propose a joint user allocation and IRS reflection parameter adjustment scheme, while the reliability of information exchange during the key generation process is also considered. Specifically, the relevant key capability expressions of the IRS-aided communication system is analyzed. Then, we study how to adjust the IRS reflection matrix and allocate the corresponding users to minimize the similarity of different channels and ensure the robustness of key generation. The simulation results show that the proposed scheme can bring higher gains to the performance of key generation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号