Show simple item record

dc.contributor.authorLu, F
dc.contributor.authorLiu, G
dc.contributor.authorLu, W
dc.contributor.authorGao, Y
dc.contributor.authorCao, J
dc.contributor.authorZhao, N
dc.contributor.authorNallanathan, A
dc.date.accessioned2024-07-11T10:46:03Z
dc.date.available2024-07-11T10:46:03Z
dc.date.issued2023-11-07
dc.identifier.citationF. Lu et al., "Resource and Trajectory Optimization for UAV-Relay-Assisted Secure Maritime MEC," in IEEE Transactions on Communications, vol. 72, no. 3, pp. 1641-1652, March 2024, doi: 10.1109/TCOMM.2023.3330884. keywords: {Autonomous aerial vehicles;Task analysis;Optimization;Eavesdropping;Trajectory;Resource management;Jamming;Secure transmission;MEC;UAV-relay;maritime communications},en_US
dc.identifier.issn0090-6778
dc.identifier.urihttps://qmro.qmul.ac.uk/xmlui/handle/123456789/98001
dc.description.abstractWith the evolutional development of maritime networks, the explosive growth of maritime data has put forward elevated demands for the computing capabilities of maritime devices (MDs). Unmanned aerial vehicle (UAV) is able to alleviate the computing pressure of MDs by forwarding the computing tasks to the edge server on the coast. However, UAV relaying introduces a significant security challenge due to the vulnerability of line-of-sight (LoS) communication channels, which can be exploited for eavesdropping on computing tasks. In this paper, an efficient secure communication scheme is proposed for UAV-relay-assisted maritime mobile edge computing (MEC) with a flying eavesdropper. The secure computing capacity of MDs is maximized by jointly optimizing the transmit power, time slot allocation factor, computation optimization and UAV trajectory. Due to multi-variable coupling, the formulated optimization problem (OP) is non-convex. We first transform OP by introducing auxiliary variables. Then, the transformed OP is decomposed and solved in an iterative manner by applying block coordinate descent (BCD) and successive convex approximation (SCA). Numerical results show that the secure computing capability of the UAV-relay-assisted maritime MEC system of proposed secure communication scheme can be effectively improved compared with benchmarks.en_US
dc.format.extent1641 - 1652
dc.publisherIEEEen_US
dc.relation.ispartofIEEE Transactions on Communications
dc.rights© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.titleResource and Trajectory Optimization for UAV-Relay-Assisted Secure Maritime MECen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TCOMM.2023.3330884
pubs.issue3en_US
pubs.notesNot knownen_US
pubs.publication-statusPublisheden_US
pubs.volume72en_US
rioxxterms.funderDefault funderen_US
rioxxterms.identifier.projectDefault projecten_US
rioxxterms.funder.projectb215eee3-195d-4c4f-a85d-169a4331c138en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record