2020
DOI: 10.1109/tii.2019.2948406
|View full text |Cite
|
Sign up to set email alerts
|

Joint Computation and Communication Design for UAV-Assisted Mobile Edge Computing in IoT

Abstract: Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system is a prominent concept, where a UAV equipped with a MEC server is deployed to serve a number of terminal devices (TDs) of Internet of Things (IoT) in a finite period. In this paper, each TD has a certain latency-critical computation task in each time slot to complete. Three computation strategies can be available to each TD. First, each TD can operate local computing by itself. Second, each TD can partially offload task bits to the UAV f… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
140
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 311 publications
(140 citation statements)
references
References 36 publications
0
140
0
Order By: Relevance
“…2 for different locations of the UAV, i.e., above the secure user (0, 0, 0), above the farthest user (110, 40, 0) and above the horizontal center of the three users (56.67, 3.33, 0). From the results, we can see that the transmission rate of U 1 with these UAV positions can all achieve the rate threshold 0.5 bit/s/Hz, according to the optimization problem (14). For the secrecy rate of U 1 , it is close to the transmission rate when the UAV hovers above U 1 , due to the fact that its transmit power is the lowest, and it can be hidden in the high-power signals of other users.…”
Section: A Single-antenna Uavmentioning
confidence: 99%
See 1 more Smart Citation
“…2 for different locations of the UAV, i.e., above the secure user (0, 0, 0), above the farthest user (110, 40, 0) and above the horizontal center of the three users (56.67, 3.33, 0). From the results, we can see that the transmission rate of U 1 with these UAV positions can all achieve the rate threshold 0.5 bit/s/Hz, according to the optimization problem (14). For the secrecy rate of U 1 , it is close to the transmission rate when the UAV hovers above U 1 , due to the fact that its transmit power is the lowest, and it can be hidden in the high-power signals of other users.…”
Section: A Single-antenna Uavmentioning
confidence: 99%
“…Zeng et al proposed an effective algorithm to jointly optimize the hovering locations, durations and flying trajectory in [13], to minimize the energy consumption of the UAVs. In [14], Zhang et al proposed an effective scheme to minimize the energy consumption in UAVassisted mobile edge computing systems. In [15], Yang et al made a fundamental energy tradeoff in UAV wireless networks by considering both the circular and straight trajectories.…”
Section: Introductionmentioning
confidence: 99%
“…In the terminal equipment, the calculation tasks of different sizes are selected for simulation analysis to verify the offloading mode and performance of the system. The simulation settings are based on the work of [16], [21], and [22]. Table 1 shows the detailed simulation parameters unless otherwise specified.…”
Section: Discussionmentioning
confidence: 99%
“…Such a flexible network layout can maximize the advantages of the fusion network, which can not only undertake considerable data processing but also increase the network reliability. Zhang, T. et al [21] aimed at minimum energy consumption and studied the edge offloading of UAV-assisted relaying and computation by applying the iterative algorithm through the Lagrangian duality method and successive convex approximation (SCA) technique. Hu, X. et al [22] studied the architecture of a UAV-assisted MEC.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation