2023
DOI: 10.1109/tiv.2022.3227367
|View full text |Cite
|
Sign up to set email alerts
|

Secure Task Offloading for MEC-Aided-UAV System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 44 publications
0
6
0
Order By: Relevance
“…To maximise computational efficiency and task queue stability, Ding et al propose a DRL-based scheme to optimise offloading and resource allocation [20,21]. Considering the limited computational resources of UAVs, Chen et al propose a strategy for offloading to ground-based base station servers to optimise transmit power and base station selection under the practical constraints of task completion latency and power consumption [22]. In a UAV-enabled mobile edge computing system based on device-to-device communication, the overall energy efficiency is maximised by optimising UAV and node transmit power and scheduling strategies in order to improve the balance between different types of nodes [23].…”
Section: Related Workmentioning
confidence: 99%
“…To maximise computational efficiency and task queue stability, Ding et al propose a DRL-based scheme to optimise offloading and resource allocation [20,21]. Considering the limited computational resources of UAVs, Chen et al propose a strategy for offloading to ground-based base station servers to optimise transmit power and base station selection under the practical constraints of task completion latency and power consumption [22]. In a UAV-enabled mobile edge computing system based on device-to-device communication, the overall energy efficiency is maximised by optimising UAV and node transmit power and scheduling strategies in order to improve the balance between different types of nodes [23].…”
Section: Related Workmentioning
confidence: 99%
“…In UAV-assisted edge computing systems, security can be significantly improved by introducing artificial noise (AN) [17][18][19][20][21][22]. In [17], Xu et al divided the transmitted power of the UAV into two parts, that is, offloading power and AN, in order to enhance the security performance of the system.…”
Section: Introductionmentioning
confidence: 99%
“…In [18], Xu et al introduced a UAV for suppressing eavesdroppers to enhance the security of the system. Unlike the case of [18] where the eavesdropper information is known, the authors of [19] maximize the minimum secure computational bits of the system by optimizing the trajectory of the UAV and the transmit power of the AN in unknown locations and the number of eavesdroppers. In [20], Lu et al studied a dual UAV system in which a legitimate UAV provides computing services and a jammer emits AN to disrupt the eavesdropping UAV to improve system security.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations