Task Scheduling and Trajectory Optimization Based on Fairness and Communication Security for Multi-UAV-MEC System
Unmanned aerial vehicles (UAVs) show significant potential in enhancing communication services within the mobile edge computing (MEC) system by taking their advantages on the flexible mobility and reliable line-of-sight links. However, in the scenarios with multiple UAV-MECs (UMs) operating concurre...
Saved in:
| Published in: | IEEE internet of things journal Vol. 11; no. 19; pp. 30510 - 30523 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Piscataway
IEEE
01.10.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 2327-4662, 2327-4662 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Unmanned aerial vehicles (UAVs) show significant potential in enhancing communication services within the mobile edge computing (MEC) system by taking their advantages on the flexible mobility and reliable line-of-sight links. However, in the scenarios with multiple UAV-MECs (UMs) operating concurrently, potential conflicts in their trajectories need to be mitigated. Thus, the 3-D trajectory needs to be properly designed in a highly reliable manner. Besides, such an infrastructure-free communication paradigm also exposes a potential risk of misuse by malicious parties, which allows them to eavesdrop on private communications, posing a threat to the security and privacy. Therefore, we consider a multi-UAV-assisted MEC communication system, where a UAV maliciously eavesdrops on the data transmission from the user devices (UDs) while a jammer is deployed on the ground to interfere with the eavesdropping channel. In specific, our objective is to minimize the energy consumption and latency while incorporating fairness metrics by optimizing the 3-D trajectories of UMs, transmission power of UDs, and the offloading strategies under the constraints of ensuring communication security and load fairness. Given the complexity of this mixed-integer nonconvex programming problem, we decompose the formulated problem into three subproblems. Specifically, at each time slot, we optimize the transmit power and offloading strategies using theoretical derivation and mathematical analysis, respectively. Additionally, a multiagent deep deterministic policy gradient (MADDPG) algorithm is employed to optimize the trajectories of UMs. Simulation results demonstrate that our proposed joint optimization algorithm successfully minimizes the system energy consumption and delay as compared to benchmarking schemes. |
|---|---|
| AbstractList | Unmanned aerial vehicles (UAVs) show significant potential in enhancing communication services within the mobile edge computing (MEC) system by taking their advantages on the flexible mobility and reliable line-of-sight links. However, in the scenarios with multiple UAV-MECs (UMs) operating concurrently, potential conflicts in their trajectories need to be mitigated. Thus, the 3-D trajectory needs to be properly designed in a highly reliable manner. Besides, such an infrastructure-free communication paradigm also exposes a potential risk of misuse by malicious parties, which allows them to eavesdrop on private communications, posing a threat to the security and privacy. Therefore, we consider a multi-UAV-assisted MEC communication system, where a UAV maliciously eavesdrops on the data transmission from the user devices (UDs) while a jammer is deployed on the ground to interfere with the eavesdropping channel. In specific, our objective is to minimize the energy consumption and latency while incorporating fairness metrics by optimizing the 3-D trajectories of UMs, transmission power of UDs, and the offloading strategies under the constraints of ensuring communication security and load fairness. Given the complexity of this mixed-integer nonconvex programming problem, we decompose the formulated problem into three subproblems. Specifically, at each time slot, we optimize the transmit power and offloading strategies using theoretical derivation and mathematical analysis, respectively. Additionally, a multiagent deep deterministic policy gradient (MADDPG) algorithm is employed to optimize the trajectories of UMs. Simulation results demonstrate that our proposed joint optimization algorithm successfully minimizes the system energy consumption and delay as compared to benchmarking schemes. |
| Author | Xiang, Kun Guizani, Mohsen He, Yejun Cao, Xiaowen |
| Author_xml | – sequence: 1 givenname: Yejun orcidid: 0000-0002-8564-5355 surname: He fullname: He, Yejun email: heyejun@ieee.org organization: State Key Laboratory of Radio Frequency Heterogeneous Integration, Sino-British Antennas and Propagation Joint Laboratory of Ministry of Science and Technology of China, Guangdong Engineering Research Center of Base Station Antennas and Propagation, Shenzhen Key Laboratory of Antennas and Propagation, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China – sequence: 2 givenname: Kun surname: Xiang fullname: Xiang, Kun email: 1303484745@qq.com organization: State Key Laboratory of Radio Frequency Heterogeneous Integration, Sino-British Antennas and Propagation Joint Laboratory of Ministry of Science and Technology of China, Guangdong Engineering Research Center of Base Station Antennas and Propagation, Shenzhen Key Laboratory of Antennas and Propagation, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China – sequence: 3 givenname: Xiaowen orcidid: 0000-0003-4164-071X surname: Cao fullname: Cao, Xiaowen email: caoxwen@szu.edu.cn organization: State Key Laboratory of Radio Frequency Heterogeneous Integration, Sino-British Antennas and Propagation Joint Laboratory of Ministry of Science and Technology of China, Guangdong Engineering Research Center of Base Station Antennas and Propagation, Shenzhen Key Laboratory of Antennas and Propagation, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China – sequence: 4 givenname: Mohsen orcidid: 0000-0002-8972-8094 surname: Guizani fullname: Guizani, Mohsen email: mguizani@ieee.org organization: Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE |
| BookMark | eNp9kM9PwjAYhhuDiYj8ASYemngetl3364iLKAbCgeF1-dg6Le4HtN1h_vUWxoF48ND0S_M-_fI-t2hQN7VA6J6SCaUkenqfr5IJI4xPXE5ZyLwrNGQuCxzu-2xwMd-gsdY7QojFPBr5Q3RIQH_jdfYl8raU9SeGOseJgp3ITKM6vNobWckfMLKp8TNokWM7zECqWmh9SsdNVbW1zPrMWmStkqbDRaPwsi2NdDbTD2f5EuN1p42o7tB1AaUW4_M9QpvZSxK_OYvV6zyeLpyMRdw4RVGwwAeeU48BUFZEkNkKwN0tzUN7iH0k3ONeaIsVfujTLfe3AOBDEOTgjtBj_-9eNYdWaJPumlbVdmXqWmk8ImFEbCroU5lqtFaiSDNpTk2MAlmmlKRHxelRcXpUnJ4VW5L-IfdKVqC6f5mHnpFCiIu85_GQUvcXZHaJYw |
| CODEN | IITJAU |
| CitedBy_id | crossref_primary_10_1016_j_jallcom_2025_182523 crossref_primary_10_3390_s25175234 crossref_primary_10_1016_j_asej_2025_103744 crossref_primary_10_1109_JIOT_2025_3542448 crossref_primary_10_1109_TWC_2025_3547975 crossref_primary_10_1007_s40747_025_01910_z crossref_primary_10_3390_drones9020108 crossref_primary_10_1016_j_comnet_2024_111028 |
| Cites_doi | 10.1109/MWC.2011.5751298 10.1109/ACSSC.2018.8645326 10.1109/TGCN.2022.3213801 10.1109/JIOT.2023.3241087 10.1109/JIOT.2020.2965898 10.1109/MCOM.006.2200283 10.1109/LWC.2021.3122957 10.1109/JIOT.2022.3177658 10.1109/TETC.2023.3268346 10.1109/TCOMM.2022.3226193 10.23919/JCC.2021.06.006 10.1109/TVT.2022.3141799 10.1109/TLA.2021.9477275 10.1109/JIOT.2022.3201017 10.1109/TGCN.2021.3095070 10.1109/TNSE.2021.3068123 10.1109/JIOT.2021.3118079 10.1109/TWC.2020.3016024 10.1109/TGCN.2023.3287604 10.1109/TWC.2022.3142365 10.1109/TII.2021.3087726 10.1109/TWC.2020.2968317 10.1109/TVT.2022.3140833 10.1109/TVT.2021.3102161 10.1109/LCOMM.2020.3026033 10.1109/JSTSP.2022.3222910 10.1109/JIOT.2022.3195855 10.1109/TCOMM.2022.3159703 10.1109/TCOMM.2019.2947921 10.1109/WiMob58348.2023.10187721 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/JIOT.2024.3412825 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2327-4662 |
| EndPage | 30523 |
| ExternalDocumentID | 10_1109_JIOT_2024_3412825 10554811 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: National Key Research and Development Program of China grantid: 2023YFE0107900 – fundername: Shenzhen Science and Technology Program grantid: JCYJ20200109113601723; JSGG20210802154203011; JSGG20210420091805014; RCBS20231211090520032; RCBS20231211090520032 – fundername: National Natural Science Foundation of China (NSFC) grantid: 62071306 funderid: 10.13039/501100001809 |
| GroupedDBID | 0R~ 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c294t-fff276a4d152aa12f9ac466a43b1d8b1d0a12045458662f6861b46baaa6a77da3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 12 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001322588600100&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2327-4662 |
| IngestDate | Mon Jun 30 15:49:28 EDT 2025 Sat Nov 29 01:44:05 EST 2025 Tue Nov 18 22:26:21 EST 2025 Wed Aug 27 01:58:56 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 19 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c294t-fff276a4d152aa12f9ac466a43b1d8b1d0a12045458662f6861b46baaa6a77da3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-4164-071X 0000-0002-8564-5355 0000-0002-8972-8094 |
| PQID | 3109490890 |
| PQPubID | 2040421 |
| PageCount | 14 |
| ParticipantIDs | proquest_journals_3109490890 crossref_citationtrail_10_1109_JIOT_2024_3412825 crossref_primary_10_1109_JIOT_2024_3412825 ieee_primary_10554811 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-10-01 |
| PublicationDateYYYYMMDD | 2024-10-01 |
| PublicationDate_xml | – month: 10 year: 2024 text: 2024-10-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE internet of things journal |
| PublicationTitleAbbrev | JIoT |
| PublicationYear | 2024 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref15 ref14 ref30 ref11 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 Jain (ref31) 1999 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
| References_xml | – ident: ref22 doi: 10.1109/MWC.2011.5751298 – ident: ref23 doi: 10.1109/ACSSC.2018.8645326 – volume-title: Throughput fairness index: An explanation year: 1999 ident: ref31 – ident: ref12 doi: 10.1109/TGCN.2022.3213801 – ident: ref20 doi: 10.1109/JIOT.2023.3241087 – ident: ref10 doi: 10.1109/JIOT.2020.2965898 – ident: ref1 doi: 10.1109/MCOM.006.2200283 – ident: ref9 doi: 10.1109/LWC.2021.3122957 – ident: ref19 doi: 10.1109/JIOT.2022.3177658 – ident: ref14 doi: 10.1109/TETC.2023.3268346 – ident: ref17 doi: 10.1109/TCOMM.2022.3226193 – ident: ref2 doi: 10.23919/JCC.2021.06.006 – ident: ref16 doi: 10.1109/TVT.2022.3141799 – ident: ref3 doi: 10.1109/TLA.2021.9477275 – ident: ref5 doi: 10.1109/JIOT.2022.3201017 – ident: ref18 doi: 10.1109/TGCN.2021.3095070 – ident: ref13 doi: 10.1109/TNSE.2021.3068123 – ident: ref21 doi: 10.1109/JIOT.2021.3118079 – ident: ref30 doi: 10.1109/TWC.2020.3016024 – ident: ref8 doi: 10.1109/TGCN.2023.3287604 – ident: ref29 doi: 10.1109/TWC.2022.3142365 – ident: ref25 doi: 10.1109/TII.2021.3087726 – ident: ref24 doi: 10.1109/TWC.2020.2968317 – ident: ref6 doi: 10.1109/TVT.2022.3140833 – ident: ref15 doi: 10.1109/TVT.2021.3102161 – ident: ref11 doi: 10.1109/LCOMM.2020.3026033 – ident: ref27 doi: 10.1109/JSTSP.2022.3222910 – ident: ref4 doi: 10.1109/JIOT.2022.3195855 – ident: ref26 doi: 10.1109/TCOMM.2022.3159703 – ident: ref28 doi: 10.1109/TCOMM.2019.2947921 – ident: ref7 doi: 10.1109/WiMob58348.2023.10187721 |
| SSID | ssj0001105196 |
| Score | 2.4315557 |
| Snippet | Unmanned aerial vehicles (UAVs) show significant potential in enhancing communication services within the mobile edge computing (MEC) system by taking their... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 30510 |
| SubjectTerms | Algorithms Autonomous aerial vehicles Communication Communications systems Cybersecurity Data transmission Eavesdropping Edge computing Energy consumption Fairness Line of sight communication Mathematical analysis Mixed integer Mobile computing mobile edge computing (MEC) multiagent deep deterministic policy gradient (MADDPG) Multiagent systems multiunmanned aerial vehicles (UAVs) offloading strategy Privacy Resource management Security Task analysis Task scheduling Three-dimensional displays Trajectory Trajectory optimization transmit power Unmanned aerial vehicles |
| Title | Task Scheduling and Trajectory Optimization Based on Fairness and Communication Security for Multi-UAV-MEC System |
| URI | https://ieeexplore.ieee.org/document/10554811 https://www.proquest.com/docview/3109490890 |
| Volume | 11 |
| WOSCitedRecordID | wos001322588600100&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Xplore customDbUrl: eissn: 2327-4662 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001105196 issn: 2327-4662 databaseCode: RIE dateStart: 20140101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JSwMxFA5aPHixLhWrVXLwJKSdJU0yx1paVLAVbKW3IZMF6zLVLoL_3iSTqkUUPAxkQjIM803eS17yvQ-A05goLZViKM40QzjSGcqIyFAsYqlwU0gthROboL0eG42SG09Wd1wYpZQ7fKbqtuj28uVELGyorGHFHDGzTN51SklB1voKqIR2NkL8zmUYJI2ry_7ArAAjXDem2nI0V3yPE1P5YYGdW-mW__lC22DLzx9hqwB8B6ypfBeUl9oM0A_VPfA64LNHc3tvXIllnEOeS2gc04OL0r_DvjEVz56DCc-NK5PQFLp8PLW2z7Ve4Y7AWy90B80sFzraLhq27tB1pw2LrOcVMOx2Bu0L5OUVkIgSPEda64gSjqVx4ZyHkU64wMRUxFkombkCU2kz9DUZIZEmjIQZJhnnnHBKJY_3QSmf5OoAQEx1HATSQK1iTBVLWFOHMuOJ5pyqkFdBsPzwqfC5x60ExlPq1iBBklqsUotV6rGqgrPPLi9F4o2_GlcsON8aFrhUQW0Jb-rH5iy1uVDddmdw-Eu3I7Bpn16c2auB0ny6UMdgQ7zNx7PpifvtPgA19NiC |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFA4yBX1xXiZOp-bBJyGulzRNH6c4vMwpWGVvJc0F56XTXQT_vUmaqUMUfCikIaGlX3NOcpLvfADsh0QqISVFYa4owoHKUU54jkIeCokjLpTgVmwi7nZpr5dcO7K65cJIKe3hM3loinYvXwz4xITKmkbMEVPD5J2PMA68kq71FVLxzXyEuL1L30ua52dXqV4DBvhQG2vD0pzxPlZO5YcNto6lXf3nK62AZTeDhK0S8lUwJ4s1UJ2qM0A3WNfBa8pGj_r2XjsTwzmHrBBQu6YHG6d_h1faWDw7FiY80s5MQF1os_7QWD_beoY9Am-c1B3U81xoibvotnWHLk-OYZn3vAZu2yfp8SlyAguIBwkeI6VUEBOGhXbijPmBShjHRFeEuS-ovjxdaXL0RZSQQBFK_ByTnDFGWBwLFm6ASjEo5CaAOFah5wkNtgxxLGlCI-WLnCWKsVj6rA686YfPuMs-bkQwnjK7CvGSzGCVGawyh1UdHHx2eSlTb_zVuGbA-dawxKUOGlN4Mzc6R5nJhmo3PL2tX7rtgcXT9LKTdc66F9tgyTypPMHXAJXxcCJ3wAJ_G_dHw137C34An7DbyQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Task+Scheduling+and+Trajectory+Optimization+Based+on+Fairness+and+Communication+Security+for+Multi-UAV-MEC+System&rft.jtitle=IEEE+internet+of+things+journal&rft.au=He%2C+Yejun&rft.au=Xiang%2C+Kun&rft.au=Cao%2C+Xiaowen&rft.au=Guizani%2C+Mohsen&rft.date=2024-10-01&rft.issn=2327-4662&rft.eissn=2327-4662&rft.volume=11&rft.issue=19&rft.spage=30510&rft.epage=30523&rft_id=info:doi/10.1109%2FJIOT.2024.3412825&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JIOT_2024_3412825 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |