1. Secure Throughput Optimization for Cache-Enabled Multi-UAVs Networks
- Author
-
Fahimeh Fazel, Jamshid Abouei, Konstantinos N. Plataniotis, Muhammad Jaseemuddin, and Alagan Anpalagan
- Subjects
Optimization problem ,Computer Networks and Communications ,business.industry ,Iterative method ,Computer science ,Computer Science Applications ,Hardware and Architecture ,Signal Processing ,Cache ,Enhanced Data Rates for GSM Evolution ,business ,Throughput (business) ,Mobile device ,Heterogeneous network ,Power domains ,Information Systems ,Computer network - Abstract
This paper considers an Ultra-Dense Heterogeneous Network (UDHN) consisting of cache-enabled Unmanned Aerial Vehicles (UAVs) and Internet of things Mobile Devices (IMDs) receiving their requested contents via the Power Domain Non-Orthogonal Multiple Access (PD-NOMA) protocol. Employing the Fast Global K-Means (FGKM) algorithm, IMDs are partitioned into several clusters connecting to either other IMDs or UAV belonging to the same cluster in the presence of untrusted users, known as non-legitimate eavesdroppers. It is assumed that users located in the cluster edge area communicate with multiple UAVs to obtain their requested contents. The main goal for such a network is to jointly optimize the number of UAVs, their 3D placements, and the cache placement probability of contents stored in UAVs and IMDs by maximizing the secure cache throughput. Toward this goal, we prove that the objective function is non-concave. Therefore, we decompose the optimization problem into multiple subproblems. We first employ the FGKM algorithm to optimally determine the number of employed UAVs and their horizontal placements. Then, the UAVs’ altitudes are optimized by employing the Interior-Point Method (IPM), while the convex approximation for the objective function and its constraints are substituted. Then, we optimize the secure cache throughput of IMDs by proposing a caching placement strategy for contents stored in UAVs and IMDs via Device to Device (D2D) and UAV to Device (U2D) links, given illegal eavesdroppers’ presence. Then, we propose an iterative algorithm to achieve the near-optimal solution for the cache throughput of IMDs. Different from existing works, the closed-form expressions for the achievable secrecy rate and the successful probability of D2D communications and U2D transmissions, as well as the secure cache throughput are derived. Finally, simulation results are presented to validate the proposed caching placement strategy. It is shown that the proposed scheme outperforms the conventional Most Popular caching (MPC) strategy substantially.
- Published
- 2022
- Full Text
- View/download PDF