Do you want to publish a course? Click here

Design Guidelines for Blockchain-Assisted 5G-UAV Networks

199   0   0.0 ( 0 )
 Added by Ons Bouachir
 Publication date 2020
and research's language is English




Ask ChatGPT about the research

Fifth Generation (5G) wireless networks are designed to meet various end-user Quality of Service (QoS) requirements through high data rates (typically of Gbps order) and low latencies. Coupled with Fog and Mobile Edge Computing (MEC), 5G can achieve high data rates, enabling complex autonomous smart city services such as the large deployment of self-driving vehicles and large-scale Artificial Intelligence (AI)-enabled industrial manufacturing. However, to meet the exponentially growing number of connected IoT devices and irregular data and service requests in both low and highly dense locations, the process of enacting traditional cells supported through fixed and costly base stations requires rethought to enable on-demand mobile access points in the form of Unmanned Aerial Vehicles (UAV) for diversified smart city scenarios. This article envisions a 5G network environment that is supported by blockchain-enabled UAVs to meet dynamic user demands with network access supply. The solution enables decentralized service delivery (Drones as a Service) and routing to and from end-users in a reliable and secure manner. Both public and private blockchains are deployed within the UAVs, supported by fog and cloud computing devices and data centers to provide wide range of complex authenticated service and data availability. Particular attention is paid tocomparing data delivery success rates and message exchange in the proposed solution against traditional UAV-supported cellular networks. Challenges and future research are also discussed with highlights on emerging technologies such as Federated Learning.



rate research

Read More

The use of the unmanned aerial vehicle (UAV) has been foreseen as a promising technology for the next generation communication networks. Since there are no regulations for UAVs deployment yet, most likely they form a network in coexistence with an already existed network. In this work, we consider a transmission mechanism that aims to improve the data rate between a terrestrial base station (BS) and user equipment (UE) through deploying multiple UAVs relaying the desired data flow. Considering the coexistence of this network with other established communication networks, we take into account the effect of interference, which is incurred by the existing nodes. Our primary goal is to optimize the three-dimensional (3D) trajectories and power allocation for the relaying UAVs to maximize the data flow while keeping the interference to existing nodes below a predefined threshold. An alternating-maximization strategy is proposed to solve the joint 3D trajectory design and power allocation for the relaying UAVs. To this end, we handle the information exchange within the network by resorting to spectral graph theory and subsequently address the power allocation through convex optimization techniques. Simulation results show that our approach can considerably improve the information flow while the interference threshold constraint is met.
Due to its high mobility and flexible deployment, unmanned aerial vehicle (UAV) is drawing unprecedented interest in both military and civil applications to enable agile wireless communications and provide ubiquitous connectivity. Mainly operating in an open environment, UAV communications can benefit from dominant line-of-sight links; however, it on the other hand renders the UAVs more vulnerable to malicious eavesdropping or jamming attacks. Recently, physical layer security (PLS), which exploits the inherent randomness of the wireless channels for secure communications, has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches. In this paper, a comprehensive survey on the current achievements of the UAV-aided wireless communications is conducted from the PLS perspective. We first introduce the basic concepts of UAV communications including the typical static/mobile deployment scenarios, the unique characteristics of air-to-ground channels, as well as various roles that a UAV may act when PLS is concerned. Then, we introduce the widely used secrecy performance metrics and start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems, and extend the discussion to a more general scenario where the UAVs mobility is further exploited. For both cases, respectively, we summarize the commonly adopted methodologies in the corresponding analysis and design, then describe important works in the literature in detail. Finally, potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS in 5G and beyond networks.
109 - Yao Tang , Man Hon Cheung , 2019
Unmanned aerial vehicles (UAVs) can enhance the performance of cellular networks, due to their high mobility and efficient deployment. In this paper, we present a first study on how the user mobility affects the UAVs trajectories of a multiple-UAV assisted wireless communication system. Specifically, we consider the UAVs are deployed as aerial base stations to serve ground users who move between different regions. We maximize the throughput of ground users in the downlink communication by optimizing the UAVs trajectories, while taking into account the impact of the user mobility, propulsion energy consumption, and UAVs mutual interference. We formulate the problem as a route selection problem in an acyclic directed graph. Each vertex represents a task associated with a reward on the average user throughput in a region-time point, while each edge is associated with a cost on the energy propulsion consumption during flying and hovering. For the centralized trajectory design, we first propose the shortest path scheme that determines the optimal trajectory for the single UAV case. We also propose the centralized route selection (CRS) scheme to systematically compute the optimal trajectories for the more general multiple-UAV case. Due to the NP-hardness of the centralized problem, we consider the distributed trajectory design that each UAV selects its trajectory autonomously and propose the distributed route selection (DRS) scheme, which will converge to a pure strategy Nash equilibrium within a finite number of iterations.
97 - Haixia Peng , Xuemin Shen 2020
In this paper, we investigate joint vehicle association and multi-dimensional resource management in a vehicular network assisted by multi-access edge computing (MEC) and unmanned aerial vehicle (UAV). To efficiently manage the available spectrum, computing, and caching resources for the MEC-mounted base station and UAVs, a resource optimization problem is formulated and carried out at a central controller. Considering the overlong solving time of the formulated problem and the sensitive delay requirements of vehicular applications, we transform the optimization problem using reinforcement learning and then design a deep deterministic policy gradient (DDPG)-based solution. Through training the DDPG-based resource management model offline, optimal vehicle association and resource allocation decisions can be obtained rapidly. Simulation results demonstrate that the DDPG-based resource management scheme can converge within 200 episodes and achieve higher delay/quality-of-service satisfaction ratios than the random scheme.
Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting many applications and services, such as precision agriculture, search and rescue, temporary network deployment or coverage extension, and security. UAVs are being considered for integration into emerging 5G networks as aerial users or network support nodes. We propose to leverage UAVs in 5G to assist in the prevention, detection, and recovery of attacks on 5G networks. Specifically, we consider jamming, spoofing, eavesdropping and the corresponding mitigation mechanisms that are enabled by the versatility of UAVs. We introduce the hot zone, safe zone and UAV-based secondary authorization entity, among others, to increase the resilience and confidentiality of 5G radio access networks and services. We present simulation results and discuss open issues and research directions, including the need for experimental evaluation and a research platform for prototyping and testing the proposed technologies.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا