Abstract

In this paper, a novel resource management framework is introduced and exploited to ensure the efficient and smooth operation of a wireless network, assisted by an unmanned aerial vehicle (UAV), operating under the non-orthogonal multiple access (NOMA) scheme and consisting of both normal and malicious risk-aware users. User devices are assumed capable of splitting their transmission power in two different communication alternatives, established via either the UAV or the macro base station (MBS). The bandwidth offered by the UAV is accessible by everyone, delivers potentially higher rate of return taking into account the enhanced communication channel gains owing to its proximity to the serving users, but is prone to failure due to its potential over-exploitation. Accordingly, the UAV’s bandwidth is considered as common pool of resources (CPR). In contrast, the MBS’s bandwidth is considered as a safe resource offering to the users a more limited but guaranteed level of service, due to the fact that though it has less available bandwidth it operates under a more controlled access scheme. The theory of the tragedy of the commons is used to capture the probability of failure of the CPR, while the prospect theory is adopted to study the normal and malicious users’ risk-aware behavior in the UAV-assisted network. A non-cooperative power control game among the users is formulated and solved, in order to determine the users’ power investment to the dual communication environment. The existence and uniqueness of a Pure Nash Equilibrium point is shown and a distributed algorithm is introduced to converge to the PNE point. This overall resource allocation framework is intelligently exploited as the vehicle to detect malicious user behavior and therefore protect the network from the undesired effects of such behaviors. The performance and inherent attributes of the proposed user-centric risk-aware operation framework, in terms of its capability to effectively utilize the available system and user resources (i.e., bandwidth and power), while succeeding in identifying potential abnormal or malicious user behaviors is assessed via modeling and simulation, under different operation scenarios.

Highlights

  • Unmanned aerial vehicles (UAVs) have gained increasing research and commercial popularity due to their salient attributes, such as flexible and effortless deployment, mobility, strong line-of-sight (LoS) connection links, adaptive altitude, low-cost, adjustable usage, maneuverability, and hovering ability [1, 2]

  • The significant portion of the bandwidth reserved by the UAV acts as an additional motive to users to communicate with the UAV, in comparison to the lower data rates which can be delivered if users select to transmit with the macro base station (MBS), despite the fact that in the latter option they will receive a guaranteed Quality of service (QoS)

  • User devices are assumed capable of splitting their transmission power in two different communication alternatives—that is UAV-based and MBS-based communication links

Read more

Summary

Introduction

Unmanned aerial vehicles (UAVs) have gained increasing research and commercial popularity due to their salient attributes, such as flexible and effortless deployment, mobility, strong line-of-sight (LoS) connection links, adaptive altitude, low-cost, adjustable usage, maneuverability, and hovering ability [1, 2]. Though usually a smaller portion of bandwidth is available by the MBS to support the users’ communication, it offers enhanced processing capabilities while at the same time it operates under a controlled user access scheme, and in our system model the MBS’s available bandwidth is treated as a safe resource alternative, due to the fact that each user can obtain a guaranteed level of QoS given its personal characteristics (e.g., channel gain, transmission power) In such a setting, a malicious user can take advantage of the vulnerability of the UAV-based communication to failure, due to the over-exploitation of the UAV’s bandwidth, and perform a distributed denial of service (DDoS) type of attack.

UAV-assisted wireless network: operation overview and model
Fragile CPR games
Numerical results and discussion
Malicious user behavior
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call