Abstract

This article considers an ultradense heterogeneous network (UDHN) consisting of cache-enabled unmanned aerial vehicles (UAVs) and Internet of Things mobile devices (IMDs) receiving their requested contents via the power domain nonorthogonal multiple access (PD-NOMA) protocol. Employing the fast global <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">${K}$ </tex-math></inline-formula> -means (FGKMs) algorithm, IMDs are partitioned into several clusters connecting to either other IMDs or UAV belonging to the same cluster in the presence of untrusted users, known as nonlegitimate eavesdroppers. It is assumed that users located in the cluster edge area communicate with multiple UAVs to obtain their requested contents. The main goal for such a network is to jointly optimize the number of UAVs, their 3-D placements, and the cache placement probability of contents stored in UAVs and IMDs by maximizing the secure cache throughput. Toward this goal, we prove that the objective function is nonconcave. Therefore, we decompose the optimization problem into multiple subproblems. We first employ the FGKM algorithm to optimally determine the number of employed UAVs and their horizontal placements. Then, the UAVs’ altitudes are optimized by employing the interior-point method (IPM), while the convex approximation for the objective function and its constraints are substituted. Then, we optimize the secure cache throughput of IMDs by proposing a caching placement strategy for contents stored in UAVs and IMDs via Device to Device (D2D) and UAV to Device (U2D) links, given illegal eavesdroppers’ presence. Then, we propose an iterative algorithm to achieve the near-optimal solution for the cache throughput of IMDs. Different from existing works, the closed-form expressions for the achievable secrecy rate and the successful probability of D2D communications and U2D transmissions, as well as the secure cache throughput are derived. Finally, simulation results are presented to validate the proposed caching placement strategy. It is shown that the proposed scheme outperforms the conventional most popular caching (MPC) strategy substantially.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.