Exploiting prospect theory and risk-awareness to protect UAV-assisted network operation

被引:0
|
作者
Panagiotis Vamvakas
Eirini Eleni Tsiropoulou
Symeon Papavassiliou
机构
[1] School of Electrical and Computer Engineering,
[2] National Technical University of Athens,undefined
[3] Department of Electrical and Computer Engineering,undefined
[4] University of New Mexico,undefined
关键词
Risk-awareness; Malicious users; Behavioral modeling; NOMA; Wireless network; Resource management; Game theory; Intrusin detection;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, a novel resource management framework is introduced and exploited to ensure the efficient and smooth operation of a wireless network, assisted by an unmanned aerial vehicle (UAV), operating under the non-orthogonal multiple access (NOMA) scheme and consisting of both normal and malicious risk-aware users. User devices are assumed capable of splitting their transmission power in two different communication alternatives, established via either the UAV or the macro base station (MBS). The bandwidth offered by the UAV is accessible by everyone, delivers potentially higher rate of return taking into account the enhanced communication channel gains owing to its proximity to the serving users, but is prone to failure due to its potential over-exploitation. Accordingly, the UAV’s bandwidth is considered as common pool of resources (CPR). In contrast, the MBS’s bandwidth is considered as a safe resource offering to the users a more limited but guaranteed level of service, due to the fact that though it has less available bandwidth it operates under a more controlled access scheme. The theory of the tragedy of the commons is used to capture the probability of failure of the CPR, while the prospect theory is adopted to study the normal and malicious users’ risk-aware behavior in the UAV-assisted network. A non-cooperative power control game among the users is formulated and solved, in order to determine the users’ power investment to the dual communication environment. The existence and uniqueness of a Pure Nash Equilibrium point is shown and a distributed algorithm is introduced to converge to the PNE point. This overall resource allocation framework is intelligently exploited as the vehicle to detect malicious user behavior and therefore protect the network from the undesired effects of such behaviors. The performance and inherent attributes of the proposed user-centric risk-aware operation framework, in terms of its capability to effectively utilize the available system and user resources (i.e., bandwidth and power), while succeeding in identifying potential abnormal or malicious user behaviors is assessed via modeling and simulation, under different operation scenarios.
引用
收藏
相关论文
共 50 条
  • [1] Exploiting prospect theory and risk-awareness to protect UAV-assisted network operation
    Vamvakas, Panagiotis
    Tsiropoulou, Eirini Eleni
    Papavassiliou, Symeon
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (01)
  • [2] Data Offloading in UAV-Assisted Multi-Access Edge Computing Systems: A Resource-Based Pricing and User Risk-Awareness Approach
    Mitsis, Giorgos
    Tsiropoulou, Eirini Eleni
    Papavassiliou, Symeon
    SENSORS, 2020, 20 (08)
  • [3] On Tethered UAV-Assisted Heterogeneous Network
    Zhang, Shuai
    Liu, Weiqi
    Ansari, Nirwan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (01) : 975 - 983
  • [4] On the Prospect of UAV-assisted Communications Paradigm in Public Safety Networks
    Vamvakas, Panagiotis
    Tsiropoulou, Eirini Eleni
    Papavassiliou, Symeon
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS), 2019, : 762 - 767
  • [5] Energy-efficient data collection in UAV-assisted semantic awareness IoT network
    Xie, Ping
    Sun, Hanxiao
    Li, Fan
    Gao, Xiangrui
    Xing, Ling
    Ma, Huahong
    INTERNET OF THINGS, 2024, 27
  • [6] Cooperative caching algorithm of UAV and user in UAV-assisted cellular network
    Zhang T.
    Chen C.
    Wang Z.
    Yang D.
    1600, Editorial Board of Journal on Communications (41): : 130 - 138
  • [7] Design and Implementation of a Novel UAV-Assisted LoRaWAN Network
    Zhao, Honggang
    Tang, Wenxin
    Chen, Sitong
    Li, Aoyang
    Li, Yong
    Cheng, Wei
    DRONES, 2024, 8 (10)
  • [8] UAV-assisted Broadband Network for Emergency and Public Safety Communications
    Grodi, Robin
    Rawat, Danda B.
    2015 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2015, : 10 - 14
  • [9] A Secure Downlink Transmission Scheme for a UAV-Assisted Edge Network
    Gao, Xinmei
    Huo, Yan
    Gao, Qinghe
    Zhao, Hongjun
    Ma, Long
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [10] UAV-Assisted IoT Communication Network Using STLC Technique
    Yilmaz, Tayfun
    Ilhan, Haci
    2022 30TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU, 2022,