Exploiting prospect theory and risk-awareness to protect UAV-assisted network operation

被引:0
|
作者
Panagiotis Vamvakas
Eirini Eleni Tsiropoulou
Symeon Papavassiliou
机构
[1] School of Electrical and Computer Engineering,
[2] National Technical University of Athens,undefined
[3] Department of Electrical and Computer Engineering,undefined
[4] University of New Mexico,undefined
关键词
Risk-awareness; Malicious users; Behavioral modeling; NOMA; Wireless network; Resource management; Game theory; Intrusin detection;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, a novel resource management framework is introduced and exploited to ensure the efficient and smooth operation of a wireless network, assisted by an unmanned aerial vehicle (UAV), operating under the non-orthogonal multiple access (NOMA) scheme and consisting of both normal and malicious risk-aware users. User devices are assumed capable of splitting their transmission power in two different communication alternatives, established via either the UAV or the macro base station (MBS). The bandwidth offered by the UAV is accessible by everyone, delivers potentially higher rate of return taking into account the enhanced communication channel gains owing to its proximity to the serving users, but is prone to failure due to its potential over-exploitation. Accordingly, the UAV’s bandwidth is considered as common pool of resources (CPR). In contrast, the MBS’s bandwidth is considered as a safe resource offering to the users a more limited but guaranteed level of service, due to the fact that though it has less available bandwidth it operates under a more controlled access scheme. The theory of the tragedy of the commons is used to capture the probability of failure of the CPR, while the prospect theory is adopted to study the normal and malicious users’ risk-aware behavior in the UAV-assisted network. A non-cooperative power control game among the users is formulated and solved, in order to determine the users’ power investment to the dual communication environment. The existence and uniqueness of a Pure Nash Equilibrium point is shown and a distributed algorithm is introduced to converge to the PNE point. This overall resource allocation framework is intelligently exploited as the vehicle to detect malicious user behavior and therefore protect the network from the undesired effects of such behaviors. The performance and inherent attributes of the proposed user-centric risk-aware operation framework, in terms of its capability to effectively utilize the available system and user resources (i.e., bandwidth and power), while succeeding in identifying potential abnormal or malicious user behaviors is assessed via modeling and simulation, under different operation scenarios.
引用
收藏
相关论文
共 50 条
  • [21] Tripartite Matching Game Model in UAV-Assisted Covert Communication Network
    Xu, Yining
    Tian, Wen
    Cheng, Zhipeng
    Fang, Xiaoxing
    Dong, Xueke
    Wang, Zhihao
    Chu, Wennan
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (07) : 1619 - 1623
  • [22] Data Collection Mechanism for UAV-Assisted Cellular Network Based on PPO
    Chen, Tuo
    Dong, Feihong
    Ye, Hu
    Wang, Yun
    Wu, Bin
    ELECTRONICS, 2023, 12 (06)
  • [23] Hierarchical Network Slicing for UAV-Assisted Wireless Networks with Deployment Optimization
    Wei, Fengsheng
    Feng, Gang
    Qin, Shuang
    Peng, Youkun
    Liu, Yijing
    IEEE Journal on Selected Areas in Communications, 2024, 42 (12) : 3705 - 3718
  • [24] AoI-minimization in UAV-assisted IoT Network with Massive Devices
    Zhang, Jianhang
    Kang, Kai
    Yang, Miao
    Zhu, Hongbin
    Qian, Hua
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 1290 - 1295
  • [25] Age-Constrained Dynamic Content Replacing and Delivering for UAV-Assisted Context Awareness
    Liudi Wang
    Shan Zhang
    Xishuo Li
    Hongbin Luo
    ChinaCommunications, 2022, 19 (07) : 277 - 293
  • [26] UAV-Assisted 5G Network Architecture with Slicing and Virtualization
    Xilouris, George K.
    Batistatos, Michael C.
    Athanasiadou, Georgia E.
    Tsoulos, Georgios
    Bin Pervaiz, Haris
    Zarakovitis, Charilaos C.
    2018 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2018,
  • [27] Age-constrained dynamic content replacing and delivering for UAV-assisted context awareness
    Wang, Liudi
    Zhang, Shan
    Li, Xishuo
    Luo, Hongbin
    CHINA COMMUNICATIONS, 2022, 19 (07) : 277 - 293
  • [28] Modeling and Analysis of UAV-Assisted Mobile Network with Imperfect Beam Alignment
    Ouamri, Mohamed Amine
    Alkanhel, Reem
    Gueguen, Cedric
    Alohali, Manal Abdullah
    Ghoneim, Sherif S. M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (01): : 453 - 467
  • [29] UAV-assisted data dissemination based on network coding in vehicular networks
    Huang, Shidong
    Huang, Chuanhe
    Yin, Yabo
    Wu, Dongfang
    Ashraf, M. Wasim Abbas
    Fu, Bin
    IET INTELLIGENT TRANSPORT SYSTEMS, 2022, 16 (04) : 421 - 433
  • [30] Deep Q-Network Based Dynamic Movement Strategy in a UAV-Assisted Network
    Zhong, Xukai
    Huo, Yiming
    Dong, Xiaodai
    Liang, Zhonghua
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,