Exploiting prospect theory and risk-awareness to protect UAV-assisted network operation

被引:0
|
作者
Panagiotis Vamvakas
Eirini Eleni Tsiropoulou
Symeon Papavassiliou
机构
[1] School of Electrical and Computer Engineering,
[2] National Technical University of Athens,undefined
[3] Department of Electrical and Computer Engineering,undefined
[4] University of New Mexico,undefined
关键词
Risk-awareness; Malicious users; Behavioral modeling; NOMA; Wireless network; Resource management; Game theory; Intrusin detection;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, a novel resource management framework is introduced and exploited to ensure the efficient and smooth operation of a wireless network, assisted by an unmanned aerial vehicle (UAV), operating under the non-orthogonal multiple access (NOMA) scheme and consisting of both normal and malicious risk-aware users. User devices are assumed capable of splitting their transmission power in two different communication alternatives, established via either the UAV or the macro base station (MBS). The bandwidth offered by the UAV is accessible by everyone, delivers potentially higher rate of return taking into account the enhanced communication channel gains owing to its proximity to the serving users, but is prone to failure due to its potential over-exploitation. Accordingly, the UAV’s bandwidth is considered as common pool of resources (CPR). In contrast, the MBS’s bandwidth is considered as a safe resource offering to the users a more limited but guaranteed level of service, due to the fact that though it has less available bandwidth it operates under a more controlled access scheme. The theory of the tragedy of the commons is used to capture the probability of failure of the CPR, while the prospect theory is adopted to study the normal and malicious users’ risk-aware behavior in the UAV-assisted network. A non-cooperative power control game among the users is formulated and solved, in order to determine the users’ power investment to the dual communication environment. The existence and uniqueness of a Pure Nash Equilibrium point is shown and a distributed algorithm is introduced to converge to the PNE point. This overall resource allocation framework is intelligently exploited as the vehicle to detect malicious user behavior and therefore protect the network from the undesired effects of such behaviors. The performance and inherent attributes of the proposed user-centric risk-aware operation framework, in terms of its capability to effectively utilize the available system and user resources (i.e., bandwidth and power), while succeeding in identifying potential abnormal or malicious user behaviors is assessed via modeling and simulation, under different operation scenarios.
引用
收藏
相关论文
共 50 条
  • [31] Performance Evaluation of UAV-Assisted mmWave Operation in Mobility-Enabled Urban Deployments
    Khosravi, Zeinab
    Gerasimenko, Mikhail
    Andreev, Sergey
    Koucheryavy, Yevgeni
    2018 41ST INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2018, : 150 - 153
  • [32] Self-Adaptive Energy Efficient Operation in UAV-assisted Public Safety Networks
    Sikeridis, Dimitrios
    Tsiropoulou, Eirini Eleni
    Devetsikiotis, Michael
    Papavassiliou, Symeon
    2018 IEEE 19TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC), 2018, : 845 - 849
  • [33] User Scheduling for Non-orthogonal Transmission in UAV-Assisted Relay Network
    Baek, Jaeuk
    Han, Sang Ik
    Han, Youngnam
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [34] Hybrid MAC Protocol for UAV-Assisted Data Gathering in a Wireless Sensor Network
    Ramli, Muhammad Rusyadi
    Lee, Jae-Min
    Kim, Dong-Seong
    INTERNET OF THINGS, 2021, 14
  • [35] Joint Deployment and Task Computation of UAVs in UAV-assisted Edge Computing Network
    Chen, Yuqing
    Zheng, Zhaohui
    APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2020, : 413 - 416
  • [36] UAV-Assisted Wireless Charging Incentive Mechanism Design Based on Contract Theory
    Su, Chunxia
    Guo, Jichong
    Chen, Zhenping
    Fu, Jingwei
    Chen, Guizhang
    SYMMETRY-BASEL, 2023, 15 (11):
  • [37] SIC-STIA-IS: An Interference Management Scheme for the UAV-Assisted Heterogeneous Network
    Lu, Jie
    Nie, Jiangtian
    Li, Jingfu
    Feng, Wenjiang
    Xiong, Zehui
    Niyato, Dusit
    Jiang, Weiheng
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 672 - 678
  • [38] Indeterministic Data Collection in UAV-Assisted Wide and Sparse Wireless Sensor Network
    Du, Yu
    Hao, Jianjun
    Chen, Zijing
    Guo, Yijun
    SENSORS, 2024, 24 (19)
  • [39] Energy Harvesting and Computation Offloading for UAV-Assisted MEC with NOMA in IoT Network
    Nguyen, Gia-Huy
    Nguyen, Anh-Nhat
    Le, Hien-Hieu
    Do, Tien-Dung
    COMMUNICATION AND INTELLIGENT SYSTEMS, VOL 3, ICCIS 2023, 2024, 969 : 381 - 392
  • [40] Joint Access and Backhaul Link Optimization in Multiple UAV-Assisted Emergency Network
    Yuan, Xiaoxu
    Tian, Hui
    Nie, Gaofeng
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 735 - 740