Exploiting prospect theory and risk-awareness to protect UAV-assisted network operation

被引:0
|
作者
Panagiotis Vamvakas
Eirini Eleni Tsiropoulou
Symeon Papavassiliou
机构
[1] School of Electrical and Computer Engineering,
[2] National Technical University of Athens,undefined
[3] Department of Electrical and Computer Engineering,undefined
[4] University of New Mexico,undefined
关键词
Risk-awareness; Malicious users; Behavioral modeling; NOMA; Wireless network; Resource management; Game theory; Intrusin detection;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, a novel resource management framework is introduced and exploited to ensure the efficient and smooth operation of a wireless network, assisted by an unmanned aerial vehicle (UAV), operating under the non-orthogonal multiple access (NOMA) scheme and consisting of both normal and malicious risk-aware users. User devices are assumed capable of splitting their transmission power in two different communication alternatives, established via either the UAV or the macro base station (MBS). The bandwidth offered by the UAV is accessible by everyone, delivers potentially higher rate of return taking into account the enhanced communication channel gains owing to its proximity to the serving users, but is prone to failure due to its potential over-exploitation. Accordingly, the UAV’s bandwidth is considered as common pool of resources (CPR). In contrast, the MBS’s bandwidth is considered as a safe resource offering to the users a more limited but guaranteed level of service, due to the fact that though it has less available bandwidth it operates under a more controlled access scheme. The theory of the tragedy of the commons is used to capture the probability of failure of the CPR, while the prospect theory is adopted to study the normal and malicious users’ risk-aware behavior in the UAV-assisted network. A non-cooperative power control game among the users is formulated and solved, in order to determine the users’ power investment to the dual communication environment. The existence and uniqueness of a Pure Nash Equilibrium point is shown and a distributed algorithm is introduced to converge to the PNE point. This overall resource allocation framework is intelligently exploited as the vehicle to detect malicious user behavior and therefore protect the network from the undesired effects of such behaviors. The performance and inherent attributes of the proposed user-centric risk-aware operation framework, in terms of its capability to effectively utilize the available system and user resources (i.e., bandwidth and power), while succeeding in identifying potential abnormal or malicious user behaviors is assessed via modeling and simulation, under different operation scenarios.
引用
收藏
相关论文
共 50 条
  • [41] Distributed Beam Tracking for Vehicular Communications via UAV-Assisted Cellular Network
    Jang, Dohyun
    Song, Ha-Lim
    Ko, Young-Chai
    Kim, H. Jin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (01) : 589 - 600
  • [42] Secure Transmission Based on Marginal Utility in UAV-assisted Cognitive Radio Network
    He, Xufeng
    Li, Xi
    Ji, Hong
    Zhang, Heli
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [43] UAV-Assisted Heterogeneous Cloud Radio Access Network With Comprehensive Interference Management
    Lu, Jie
    Li, Jingfu
    Yu, F. Richard
    Jiang, Weiheng
    Feng, Wenjiang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (01) : 843 - 859
  • [44] A Smart Content Caching and Replacement Scheme for UAV-Assisted Fog Computing Network
    Li, Xujie
    Shen, Jichang
    Sun, Ying
    Wang, Ziya
    Zheng, Xuedong
    2020 12TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2020, : 1040 - 1045
  • [45] Energy efficient short-packet-communication in UAV-assisted cognitive network
    Han, Huizhu
    Huang, Yangchao
    Hu, Hang
    Pan, Yu
    An, Qi
    Liu, Shihao
    Zhao, Senhao
    IET COMMUNICATIONS, 2023, 17 (10) : 1149 - 1161
  • [46] UAV-assisted Wireless Energy Harvesting Fog Computing Network Optimization Method
    Zhang, Li-Tong
    Xiong, Ke
    Zhang, Yu
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 : 9 - 17
  • [47] Joint Sensor Localization and Data Collection in UAV-Assisted Wireless Sensor Network
    Zhu, Mingyue
    Xu, Wenyan
    Guo, Ningyan
    Wei, Zhiqing
    2022 14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING, WCSP, 2022, : 894 - 899
  • [48] Application Layer ARQ and Network Coding for QoS Improving in UAV-assisted networks
    Vasiliev, Danil
    Chunaev, Andrei
    Abilov, Albert
    Kaysina, Irina
    Meitis, Daniil
    PROCEEDINGS OF THE 2019 25TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 353 - 360
  • [49] A Hierarchical Hybrid Subtask Scheduling Algorithm in UAV-Assisted MEC Emergency Network
    Luan, Qiuji
    Cui, Hongyan
    Zhang, Lifeng
    Lv, Zhonghua
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 12737 - 12753
  • [50] An Emergency Communication System based on UAV-assisted Self-organizing Network
    Gao, Tianhan
    Lang, Fan
    Guo, Nan
    2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 90 - 95