Next Article in Journal
Estuary Stingray (Dasyatis fluviorum) Behaviour Does Not Change in Response to Drone Altitude
Next Article in Special Issue
Multi-UAV Trajectory Planning during Cooperative Tracking Based on a Fusion Algorithm Integrating MPC and Standoff
Previous Article in Journal
Motion Control System Design for a Novel Water-Powered Aerial System for Firefighting with Flow-Regulating Actuators
Previous Article in Special Issue
Dynamic Robust Spectrum Sensing Based on Goodness-of-Fit Test Using Bilateral Hypotheses
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Files Cooperative Caching Strategy Based on Physical Layer Security for Air-to-Ground Integrated IoV

1
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710129, China
2
Department of Computer Science, University of Victoria, Victoria, BC V8P 5C2, Canada
*
Author to whom correspondence should be addressed.
Drones 2023, 7(3), 163; https://doi.org/10.3390/drones7030163
Submission received: 9 January 2023 / Revised: 23 February 2023 / Accepted: 23 February 2023 / Published: 26 February 2023
(This article belongs to the Special Issue UAV-Assisted Intelligent Vehicular Networks)

Abstract

:
Mobile edge cache (MEC)-enabled air-to-ground integrated Internet of Vehicles (IoV) technology can solve wireless network backhaul congestion and high latency, but security problems such as eavesdropping are often ignored when designing cache strategies. In this paper, we propose a joint design of cache strategy and physical layer transmission to improve the security offloading ratio of MEC-enabled air-to-ground IoV. By using the random geometry theory and Laplace transform, we derive the closed-form expression of the network security offloading ratio, which is defined as the probability that the request vehicle (RV) successfully finds the required file around it and obtains the file with a data rate larger than a given threshold. During the file acquisition process, we collectively consider the impact of the successful connection and secure transmission in the vehicle wireless communication. Then, we establish an optimization problem for maximizing the network security offloading ratio, in which the cache strategy and the secure transmission rate are jointly optimized. Furthermore, we propose an alternating optimization algorithm to solve the joint optimization problem. Simulation experiments verify the correctness of our theoretical derivation, and prove that the proposed cache strategy is superior to other existing cache strategies.

1. Introduction

According to Cisco’s 2018–2023 Internet Annual Report, global devices and connected devices will grow at a compound annual growth rate (CAGR) of 10%, and IoV-based applications will grow at a CAGR of 17% [1,2]. The explosive growth of mobile data will bring a heavy burden to the core network. Currently, if a proper solution is not found to address the explosive growth of data traffic, it may degrade the quality experience of user vehicle (UV) and even cause congestion on backhaul links in the future. However, the present technologies can not meet all requirements in fifth generation communication network (5G), and there will be higher requirements for wireless network latency, coverage, spectrum and energy efficiency [3,4,5,6,7] in sixth generation communication network (6G). In order to satisfy the above requirements, 6G will need a paradigm shift to provide intelligent services for mobile devices. MEC-enabled air-to-ground integrated IoV technology has been proven to be a key technology in vehicle wireless networks, which can fully utilize the cache space of edge UV to improve network resiliency, reduce latency, and backhaul traffic [8,9,10,11]. Vehicle-to-Vehicle (V2V) communication can allow UV to directly share files to other UV around without going through the core network. The previous theoretical and practical research on mobile edge cache (MEC) based on V2V communication shows that V2V communication technology can effectively improve the throughput of IoV [12,13,14]. Therefore, MEC-enabled air-to-ground integrated IoV technology will have better application prospects in the 6G wireless communication network.
By utilizing the V2V communication technology, the adjacent UVs with MEC capability can communicate with each other directly without relying on the data forwarding of the air base station (ABS), which will further improve the quality of service (QoS) of UVs and network performance. Since the cache capacity of the UV is also limited, it is necessary to design an optimal caching strategy to reasonably cache content to maximize network utility. Most of the existing caching strategy research use hit ratio, energy efficiency (EE), and network delay as optimization indicators. The significant breakthroughs have been made in these research directions [15,16,17,18,19,20,21,22]. Dai et al. [15] proposed a cooperative caching-multicast strategy based on V2V communication technology to improve the timeliness and spatial coverage of content services. They analyzed and verified the effectiveness of the strategy through the main technical indicators of average transmission coverage and average transmission delay. In order to obtain a more accurate caching strategy, Ning et al. [16] considered the effects of self-offloading, V2V offloading, general user preference, individual UV preference, and the peak time change of content preference on the design of the caching strategy. Therefore, it was also confirmed that the network data offloading performance could be effectively improved by rationally designing the caching strategy between UVs and making full use of the self-caching capability. Anjum et al. [17] proposed a cache method based on two-tiered segment, which divided the storage capacity of each mobile device into two areas. Their research could effectively reduce the startup and playback delay of video in the network. Ma et al. [18] investigated the application of the cluster center caching strategy in data sharing, and analyzed the effectiveness of the cluster center caching strategy by using network coverage probability, average completion ratio, and cache hit ratio. Lee et al. [19] studied the optimal caching strategy and cooperative distance design of V2V caching network from the aspects of network throughput and EE. Cai et al. [20] proposed a social-aware mobile edge caching strategy based on network coding, considering the impact of location proximity and UV social relations on caching strategies. S. Sinem Kafıloğlu et al. [21] proposed two cooperative cache replacement algorithms based on distance and priority classification to optimize network energy consumption. Because the battery capacity of each UV was limited, Li et al. [22] studied the design of caching strategy for V2V-assisted wireless networks from the perspective of network offloading gain and energy consumption. The above researches have made important contributions from various perspectives based on V2V wireless caching networks, but they all ignore the communication security issues in MEC-enabled air-to-ground integrated IoV.
In the era of advanced network technology, the use of various applications generates a large amount of unknown personal privacy data. Once the personal privacy data is leaked, it can seriously affect the privacy of UVs and even the safety of UVs’ property and life. Therefore, people’s privacy and security problems in MEC-enabled air-to-ground integrated IoV must be paid great attention to. Physical layer security [23,24] and wireless caching can be easily integrated in a low complexity and high flexibility manner, mainly including two reasons: (1) Physical layer security achieves wireless secrecy by using eavesdropping channel coding, which is different from source encryption. This encryption method can enable the cached files to be reused, thereby improving the reuse probability of the content in the edge cache. (2) Physical layer security can exploit the inherent randomness of wireless channels without necessarily relying on keys. The security problem in wireless networks is gradually attracting researchers’ attention. Refs. [25,26,27,28] have done some research on the security problem of random wireless networks, but the research on using physical layer security to ensure that file transmissions in edge cache are not eavesdropped is still rare. There even lacks a basic theoretical security performance analysis framework and optimization from the perspective of random geometry. Wang and Zheng [25] investigated the physical layer security of random cellular networks, which laid the foundation for the study of wireless network security. Liu et al. [26] derived the exact expression of outage probability of large-scale access to wireless networks through physical layer security. Zheng et al. [27] studied the joint design of small cell network-based cache placement and physical layer transmission in the presence of randomly distributed eavesdroppers to improve the secure content delivery probability of small cell networks. Ren et al. [28] proposed a mobile-aware cooperative coding caching strategy for the high-speed mobility of users and the secure transmission of content. Inspired by the above researches, this paper focuses on the research of security problems in the MEC-enabled air-to-ground integrated IoV to prevent the important data of UVs from being forged or tampered by attackers and provide a strong guarantee for UVs’ privacy.
In this paper, we mainly investigate the cache strategy design and physical layer security in the MEC-enabled air-to-ground integrated IoV to improve the data offloading performance and the anti-eavesdropping capability. The main work and achievements are described as follows
  • We propose a novel mobile edge cache strategy based on physical layer security, which enhances the adjacent discovery capability of files and improves the probability of secure transmission. Based on random geometry theory, we calculate the precise expression of the MEC-enabled air-to-ground integrated IoV security offloading ratio. Taking the security offloading ratio as the objective function, we build a joint optimization problem about the cache strategy and the secure transmission rate;
  • Since the cache strategy and the secure transmission rate are tightly coupled in the objective function, it is difficult to directly obtain the joint optimal solution. Therefore, we propose an alternating optimization algorithm, which can obtain the joint optimal solution of the cache strategies and the secure transmission rate to maximize the network security offloading ratio;
  • Through a numerical simulation of the key technical parameters, the results show that the network security offloading performance of the proposed caching strategy is superior to the existing caching strategies.
Other sections of the paper are arranged as follows. Section 2 is the air-to-ground integrated IoV system model, and Section 3 shows the problem formulation and analysis. The cache strategy optimization problem is presented in Section 4. In Section 5, theoretical analysis and numerical simulation results are described. Finally, the conclusions of this paper are drawn in Section 6.

2. System Model

This section mainly introduces the MEC-enabled air-to-ground integrated IoV network model and file access model considered in our research content.

2.1. Network Model

In this paper, we consider a MEC-enabled air-to-ground integrated IoV model, in which cooperative vehicles (CVs), RVs and eavesdropping vehicles (EVs) are modeled as a homogeneous Poisson point process (HPPP) [29] with density λ p , λ r and λ e , respectively, as shown in Figure 1. This is a small cell network, such as a single road or an intersection of two roads. In this case, we can model network nodes into Poisson point process and use random geometric theory analysis. The PPP model is usually more accurate for the vehicle network formed on this sparse road layout [30,31,32,33]. Each UV has a single antenna with transmission power P t . For large-scale fading we consider a standard fading model r α . r represents the communication distance between UVs, α is the fading factor and α > 2 is the pre-condition. For small-scale fading, we consider Rayleigh fading, in which the channel gain follows the exponential distribution with unit mean independently, i.e.,  G exp 1  [34,35]. The reason is that this work focuses on Highrise Urban scenarios, consisting of many ground obstructions. Therefore, traditional air-to-ground channels (e.g., Nakagami fading channels [36,37]) may not be suitable for our considered scenarios. This assumption has been widely used for vehicular communications [38,39]. If the UV caches the required files in their own storage space, the UV can get it directly without consuming other resources. Otherwise, the required files will be obtained through cooperation between UVs. We assume that the ABS caches all files and knows all UV information to coordinate V2V cooperative communication.
We consider a limited file library F = 1 , 2 , , F , where 1-st is the most popular file. Each CV has a limited cache capacity S S < < F . Due to the size and cost constraints assumptions in Refs. [22,40], we assume that each CV can cache one file, which easily generalizes to the multiple file case. We assume that each UV can obtain the file independently, which obeys the Zipf distribution [41]. The probability that the f t h file is requested by the UE can be expressed as p f = f ε / i = 1 F i ε , where ε is the popularity factor. Each CV can cache files according to optimized cache strategy q = q 1 , , q f , , q F , where q f represents the probability that the f t h file is cached. Based on the thinning property [42], the location of the CV that cached file f follows a HPPP distribution with density q f λ p .

2.2. File Access Model

We consider that the ABS caches all files and knows the RVs’ request information and the CVs’ cache status. The ABS will schedule the content according to the known information. If the requester sends the file request information, there are two ways to obtain the files, namely self-cache and V2V cache. When self-cache and V2V caching fail, the ABS provides the required files to the RV.
  • Case 1: self-cache: If the RV caches the desired file in the local cache, and the RV will get the desired file directly from the local cache without associating other CVs. This is a special case consideration in edge caching, which is often ignored in existing related researches [43,44,45];
  • Case 2: V2V cache: If the RV does not cache the required file in the self-cache, then the RV will obtain the required file from surrounding CVs through V2V communication. This process involves the successful establishment of V2V communication and the secure transmission of files. The research will be discussed in later chapters.

3. Problem Formulation and Analysis

In this section, we mainly analyze the data offloading performance of the MEC-enabled air-to-ground integrated IoV, and take the network security offloading ratio as the main quantitative indicator. The network security offloading ratio is defined as the probability that a file is successfully found around the RV and transmitted confidentially at a given data rate threshold. Therefore, the total network security offloading ratio of the MEC-enabled air-to-ground integrated IoV H t o t a l is defined as
H t o t a l = f = 1 F p f P s + P V 2 V D s D c ,
where P s and P V 2 V are the self-cache data offload ratio and the probability that V2V successfully finds the file, respectively. D s and D c are the probability of successful V2V connection and the probability of secure transmission, respectively.

3.1. Self-Cache Offloading Ratio

We calculate the probability that the RV finds the required file in the local cache library as the self-cache offloading ratio. Therefore, the self-cache data offloading ratio can be calculated as
P s = f = 1 F p f q f .

3.2. V2V Cache Offloading Ratio

If the RV cannot obtain the required files through self-caching, then the V2V cache needs to be enabled to obtain the required files from neighboring CVs. We assume that CV 1 caches the file f, because the location of CV 1 follows a HPPP distribution, so the probability density function of the RV and CV 1 with association distance r is calculated as f = 2 π q f λ p r e π q f λ p r 2 [46]. Therefore, the probability that the RV successfully sensing the file f within the communication range z can be calculated as
P V 2 V , f = ( 1 q f ) ( 1 e π q f λ p z 2 ) .
From Equation (3), we can calculate the probability that the RV successfully sensing all files in the file library F = 1 , 2 , , F as
P V 2 V = f = 1 F p f ( 1 q f ) ( 1 e π q f λ p z 2 ) .
Based on Shannon’s theorem, when the transmission capacity C b between UVs is C b R s + R v , the V2V communication can be successfully established. When EV’s channel capacity C e is C e R v , the communication can be transmitted confidentially, where R s and R v represent the original transmission rate and redundant transmission rate, respectively. Therefore, the successful connection probability and security transmission probability of the cache-enabled V2V communication can be calculated as D s = P log 2 1 + S I N R b R s + R v and D c = P log 2 1 + S I N R e R v . Specifically, S I N R b = P t g b , 0 r b , 0 α I b + N 0 w 1 is the signal-to-interference-and-noise ratio (SINR) at RV, where I b represents the interference generated by surrounding the RVs, whose location obeys a HPPP Φ 1 with density λ r P D 2 D . N 0 w 1 is the noise power at the receiver, g b , 0 is the channel gain, and r b , 0 represents the cooperation distance between UVs. S I N R e = P t g e , 0 r e , 0 α I e + N 0 w 2 is the SINR at EV, where r e , 0 is the distance between the CV and the EV, g e , 0 is the channel gain. The random variable I e = i Φ 2 CP 0 P t g i r i α refers to the interference of EVs around, and  N 0 w 2 represents the received noise power. We do further calculations of probabilities D s and D c , the expression can be rewritten as
D s = P log 2 1 + P t g b , 0 r b , 0 α I b + N 0 w 1 R s + R v ( 1 ) P g b , 0 I b P t 1 r b , 0 α 2 R s + R v = ( 2 ) E I b e I b P t 1 r b , 0 α 2 R s + R v = ( 2 ) L I b P t 1 r b , 0 α 2 R s + R v ,
where step (1) considers the interference restriction between UVs, step (2) considers small-scale fading that follows an exponential distribution g b , 0 exp 1 [34,35], and step (3) is the Laplace transform of the random variable I b [47,48], where I b = i Φ 1 CP 0 P t g i r i α . The Laplace transform of the random variable I b can be calculated as
L I b s = E Φ 1 , g i e s i Φ 1 CP 0 P t g i r i α = E Φ 1 , g i i Φ 1 CP 0 1 + s P t r i α 1 = exp 2 π λ r P V 2 V 0 1 1 1 + s P t x α x d x = exp 2 π λ r P V 2 V 0 1 x 1 + s P t 1 x α d x = exp 2 π λ r P V 2 V 0 y 2 α 1 1 + s P t 1 y 1 α d y = ( 1 ) exp 2 π 2 λ r P V 2 V s P t 2 α csc 2 α α 1 ,
where step (1) is obtained by (Ref. [49] Equation (3.194.4)) when the path loss factor satisfies α > 2 . Then, by substituting s = P t 1 r b , 0 α 2 R s + R v into Equation (6) we can rewrite Equation (5) as
D s = L I b P t 1 r b , 0 α 2 R s + R v = exp 2 π 2 λ r P V 2 V 2 2 R s + R v / α csc 2 π α 1 α 1 r b , 0 2 .
Furthermore, we calculate the secure transmission probability of the MEC-enabled air-to-ground integrated IoV D c . The SINR of EV can be expressed as S I N R e = P t g e , 0 r e , 0 α I e + N 0 w 2 . The position at EVs follow a HPPP distribution Φ 2 with density λ e . Therefore, the secure transmission probability D c can be recalculated as
D c = P log 2 1 + S I N R e R v = P log 2 1 + P t g e , 0 r e , 0 α I e + N 0 w 2 R v = P g e , 0 I e P t 1 r e , 0 α 2 R v = 1 P g e , 0 > I e P t 1 r e , 0 α 2 R v = 1 E I e e I e P t 1 r e , 0 α 2 R v = 1 L I e P t 1 r e , 0 α 2 R v .
Then, we do the Laplace transform of the random variable I e in Equation (8). The calculation process is as follows
L I e P t 1 r e , 0 α 2 R v = E Φ 2 , g i e s i Φ 2 CP 0 P t g i r i α = E Φ 2 , g i i Φ 2 CP 0 1 + r e , 0 α 2 R v r i α 1 = exp 2 π λ e 0 1 1 1 + r e , 0 α 2 R v x α x d x = exp 2 π λ e 0 y 2 α 1 1 + r e , 0 α 2 R v 1 y 1 α d y = exp 2 π 2 λ e 2 2 R v / α csc 2 π α 1 α 1 r e , 0 2 .
Therefore, through the calculation of Equations (8) and (9), we can get the expression of the secure transmission probability D c as
D c = 1 exp 2 π 2 λ e 2 2 R v / α csc 2 π α 1 α 1 r e , 0 2 .
Finally, by substituting Equations (2), (3), (7) and (10) into Equation (1), we can get a closed-form expression for the security offloading ratio of the MEC-enabled air-to-ground integrated IoV as
H t o t a l = f = 1 F p f q f + 1 q f ( 1 e π q f λ p z 2 ) D s D c .

4. The Cache Strategy and Secure Transmission Rate Optimization Problem

In this section, we investigate the joint effect of caching strategy and the secure transmission rate on the security offloading ratio of MEC-enabled air-to-ground integrated IoV. The redundancy rate and content cache probability are jointly optimized to maximize the network security offload probability. We study the optimal trade-off between file sharing and privacy security. According to the theoretical derivation results of the Section 3, we can construct the joint optimization as
P 1 : max q , R v H t o t a l
s . t . f = 1 F q f S
0 q f 1
R v 0
where the objective Function (12a) represents the probability that the requester finds the desired file and obtains it successfully in the MEC-enabled air-to-ground integrated IoV. Constraint (12b) indicates that the cache capacity of each CV is limited. Constraint (12c) is the cache probability of each file. Constraint (12d) ensures that the secure transmission rate of the file is positive.
Due to the complexity brought by the exponential term in the objective function H t o t a l , the joint optimization problem P 1 is an NP-hard problem [50]. It is difficult for us to directly obtain the joint optimal solution. From the objective function H t o t a l we can observe that if the security transmission rate is increased, the probability of the successful V2V connection will decrease. Conversely, if the security transmission rate is too small, the security transmission probability will be reduced. Therefore, there may be an optimal secure transmission rate to maximize the security offloading ratio of the MEC-enabled air-to-ground integrated IoV. Furthermore, the caching strategy and the secure transmission rate are tightly coupled, so each caching strategy may correspond to an optimal secure transmission rate. Therefore, we propose an alternating joint optimization method. First, we transform the original problem P 1 into two sub-problems ( P 1 a and P 1 b ) for independent optimization, and then propose a joint optimization algorithm, which can finally solve the optimal solution of the joint cache strategy and the secure transmission rate.

4.1. Optimal Secure Transmission Rate for a Given Cache Strategy

In this subsection, our work focuses on optimizing the secure transmission rate of the MEC-enabled air-to-ground integrated IoV under a given caching strategy. Therefore, the sub-optimization problem is defined as
P 1 a : max R v H t o t a l s . t . R v 0
In order to get the optimal solution of the secure transmission rate R v , we must first judge the Hessian matrix of of the objective function H t o t a l . The first derivative of H t o t a l can be solved as
H t o t a l R v = f = 1 F p f q f + ( 1 q f ) P V 2 V D s D c R v = f = 1 F p f q f + ( 1 q f ) P V 2 V D s R v · D c + D c R v · D s .
For simplicity, we set φ b = 2 π 2 λ r csc 2 π α 1 α 1 r b , 0 2 2 2 R s / α and φ e = 2 π 2 λ e csc 2 π α 1 α 1 r e , 0 2 . So D s and D c are rewritten as D s = exp k b P V 2 V 2 2 R v / α , and  D c = 1 exp k e 2 2 R v / α . The first derivative of D s and D c with respect to R v can be calculated as
D s R v = 2 α k b P V 2 V exp k b P V 2 V 2 2 R v / α 2 2 R v / α ln 2 .
D c R v = 2 α k e exp k e 2 2 R v / α 2 2 R v / α ln 2 .
By substituting Equations (15) and (16) into Equation (14), we can further rewrite H t o t a l R v as
H t o t a l R v = f = 1 F p f q f + 1 q f P V 2 V D s D c R v = f = 1 F p f q f + 1 q f P V 2 V 2 α 2 2 R v / α ln 2 exp k b P V 2 V 2 2 R v / α × k b P V 2 V + k b P V 2 V + k e exp k e 2 2 R v / α .
By analyzing Equation (17), it can be seen that 1 q f exp k b P V 2 V 2 2 R v / α ln 2 × P V 2 V 2 α 2 2 R v / α is a positive term, so the positive or negative of H t o t a l R v is determined by ϑ q f = k b P V 2 V + k b P V 2 V + k e exp k e 2 2 R v / α . Obviously ϑ q f belongs to the exponential function. So according to the properties of the exponential function, ϑ q f is a monotonically decreasing function. Therefore, we set ϑ q f equal to 0 to get the extreme point R v * of the function H t o t a l , which is calculated as
R v * = α 2 log 2 ln φ b P V 2 V / φ b P V 2 V + φ e φ e .
This means that H t o t a l R v is positive within the interval of 0 < R v < R v * and negative within R v > R v * . Thus, it can be determined that H t o t a l is a concave function within the interval R v > 0 , and the maximum point is R v * . We can optimize R v * by a fixed q .

4.2. Optimal Cache Strategy for a Given Secure Transmission Rate

In this subsection, we optimize the cache strategy based on the given secure transmission rate. The sub-problem with respect to cache strategy q = q 1 , , q f , , q F is formulated as
P 1 b : max q H t o t a l s . t . f = 1 F q f C 0 q f 1
Proposition 1.
The proposed optimization problem P 1 b is a convex optimization problem with regard to 0 q f 1 .
Proof Proposition 1.
See Appendix A.    □
Through Proposition 1, we know that the optimization problem P 1 b about the caching strategy is a convex programming problem. Generally, the optimization problem P 1 b can obtain the closed expression of the optimal cache strategy q * through the analytical method, but the complex structure introduced by the exponential term in the objective function H t o t a l and the existence of inequality constraints make it difficult for the optimization problem P 1 b to obtain the closed expression of the optimal cache strategy q * . Therefore, we use the fmincon module of MATLAB to solve the optimization problem P 1 b [19,51,52]. It can ensure that the constrained optimization problem P 1 b converges to the global optimal solution.

4.3. Iterative Algorithm for Joint Optimization

In this section, we jointly optimize the caching strategy q and the secure transmission rate R v to maximize the security offloading rate of the MEC-enabled air-to-ground integrated IoV. From the previous theoretical analysis, it can be seen that the cache strategy q and the secure transmission rate R v are the product relationship in the expression of the network security offloading ratio H t o t a l , which makes the joint optimization more complicated. Therefore, we propose an alternating optimization algorithm to obtain the joint optimal solution of the caching strategy and the secure transmission rate. The details of the joint optimization algorithm are shown in Algorithm 1. In Algorithm 1, we first obtain the optimal secure transmission rate through a given caching strategy, and then solve the optimal caching strategy by obtaining the secure transmission rate, and alternately optimized each until the network security offloading ratio converges. Finally, a set of joint optimal solutions of the cache strategy q * and the secure transmission rate R v * are output.
Algorithm 1 Joint optimization algorithm.
1:
Initialize the cache strategy q to a feasible value.
2:
Repeat Loop:
3:
 (a) Calculate the security transmission rate R v by Equation (18).
4:
 (b) Update the file cache strategy q by solving the convex optimization problem P 1 b for fixed R v .
5:
 (c) Update the secure transmission rate R v in Equation (18) using the cache strategy solved in step (b).
6:
Until the network security offloading ratio H t o t a l , the optimal secure transmission rate R v * and the optimal cache strategy q *
7:
Output H t o t a l , R v and q

5. Simulation and Numerical Results

In this section, we use key technical parameters to verify the performance of the proposed caching strategy and the correctness of the theoretical analysis. To verify the security offload performance and cache efficiency performance of files, we compare the proposed caching strategy with the PAEH caching strategy [29] and the Uniform-baseline caching strategy [53]. The PAEH caching strategy considered the impact of the self-caching and the successful transmission probability, which were the focus of current research in cooperative caching. By comparing the proposed cache strategy with the PAEH caching strategy, we can verify the security offloading ability of the proposed cache strategy. The uniform-baseline caching strategy is a cache strategy that does not consider the change of content popularity. This strategy, as the baseline cache strategy, appears in many related studies to prove the cache efficiency improvement ability of the proposed cache strategy. All the caching strategies consider the effect of self-caching. Unless otherwise specified, the simulation environment parameter settings in this paper are shown in Table 1.
In Figure 2, we introduce the distribution probability of files under the proposed caching strategy, the PAEH caching strategy, and the uniform-baseline caching strategy. From Figure 2, we can easily see that the uniform-baseline caching strategy caches all files with the same probability. The proposed caching strategy and the PAEH caching strategy only cache a small number of high-ranked files. When the Zipf factor ε = 1 , the proposed caching strategy and the PAEH caching strategy only need to cache the top 3 files to maximize the network security offloading rate, because an increase in the Zipf factor ε means that the probability of the file being requested becomes more concentrated. In order to increase the network security offload ratio, the proposed caching strategy and the PAEH caching strategy increase the caching probability of the top files. This is consistent with the high demand for a certain file in a certain period of time in the actual network. Lower-ranked files may not need to be cached due to the CV’s limited cache capacity.
Figure 3 corresponds to optimization problem P 1 a , which illustrates the optimization of the secure transmission rate for a given caching strategy. The specific values of the caching strategy adopted in Figure 3 are given in Table 2. As can be seen from Figure 3, with the secure transmission rate increasing, the network security offloading ratio curve first increases to the extreme point and then drops rapidly. This phenomenon also verifies that our optimization scheme has an optimal solution. In addition, we can also observe that there is still the network security offloading ratio even when the secure transmission rate is zero, because the effect of self-caching is considered in our proposed caching strategy. We comprehensively take into account the factors of successful connection and security transmission of V2V communication in the proposed caching strategy. Therefore, under the condition of a very low secure transmission rate, the main way to obtain files by the proposed caching strategy may still be through self-caching. This may lead to the phenomenon that the curve starts. When the secure transmission rate is very low, the network security offloading ratio of the q 1 cache strategy is lower than that of q 3 .
Figure 4 compares the proposed caching strategy, PAEH caching strategy and uniform-baseline caching strategy, with the increasing Zipf parameters. From Figure 4, we can easily see that the network security offloading ratio brought by the proposed caching strategy and PAEH caching strategy will increase rapidly with the increase of Zipf parameters. However, the network security offloading ratio of the uniform-baseline caching strategy is fixed on a horizontal line and does not change with the increase of the Zipf parameters. This result is the same as we expected, because the uniform-baseline caching strategy does not take into account the popularity of files, but caches all files with equal probability. Of course, the network security offloading ratio of the Uniform-baseline caching strategy is also the worst. Furthermore, we can also see that when the Zipf parameter is small, the proposed caching strategy is significantly better than the PAEH caching strategy, but the gap gradually decreases as the Zipf parameter increases. This is because the caching probability of our proposed scheme is strongly correlated with the probability of requesting files. The increase of popularity factor ε means that the probability of being requested for the most popular file increases. This will lead to the cache probability of the most popular file approaching 1, and the cache probability of other files approaching 0. When the popularity factor ε gradually increases, both the proposed caching strategy and the PAEH caching strategy cache the top files, so the network security offloading ratio is gradually approaching.
In Figure 5, we investigate the effect of different CV densities and EV densities ( λ e = 1 × 10 3 /m 2 , λ e = 4 × 10 3 /m 2 , λ e = 10 × 10 3 /m 2 ) on the security offloading ratio of the MEC-enabled air-to-ground integrated IoV. Monte Carlo method is used to obtain the simulation results. From Figure 5, we can see that the simulation results match well with the theoretical values. This indicates that the theoretical derivation of this paper is reasonable. By analyzing the abscissa in Figure 5, we can conclude that the network security offloading ratio increases with the increase of CV density. This is because the increase in CV density also increases the probability of the RVs finding the surrounding required files. In addition, with the increase of CV density, the network security offloading ratio increases slowly and gradually tends to balance. This indicates that when the CV density reaches a certain value, the CV’s cache capacity will become the main influencing factor of the network security offloading ratio. Furthermore, it can be seen from the three EV density curves that the network security offloading ratio decreases as the EV density increases. The reason for this phenomenon may be that the proposed caching strategy considers the factors of successful V2V communication connection and secure transmission. When the EV density increases, the risk of the file secure transmission also increases, which may lead to the decrease of the network security offloading ratio. In addition, with the increase in EV density, the network security offloading ratio will decrease slowly. The main reason is that the proposed caching strategy takes into account the impact of self-caching, which can ensure that the files can be obtained confidentially through self-caching even when the communication conditions are very risky.
In Figure 6, we compare the data security offloading performance of the proposed caching strategy, the PAEH strategy and the uniform-baseline caching strategy with different CV densities and Zipf parameters. It is obvious that all the caching strategies involved in the comparison will increase rapidly with the increase of CV density. The proposed caching strategy significantly outperforms the PAEH strategy and the uniform-baseline caching strategy in terms of the network security offloading ratio. This is the same conclusion as in Figure 5, in which the increase in the density of CV gives the requester a greater chance of obtaining the desired file. With the increase of Zipf parameters, the proposed caching strategy and the PAEH caching strategy will be significantly improved. Although both the proposed caching strategy and the PAEH caching strategy consider the influence of self-caching, it can be seen from the distribution of caching strategies in Figure 2 that the caching probability of the proposed caching strategy is strongly correlated with the request probability. However, the network security offloading ratio curves of the uniform-baseline caching strategy under the two Zipf parameters are coincident, because the uniform-baseline caching strategy does not consider the influence of content popularity.
In Figure 7, we compare the network security offloading ratio of the proposed caching strategy, the PAEH strategy, and the uniform-baseline caching strategy under different CV cache capacities. It can be seen from Figure 7 that the proposed caching strategy, the PAEH strategy, and the uniform-baseline caching strategy all increase with the increase of CV cache capacity. Due to the consideration of self-caching by all caching strategies and our assumption of a limited file library F = 10 , when the CV cache capacity is S = 10 , the network security offloading ratio of all caching strategies can reach the maximum value. In addition, we can also observe that with the increase of CV capacity, all cache strategies gradually narrow the gap in network security offloading ratio. Because when the cache capacity of the CV is large enough (compared with the file library), the probability that the requester obtains the required file through the self-cache is increased. At this time, the proportion of caching strategy and file popularity distribution to network data offloading will decrease. Therefore, the network security offloading ratio curve is gradually approaching. Furthermore, the proposed caching strategy is better than the PAEH strategy and the uniform-baseline caching strategy due to the consideration of the successful transmission of V2V communication. Since the uniform-baseline caching strategy does not fully utilize the cache space (all files are cached with the same probability), its network offloading ratio is the worst.

6. Conclusions

In this paper, we propose a novel mobile edge caching strategy to improve the security offloading ratio of the MEC-enabled air-to-ground integrated IoV, which comprehensively considers the effects of self-caching, the successful connection of V2V communication, and the secure transmission. On the basis of stochastic geometry theory and Laplace transform, we calculate the accurate expression for the network security offloading ratio. Based on the network security offloading ratio, we construct a joint optimization problem of the caching strategy and the secure transmission rate. Due to the complexity of the optimization problem, it is difficult to directly obtain the joint optimal solution of the caching strategy and the secure transmission rate. We propose an alternating optimization algorithm to jointly optimize the caching strategy and the secure transmission rate. Through the limited number of alternate optimizations, we can obtain a set of the optimal caching strategy and secure transmission rate that maximize the network security offloading ratio. Finally, we verify the superiority and feasibility of the proposed caching strategy through simulation experiments.
In addition, this paper focuses on considering a single line and a single ABS. If multiple lines and ABS are considered, road layout should be further considered. In this scenario, the network model should meet the Cox process or doubly stochastic Poisson point process. However, the network will become more complicated, which is out of the scope of this paper and will be our future work. This paper focuses on highrise urban scenarios, consisting of many ground obstructions. Furthermore, studies regarding the comprehensive impact on LoS and NLoS groups will be conducted in the future.

Author Contributions

Methodology, Formal analysis, and Writing—Reviewing, W.W.; Supervision and Project administration, H.L.; Formal analysis, Y.L.; Project administration and Investigation, W.C.; Editing, R.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (No. 62271395) and (No. 61401360), Natural Science Foundation of Shaanxi Province (No. 2021JM-076).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

We set ψ q f = exp k b P V 2 V 2 2 R s + R v / α × 1 exp k e 2 2 R v / α , so the objective function can be rewritten as H t o t a l = f = 1 F p f q f + 1 q f ( 1 e π q f λ p r 2 ) ψ q f . The first derivative of H t o t a l with respect to q f can be calculated as
H t o t a l q f = 1 ( 1 e π q f λ p z 2 ) ψ q f + 1 q f ψ q f × π λ p r 2 e π q f λ p r 2 P V 2 V k b 2 2 R s + R v / α ( 1 e π q f λ p z 2 ) .
Furthermore, we can also calculate the second derivative of H t o t a l with respect to q f as
2 H t o t a l q f 2 = ψ q f 2 π λ p r 2 e π q f λ p r 2 + 2 P V 2 V ζ q f + 1 q f k b 2 2 R s + R v / α P V 2 V 2 ζ q f π λ p r 2 2 e π q f λ p r 2 P V 2 V ζ q f = ψ q f 1 q f ζ q f P V 2 V 2 k b 2 2 R s + R v / α 2 + 1 q f π λ p r 2 π λ p r 2 e π q f λ p r 2 + k b 2 2 R s + R v 2 R s + R v α α 2 ( 1 e π q f λ p z 2 ) P V 2 V 1 e π q f λ p r 2 1 q f P V 2 V ,
where ζ q f = k b 2 2 R s + R v / α ( 1 e π q f λ p z 2 ) . Obviously, the other terms of 2 H t o t a l / q f 2 are negative, so we just need to judge the positive and negative of G q f = 2 ( 1 e π q f λ p z 2 ) P V 2 V 1 e π q f λ p r 2 1 q f P V 2 V .The first derivative of G q f with respect to q f can be calculated as
G q f = 2 π λ p r 2 e π q f λ p z 2 P V 2 V π λ p r 2 e π q f λ p r 2 1 q f P V 2 V 1 e π q f λ p r 2 1 q f P V 2 V + 3 ( 1 e π q f λ p z 2 ) P V 2 V = ( 1 e π q f λ p z 2 ) π λ p r 2 e π q f λ p r 2 8 + 3 π λ p r 2 1 q f + 3 ( 1 e π q f λ p z 2 ) P V 2 V
Through the calculation of Equation (A4), we can easily judge the positive and negative of the second derivative p V 2 V .
p V 2 V = 2 π λ p r 2 e π q f λ p z 2 π λ p r 2 2 e π q f λ p z 2 1 q f < 0 .
Therefore, we can get the conclusion G q f < 0 , which represents G q f as a decreasing function within 0 q f 1 . So, we can judge that the function G q f G 0 = 0 . Furthermore, we can get 2 H t o t a l / q f 2 < 0 . Therefore, the objective function H t o t a l is a concave function on the convex set 0 q f 1 , then the optimization problem P 1 b is proved to be a standard convex optimization problem.

References

  1. Cisco. Cisco Annual Internet Report (2018–2023) White Paper; Cisco: San Jose, CA, USA, 2020. [Google Scholar]
  2. Israr, A.; Ali, Z.A.; Alkhammash, E.H.; Jussila, J.J. Optimization Methods Applied to Motion Planning of Unmanned Aerial Vehicles: A Review. Drones 2022, 6, 126. [Google Scholar] [CrossRef]
  3. You, X.; Wang, C.X.; Huang, J.; Gao, X.; Zhang, Z.; Wang, M.; Huang, Y.; Zhang, C.; Jiang, Y.; Wang, J.; et al. Towards 6G wireless communication networks: Vision, enabling technologies, and new paradigm shifts. Sci. China Inf. Sci. 2021, 64, 1–74. [Google Scholar] [CrossRef]
  4. Sun, W.; Li, S.; Zhang, Y. Edge caching in blockchain empowered 6G. China Commun. 2021, 18, 1–17. [Google Scholar] [CrossRef]
  5. Wang, D.; Zhou, F.; Lin, W.; Ding, Z.; Al-Dhahir, N. Cooperative hybrid nonorthogonal multiple access-based mobile-edge computing in cognitive radio networks. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 1104–1117. [Google Scholar] [CrossRef]
  6. Wang, D.; Wu, M.; He, Y.; Pang, L.; Xu, Q.; Zhang, R. An HAP and UAVs Collaboration Framework for Uplink Secure Rate Maximization in NOMA-Enabled IoT Networks. Remote Sens. 2022, 14, 4501. [Google Scholar] [CrossRef]
  7. He, Y.; Wang, D.; Huang, F.; Zhang, R.; Pan, J. Trajectory optimization and channel allocation for delay sensitive secure transmission in UAV-relayed VANETs. IEEE Trans. Veh. Technol. 2022, 71, 4512–4517. [Google Scholar] [CrossRef]
  8. Thandavarayan, G.; Sepulcre, M.; Gozalvez, J. Generation of cooperative perception messages for connected and automated vehicles. IEEE Trans. Veh. Technol. 2020, 69, 16336–16341. [Google Scholar] [CrossRef]
  9. Chen, Y.; Liu, Y.; Zhao, J.; Zhu, Q. Mobile edge cache strategy based on neural collaborative filtering. IEEE Access 2020, 8, 18475–18482. [Google Scholar] [CrossRef]
  10. Wang, D.; He, T.; Zhou, F.; Cheng, J.; Zhang, R.; Wu, Q. Outage-driven link selection for secure buffer-aided networks. Sci. China Inf. Sci. 2022, 65, 1–6. [Google Scholar] [CrossRef]
  11. He, Y.; Nie, L.; Guo, T.; Kaur, K.; Hassan, M.M.; Yu, K. A NOMA-enabled framework for relay deployment and network optimization in double-layer airborne access VANETs. IEEE Trans. Intell. Transp. Syst. 2022, 23, 22452–22466. [Google Scholar] [CrossRef]
  12. He, Y.; Zhai, D.; Huang, F.; Wang, D.; Tang, X.; Zhang, R. Joint task offloading, resource allocation, and security assurance for mobile edge computing-enabled UAV-assisted VANETs. Remote Sens. 2021, 13, 1547. [Google Scholar] [CrossRef]
  13. Grlj, C.G.; Krznar, N.; Pranjić, M. A Decade of UAV Docking Stations: A Brief Overview of Mobile and Fixed Landing Platforms. Drones 2022, 6, 17. [Google Scholar] [CrossRef]
  14. Narang, M.; Xiang, S.; Liu, W.; Gutierrez, J.; Chiaraviglio, L.; Sathiaseelan, A.; Merwaday, A. UAV-assisted edge infrastructure for challenged networks. In Proceedings of the 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, 1–4 May 2017; pp. 60–65. [Google Scholar]
  15. Dai, Y.; Xu, D.; Maharjan, S.; Zhang, Y. Joint load balancing and offloading in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4377–4387. [Google Scholar] [CrossRef]
  16. Ning, Z.; Zhang, K.; Wang, X.; Obaidat, M.S.; Guo, L.; Hu, X.; Hu, B.; Guo, Y.; Sadoun, B.; Kwok, R.Y. Joint computing and caching in 5G-envisioned Internet of vehicles: A deep reinforcement learning-based traffic control system. IEEE Trans. Intell. Transp. Syst. 2020, 22, 5201–5212. [Google Scholar] [CrossRef]
  17. Anjum, N.; Yang, Z.; Khan, I.; Kiran, M.; Wu, F.; Rabie, K.; Bahaei, S.M. Efficient algorithms for cache-throughput analysis in cellular-d2d 5g networks. Comput. Mater. Contin. 2021, 67, 1759–1780. [Google Scholar] [CrossRef]
  18. Ma, Z.; Nuermaimaiti, N.; Zhang, H.; Zhou, H.; Nallanathan, A. Deployment model and performance analysis of clustered D2D caching networks under cluster-centric caching strategy. IEEE Trans. Commun. 2020, 68, 4933–4945. [Google Scholar] [CrossRef]
  19. Lee, M.C.; Molisch, A.F. Caching policy and cooperation distance design for base station-assisted wireless D2D caching networks: Throughput and energy efficiency optimization and tradeoff. IEEE Trans. Wirel. Commun. 2018, 17, 7500–7514. [Google Scholar] [CrossRef]
  20. Cai, J.; Wu, X.; Liu, Y.; Luo, J.; Liao, L. Network coding-based socially-aware caching strategy in D2D. IEEE Access 2020, 8, 12784–12795. [Google Scholar] [CrossRef]
  21. Kafıloğlu, S.S.; Gür, G.; Alagöz, F. Cooperative Caching and Video Characteristics in D2D Edge Networks. IEEE Commun. Lett. 2020, 24, 2647–2651. [Google Scholar] [CrossRef]
  22. Li, M.; Cheng, N.; Gao, J.; Wang, Y.; Zhao, L.; Shen, X. Energy-efficient UAV-assisted mobile edge computing: Resource allocation and trajectory optimization. IEEE Trans. Veh. Technol. 2020, 69, 3424–3438. [Google Scholar] [CrossRef]
  23. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  24. Irram, F.; Ali, M.; Naeem, M.; Mumtaz, S. Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions. J. Netw. Comput. Appl. 2022, 206, 103431. [Google Scholar] [CrossRef]
  25. Wang, H.M.; Zheng, T.X. Physical Layer Security in Random Cellular Networks; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
  26. Liu, Y.; Qin, Z.; Elkashlan, M.; Gao, Y.; Hanzo, L. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks. IEEE Trans. Wirel. Commun. 2017, 16, 1656–1672. [Google Scholar] [CrossRef]
  27. Zheng, T.X.; Wang, H.M.; Yuan, J. Physical-layer security in cache-enabled cooperative small cell networks against randomly distributed eavesdroppers. IEEE Trans. Wirel. Commun. 2018, 17, 5945–5958. [Google Scholar] [CrossRef] [Green Version]
  28. Ren, D.; Gui, X.; Zhang, K.; Wu, J. Mobility-aware traffic offloading via cooperative coded edge caching. IEEE Access 2020, 8, 43427–43442. [Google Scholar] [CrossRef]
  29. Meng, Y.; Zhang, Z.; Huang, Y. Cache-and energy harvesting-enabled d2d cellular network: Modeling, analysis and optimization. IEEE Trans. Green Commun. Netw. 2021, 5, 703–713. [Google Scholar] [CrossRef]
  30. Farooq, M.J.; ElSawy, H.; Alouini, M.S. A stochastic geometry model for multi-hop highway vehicular communication. IEEE Trans. Wirel. Commun. 2015, 15, 2276–2291. [Google Scholar] [CrossRef] [Green Version]
  31. Steinmetz, E.; Wildemeersch, M.; Quek, T.Q.; Wymeersch, H. A stochastic geometry model for vehicular communication near intersections. In Proceedings of the 2015 IEEE Globecom Workshops (GC Wkshps), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
  32. Wu, Y.; Zheng, J. Modeling and Analysis of the Local Delay in an MEC-Based VANET for an Urban Area. IEEE Trans. Veh. Technol. 2022, 71, 13266–13280. [Google Scholar] [CrossRef]
  33. Sial, M.N.; Deng, Y.; Ahmed, J.; Nallanathan, A.; Dohler, M. Stochastic geometry modeling of cellular V2X communication over shared channels. IEEE Trans. Veh. Technol. 2019, 68, 11873–11887. [Google Scholar] [CrossRef] [Green Version]
  34. Andrews, J.G.; Baccelli, F.; Ganti, R.K. A tractable approach to coverage and rate in cellular networks. IEEE Trans. Commun. 2011, 59, 3122–3134. [Google Scholar] [CrossRef] [Green Version]
  35. Chen, Z.; Pappas, N.; Kountouris, M. Probabilistic caching in wireless D2D networks: Cache hit optimal versus throughput optimal. IEEE Commun. Lett. 2017, 21, 584–587. [Google Scholar] [CrossRef] [Green Version]
  36. Liu, H.W.; Zheng, T.X.; Wen, Y.; Feng, C.; Wang, H.M. Performance Analysis of Uplink mmWave Communications in C-V2X Networks. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
  37. Ullah, A.; Choi, W. Massive MIMO Assisted Aerial-Terrestrial Network: How Many UAVs Need to Be Deployed? TechRxiv 2022, 10, 36227. [Google Scholar]
  38. Zhang, C.; Wei, Z.; Feng, Z.; Zhang, W. Spectrum sharing of drone networks. In Handbook of Cognitive Radio; Springer: Berlin/Heidelberg, Germany, 2019; pp. 1279–1304. [Google Scholar]
  39. Zhang, S.; Zhu, Y.; Liu, J. Multi-UAV Enabled Aerial-Ground Integrated Networks: A Stochastic Geometry Analysis. IEEE Trans. Commun. 2022, 70, 7040–7054. [Google Scholar] [CrossRef]
  40. Malak, D.; Al-Shalash, M. Device-to-device content distribution: Optimal caching strategies and performance bounds. In Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015; pp. 664–669. [Google Scholar]
  41. Li, S.; Sun, W.; Zhang, H.; Zhang, Y. Physical Layer Security for Edge Caching in 6G Networks. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
  42. Stoyan, D.; Kendall, W.S.; Chiu, S.N.; Mecke, J. Stochastic Geometry and Its Applications; John Wiley & Sons: Hoboken, NJ, USA, 2013. [Google Scholar]
  43. Chai, R.; Li, Y.; Chen, Q. Joint cache partitioning, content placement, and user association for D2D-enabled heterogeneous cellular networks. IEEE Access 2019, 7, 56642–56655. [Google Scholar] [CrossRef]
  44. Vu, T.X.; Chatzinotas, S.; Ottersten, B.; Trinh, A.V. Full-duplex enabled mobile edge caching: From distributed to cooperative caching. IEEE Trans. Wirel. Commun. 2019, 19, 1141–1153. [Google Scholar] [CrossRef] [Green Version]
  45. Mozaffari, M.; Saad, W.; Bennis, M.; Debbah, M. Unmanned aerial vehicle with underlaid device-to-device communications: Performance and tradeoffs. IEEE Trans. Wirel. Commun. 2016, 15, 3949–3963. [Google Scholar] [CrossRef]
  46. Okabe, A.; Boots, B.; Sugihara, K.; Chiu, S.N. Concepts and Applications of Voronoi Diagrams; John Wiley: Chichester, UK, 2000. [Google Scholar]
  47. Wang, C.; Li, Z.; Xia, X.G.; Shi, J.; Si, J.; Zou, Y. Physical layer security enhancement using artificial noise in cellular vehicle-to-everything (C-V2X) networks. IEEE Trans. Veh. Technol. 2020, 69, 15253–15268. [Google Scholar] [CrossRef]
  48. Zheng, T.X.; Wen, Y.; Liu, H.W.; Ju, Y.; Wang, H.M.; Wong, K.K.; Yuan, J. Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks. IEEE Trans. Wirel. Commun. 2022, 21, 9818–9833. [Google Scholar] [CrossRef]
  49. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products; Academic Press: Cambridge, MA, USA, 2014. [Google Scholar]
  50. Bai, T.; Wang, J.; Ren, Y.; Hanzo, L. Energy-efficient computation offloading for secure UAV-edge-computing systems. IEEE Trans. Veh. Technol. 2019, 68, 6074–6087. [Google Scholar] [CrossRef] [Green Version]
  51. Su, Z.; Feng, W.; Tang, J.; Chen, Z.; Fu, Y.; Zhao, N.; Wong, K.K. Energy efficiency optimization for D2D communications underlaying UAV-assisted industrial IoT networks with SWIPT. IEEE Internet Things J. 2022, 10, 1990–2002. [Google Scholar] [CrossRef]
  52. Boyd, S.; Boyd, S.P.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  53. Amer, R.; Baza, M.; Salman, T.; Butt, M.M.; Alhindi, A.; Marchetti, N. Optimizing joint probabilistic caching and channel access for clustered D2D networks. J. Commun. Netw. 2021, 23, 433–441. [Google Scholar] [CrossRef]
Figure 1. MEC-enabled air-to-ground integrated IoV model.
Figure 1. MEC-enabled air-to-ground integrated IoV model.
Drones 07 00163 g001
Figure 2. Distribution of caching strategies with different Zipf factors.
Figure 2. Distribution of caching strategies with different Zipf factors.
Drones 07 00163 g002
Figure 3. The curve of the network security offloading ratio versus the secure transmission rate.
Figure 3. The curve of the network security offloading ratio versus the secure transmission rate.
Drones 07 00163 g003
Figure 4. The network security offloading ratio of the caching strategies varies with Zipf parameters.
Figure 4. The network security offloading ratio of the caching strategies varies with Zipf parameters.
Drones 07 00163 g004
Figure 5. The network security offloading ratio varies with EV density and CV density.
Figure 5. The network security offloading ratio varies with EV density and CV density.
Drones 07 00163 g005
Figure 6. The network security offload ratio of different caching strategies varies with CV densities.
Figure 6. The network security offload ratio of different caching strategies varies with CV densities.
Drones 07 00163 g006
Figure 7. The network security offloading ratio of different caching strategies varies with CV cache capacity.
Figure 7. The network security offloading ratio of different caching strategies varies with CV cache capacity.
Drones 07 00163 g007
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParametersValue
Intensity of CVs λ p 4 × 10 3 /m 2
Intensity of EVs λ e 2 × 10 3 /m 2
V2V bandwidth W20 MHz
Path loss exponent α 3.68
Noise power σ 2 −174 dBm/Hz
The number of files F10 files
Each CV’s cache capacity S1 file
Zip parameter ε 0.6 , 1
Table 2. Three caching strategies adopted for Figure 3.
Table 2. Three caching strategies adopted for Figure 3.
Zipf ParametersCache Probability of Files
q 1 ε = 1.5 0.7550 0.2450 0 0 0 0 0 0 0 0 0
q 2 ε = 1 0.6351 0.2904 0.0745 0 0 0 0 0 0 0
q 3 ε = 0.6 0.4960 0.2848 0.1562 0.0629 0 0 0 0 0 0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, W.; Li, H.; Liu, Y.; Cheng, W.; Liang, R. Files Cooperative Caching Strategy Based on Physical Layer Security for Air-to-Ground Integrated IoV. Drones 2023, 7, 163. https://doi.org/10.3390/drones7030163

AMA Style

Wang W, Li H, Liu Y, Cheng W, Liang R. Files Cooperative Caching Strategy Based on Physical Layer Security for Air-to-Ground Integrated IoV. Drones. 2023; 7(3):163. https://doi.org/10.3390/drones7030163

Chicago/Turabian Style

Wang, Weiguang, Hui Li, Yang Liu, Wei Cheng, and Rui Liang. 2023. "Files Cooperative Caching Strategy Based on Physical Layer Security for Air-to-Ground Integrated IoV" Drones 7, no. 3: 163. https://doi.org/10.3390/drones7030163

Article Metrics

Back to TopTop