Jianhua Liu*, Peng Xie, Jiajia Liu, Xiaoguang Tu
CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1243-1273, 2024, DOI:10.32604/cmes.2024.054002
- 27 September 2024
Abstract In mobile edge computing, unmanned aerial vehicles (UAVs) equipped with computing servers have emerged as a promising solution due to their exceptional attributes of high mobility, flexibility, rapid deployment, and terrain agnosticism. These attributes enable UAVs to reach designated areas, thereby addressing temporary computing swiftly in scenarios where ground-based servers are overloaded or unavailable. However, the inherent broadcast nature of line-of-sight transmission methods employed by UAVs renders them vulnerable to eavesdropping attacks. Meanwhile, there are often obstacles that affect flight safety in real UAV operation areas, and collisions between UAVs may also occur. To solve… More >