Privacy-Aware Wireless Power Transfer for Aerial Computation Offloading via Colonel Blotto Game

Yao Wang, Long Zhang, Minghui Min, Chao Guo, Vishal Sharma, Zhu Han

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In this paper, a laser-powered aerial multi-access edge computing (MEC) architecture is proposed, where a high-altitude platform (HAP) integrated with an MEC server transfers laser energy to charge aerial user equipments (AUEs) for offloading their computation tasks to the HAP. Particularly, we identify a new privacy vulnerability caused by the transmission of wireless power transfer (WPT) signaling in the presence of a malicious smart attacker (SA). To address this vulnerability, the interaction between the HAP and SA in their allocation of tile grids as charging points to the AUEs in laser-enabled WPT is formulated as a Colonel Blotto game (CBG), which models the competition of two players for limited resources over multiple battlefields for a finite time horizon. Moreover, the utility function that each player receives over a battlefield is developed by revealing the tradeoff between privacy protection level and energy consumption of each AUE. We further obtain the mixed-strategy Nash equilibrium for the modified CBG with asymmetric players. Simulation results are presented to show the effectiveness of this game framework.
Original languageEnglish
Title of host publication2020 IEEE Globecom Workshops (GC Wkshps): Proceeedings
Number of pages6
ISBN (Electronic)978-1-7281-7307-8
DOIs
Publication statusPublished - 05 Mar 2021
Externally publishedYes
EventIEEE Global Communications Conference 2020 - Taipei, Taiwan, Province of China
Duration: 07 Dec 202011 Dec 2020

Conference

ConferenceIEEE Global Communications Conference 2020
Abbreviated titleGLOBECOM 2020
Country/TerritoryTaiwan, Province of China
CityTaipei
Period07/12/202011/12/2020

Fingerprint

Dive into the research topics of 'Privacy-Aware Wireless Power Transfer for Aerial Computation Offloading via Colonel Blotto Game'. Together they form a unique fingerprint.

Cite this