Skip to main content
Log in

UAV-assisted wireless relay networks for mobile offloading and trajectory optimization

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In some remote areas under extremely scarce computation and communication resources, unmanned aerial vehicles (UAVs) assisted wireless communications are quite attractive for the more widely communication coverage and powerful computation capacity in contrast to user mobile devices (MDs). In addition to providing relay communication capabilities, the UAV can not only perform user tasks locally, but also offload them to base station or cloudlet for computing, provided that the user tasks require more powerful computation capacities. Considering the fact that the mobility trajectory of UAV could exert a negative impact on mobile offloading, we investigate the mobile offloading problem with a comparative consideration of mobility trajectory, communication, and computation resource allocation, in which the UAV-assisted mobile offloading and trajectory optimization problem (UOTO) is formulated with the objective of maximizing minimum user utility. Unfortunately, the UOTO provided is proven to be non-convex and there is no effective way to solve it. To overcome the difficulties, we develop a near-optimal algorithm by integrating the nonlinear fractional programming (NFP) and successive convex approximation (SCA). The extensive experiments are conducted to illustrate the performance of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Hu X, Zhuang X, Feng G, Lv H, Wang H, Lin J (2018) Joint optimization of traffic and computation offloading in uav-assisted wireless networks. In: 2018 IEEE 15th international conference on mobile Ad Hoc and sensor systems (MASS). IEEE, pp 475–480

  2. Wang Y, Wang K, Huang H, Miyazaki T, Guo S (2019) Traffic and computation co-offloading with reinforcement learning in fog computing for industrial applications. IEEE Trans Indust Inf 15(2):976–986

    Google Scholar 

  3. Iosifidis G, Gao L, Huang J, Tassiulas L (2015) A double-auction mechanism for mobile data-offloading markets. IEEE/ACM Trans Netw 23(5):1634–1647

    Google Scholar 

  4. Al-Kanj L, Vincent Poor H, Dawy Z (2014) Optimal cellular offloading via device-to-device communication networks with fairness constraints. IEEE Trans Wirel Commun 13(8):4628–4643

    Google Scholar 

  5. Wang T, Zhang G, Liu A, Bhuiyan MZA, Jin Q (2019) A secure iot service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet of Things Journal 6(3):4831–4843

    Google Scholar 

  6. Zeng Y, Zhang R, Teng JL (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag 54(5):36–42

    Google Scholar 

  7. Wang K, Zhou Q, Guo S, Luo J (2018) Cluster frameworks for efficient scheduling and resource allocation in data center networks: A survey. IEEE Commun Surv Tutorials 20(4):3560–3580

    Google Scholar 

  8. Ministry of Internal Affairs Economic Research Office and Japan Communications (MIC). Information and communications in japan. http://www.soumu.go.jp/johotsusintokei/whitepaper/eng/WP2011/2011-index.html

  9. Qiantori A, Sutiono AB, Hariyanto H, Suwa H, Ohta T (2012) An emergency medical communications system by low altitude platform at the early stages of a natural disaster in indonesia. J Med Syst 36(1):41–52

    Google Scholar 

  10. Cheng F, Zhang S, Li Z, Chen Y, Zhao N, Yu R, Leung VCM (2018) Uav trajectory optimization for data offloading at the edge of multiple cells. IEEE Trans Veh Technol 67(7):6732–6736

    Google Scholar 

  11. Li Y, Feng G, Ghasemiahmadi M, Cai L (2019) Power allocation and 3-d placement for floating relay supporting indoor communications. IEEE Trans Mob Comput 18(3):618–631

    Google Scholar 

  12. Zhan P, Yu K, Swindlehurst AL (2011) Wireless relay communications with unmanned aerial vehicles: Performance and optimization. IEEE Trans Aerosp Electron Syst 47(3):2068–2085

    Google Scholar 

  13. Zhang J, Zeng Y, Zhang R (2018) UAV-Enabled Radio Access Network: Multi-Mode Communication and Trajectory Design. ArXiv e-prints

  14. Zhang J, Zeng Y, Zhang R (2017) Spectrum and energy efficiency maximization in uav-enabled mobile relaying. In: IEEE international conference on communications, pp 1–6

  15. Zhao W (2004) A message ferrying approach for data delivery in sparse mobile ad hoc networks. In: Proceedings of ACM Int’l symposium on mobile Ad Hoc networking and computing, pp 187–198

  16. Wang Y, Wang K, Huang H, Miyazaki T, Guo S (2019) Traffic and computation co-offloading with reinforcement learning in fog computing for industrial applications. IEEE Trans Indust Inf 15(2):976–986

    Google Scholar 

  17. Wang T, Zhou J, Liu A, Bhuiyan MZA, Wang G, Jia W (2019) Fog-based computing and storage offloading for data synchronization in iot. IEEE Internet of Things Journal 6(3):4272–4282

    Google Scholar 

  18. Wang T, Zeng J, Lai Y, Cai Y, Tian H, Chen Y, Wang B Data collection from wsns to the cloud based on mobile fog elements. Future Generation Computer Systems, https://doi.org/10.1016/j.future.2017.07.031

    Google Scholar 

  19. Jeong S, Simeone O, Kang J (2017) Mobile cloud computing with a uav-mounted cloudlet: optimal bit allocation for communication and computation. Iet Commun 11(7):969–974

    Google Scholar 

  20. He X, Wang K, Huang H, Miyazaki T, Wang Y, Guo S (2018) Green resource allocation based on deep reinforcement learning in content-centric iot. IEEE Transactions on Emerging Topics in Computing, pp 1–1. https://doi.org/10.1109/TETC.2018.2805718

  21. Zeng Y, Zhang Rx (2017) Energy-efficient uav communication with trajectory optimization. IEEE Trans Wirel Commun 16(6):3747–3760

    Google Scholar 

  22. Hua M, Wang Y, Wu Q, Li C, Huang Y, Yang L (June 2018) Energy Optimization for Cellular-Connected multi-UAV Mobile Edge Computing Systems with Multi-Access Schemes. ArXiv e-prints

    Google Scholar 

  23. Zhang J, Zeng Y, Zhang R (2018) Uav-enabled radio access network: Multi-mode communication and trajectory design

  24. Huang Y, Xu J, Qiu L, Zhang R (2018) Cognitive UAV Communication via Joint Trajectory and Power Control. arXiv:1802.05090

  25. Li P, Guo S, Miyazaki T, Liao X, Jin H, Zomaya AY, Wang K (2017) Traffic-aware geo-distributed big data analytics with predictable job completion time. IEEE Trans Parallel Distrib Syst 28(6):1785–1796

    Google Scholar 

  26. Xu J, Zeng Y, Zhang R (2018) Uav-enabled wireless power transfer: Trajectory design and energy optimization. IEEE Transactions on Wireless Communications 17(8):5092–5106

    Google Scholar 

  27. Jeong S, Simeone O, Kang J (2018) Mobile edge computing via a uav-mounted cloudlet: Optimization of bit allocation and path planning. IEEE Trans Veh Technol 67(3):2049–2063

    Google Scholar 

  28. Motlagh NH, Taleb T, Arouk O (2016) Low-altitude unmanned aerial vehicles-based internet of things services Comprehensive survey and future perspectives. IEEE Internet J 3(6):899–922

    Google Scholar 

  29. Zhang H, Zheng WX (2018) Denial-of-service power dispatch against linear quadratic control via a fading channel. IEEE Trans Autom Control 63(9):3032–3039

    MathSciNet  MATH  Google Scholar 

  30. Cover TM, Thomas JA (2006) Elements of information theory (wiley series in telecommunications and signal processing). Wiley-Interscience, New York

    Google Scholar 

  31. Wang F, Xu J, Wang X, Cui S (2017) Joint offloading and computing optimization in wireless powered mobile-edge computing systems. IEEE Trans Wirel Commun 17(3):1784– 1797

    Google Scholar 

  32. Zhang H, Meng W, Qi J, Wang X, Zheng WX (2019) Distributed load sharing under false data injection attack in an inverter-based microgrid. IEEE Trans Indust Electron 66(2):1543–1551

    Google Scholar 

  33. Yang G, He S, Shi Z (2017) Leveraging crowdsourcing for efficient malicious users detection in large-scale social networks. IEEE Internet J 4(2):330–339

    Google Scholar 

  34. Xu C, Jiao L, Li W, Fu X (2015) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Netw 24(5):2795–2808

    Google Scholar 

  35. Thengvall BG, Bard JF, Yu G (2003) A bundle algorithm approach for the aircraft schedule recovery problem during hub closures. Transp Sci 37(4):392–407

    Google Scholar 

  36. Wallenius J, Dyer JS, Fishburn PC, Steuer RE, Zionts S, Deb K (2008) Multiple criteria decision making, multiattribute utility theory: Recent accomplishments and what lies ahead. Manage Sci 54(7):1336–1349

    MATH  Google Scholar 

  37. Sun R, Hong M, Luo ZQ (2014) Joint downlink base station association and power control for max-min fairness: Computation and complexity. IEEE J Sel Areas Commun 33(6):1040–1054

    Google Scholar 

  38. Li Y, Sheng M, Tan CW, Zhang Y, Sun Y, Wang X, Shi Y, Li J (2015) Energy-efficient subcarrier assignment and power allocation in ofdma systems with max-min fairness guarantees. IEEE Trans Commun 63 (9):3183–3195

    Google Scholar 

  39. Fang B, Qian Z, Zhong W, Shao W (2015) An-aided secrecy precoding for swipt in cognitive mimo broadcast channels. IEEE Commun Lett 19(9):1632–1635

    Google Scholar 

  40. Mokhtari A, Koppel A, Scutari G, Ribeiro A (2017) Large-scale nonconvex stochastic optimization by doubly stochastic successive convex approximation. In: IEEE international conference on acoustics, speech and signal processing, pp 4701–4705

  41. Tian X, Zhang W, Yang Y, Wu X, Peng Y, Wang X (2018) Toward a quality-aware online pricing mechanism for crowdsensed wireless fingerprints. IEEE Trans Veh Technol 67(7):5953–5964

    Google Scholar 

  42. Yang C, Shi Z, Han K, Zhang JJ, Gu Y, Qin Z (2018) Optimization of particle cbmember filters for hardware implementation. IEEE Trans Veh Technol 67(9):9027–9031

    Google Scholar 

  43. Zhou F, Wu Y, Qingyang Hu R, Qian Y (June 2018) Computation Rate Maximization in UAV-enabled Wireless Powered Mobile-Edge Computing Systems. ArXiv e-prints

    Google Scholar 

  44. Yang G, He S, Shi Z, Chen J (2017) Promoting cooperation by the social incentive mechanism in mobile crowdsensing. IEEE Commun Mag 55(3):86–92

    Google Scholar 

  45. Faybusovich BV (2006) Convex optimization. IEEE Trans Autom Control 51(11):1859–1859

    Google Scholar 

  46. Bai Y, Zhang L (2017) A full-newton step interior-point algorithm for symmetric cone convex quadratic optimization. J Indust Manag Optim 7(4):891–906

    MathSciNet  MATH  Google Scholar 

  47. Tian X, Li W, Yang Y, Zhang Z, Wang X (2018) Optimization of fingerprints reporting strategy for WLAN, indoor localization. IEEE Trans Mob Comput 17(2):390–403

    Google Scholar 

  48. Wang Y, Lopez JA, Sznaier M (2018) Convex optimization approaches to information structured decentralized control. IEEE Trans Autom Control 63(10):3393–3403

    MathSciNet  MATH  Google Scholar 

  49. Shen K, Yu W (2018) Fractional programming for communication systems-part I: power control and beamforming. CoRR, arXiv:1802.10192

  50. Sherali HD, Alameddine A (1992) A new reformulation-linearization technique for bilinear programming problems. J Glob Optim 2(4):379–410

    MathSciNet  MATH  Google Scholar 

  51. Zhu Y, Zhong Z, Basin MV, Zhou D (2018) A descriptor system approach to stability and stabilization of discrete-time switched pwa systems. IEEE Trans Autom Control 63(10):3456–3463

    MathSciNet  MATH  Google Scholar 

  52. Zhu Y, Zhong Z, Zheng WX, Zhou D (2018) Hmm-based h-infinity filtering for discrete-time markov jump LPV systems over unreliable communication channels. IEEE Trans Syst Man Cybern Syst 48(12):2035–2046

    Google Scholar 

  53. Scutari G, Facchinei F, Lampariello L, Song P (2014) Parallel and distributed methods for nonconvex Optimization-Part I: Theory. ArXiv e-prints

  54. Grant M, Stephen B (2014) CVX: Matlab software for disciplined convex programming, version 2.1. http://cvxr.com/cvx

  55. Chen J, Hu K, Wang Q, Sun Y, Shi Z, He S (2017) Narrowband internet of things Implementations and applications. IEEE Internet J 4(6):2309–2314

    Google Scholar 

  56. Bubeck S (May 2014) Convex Optimization: Algorithms and Complexity. ArXiv e-prints

  57. Cao X, Xu J, Zhang R (2018) Mobile edge computing for cellular-connected uav: Computation offloading and trajectory optimization. In: 2018 IEEE 19th international workshop on signal processing advances in wireless communications (SPAWC), https://doi.org/10.1109/SPAWC.2018.8445936

  58. Zhou F, Wu Y, Sun H, Chu Z (2018) Uav-enabled mobile edge computing: Offloading optimization and trajectory design. In: 2018 IEEE international conference on communications, ICC 2018, Kansas City, MO

  59. Hua M, Huang Y, Yi W, Wu Q, Dai H, Yang L (2018) Energy optimization for cellular-connected multi-uav mobile edge computing systems with multi-access schemes. J Comm Inform Netw 3(4):33–44

    Google Scholar 

Download references

Acknowledgments

This work is supported by the Natural Science Foundation of China (No. 61872104), the Natural Science Foundation of Heilongjiang Province in China (No. F201 6009), the Fundamental Research Fund for the Central Universities in China (No. HEUCF180602) and the National Science and Technology Major Project (No. 2016 ZX03001023-005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bingyang Li.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on Networked Cyber-Physical Systems

Guest Editors: Heng Zhang, Mohammed Chadli, Zhiguo Shi, Yanzheng Zhu, and Zhaojian Li

A preliminary version of this work has been published in the 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems(MASS) [1].

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Feng, G., Wang, C., Li, B. et al. UAV-assisted wireless relay networks for mobile offloading and trajectory optimization. Peer-to-Peer Netw. Appl. 12, 1820–1834 (2019). https://doi.org/10.1007/s12083-019-00793-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00793-5

Keywords

Navigation