JOURNAL ARTICLE

Blockchain-Empowered Secure Aerial Edge Computing for AIoT Devices

Zufan ZhangKaixiang ZengYinxue Yi

Year: 2023 Journal:   IEEE Internet of Things Journal Vol: 11 (1)Pages: 84-94   Publisher: Institute of Electrical and Electronics Engineers

Abstract

The unmanned aerial vehicle (UAV) equipped with mobile-edge computing (MEC) can act as an air base station to provide computing services for Artificial Intelligence of Things (AIoT) devices in remote areas. However, the computation offloading process poses a risk to users' privacy due to potential information leaks resulting from interactions between UAVs or migration of data between AIoT devices and UAVs. In this article, we proposed a secure aerial computing network that integrates MEC and blockchain technologies to effectively guarantee privacy and security during computation offloading between AIoT devices and UAVs. Additionally, taking into account task offloading scheduling, radio spectrum resource allocation, and computation resource allocation, a joint optimization problem is formulated to minimize the weighted sum of delay and energy consumption throughout the entire computing process. To tackle this issue, we proposed a block coordinate descent (BCD)-based algorithm to solve the mixed-integer and nonconvex problem. Simulation results demonstrate that the proposed algorithm surpasses other baseline approaches.

Keywords:
Computer science Edge computing Mobile edge computing Computation offloading Distributed computing Base station Energy consumption Scheduling (production processes) Computation Block (permutation group theory) Edge device Cloud computing Computer network Server Enhanced Data Rates for GSM Evolution Algorithm Mathematical optimization Artificial intelligence

Metrics

13
Cited By
6.76
FWCI (Field Weighted Citation Impact)
30
Refs
0.96
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

UAV Applications and Optimization
Physical Sciences →  Engineering →  Aerospace Engineering
Advanced Neural Network Applications
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Blockchain-Empowered Cyber-Secure Federated Learning for Trustworthy Edge Computing

Ervin MooreAhmed ImteajMd Zarif HossainShabnam RezapourM. Hadi Amini

Journal:   IEEE Transactions on Artificial Intelligence Year: 2025 Vol: 6 (8)Pages: 2110-2118
JOURNAL ARTICLE

Blockchain and SGX-Enabled Edge-Computing-Empowered Secure IoMT Data Analysis

Ying GaoHongliang LinYijian ChenYangliang Liu

Journal:   IEEE Internet of Things Journal Year: 2021 Vol: 8 (21)Pages: 15785-15795
JOURNAL ARTICLE

Blockchain Empowered Secure Video Sharing With Access Control for Vehicular Edge Computing

Bingcheng JiangQian HePeng LiuSabita MaharjanYan Zhang

Journal:   IEEE Transactions on Intelligent Transportation Systems Year: 2023 Vol: 24 (9)Pages: 9041-9054
JOURNAL ARTICLE

Secure Aerial Computing: Convergence of Mobile Edge Computing and Blockchain for UAV Networks

Qingqing TangZesong FeiJianchao ZhengBin LiLei GuoJing Wang

Journal:   IEEE Transactions on Vehicular Technology Year: 2022 Vol: 71 (11)Pages: 12073-12087
© 2026 ScienceGate Book Chapters — All rights reserved.