UAV-assisted wireless relay networks for mobile offloading and trajectory optimization

  • Guangsheng Feng
  • Chengbo Wang
  • Bingyang LiEmail author
  • Haibin Lv
  • Xiaoxiao Zhuang
  • Hongwu Lv
  • Huiqiang Wang
  • Xianlang Hu
Part of the following topical collections:
  1. Special Issue on Networked Cyber-Physical Systems


In some remote areas under extremely scarce computation and communication resources, unmanned aerial vehicles (UAVs) assisted wireless communications are quite attractive for the more widely communication coverage and powerful computation capacity in contrast to user mobile devices (MDs). In addition to providing relay communication capabilities, the UAV can not only perform user tasks locally, but also offload them to base station or cloudlet for computing, provided that the user tasks require more powerful computation capacities. Considering the fact that the mobility trajectory of UAV could exert a negative impact on mobile offloading, we investigate the mobile offloading problem with a comparative consideration of mobility trajectory, communication, and computation resource allocation, in which the UAV-assisted mobile offloading and trajectory optimization problem (UOTO) is formulated with the objective of maximizing minimum user utility. Unfortunately, the UOTO provided is proven to be non-convex and there is no effective way to solve it. To overcome the difficulties, we develop a near-optimal algorithm by integrating the nonlinear fractional programming (NFP) and successive convex approximation (SCA). The extensive experiments are conducted to illustrate the performance of the proposed scheme.


UAV Relay Traffic offloading Computation offloading Fairness 



This work is supported by the Natural Science Foundation of China (No. 61872104), the Natural Science Foundation of Heilongjiang Province in China (No. F201 6009), the Fundamental Research Fund for the Central Universities in China (No. HEUCF180602) and the National Science and Technology Major Project (No. 2016 ZX03001023-005).


  1. 1.
    Hu X, Zhuang X, Feng G, Lv H, Wang H, Lin J (2018) Joint optimization of traffic and computation offloading in uav-assisted wireless networks. In: 2018 IEEE 15th international conference on mobile Ad Hoc and sensor systems (MASS). IEEE, pp 475–480Google Scholar
  2. 2.
    Wang Y, Wang K, Huang H, Miyazaki T, Guo S (2019) Traffic and computation co-offloading with reinforcement learning in fog computing for industrial applications. IEEE Trans Indust Inf 15(2):976–986Google Scholar
  3. 3.
    Iosifidis G, Gao L, Huang J, Tassiulas L (2015) A double-auction mechanism for mobile data-offloading markets. IEEE/ACM Trans Netw 23(5):1634–1647Google Scholar
  4. 4.
    Al-Kanj L, Vincent Poor H, Dawy Z (2014) Optimal cellular offloading via device-to-device communication networks with fairness constraints. IEEE Trans Wirel Commun 13(8):4628–4643Google Scholar
  5. 5.
    Wang T, Zhang G, Liu A, Bhuiyan MZA, Jin Q (2019) A secure iot service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet of Things Journal 6(3):4831–4843Google Scholar
  6. 6.
    Zeng Y, Zhang R, Teng JL (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag 54(5):36–42Google Scholar
  7. 7.
    Wang K, Zhou Q, Guo S, Luo J (2018) Cluster frameworks for efficient scheduling and resource allocation in data center networks: A survey. IEEE Commun Surv Tutorials 20(4):3560–3580Google Scholar
  8. 8.
    Ministry of Internal Affairs Economic Research Office and Japan Communications (MIC). Information and communications in japan.
  9. 9.
    Qiantori A, Sutiono AB, Hariyanto H, Suwa H, Ohta T (2012) An emergency medical communications system by low altitude platform at the early stages of a natural disaster in indonesia. J Med Syst 36(1):41–52Google Scholar
  10. 10.
    Cheng F, Zhang S, Li Z, Chen Y, Zhao N, Yu R, Leung VCM (2018) Uav trajectory optimization for data offloading at the edge of multiple cells. IEEE Trans Veh Technol 67(7):6732–6736Google Scholar
  11. 11.
    Li Y, Feng G, Ghasemiahmadi M, Cai L (2019) Power allocation and 3-d placement for floating relay supporting indoor communications. IEEE Trans Mob Comput 18(3):618–631Google Scholar
  12. 12.
    Zhan P, Yu K, Swindlehurst AL (2011) Wireless relay communications with unmanned aerial vehicles: Performance and optimization. IEEE Trans Aerosp Electron Syst 47(3):2068–2085Google Scholar
  13. 13.
    Zhang J, Zeng Y, Zhang R (2018) UAV-Enabled Radio Access Network: Multi-Mode Communication and Trajectory Design. ArXiv e-printsGoogle Scholar
  14. 14.
    Zhang J, Zeng Y, Zhang R (2017) Spectrum and energy efficiency maximization in uav-enabled mobile relaying. In: IEEE international conference on communications, pp 1–6Google Scholar
  15. 15.
    Zhao W (2004) A message ferrying approach for data delivery in sparse mobile ad hoc networks. In: Proceedings of ACM Int’l symposium on mobile Ad Hoc networking and computing, pp 187–198Google Scholar
  16. 16.
    Wang Y, Wang K, Huang H, Miyazaki T, Guo S (2019) Traffic and computation co-offloading with reinforcement learning in fog computing for industrial applications. IEEE Trans Indust Inf 15(2):976–986Google Scholar
  17. 17.
    Wang T, Zhou J, Liu A, Bhuiyan MZA, Wang G, Jia W (2019) Fog-based computing and storage offloading for data synchronization in iot. IEEE Internet of Things Journal 6(3):4272–4282Google Scholar
  18. 18.
    Wang T, Zeng J, Lai Y, Cai Y, Tian H, Chen Y, Wang B Data collection from wsns to the cloud based on mobile fog elements. Future Generation Computer Systems,
  19. 19.
    Jeong S, Simeone O, Kang J (2017) Mobile cloud computing with a uav-mounted cloudlet: optimal bit allocation for communication and computation. Iet Commun 11(7):969–974Google Scholar
  20. 20.
    He X, Wang K, Huang H, Miyazaki T, Wang Y, Guo S (2018) Green resource allocation based on deep reinforcement learning in content-centric iot. IEEE Transactions on Emerging Topics in Computing, pp 1–1.
  21. 21.
    Zeng Y, Zhang Rx (2017) Energy-efficient uav communication with trajectory optimization. IEEE Trans Wirel Commun 16(6):3747–3760Google Scholar
  22. 22.
    Hua M, Wang Y, Wu Q, Li C, Huang Y, Yang L (June 2018) Energy Optimization for Cellular-Connected multi-UAV Mobile Edge Computing Systems with Multi-Access Schemes. ArXiv e-printsGoogle Scholar
  23. 23.
    Zhang J, Zeng Y, Zhang R (2018) Uav-enabled radio access network: Multi-mode communication and trajectory designGoogle Scholar
  24. 24.
    Huang Y, Xu J, Qiu L, Zhang R (2018) Cognitive UAV Communication via Joint Trajectory and Power Control. arXiv:1802.05090
  25. 25.
    Li P, Guo S, Miyazaki T, Liao X, Jin H, Zomaya AY, Wang K (2017) Traffic-aware geo-distributed big data analytics with predictable job completion time. IEEE Trans Parallel Distrib Syst 28(6):1785–1796Google Scholar
  26. 26.
    Xu J, Zeng Y, Zhang R (2018) Uav-enabled wireless power transfer: Trajectory design and energy optimization. IEEE Transactions on Wireless Communications 17(8):5092–5106Google Scholar
  27. 27.
    Jeong S, Simeone O, Kang J (2018) Mobile edge computing via a uav-mounted cloudlet: Optimization of bit allocation and path planning. IEEE Trans Veh Technol 67(3):2049–2063Google Scholar
  28. 28.
    Motlagh NH, Taleb T, Arouk O (2016) Low-altitude unmanned aerial vehicles-based internet of things services Comprehensive survey and future perspectives. IEEE Internet J 3(6):899–922Google Scholar
  29. 29.
    Zhang H, Zheng WX (2018) Denial-of-service power dispatch against linear quadratic control via a fading channel. IEEE Trans Autom Control 63(9):3032–3039MathSciNetzbMATHGoogle Scholar
  30. 30.
    Cover TM, Thomas JA (2006) Elements of information theory (wiley series in telecommunications and signal processing). Wiley-Interscience, New YorkGoogle Scholar
  31. 31.
    Wang F, Xu J, Wang X, Cui S (2017) Joint offloading and computing optimization in wireless powered mobile-edge computing systems. IEEE Trans Wirel Commun 17(3):1784– 1797Google Scholar
  32. 32.
    Zhang H, Meng W, Qi J, Wang X, Zheng WX (2019) Distributed load sharing under false data injection attack in an inverter-based microgrid. IEEE Trans Indust Electron 66(2):1543–1551Google Scholar
  33. 33.
    Yang G, He S, Shi Z (2017) Leveraging crowdsourcing for efficient malicious users detection in large-scale social networks. IEEE Internet J 4(2):330–339Google Scholar
  34. 34.
    Xu C, Jiao L, Li W, Fu X (2015) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Netw 24(5):2795–2808Google Scholar
  35. 35.
    Thengvall BG, Bard JF, Yu G (2003) A bundle algorithm approach for the aircraft schedule recovery problem during hub closures. Transp Sci 37(4):392–407Google Scholar
  36. 36.
    Wallenius J, Dyer JS, Fishburn PC, Steuer RE, Zionts S, Deb K (2008) Multiple criteria decision making, multiattribute utility theory: Recent accomplishments and what lies ahead. Manage Sci 54(7):1336–1349zbMATHGoogle Scholar
  37. 37.
    Sun R, Hong M, Luo ZQ (2014) Joint downlink base station association and power control for max-min fairness: Computation and complexity. IEEE J Sel Areas Commun 33(6):1040–1054Google Scholar
  38. 38.
    Li Y, Sheng M, Tan CW, Zhang Y, Sun Y, Wang X, Shi Y, Li J (2015) Energy-efficient subcarrier assignment and power allocation in ofdma systems with max-min fairness guarantees. IEEE Trans Commun 63 (9):3183–3195Google Scholar
  39. 39.
    Fang B, Qian Z, Zhong W, Shao W (2015) An-aided secrecy precoding for swipt in cognitive mimo broadcast channels. IEEE Commun Lett 19(9):1632–1635Google Scholar
  40. 40.
    Mokhtari A, Koppel A, Scutari G, Ribeiro A (2017) Large-scale nonconvex stochastic optimization by doubly stochastic successive convex approximation. In: IEEE international conference on acoustics, speech and signal processing, pp 4701–4705Google Scholar
  41. 41.
    Tian X, Zhang W, Yang Y, Wu X, Peng Y, Wang X (2018) Toward a quality-aware online pricing mechanism for crowdsensed wireless fingerprints. IEEE Trans Veh Technol 67(7):5953–5964Google Scholar
  42. 42.
    Yang C, Shi Z, Han K, Zhang JJ, Gu Y, Qin Z (2018) Optimization of particle cbmember filters for hardware implementation. IEEE Trans Veh Technol 67(9):9027–9031Google Scholar
  43. 43.
    Zhou F, Wu Y, Qingyang Hu R, Qian Y (June 2018) Computation Rate Maximization in UAV-enabled Wireless Powered Mobile-Edge Computing Systems. ArXiv e-printsGoogle Scholar
  44. 44.
    Yang G, He S, Shi Z, Chen J (2017) Promoting cooperation by the social incentive mechanism in mobile crowdsensing. IEEE Commun Mag 55(3):86–92Google Scholar
  45. 45.
    Faybusovich BV (2006) Convex optimization. IEEE Trans Autom Control 51(11):1859–1859Google Scholar
  46. 46.
    Bai Y, Zhang L (2017) A full-newton step interior-point algorithm for symmetric cone convex quadratic optimization. J Indust Manag Optim 7(4):891–906MathSciNetzbMATHGoogle Scholar
  47. 47.
    Tian X, Li W, Yang Y, Zhang Z, Wang X (2018) Optimization of fingerprints reporting strategy for WLAN, indoor localization. IEEE Trans Mob Comput 17(2):390–403Google Scholar
  48. 48.
    Wang Y, Lopez JA, Sznaier M (2018) Convex optimization approaches to information structured decentralized control. IEEE Trans Autom Control 63(10):3393–3403MathSciNetzbMATHGoogle Scholar
  49. 49.
    Shen K, Yu W (2018) Fractional programming for communication systems-part I: power control and beamforming. CoRR, arXiv:1802.10192
  50. 50.
    Sherali HD, Alameddine A (1992) A new reformulation-linearization technique for bilinear programming problems. J Glob Optim 2(4):379–410MathSciNetzbMATHGoogle Scholar
  51. 51.
    Zhu Y, Zhong Z, Basin MV, Zhou D (2018) A descriptor system approach to stability and stabilization of discrete-time switched pwa systems. IEEE Trans Autom Control 63(10):3456–3463MathSciNetzbMATHGoogle Scholar
  52. 52.
    Zhu Y, Zhong Z, Zheng WX, Zhou D (2018) Hmm-based h-infinity filtering for discrete-time markov jump LPV systems over unreliable communication channels. IEEE Trans Syst Man Cybern Syst 48(12):2035–2046Google Scholar
  53. 53.
    Scutari G, Facchinei F, Lampariello L, Song P (2014) Parallel and distributed methods for nonconvex Optimization-Part I: Theory. ArXiv e-printsGoogle Scholar
  54. 54.
    Grant M, Stephen B (2014) CVX: Matlab software for disciplined convex programming, version 2.1.
  55. 55.
    Chen J, Hu K, Wang Q, Sun Y, Shi Z, He S (2017) Narrowband internet of things Implementations and applications. IEEE Internet J 4(6):2309–2314Google Scholar
  56. 56.
    Bubeck S (May 2014) Convex Optimization: Algorithms and Complexity. ArXiv e-printsGoogle Scholar
  57. 57.
    Cao X, Xu J, Zhang R (2018) Mobile edge computing for cellular-connected uav: Computation offloading and trajectory optimization. In: 2018 IEEE 19th international workshop on signal processing advances in wireless communications (SPAWC),
  58. 58.
    Zhou F, Wu Y, Sun H, Chu Z (2018) Uav-enabled mobile edge computing: Offloading optimization and trajectory design. In: 2018 IEEE international conference on communications, ICC 2018, Kansas City, MOGoogle Scholar
  59. 59.
    Hua M, Huang Y, Yi W, Wu Q, Dai H, Yang L (2018) Energy optimization for cellular-connected multi-uav mobile edge computing systems with multi-access schemes. J Comm Inform Netw 3(4):33–44Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Harbin Engineering UniversityHarbinChina
  2. 2.Jiangsu Institute of AutomationLianyungangChina

Personalised recommendations