Archive

  • Select all
    |
    FEATURE TOPIC: NON-TERRESTRIAL NETWORK: ARCHITECTURE,TECHNOLOGIES AND APPLICATIONS
  • FEATURE TOPIC: NON-TERRESTRIAL NETWORK: ARCHITECTURE,TECHNOLOGIES AND APPLICATIONS
    Yin Haoyu, Zhao Haiyan, Li Weidong, Hao Zhangcheng, Hong Wei
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In this paper, a method for designing super-massive sparse phased arrays (SMSPAs) known as the unitary modified matrix enhancement and matrix pencil (UMMEMP) method is proposed. In this method, an eigenvalue pairing method, which is inspired by the modified MEMP, effectively pairs the repeated eigenvalues intractable in the unitary matrix pencil method, and it is more effective in determining the locations of elements in the sparse array. Three numerical examples and a full-wave validation are presented to demonstrate the effectiveness of the method, implemented via SMSPA, in achieving low sidelobe level wide-angle scanning radiation patterns, circular flat-top radiation patterns, and ultra wide-angle scanning radiation patterns.

  • FEATURE TOPIC: NON-TERRESTRIAL NETWORK: ARCHITECTURE,TECHNOLOGIES AND APPLICATIONS
    Chen Yifan, Zhang Yu, Zhang Qingqing, Mo Yandan, Lin Di, Lu Weidang, Hu Su
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Due to the advantages of high mobility and line-of-sight transmission, unmanned aerial vehicles (UAVs) equipped with mobile edge computing (MEC) servers can effectively reduce the computational burden and task delay of ground users (GUs). However, the offloading data from GU to UAV is vulnerable to be eavesdropped by malicious users in the network. Thus, this paper proposes a secure cooperative offloading scheme in a multi-UAV-assisted MEC network, where each UAV has the capability to partially distributing the tasks to other idle UAVs. Specifically, we first model the task offloading decision process of GUs based on the multi-agent Markov Decision Process (MDP) framework. Then we optimize the offloading decision of GUs by adopting multi-agent deep determined policy gradient (MADDPG) to minimize the overall system latency for task processing and computation offloading. Simulation results verify that the proposed cooperative offloading scheme can effectively reduce the system latency compared with the benchmark.

  • FEATURE TOPIC: NON-TERRESTRIAL NETWORK: ARCHITECTURE,TECHNOLOGIES AND APPLICATIONS
    Wang Yanmin, Feng Wei, Xiao Ming, Wang Chengxiang
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Satellite and terrestrial cellular networks can be integrated together to achieve extended broadband coverage for, e.g., maritime communication scenarios, in the upcoming sixth-generation (6G) era. To counter spectrum scarcity, collaborative spectrum sharing is considered for hybrid satellite-terrestrial networks (HSTNs) in this paper. With only slowly-varying large-scale channel state information (CSI), joint power and channel allocation is implemented for terrestrial mobile terminals (MTs) which share the same frequency band with the satellite MTs opportunistically. Specially, strict quality service assurance is adopted for terrestrial MTs under the constraint of leakage interference to satellite MTs. With the target of maximizing both the number of served terrestrial MTs and the average sum transmission rate, a double-target spectrum sharing problem is formulated. To solve the complicated mixed integer programming (MIP) problem efficiently, user-centric channel pools are introduced. Simulations demonstrate that the proposed spectrum sharing scheme could achieve a significant performance gain for the HSTN.

  • FEATURE TOPIC: NON-TERRESTRIAL NETWORK: ARCHITECTURE,TECHNOLOGIES AND APPLICATIONS
    Lyu Daxin, Wen Zhaoxi, Ma Yingchang, Zhang Junlin, Liu Mingqian
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    With the widespread application of communication technology in the non-terrestrial network (NTN), the issue of the insecure communication due to the inherent openness of the NTN is increasingly being recognized. Consequently, safeguarding communication information in the NTN has emerged as a critical challenge. To address this issue, we propose a beamforming and horizontal trajectory joint optimization method for unmanned aerial vehicle (UAV) covert communications in the NTN. First, we formulate an optimization problem that considers constraints such as the transmitting power and the distance. Moreover, we employ the integrated communication and jamming (ICAJ) signal as Alice’s transmitting signal, further protecting the content of communication information. Next, we construct two subproblems, and we propose an alternate optimization (AO) algorithm based on quadratic transform and penalty term method to solve the proposed two subproblems. Simulation results demonstrate that the proposed method is effective and has better performance than benchmarks.

  • FEATURE TOPIC: NON-TERRESTRIAL NETWORK: ARCHITECTURE,TECHNOLOGIES AND APPLICATIONS
    Gao Shengqi, Hao Zhangcheng
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In this paper, a $4 \times 4$ wideband linearly polarization (LP) antenna array is proposed by using planar dual-arm spiral structures. Wideband balun structures, composed of microstrip line-fed coupling slots, are adopted to feed two dual-arms spiral structures with opposite phases. Then, by combining the left- and right- hand circular polarizations, a linearly polarization is achieved. The proposed antenna has a wide operating bandwidth due to the wideband nature of the spiral structure. Simulated results show that the antenna element can achieve a 68.73$\%$ impedance bandwidth and a maximum gain of 6.64 dBi within 19.44 - 38.83 GHz. A $4 \times 4$ array prototype is designed to verify the concept. Measured results show that an impedance bandwidth of 63.73$\%$ is obtained. The proposed array has the merits of a wide bandwidth, a low profile, a low cost, and a small size, which is promising for the application in millimeter wave wireless systems.

  • FEATURE TOPIC: NON-TERRESTRIAL NETWORK: ARCHITECTURE,TECHNOLOGIES AND APPLICATIONS
    Liu Chang, Zhang Jiaxin, Chang Zhaoyang, Zhang Xing, Wang Wenbo
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In recent years, load balancing routing algorithms have been extensively studied in satellite networks. Most existing studies focus on path selection and hop-count optimization for end-to-end transmission, while overlooking congestion issues on feeder links caused by the limited number and centralized distribution of ground stations. Hence, a multi-service routing algorithm called the Multi-service Load Balancing Routing Algorithm for Traffic Return (MLB-TR) is proposed. Unlike traditional approaches, MLB-TR aims to achieve a broader and more comprehensive load balancing objective. Specifically, based on the service type, an appropriate landing satellite is first selected by considering factors such as shortest path hop count and satellite load. Then, a set of candidate paths from the source satellite to the selected landing satellite is computed. Finally, using the regional load balancing index as the optimization objective, the final transmission path is selected from the candidate path set. Simulation results show that the proposed algorithm outperforms the existing works.

  • FEATURE TOPIC: NON-TERRESTRIAL NETWORK: ARCHITECTURE,TECHNOLOGIES AND APPLICATIONS
    Chen Yong, Zhang Xianyu, Zhang Yu, Wang Wei, Yang Hua
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Due to the extraordinary advantages, unmanned aerial vehicle (UAV) can be utilized as aerial base station (BS) to provide temporary and on-demand wireless connections for user equipments in the coverage area. This article specifically considers the UAV-enabled orthogonal frequency division multiple access (OFDMA) wireless communication network. Considering a practical scenario, a joint resource allocation and trajectory design optimization problem with the constraints on UAV mobility, limited total resource and backhaul link rate has been formulated, which aims to maximize the minimum achievable average rate of the users. To tackle the coupling and non-convexity of the proposed problem, an efficient optimization algorithm has been proposed based on alternating optimization, successive convex approximation and introducing slack variable techniques. Simulation results illustrate that the proposed optimization algorithm can effectively improve the system performance. Also, the numerical results unveil that joint optimization is superior to baseline schemes.

  • FEATURE TOPIC: NON-TERRESTRIAL NETWORK: ARCHITECTURE,TECHNOLOGIES AND APPLICATIONS
    Zhang Yuexia, Zhang Siyu, Zheng Hui
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Multispectral low earth orbit (LEO) satellites are characterized by a large volume of captured data and high spatial resolution, which can provide rich image information and data support for a variety of fields, but it is difficult for them to satisfy low-delay and low-energy consumed task processing requirements due to their limited computing resources. To address the above problems, this paper presents the LEO satellites cooperative task offloading and computing resource allocation (LEOC-TC) algorithm. Firstly, a LEO satellites cooperative task offloading system was designed so that the multispectral LEO satellites in the system could leave their tasks locally or offload them to other LEO satellites with servers for processing, thus providing high-quality information-processing services for multispectral LEO satellites. Secondly, an optimization problem with the objective of minimizing the weighted sum of the total task processing delay and total energy consumed for multispectral LEO satellite is established, and the optimization problem is split into an offloading ratio subproblem and a computing resource subproblem. Finally, Bernoulli mapping tuna swarm optimization algorithm is used to solve the above two sub-problems separately in order to satisfy the demand of low delay and low energy consumed by the system. Simulation results show that the total task processing cost of the LEOC-TC algorithm can be reduced by 63.32%, 66.67%, and 80.72% compared to the random offloading ratio algorithm, the average resource offloading algorithm, and the local computing algorithm, respectively.

  • COMMUNICATIONS THEORIES & SYSTEMS
  • COMMUNICATIONS THEORIES & SYSTEMS
    Xincheng Yan, Changsheng Wan, Zhenjie Bao, Pei Li, Kangxin Hou, Haitao Chen
    Abstract ( )   Knowledge map   Save
    Digital twin is a novel technology that has achieved significant progress in industrial manufacturing systems in recent years. In the digital twin environment, entities in the virtual space collect data from devices in the physical space to analyze their states. However, since a lot of devices exist in the physical space, the digital twin system needs to aggregate data from multiple devices at the edge gateway. Homomorphic integrity and confidentiality protections are two important requirements for this data aggregation process. Unfortunately, existing homomorphic encryption algorithms do not support integrity protection, and existing homomorphic signing algorithms require all signers to use the same signing key, which is not feasible in the digital twin environment. Moreover, for both integrity and confidentiality protections, the homomorphic signing algorithm must be compatible with the aggregation manner of the homomorphic encryption algorithm. To address these issues, this paper designs a novel homomorphic aggregation scheme, which allows multiple devices in the physical space to sign different data using different keys and support integrity and confidentiality protections. Finally, the security of the newly designed scheme is analyzed, and its efficiency is evaluated. Experimental results show that our scheme is feasible for real world applications.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Zhengyi Zhou, Ning Ge, Zhaocheng Wang, John S. Thompson
    Abstract ( )   Knowledge map   Save
    In offshore maritime communication systems, base stations (BSs) are employed along the coastline to provide high-speed data service for vessels in coastal sea areas. To ensure the line-of-sight propagation of BS-vessel links, high transceiver antenna height is required, which limits the number of geographically available sites for BS deployment, and imposes a high cost for realizing effective wide-area coverage. In this paper, the joint user association and power allocation (JUAPA) problem is investigated to enhance the coverage of offshore maritime systems. By exploiting the characteristics of network topology as well as vessels' motion in offshore communications, a multi-period JUAPA problem is formulated to maximize the number of ships that can be simultaneously served by the network. This JUAPA problem is intrinsically non-convex and subject to mixed-integer constraints, which is difficult to solve either analytically or numerically. Hence, we propose an iterative augmentation based framework to efficiently select the active vessels, where the JUAPA scheme is iteratively optimized by the network for increasing the number of the selected vessels. More specifically, in each iteration, the user association variables and power allocation variables are determined by solving two separate subproblems, so that the JUAPA strategy can be updated in a low-complexity manner. The performance of the proposed JUAPA method is evaluated by extensive simulation, and numerical results indicate that it can effectively increase the number of vessels served by the network, and thus enhances the coverage of offshore systems.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Yan Li, Kai Niu
    Abstract ( )   Knowledge map   Save
    The construction of polar codes in correlated block fading channels is still an open issue to be solved. In this paper, to explicitly reveal the impact of correlation on error performance of polar coded diversity communication systems, an integrated framework has been established to analyze the theoretical error performance of polar codes in correlated block fading channels. First, the upper bound on error probability of polarized channels is derived based on split polar spectrum, which is fully determined by covariance channel matrix as well as the block-wise weight distribution of the corresponding polar subcode. Further, to facilitate practical implementations, we design a construction metric named polarized correlation weight (PCW) to generate polar codes in correlated block fading channels. Finally, simulation results on block error rate indicate that the proposed metric can exhibit both diversity gain and coding gain compared to the conventional methods under successive cancellation decoding.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Ling Xiang, Wenjiang Feng, Yongqi Zou, Juntao Zhang
    Abstract ( )   Knowledge map   Save
    Backscatter communication (BC) is considered a key technology in self-sustainable communications, and the unmanned aerial vehicle (UAV) as a data collector can improve the efficiency of data collection. We consider a UAV-aided BC system, where the power beacons (PBs) are deployed as dedicated radio frequency (RF) sources to supply power for backscatter devices (BDs). After harvesting enough energy, the BDs transmit data to the UAV. We use stochastic geometry to model the large-scale BC system. Specifically, the PBs are modeled as a type II Matérn hard-core point process (MHCPP II) and the BDs are modeled as a homogeneous Poisson point process (HPPP). Firstly, the BDs' activation probability and average coverage probability are derived. Then, to maximize the energy efficiency (EE), we optimize the RF power of the PBs under different PB densities. Furthermore, we compare the coverage probability and EE performance of our system with a benchmark scheme, in which the distribution of PBs is modeled as a HPPP. Simulation results show that the PBs modeled as MHCPP II has better performance, and we found that the higher the density of PBs, the smaller the RF power required, and the EE is also higher.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Lei Zhang, Chuanchuan Yang, Fan Zhang
    Abstract ( )   Knowledge map   Save
    Recently, the NGPON2 standards organization has decided to deploy LDPC code in upstream and downstream channels in next-generation Ethernet passive optical network (NG-EPON) systems. However, PON upstream channels operate in burst-mode, hence the turn-on effects in optical network units (ONUs) may introduce burst errors, which are difficult for LDPC to deal with. One of the solutions is introducing an interleaver to convert consecutive burst errors into separate random errors. The traditional interleavers such as the block interleaver and the random interleaver, only consider dispersing the consecutive errors. In this paper, we present a design methodology for channel-adaptive interleaving pattern by joint optimizing of interleaving and LDPC decoding in PON systems deploying LDPC codes. After determining the interleaving pattern where the bits can be recovered with more reliable messages during LDPC iterative decoding, we map the bits from the potential locations of burst errors to the interleaving positions. By doing so, we can not only disperse the burst errors but also make full use of the LDPC code to improve its decoding performance. The numerical results show that the proposed interleaving scheme has a better performance under any burst-error length.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Zhe Zhang, Liang Zhou, Junyi Du, Zhiheng Zhou
    Abstract ( )   Knowledge map   Save
    This paper is concerned with designing symbol labeling for a low-density parity-check (LDPC)-coded delayed bit-interleaved coded modulation (DBICM) scheme in a two-way relay channel (TWRC). We first present some properties of symbol labeling within a phase shift keying (PSK) modulation. These properties reduce the candidate labeling search space. Based on this search space, we take DBICM capacity as the cost function and propose a general method for optimizing symbol labeling by employing the differential evolution algorithm. Numerical results show that our labeling obtains a signal-to-noise ratio (SNR) gain up to 0.45 dB with respect to Gray labeling.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Xin Qin, Chuanchuan Yang, Xiaotian Jiang, Jiazhe Hu, Xinyue Wang, Ziyu Wang
    Abstract ( )   Knowledge map   Save
    The progressive edge-growth (PEG) algorithm is a general method to construct short low-density parity-check (LDPC) codes and it is a greedy method to place each edge with large girths. In order to improve the performance of LDPC codes, many improved PEG (IPEG) algorithms employ multi metrics to select surviving edges in turn. In this paper, the proposed edges metric (EM) based on message-passing algorithm (MPA) is introduced to PEG algorithm and the proposed EM constrained PEG (EM-PEG) algorithm mainly considers the independence of message passing from different nodes in Tanner graph. The numerical results show that our EM-PEG algorithm brings better bit error rate (BER) performance gains to LDPC codes than the traditional PEG algorithm and the powerful multi-edge multi-metric constrained PEG algorithm (MM-PEGA) proposed recently. In addition, the multi-edge EM constrained PEG (M-EM-PEG) algorithm which adopts multi-edge EM may further improve the BER performance.
  • NETWORKS & SECURITY
  • NETWORKS & SECURITY
    Zihang Ding, Jianhua Zhang, Changsheng You, Pan Tang, Hongbo Xing, Zhiqiang Yuan, Jie Meng, Guangyi Liu
    Abstract ( )   Knowledge map   Save
    Extremely large-scale multiple-input multiple-output (XL-MIMO) is regarded as a promising technology for next-generation communication systems. However, this will expand the near-field (NF) range, rendering more users more likely to be located in the NF region. In this paper, we aim to answer two questions: What are the new characteristics of the NF channel? Is it necessary to develop new transciver techniques to maintain system performance within the NF region? To this end, we first review current NF channel models and analyze the differences between the existing 3GPP TR 38.901 channel model and the NF channel model, including the spherical wavefront and spatially non-stationarity. Then, we provide examples on how these differences affect the XL-MIMO system performance in terms of beamforming gain and achievable rate. Simulation results demonstrate that, when using far-field (FF) technique under the NF channel, the maximum normalized beam gain loss is less than 3 dB for most users in the NF region defined by Rayleigh distance. Moreover, the achievable rate loss of beam training is less than 3% compared to that realized by NF technique. Finally, we demonstrate the necessity of employing NF transceiver techniques based on simulation results.
  • NETWORKS & SECURITY
    Shengli Zhou, Xinyan Shen, Rui Xu, Zhenbo Wang, Chaoyi Yang
    Abstract ( )   Knowledge map   Save
    Fraudulent website is an important carrier tool for telecom fraud. At present, criminals can use artificial intelligence generative content technology to quickly generate fraudulent website templates and build fraudulent websites in batches. Accurate identification of fraudulent website will effectively reduce the risk of public victimization. Therefore, this study developed a fraudulent website template identification method based on DOM structure extraction of website fingerprint features, which solves the problems of single-dimension identification, low accuracy, and the insufficient generalization ability of current fraudulent website templates. This method uses an improved SimHash algorithm to traverse the DOM tree of a webpage, extract website node features, calculate the weight of each node, and obtain the fingerprint feature vector of the website through dimensionality reduction. Finally, the random forest algorithm is used to optimize the training features for the best combination of parameters. This method automatically extracts fingerprint features from websites and identifies website template ownership based on these features. An experimental analysis showed that this method achieves a classification accuracy of 89.8% and demonstrates superior recognition.
  • NETWORKS & SECURITY
    Yijie Shao, Zhiwen Pan, Nan Liu, Xiaohu You
    Abstract ( )   Knowledge map   Save
    In wireless communication, the problem of authenticating the transmitter’s identity is challenging, especially for those terminal devices in which the security schemes based on cryptography are approximately unfeasible owing to limited resources. In this paper, a physical layer authentication scheme is proposed to detect whether there is anomalous access by the attackers disguised as legitimate users. Explicitly, channel state information (CSI) is used as a form of fingerprint to exploit spatial discrimination among devices in the wireless network and machine learning (ML) technology is employed to promote the improvement of authentication accuracy. Considering that the falsified messages are not accessible for authenticator during the training phase, deep support vector data description (Deep SVDD) is selected to solve the one-class classification (OCC) problem. Simulation results show that Deep SVDD based scheme can tackle the challenges of physical layer authentication in wireless communication environments.
  • NETWORKS & SECURITY
    Weizhen He, Fucai Chen, Guozhen Cheng, Dacheng Zhou, Ke Shang, Chunfang Yang
    Abstract ( )   Knowledge map   Save
    End-host address mutation is one of the key network moving target defense mechanisms to defend against reconnaissance. However, frequently changing host addresses increases the transmission delay of active sessions, which may cause serious ramifications. In this paper, by leveraging the advanced DPDK technology, we proposed a high-performance MTD gateway framework, called HPMG, which can not only prevent adversaries from reconnaissance effectively, but also retain high-speed data packet processing capabilities. Firstly, every moving target host is assigned three different IP addresses, called real IP, virtual IP, and external IP, to realize multi-level network address architecture. To delay the scanning techniques of adversaries, HPMG mutates virtual IP and virtual MAC addresses, and replies with fake host responses. Besides, to be transparent to the end-hosts, HPMG keeps real IP and real MAC unchanged. Finally, we optimized the forwarding and processing performance of the HPMG based on the fast path framework of DPDK. Our theoretical analysis, implementation, and evaluation show that HPMG can effectively defend against reconnaissance attacks and decrease the processing delay caused by address mutation.% so as to reduce the out-of-band (OOB) radiation as much as possible. Parameters of the proposed scheme are solved under joint con-straints of constant power and unity cumulative distribution. A new receiving method is also proposed to improve the bit error rate (BER) performance of OFDM systems. Simulation results indicate the proposed scheme can achieve better OOB radiation and BER performance at same PAPR levels, compared with existing similar companding algorithms.
  • EMERGING TECHNOLOGIES & APPLICATIONS
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Weicong Chen, Jiajia Guo, Yiming Cui, Xiao Li, Shi Jin
    Abstract ( )   Knowledge map   Save
    Channel state information (CSI) is essential to unlock the potential of reconfigurable intelligent surfaces (RISs) in wireless communication systems. Since massive RIS elements are typically implemented without baseband signal processing capabilities, limited CSI feedback is necessary when designing the reflection/refraction coefficients of the RIS. In this article, the unique RIS-assisted channel features, such as the RIS position-dependent channel fluctuation, the ultra-high dimensional sub-channel matrix, and the structured sparsity, are distilled from recent advances in limited feedback and used as guidelines for designing feedback schemes. We begin by illustrating the use cases and the corresponding challenges associated with RIS feedback. We then discuss how to leverage techniques such as channel customization, structured-sparsity, autoencoders, and others to reduce feedback overhead and complexity when devising feedback schemes. Finally, we identify potential research directions by considering the unresolved challenges, the new RIS architecture, and the integration with multi-modal information and artificial intelligence.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Jianfei Zhang, Zhen Wang, Yun Hu, Zheng Chang
    Abstract ( )   Knowledge map   Save
    In the wake of major natural disasters or human-made disasters, the communication infrastructure within disaster-stricken areas is frequently damaged. Unmanned aerial vehicles (UAVs), thanks to their merits such as rapid deployment and high mobility, are commonly regarded as an ideal option for constructing temporary communication networks. Considering the limited computing capability and battery power of UAVs, this paper proposes a two-layer UAV cooperative computing offloading strategy for emergency disaster relief scenarios. The multi-agent twin delayed deep deterministic policy gradient (MATD3) algorithm integrated with prioritized experience replay (PER) is utilized to jointly optimize the scheduling strategies of UAVs, task offloading ratios, and their mobility, aiming to diminish the energy consumption and delay of the system to the minimum. In order to address the aforementioned non-convex optimization issue, a Markov decision process (MDP) has been established. The results of simulation experiments demonstrate that, compared with the other four baseline algorithms, the algorithm introduced in this paper exhibits better convergence performance, verifying its feasibility and efficacy.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Dan Pu, Wenjiang Feng, Juntao Zhang
    Abstract ( )   Knowledge map   Save
    In this paper, unmanned aerial vehicle (UAV) is adopted to serve as aerial base station (ABS) and mobile edge computing (MEC) platform for wireless communication systems. When Internet of Things devices (IoTDs) cannot cope with computation-intensive and/or time-sensitive tasks, part of tasks is offloaded to the UAV side, and UAV process them with its own computing resources and caching resources. Thus, the burden of IoTDs gets relieved under the satisfaction of the quality of service (QoS) requirements. However, owing to the limited resources of UAV, the cost of whole system, i.e., that is defined as the weighted sum of energy consumption and time delay with caching, should be further optimized while the objective function and the constraints are non-convex. Therefore, we first jointly optimize communication resources ${{\mathbf{B}}}$, computing resources ${{\mathbf{F}}}$ and offloading rates ${{\mathbf{X}}}$ with alternating iteration and convex optimization method, and then determine the value of caching decision ${{\mathbf{Y}}}$ with branch-and-bound (BB) algorithm. Numerical results show that UAV assisting partial task offloading with content caching is superior to local computing and full offloading mechanism without caching, and meanwhile the cost of whole system gets further optimized with our proposed scheme.