Files Cooperative Caching Strategy Based on Physical Layer Security for Air-to-Ground Integrated IoV

: Mobile edge cache (MEC)-enabled air-to-ground integrated Internet of Vehicles (IoV) technology can solve wireless network backhaul congestion and high latency, but security problems such as eavesdropping are often ignored when designing cache strategies. In this paper, we propose a joint design of cache strategy and physical layer transmission to improve the security ofﬂoading ratio of MEC-enabled air-to-ground IoV. By using the random geometry theory and Laplace transform, we derive the closed-form expression of the network security ofﬂoading ratio, which is deﬁned as the probability that the request vehicle (RV) successfully ﬁnds the required ﬁle around it and obtains the ﬁle with a data rate larger than a given threshold. During the ﬁle acquisition process, we collectively consider the impact of the successful connection and secure transmission in the vehicle wireless communication. Then, we establish an optimization problem for maximizing the network security ofﬂoading ratio, in which the cache strategy and the secure transmission rate are jointly optimized. Furthermore, we propose an alternating optimization algorithm to solve the joint optimization problem. Simulation experiments verify the correctness of our theoretical derivation, and prove that the proposed cache strategy is superior to other existing cache strategies.


Introduction
According to Cisco's 2018-2023 Internet Annual Report, global devices and connected devices will grow at a compound annual growth rate (CAGR) of 10%, and IoV-based applications will grow at a CAGR of 17% [1,2].The explosive growth of mobile data will bring a heavy burden to the core network.Currently, if a proper solution is not found to address the explosive growth of data traffic, it may degrade the quality experience of user vehicle (UV) and even cause congestion on backhaul links in the future.However, the present technologies can not meet all requirements in fifth generation communication network (5G), and there will be higher requirements for wireless network latency, coverage, spectrum and energy efficiency [3][4][5][6][7] in sixth generation communication network (6G).In order to satisfy the above requirements, 6G will need a paradigm shift to provide intelligent services for mobile devices.MEC-enabled air-to-ground integrated IoV technology has been proven to be a key technology in vehicle wireless networks, which can fully utilize the cache space of edge UV to improve network resiliency, reduce latency, and backhaul traffic [8][9][10][11].Vehicleto-Vehicle (V2V) communication can allow UV to directly share files to other UV around without going through the core network.The previous theoretical and practical research on mobile edge cache (MEC) based on V2V communication shows that V2V communication technology can effectively improve the throughput of IoV [12][13][14].Therefore, MEC-enabled air-to-ground integrated IoV technology will have better application prospects in the 6G wireless communication network.
By utilizing the V2V communication technology, the adjacent UVs with MEC capability can communicate with each other directly without relying on the data forwarding of the air base station (ABS), which will further improve the quality of service (QoS) of UVs and network performance.Since the cache capacity of the UV is also limited, it is necessary to design an optimal caching strategy to reasonably cache content to maximize network utility.Most of the existing caching strategy research use hit ratio, energy efficiency (EE), and network delay as optimization indicators.The significant breakthroughs have been made in these research directions [15][16][17][18][19][20][21][22].Dai et al. [15] proposed a cooperative cachingmulticast strategy based on V2V communication technology to improve the timeliness and spatial coverage of content services.They analyzed and verified the effectiveness of the strategy through the main technical indicators of average transmission coverage and average transmission delay.In order to obtain a more accurate caching strategy, Ning et al. [16] considered the effects of self-offloading, V2V offloading, general user preference, individual UV preference, and the peak time change of content preference on the design of the caching strategy.Therefore, it was also confirmed that the network data offloading performance could be effectively improved by rationally designing the caching strategy between UVs and making full use of the self-caching capability.Anjum et al. [17] proposed a cache method based on two-tiered segment, which divided the storage capacity of each mobile device into two areas.Their research could effectively reduce the startup and playback delay of video in the network.Ma et al. [18] investigated the application of the cluster center caching strategy in data sharing, and analyzed the effectiveness of the cluster center caching strategy by using network coverage probability, average completion ratio, and cache hit ratio.Lee et al. [19] studied the optimal caching strategy and cooperative distance design of V2V caching network from the aspects of network throughput and EE.Cai et al. [20] proposed a social-aware mobile edge caching strategy based on network coding, considering the impact of location proximity and UV social relations on caching strategies.S. Sinem Kafılo glu et al. [21] proposed two cooperative cache replacement algorithms based on distance and priority classification to optimize network energy consumption.Because the battery capacity of each UV was limited, Li et al. [22] studied the design of caching strategy for V2V-assisted wireless networks from the perspective of network offloading gain and energy consumption.The above researches have made important contributions from various perspectives based on V2V wireless caching networks, but they all ignore the communication security issues in MEC-enabled air-to-ground integrated IoV.
In the era of advanced network technology, the use of various applications generates a large amount of unknown personal privacy data.Once the personal privacy data is leaked, it can seriously affect the privacy of UVs and even the safety of UVs' property and life.Therefore, people's privacy and security problems in MEC-enabled air-to-ground integrated IoV must be paid great attention to.Physical layer security [23,24] and wireless caching can be easily integrated in a low complexity and high flexibility manner, mainly including two reasons: (1) Physical layer security achieves wireless secrecy by using eavesdropping channel coding, which is different from source encryption.This encryption method can enable the cached files to be reused, thereby improving the reuse probability of the content in the edge cache.(2) Physical layer security can exploit the inherent randomness of wireless channels without necessarily relying on keys.The security problem in wireless networks is gradually attracting researchers' attention.Refs.[25][26][27][28] have done some research on the security problem of random wireless networks, but the research on using physical layer security to ensure that file transmissions in edge cache are not eavesdropped is still rare.There even lacks a basic theoretical security performance analysis framework and optimization from the perspective of random geometry.Wang and Zheng [25] investigated the physical layer security of random cellular networks, which laid the foundation for the study of wireless network security.Liu et al. [26] derived the exact expression of outage probability of large-scale access to wireless networks through physical layer security.Zheng et al. [27] studied the joint design of small cell network-based cache placement and physical layer transmission in the presence of randomly distributed eavesdroppers to improve the secure content delivery probability of small cell networks.Ren et al. [28] proposed a mobile-aware cooperative coding caching strategy for the high-speed mobility of users and the secure transmission of content.Inspired by the above researches, this paper focuses on the research of security problems in the MEC-enabled air-to-ground integrated IoV to prevent the important data of UVs from being forged or tampered by attackers and provide a strong guarantee for UVs' privacy.
In this paper, we mainly investigate the cache strategy design and physical layer security in the MEC-enabled air-to-ground integrated IoV to improve the data offloading performance and the anti-eavesdropping capability.The main work and achievements are described as follows

•
We propose a novel mobile edge cache strategy based on physical layer security, which enhances the adjacent discovery capability of files and improves the probability of secure transmission.Based on random geometry theory, we calculate the precise expression of the MEC-enabled air-to-ground integrated IoV security offloading ratio.Taking the security offloading ratio as the objective function, we build a joint optimization problem about the cache strategy and the secure transmission rate; • Since the cache strategy and the secure transmission rate are tightly coupled in the objective function, it is difficult to directly obtain the joint optimal solution.Therefore, we propose an alternating optimization algorithm, which can obtain the joint optimal solution of the cache strategies and the secure transmission rate to maximize the network security offloading ratio; • Through a numerical simulation of the key technical parameters, the results show that the network security offloading performance of the proposed caching strategy is superior to the existing caching strategies.
Other sections of the paper are arranged as follows.Section 2 is the air-to-ground integrated IoV system model, and Section 3 shows the problem formulation and analysis.The cache strategy optimization problem is presented in Section 4. In Section 5, theoretical analysis and numerical simulation results are described.Finally, the conclusions of this paper are drawn in Section 6.

System Model
This section mainly introduces the MEC-enabled air-to-ground integrated IoV network model and file access model considered in our research content.

Network Model
In this paper, we consider a MEC-enabled air-to-ground integrated IoV model, in which cooperative vehicles (CVs), RVs and eavesdropping vehicles (EVs) are modeled as a homogeneous Poisson point process (HPPP) [29] with density λ p , λ r and λ e , respectively, as shown in Figure 1.This is a small cell network, such as a single road or an intersection of two roads.In this case, we can model network nodes into Poisson point process and use random geometric theory analysis.The PPP model is usually more accurate for the vehicle network formed on this sparse road layout [30][31][32][33].Each UV has a single antenna with transmission power P t .For large-scale fading we consider a standard fading model r −α .r represents the communication distance between UVs, α is the fading factor and α > 2 is the pre-condition.For small-scale fading, we consider Rayleigh fading, in which the channel gain follows the exponential distribution with unit mean independently, i.e., G ∼ exp(1) [34,35].The reason is that this work focuses on Highrise Urban scenarios, consisting of many ground obstructions.Therefore, traditional air-to-ground channels (e.g., Nakagami fading channels [36,37]) may not be suitable for our considered scenarios.This assumption has been widely used for vehicular communications [38,39].If the UV caches the required files in their own storage space, the UV can get it directly without consuming other resources.Otherwise, the required files will be obtained through cooperation between UVs.We assume that the ABS caches all files and knows all UV information to coordinate V2V cooperative communication.We consider a limited file library F = {1, 2, • • • , F}, where 1-st is the most popular file.Each CV has a limited cache capacity S (S << F).Due to the size and cost constraints assumptions in Refs.[22,40], we assume that each CV can cache one file, which easily generalizes to the multiple file case.We assume that each UV can obtain the file independently, which obeys the Zipf distribution [41].The probability that the f − th file is requested by the UE can be expressed as , where ε is the popularity factor.Each CV can cache files according to optimized cache strategy q = q 1 , • • • , q f , • • • , q F , where q f represents the probability that the f − th file is cached.Based on the thinning property [42], the location of the CV that cached file f follows a HPPP distribution with density q f λ p .

File Access Model
We consider that the ABS caches all files and knows the RVs' request information and the CVs' cache status.The ABS will schedule the content according to the known information.If the requester sends the file request information, there are two ways to obtain the files, namely self-cache and V2V cache.When self-cache and V2V caching fail, the ABS provides the required files to the RV.

•
Case 1: self-cache: If the RV caches the desired file in the local cache, and the RV will get the desired file directly from the local cache without associating other CVs.This is a special case consideration in edge caching, which is often ignored in existing related researches [43][44][45]; • Case 2: V2V cache: If the RV does not cache the required file in the self-cache, then the RV will obtain the required file from surrounding CVs through V2V communication.
This process involves the successful establishment of V2V communication and the secure transmission of files.The research will be discussed in later chapters.

Problem Formulation and Analysis
In this section, we mainly analyze the data offloading performance of the MEC-enabled air-to-ground integrated IoV, and take the network security offloading ratio as the main quantitative indicator.The network security offloading ratio is defined as the probability that a file is successfully found around the RV and transmitted confidentially at a given data rate threshold.Therefore, the total network security offloading ratio of the MEC-enabled air-to-ground integrated IoV H total is defined as where P s and P V2V are the self-cache data offload ratio and the probability that V2V successfully finds the file, respectively.D s and D c are the probability of successful V2V connection and the probability of secure transmission, respectively.

Self-Cache Offloading Ratio
We calculate the probability that the RV finds the required file in the local cache library as the self-cache offloading ratio.Therefore, the self-cache data offloading ratio can be calculated as (2)

V2V Cache Offloading Ratio
If the RV cannot obtain the required files through self-caching, then the V2V cache needs to be enabled to obtain the required files from neighboring CVs.We assume that CV 1 caches the file f , because the location of CV 1 follows a HPPP distribution, so the probability density function of the RV and CV 1 with association distance r is calculated as [46].Therefore, the probability that the RV successfully sensing the file f within the communication range z can be calculated as From Equation (3), we can calculate the probability that the RV successfully sensing all files in the file library F = {1, 2, • • • , F} as Based on Shannon's theorem, when the transmission capacity C b between UVs is C b ≥ R s + R v , the V2V communication can be successfully established.When EV's channel capacity C e is C e ≤ R v , the communication can be transmitted confidentially, where R s and R v represent the original transmission rate and redundant transmission rate, respectively.Therefore, the successful connection probability and security transmission probability of the cache-enabled V2V communication can be calculated as is the signal-to-interference-and-noise ratio (SINR) at RV, where I b represents the interference generated by surrounding the RVs, whose location obeys a HPPP Φ 1 with density λ r P D2D .N 0 w 1 is the noise power at the receiver, g b,0 is the channel gain, and r b,0 represents the cooperation distance between UVs.SI NR e = P t g e,0 r −α e,0 I e +N 0 w 2 is the SINR at EV, where r e,0 is the distance between the CV and the EV, g e,0 is the channel gain.The random variable I e = ∑ i∈Φ 2 \CP 0 P t g i r −α i refers to the interference of EVs around, and N 0 w 2 represents the received noise power.We do further calculations of probabilities D s and D c , the expression can be rewritten as where step (1) considers the interference restriction between UVs, step (2) considers smallscale fading that follows an exponential distribution g b,0 ∼ exp(1) [34,35], and step (3) is the Laplace transform of the random variable I b [47,48], where I b = ∑ i∈Φ 1 \CP 0 P t g i r −α i .The Laplace transform of the random variable I b can be calculated as = exp −2π 2 λ r P V2V (sP t ) where step ( 1) is obtained by (Ref.[49] Equation (3.194.4)) when the path loss factor satisfies α > 2.Then, by substituting s = P −1 t r α b,0 2 R s +R v into Equation ( 6) we can rewrite Equation (5) as Furthermore, we calculate the secure transmission probability of the MEC-enabled air-to-ground integrated IoV D c .The SINR of EV can be expressed as SI NR e = P t g e,0 r −α e,0 I e +N 0 w 2 .The position at EVs follow a HPPP distribution Φ 2 with density λ e .Therefore, the secure transmission probability D c can be recalculated as Then, we do the Laplace transform of the random variable I e in Equation ( 8).The calculation process is as follows Therefore, through the calculation of Equations ( 8) and ( 9), we can get the expression of the secure transmission probability D c as Finally, by substituting Equations ( 2), ( 3), ( 7) and (10) into Equation (1), we can get a closed-form expression for the security offloading ratio of the MEC-enabled air-to-ground integrated IoV as

The Cache Strategy and Secure Transmission Rate Optimization Problem
In this section, we investigate the joint effect of caching strategy and the secure transmission rate on the security offloading ratio of MEC-enabled air-to-ground integrated IoV.The redundancy rate and content cache probability are jointly optimized to maximize the network security offload probability.We study the optimal trade-off between file sharing and privacy security.According to the theoretical derivation results of the Section 3, we can construct the joint optimization as where the objective function (12a) represents the probability that the requester finds the desired file and obtains it successfully in the MEC-enabled air-to-ground integrated IoV.Constraint (12b) indicates that the cache capacity of each CV is limited.Constraint (12c) is the cache probability of each file.Constraint (12d) ensures that the secure transmission rate of the file is positive.Due to the complexity brought by the exponential term in the objective function H total , the joint optimization problem P1 is an NP-hard problem [50].It is difficult for us to directly obtain the joint optimal solution.From the objective function H total we can observe that if the security transmission rate is increased, the probability of the successful V2V connection will decrease.Conversely, if the security transmission rate is too small, the security transmission probability will be reduced.Therefore, there may be an optimal secure transmission rate to maximize the security offloading ratio of the MEC-enabled air-to-ground integrated IoV.Furthermore, the caching strategy and the secure transmission rate are tightly coupled, so each caching strategy may correspond to an optimal secure transmission rate.Therefore, we propose an alternating joint optimization method.First, we transform the original problem P1 into two sub-problems (P1 − a and P1 − b) for independent optimization, and then propose a joint optimization algorithm, which can finally solve the optimal solution of the joint cache strategy and the secure transmission rate.

Optimal Secure Transmission Rate for a Given Cache Strategy
In this subsection, our work focuses on optimizing the secure transmission rate of the MEC-enabled air-to-ground integrated IoV under a given caching strategy.Therefore, the sub-optimization problem is defined as In order to get the optimal solution of the secure transmission rate R v , we must first judge the Hessian matrix of of the objective function H total .The first derivative of H total can be solved as For simplicity, we set By substituting Equations ( 15) and ( 16) into Equation ( 14) , we can further rewrite By analyzing Equation ( 17), it can be seen that 1 − q f exp −k b P V2V 2 2R v /α ln 2 × P V2V 2 α 2 2R v /α is a positive term, so the positive or negative of ∂H total ∂R v is determined by ϑ q f = −k b P V2V + (k b P V2V + k e ) exp −k e 2 2R v /α .Obviously ϑ q f belongs to the exponential function.So according to the properties of the exponential function, ϑ q f is a monotonically decreasing function.Therefore, we set ϑ q f equal to 0 to get the extreme point R * v of the function H total , which is calculated as This means that ∂H total ∂R v is positive within the interval of 0 < R v < R * v and negative within R v > R * v .Thus, it can be determined that H total is a concave function within the interval R v > 0, and the maximum point is R * v .We can optimize R * v by a fixed q.

Optimal Cache Strategy for a Given Secure Transmission Rate
In this subsection, we optimize the cache strategy based on the given secure transmission rate.The sub-problem with respect to cache strategy Proposition 1.The proposed optimization problem P1 − b is a convex optimization problem with regard to 0 ≤ q f ≤ 1.

Proof of Proposition 1. See Appendix A.
Through Proposition 1, we know that the optimization problem P1 − b about the caching strategy is a convex programming problem.Generally, the optimization problem P1 − b can obtain the closed expression of the optimal cache strategy q * through the analytical method, but the complex structure introduced by the exponential term in the objective function H total and the existence of inequality constraints make it difficult for the optimization problem P1 − b to obtain the closed expression of the optimal cache strategy q * .Therefore, we use the fmincon module of MATLAB to solve the optimization problem P1 − b [19,51,52].It can ensure that the constrained optimization problem P1 − b converges to the global optimal solution.

Iterative Algorithm for Joint Optimization
In this section, we jointly optimize the caching strategy q and the secure transmission rate R v to maximize the security offloading rate of the MEC-enabled air-to-ground integrated IoV.From the previous theoretical analysis, it can be seen that the cache strategy q and the secure transmission rate R v are the product relationship in the expression of the network security offloading ratio H total , which makes the joint optimization more complicated.Therefore, we propose an alternating optimization algorithm to obtain the joint optimal solution of the caching strategy and the secure transmission rate.The details of the joint optimization algorithm are shown in Algorithm 1.In Algorithm 1, we first obtain the optimal secure transmission rate through a given caching strategy, and then solve the optimal caching strategy by obtaining the secure transmission rate, and alternately optimized each until the network security offloading ratio converges.Finally, a set of joint optimal solutions of the cache strategy q * and the secure transmission rate R * v are output.
Algorithm 1 Joint optimization algorithm.
1: Initialize the cache strategy q to a feasible value.
2: Repeat Loop: 3: (a) Calculate the security transmission rate R v by Equation ( 18).(c) Update the secure transmission rate R v in Equation ( 18) using the cache strategy solved in step (b).6: Until the network security offloading ratio H total , the optimal secure transmission rate R * v and the optimal cache strategy q * 7: Output H total , R v and q

Simulation and Numerical Results
In this section, we use key technical parameters to verify the performance of the proposed caching strategy and the correctness of the theoretical analysis.To verify the security offload performance and cache efficiency performance of files, we compare the proposed caching strategy with the PAEH caching strategy [29] and the Uniform-baseline caching strategy [53].The PAEH caching strategy considered the impact of the self-caching and the successful transmission probability, which were the focus of current research in cooperative caching.By comparing the proposed cache strategy with the PAEH caching strategy, we can verify the security offloading ability of the proposed cache strategy.The uniform-baseline caching strategy is a cache strategy that does not consider the change of content popularity.This strategy, as the baseline cache strategy, appears in many related studies to prove the cache efficiency improvement ability of the proposed cache strategy.All the caching strategies consider the effect of self-caching.Unless otherwise specified, the simulation environment parameter settings in this paper are shown in Table 1.In Figure 2, we introduce the distribution probability of files under the proposed caching strategy, the PAEH caching strategy, and the uniform-baseline caching strategy.From Figure 2, we can easily see that the uniform-baseline caching strategy caches all files with the same probability.The proposed caching strategy and the PAEH caching strategy only cache a small number of high-ranked files.When the Zipf factor ε = 1, the proposed caching strategy and the PAEH caching strategy only need to cache the top 3 files to maximize the network security offloading rate, because an increase in the Zipf factor ε means that the probability of the file being requested becomes more concentrated.In order to increase the network security offload ratio, the proposed caching strategy and the PAEH caching strategy increase the caching probability of the top files.This is consistent with the high demand for a certain file in a certain period of time in the actual network.Lower-ranked files may not need to be cached due to the CV's limited cache capacity.   2. As can be seen from Figure 3, with the secure transmission rate increasing, the network security offloading ratio curve first increases to the extreme point and then drops rapidly.This phenomenon also verifies that our optimization scheme has an optimal solution.In addition, we can also observe that there is still the network security offloading ratio even when the secure transmission rate is zero, because the effect of self-caching is considered in our proposed caching strategy.We comprehensively take into account the factors of successful connection and security transmission of V2V communication in the proposed caching strategy.Therefore, under the condition of a very low secure transmission rate, the main way to obtain files by the proposed caching strategy may still be through self-caching.This may lead to the phenomenon that the curve starts.When the secure transmission rate is very low, the network security offloading ratio of the q 1 cache strategy is lower than that of q 3 .Table 2. Three caching strategies adopted for Figure 3.

Zipf Parameters
Cache Probability of Files q 1 (ε = 1.5) 0.7550 0.2450 0 0 0 0 0 0 0 0 0 q 2 (ε = 1) 0.6351 0.2904 0.0745 0 0 0 0 0 0 0 q 3 (ε = 0.6) 0.4960 0.2848 0.1562 0.0629 0 0 0 0 0 0 Figure 4 compares the proposed caching strategy, PAEH caching strategy and uniformbaseline caching strategy, with the increasing Zipf parameters.From Figure 4, we can easily see that the network security offloading ratio brought by the proposed caching strategy and PAEH caching strategy will increase rapidly with the increase of Zipf parameters.However, the network security offloading ratio of the uniform-baseline caching strategy is fixed on a horizontal line and does not change with the increase of the Zipf parameters.This result is the same as we expected, because the uniform-baseline caching strategy does not take into account the popularity of files, but caches all files with equal probability.Of course, the network security offloading ratio of the Uniform-baseline caching strategy is also the worst.Furthermore, we can also see that when the Zipf parameter is small, the proposed caching strategy is significantly better than the PAEH caching strategy, but the gap gradually decreases as the Zipf parameter increases.This is because the caching probability of our proposed scheme is strongly correlated with the probability of requesting files.The increase of popularity factor ε means that the probability of being requested for the most popular file increases.This will lead to the cache probability of the most popular file approaching 1, and the cache probability of other files approaching 0. When the popularity factor ε gradually increases, both the proposed caching strategy and the PAEH caching strategy cache the top files, so the network security offloading ratio is gradually approaching.In Figure 5, we investigate the effect of different CV densities and EV densities (λ e = 1 × 10 −3 /m 2 , λ e = 4 × 10 −3 /m 2 , λ e = 10 × 10 −3 /m 2 ) on the security offloading ratio of the MEC-enabled air-to-ground integrated IoV.Monte Carlo method is used to obtain the simulation results.From Figure 5, we can see that the simulation results match well with the theoretical values.This indicates that the theoretical derivation of this paper is reasonable.By analyzing the abscissa in Figure 5, we can conclude that the network security offloading ratio increases with the increase of CV density.This is because the increase in CV density also increases the probability of the RVs finding the surrounding required files.In addition, with the increase of CV density, the network security offloading ratio increases slowly and gradually tends to balance.This indicates that when the CV density reaches a certain value, the CV's cache capacity will become the main influencing factor of the network security offloading ratio.Furthermore, it can be seen from the three EV density curves that the network security offloading ratio decreases as the EV density increases.The reason for this phenomenon may be that the proposed caching strategy considers the factors of successful V2V communication connection and secure transmission.When the EV density increases, the risk of the file secure transmission also increases, which may lead to the decrease of the network security offloading ratio.In addition, with the increase in EV density, the network security offloading ratio will decrease slowly.The main reason is that the proposed caching strategy takes into account the impact of self-caching, which can ensure that the files can be obtained confidentially through self-caching even when the communication conditions are very risky.In Figure 6, we compare the data security offloading performance of the proposed caching strategy, the PAEH strategy and the uniform-baseline caching strategy with different CV densities and Zipf parameters.It is obvious that all the caching strategies involved in the comparison will increase rapidly with the increase of CV density.The proposed caching strategy significantly outperforms the PAEH strategy and the uniform-baseline caching strategy in terms of the network security offloading ratio.This is the same conclusion as in Figure 5, in which the increase in the density of CV gives the requester a greater chance of obtaining the desired file.With the increase of Zipf parameters, the proposed caching strategy and the PAEH caching strategy will be significantly improved.Although both the proposed caching strategy and the PAEH caching strategy consider the influence of self-caching, it can be seen from the distribution of caching strategies in Figure 2 that the caching probability of the proposed caching strategy is strongly correlated with the request probability.However, the network security offloading ratio curves of the uniform-baseline caching strategy under the two Zipf parameters are coincident, because the uniform-baseline caching strategy does not consider the influence of content popularity.In Figure 7, we compare the network security offloading ratio of the proposed caching strategy, the PAEH strategy, and the uniform-baseline caching strategy under different CV cache capacities.It can be seen from Figure 7 that the proposed caching strategy, the PAEH strategy, and the uniform-baseline caching strategy all increase with the increase of CV cache capacity.Due to the consideration of self-caching by all caching strategies and our assumption of a limited file library F = 10, when the CV cache capacity is S = 10, the network security offloading ratio of all caching strategies can reach the maximum value.In addition, we can also observe that with the increase of CV capacity, all cache strategies gradually narrow the gap in network security offloading ratio.Because when the cache capacity of the CV is large enough (compared with the file library), the probability that the requester obtains the required file through the self-cache is increased.At this time, the proportion of caching strategy and file popularity distribution to network data offloading will decrease.Therefore, the network security offloading ratio curve is gradually approaching.Furthermore, the proposed caching strategy is better than the PAEH strategy and the uniform-baseline caching strategy due to the consideration of the successful transmission of V2V communication.Since the uniform-baseline caching strategy does not fully utilize the cache space (all files are cached with the same probability), its network offloading ratio is the worst.

Conclusions
In this paper, we propose a novel mobile edge caching strategy to improve the security offloading ratio of the MEC-enabled air-to-ground integrated IoV, which comprehensively considers the effects of self-caching, the successful connection of V2V communication, and the secure transmission.On the basis of stochastic geometry theory and Laplace transform, we calculate the accurate expression for the network security offloading ratio.Based on the network security offloading ratio, we construct a joint optimization problem of the caching strategy and the secure transmission rate.Due to the complexity of the optimization problem, it is difficult to directly obtain the joint optimal solution of the caching strategy and the secure transmission rate.We propose an alternating optimization algorithm to jointly optimize the caching strategy and the secure transmission rate.Through the limited number of alternate optimizations, we can obtain a set of the optimal caching strategy and secure transmission rate that maximize the network security offloading ratio.Finally, we verify the superiority and feasibility of the proposed caching strategy through simulation experiments.
In addition, this paper focuses on considering a single line and a single ABS.If multiple lines and ABS are considered, road layout should be further considered.In this scenario, the network model should meet the Cox process or doubly stochastic Poisson point process.
Through the calculation of Equation (A4), we can easily judge the positive and negative of the second derivative p V2V ′′ .
Furthermore, we can get ∂ 2 H total /∂q 2 f < 0. Therefore, the objective function H total is a concave function on the convex set 0 ≤ q f ≤ 1, then the optimization problem P1 − b is proved to be a standard convex optimization problem.

α and ϕ e = 2π 2 λ
e csc 2πα −1 α −1 r 2 e,0 .So D s and D c are rewritten as D s = exp −k b P V2V 2 2R v /α , and D c = 1 − exp −k e 2 2R v /α .The first derivative of D s and D c with respect to R v can be calculated as Update the file cache strategy q by solving the convex optimization problem P1 − b for fixed R v .5:

Figure 2 .
Figure 2. Distribution of caching strategies with different Zipf factors.

Figure 3
Figure 3 corresponds to optimization problem P1 − a, which illustrates the optimization of the secure transmission rate for a given caching strategy.The specific values of the caching strategy adopted in Figure3are given in Table2.As can be seen from Figure3,

Figure 3 .
Figure 3.The curve of the network security offloading ratio versus the secure transmission rate.

Figure 4 .
Figure 4.The network security offloading ratio of the caching strategies varies with Zipf parameters.

Figure 5 .
Figure 5.The network security offloading ratio varies with EV density and CV density.

Figure 6 .
Figure 6.The network security offload ratio of different caching strategies varies with CV densities.

Figure 7 .
Figure 7.The network security offloading ratio of different caching strategies varies with CV cache capacity.