Energy-Efficient Multi-Access Mobile Edge Computing With Secrecy Provisioning
Thanks to the wide deployment of heterogeneous radio access networks (RANs) in the past decades, the emerging paradigm of multi-access mobile edge computing, which allows mobile terminals to simultaneously offload the computation-workloads to several different edge-computing servers via multi-RANs,...
Saved in:
| Published in: | IEEE transactions on mobile computing Vol. 22; no. 1; pp. 237 - 252 |
|---|---|
| Main Authors: | , , , , , |
| Format: | Magazine Article |
| Language: | English |
| Published: |
Los Alamitos
IEEE
01.01.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 1536-1233, 1558-0660 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Thanks to the wide deployment of heterogeneous radio access networks (RANs) in the past decades, the emerging paradigm of multi-access mobile edge computing, which allows mobile terminals to simultaneously offload the computation-workloads to several different edge-computing servers via multi-RANs, has provided a promising scheme for enabling the computation-intensive mobile Internet services in future wireless systems. The broadcasting nature of radio transmission, however, may lead to a potential secrecy-outage during the offloading transmission. In this paper, we thus investigate the energy-efficient multi-access mobile edge computing with secrecy provisioning. Specifically, we first investigate the scenario of one wireless device's (WD's) multi-access offloading subject to a malicious node's eavesdropping. By characterizing the WD's secrecy based throughput in its offloading transmission, we formulate a joint optimization of the WD's multi-access computation offloading, secrecy provisioning, and offloading-transmission duration, with the objective of minimizing the WD's total energy consumption, while providing a guaranteed secrecy-outage during offloading and a guaranteed overall-latency in completing the WD's workload. Despite the non-convexity of this joint optimization problem, we exploit its layered structure and propose an efficient algorithm for solving it. Based on the study on the single-WD scenario, we further investigate the scenario of multiple WDs, in which a group of WDs sequentially execute the multi-access computation offloading, while subject to a malicious node's eavesdropping. Taking the coupling effect among different WDs into account, we propose a swapping-heuristic based algorithm (that uses our proposed single-WD algorithm as a subroutine) for finding the ordering of the WDs to execute the multi-access computation offloading, with the objective of minimizing all WDs' total energy consumption. Extensive numerical results are provided to validate the effectiveness and efficiency of our proposed algorithms. The results demonstrate that our algorithms can outperform some conventional fixed offloading scheduling scheme and randomized offloading ordering scheme. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1536-1233 1558-0660 |
| DOI: | 10.1109/TMC.2021.3068902 |