Energy-Efficient Multi-Access Mobile Edge Computing With Secrecy Provisioning

Thanks to the wide deployment of heterogeneous radio access networks (RANs) in the past decades, the emerging paradigm of multi-access mobile edge computing, which allows mobile terminals to simultaneously offload the computation-workloads to several different edge-computing servers via multi-RANs,...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on mobile computing Vol. 22; no. 1; pp. 237 - 252
Main Authors: Qian, Li Ping, Wu, Yuan, Yu, Ningning, Wang, Daohang, Jiang, Fuli, Jia, Weijia
Format: Magazine Article
Language:English
Published: Los Alamitos IEEE 01.01.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:1536-1233, 1558-0660
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Thanks to the wide deployment of heterogeneous radio access networks (RANs) in the past decades, the emerging paradigm of multi-access mobile edge computing, which allows mobile terminals to simultaneously offload the computation-workloads to several different edge-computing servers via multi-RANs, has provided a promising scheme for enabling the computation-intensive mobile Internet services in future wireless systems. The broadcasting nature of radio transmission, however, may lead to a potential secrecy-outage during the offloading transmission. In this paper, we thus investigate the energy-efficient multi-access mobile edge computing with secrecy provisioning. Specifically, we first investigate the scenario of one wireless device's (WD's) multi-access offloading subject to a malicious node's eavesdropping. By characterizing the WD's secrecy based throughput in its offloading transmission, we formulate a joint optimization of the WD's multi-access computation offloading, secrecy provisioning, and offloading-transmission duration, with the objective of minimizing the WD's total energy consumption, while providing a guaranteed secrecy-outage during offloading and a guaranteed overall-latency in completing the WD's workload. Despite the non-convexity of this joint optimization problem, we exploit its layered structure and propose an efficient algorithm for solving it. Based on the study on the single-WD scenario, we further investigate the scenario of multiple WDs, in which a group of WDs sequentially execute the multi-access computation offloading, while subject to a malicious node's eavesdropping. Taking the coupling effect among different WDs into account, we propose a swapping-heuristic based algorithm (that uses our proposed single-WD algorithm as a subroutine) for finding the ordering of the WDs to execute the multi-access computation offloading, with the objective of minimizing all WDs' total energy consumption. Extensive numerical results are provided to validate the effectiveness and efficiency of our proposed algorithms. The results demonstrate that our algorithms can outperform some conventional fixed offloading scheduling scheme and randomized offloading ordering scheme.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1536-1233
1558-0660
DOI:10.1109/TMC.2021.3068902