Mobility management is an essential component in enabling mobile hosts to move seamlessly from one location to another while maintaining the packet routing efficiency between the corresponding hosts. One of the concer...Mobility management is an essential component in enabling mobile hosts to move seamlessly from one location to another while maintaining the packet routing efficiency between the corresponding hosts. One of the concerns raised with the internet engineering task force(IETF)mobile IP standard is the excessive signaling generated for highly mobile computers. This paper introduces a scheme to address that issue by manipulating the inherent client-server interaction which exists in most applications to provide the correspondent host with the current mobile host binding. To evaluate the performance of the scheme, typical internet application sessions involving a mobile host is simulated and the signaling and routing costs are examined. Results show a substantial reduction in the mobility management overhead as well as the total cost of delivering packets to the mobile host.展开更多
Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,p...Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,potentially resulting in numerous internal network attacks.Most existing techniques use a central base station,which introduces several difficulties into the system due to the network’s reliance on a single point,while other ways generate more overhead while jeopardising network lifetime.In this research,an intelligent double hashing-based clone node identification scheme was used,which reduces communication and memory costs while performing the clone detection procedure.The approach works in two stages:in the first,the network is deployed using an intelligent double hashing procedure to avoid any network collisions and then in the second,the clone node identification procedure searches for any clone node in the network.This first phase verifies the node prior to network deployment,and then,whenever a node wants to interact,it executes the second level of authentication.End-to-end delay,which is bound to increase owing to the injection of clone nodes,and packet loss,which is reduced by the double hashing technique,were used to evaluate the performance of the aforementioned approach.展开更多
Contact between mobile hosts and database servers presents many problems in theMobile Database System(MDS).It is harmed by a variety of causes,including handoff,inadequate capacity,frequent transaction updates,and rep...Contact between mobile hosts and database servers presents many problems in theMobile Database System(MDS).It is harmed by a variety of causes,including handoff,inadequate capacity,frequent transaction updates,and repeated failures,both of which contribute to serious issues with the information system’s consistency.However,error tolerance technicality allows devices to continue performing their functions in the event of a failure.The aim of this paper is to identify the optimal recovery approach from among the available state-of-the-art techniques in MDS by employing game theory.Several of the presented recovery protocols are chosen and evaluated in order to determine the most critical factors affecting the recovery mechanism,such as the number of processes,the time required to deliver messages,and the number of messages logged-in time.Then,using the suggested payout matrix,the game theory strategy is adapted to choose the optimum recovery technique for the specified environmental variables.The NS2 simulatorwas used to carry out the tests and apply the chosen recovery protocols.The experiments validate the proposed model’s usefulness in comparison to other methods.展开更多
The mode of mobile computing originated from distributed computing and it has the un-idempotent operation property, therefore the deadlock detection algorithm designed for mobile computing systems will face challenges...The mode of mobile computing originated from distributed computing and it has the un-idempotent operation property, therefore the deadlock detection algorithm designed for mobile computing systems will face challenges with regard to correctness and high efficiency. This paper attempts a fundamental study of deadlock detection for the AND model of mobile computing systems. First, the existing deadlock detection algorithms for distributed systems are classified into the resource node dependent (RD) and the resource node independent (RI) categories, and their corresponding weaknesses are discussed. Afterwards a new RI algorithm based on the AND model of mobile computing system is presented. The novelties of our algorithm are that: 1) the blocked nodes inform their predecessors and successors simultaneously; 2) the detection messages (agents) hold the predecessors information of their originator; 3) no agent is stored midway. Additionally, the quit-inform scheme is introduced to treat the excessive victim quitting problem raised by the overlapped cycles. By these methods the proposed algorithm can detect a cycle of size n within n-2 steps and with (n^2-n-2)/2 agents. The performance of our algorithm is compared with the most competitive RD and RI algorithms for distributed systems on a mobile agent simulation platform. Experiment results point out that our algorithm outperforms the two algorithms under the vast majority of resource configurations and concurrent workloads. The correctness of the proposed algorithm is formally proven by the invariant verification technique.展开更多
With the rapid developments of wireless communication and microelectronic technology, the bandwidth of wireless communication is becoming wider than ever, up to 100Gbps and the computer can be designed as small as a m...With the rapid developments of wireless communication and microelectronic technology, the bandwidth of wireless communication is becoming wider than ever, up to 100Gbps and the computer can be designed as small as a match with powerful computing and controlling capability. These rapid developments have extended the mobile computing. There are many application forms of mobile computing, such as mobile databases, mobile data management, wearable computing etc. A great branch of mobile computing, Augmented Reality (AR), which is the combination of mobile computing and wearable computers was discussed.展开更多
Due to the mobility of mobile hosts,checkpoints and message logs of the computing process may disperseover different mobile support stations in the checkpointing and rollback recovery protocol for mobilecomputing.Thre...Due to the mobility of mobile hosts,checkpoints and message logs of the computing process may disperseover different mobile support stations in the checkpointing and rollback recovery protocol for mobilecomputing.Three existing checkpoint handoff schemes do not give well consideration to the efficiency offailure-free process execution and the recovery speed of the failure process at the same time.A dynamicadaptive handoff management of the checkpointing and rollback recovery protocol for mobile computing isproposed in this paper.According to the individual feature and current state of each mobile host,differentimplementations are selected dynamically to complete the handoff process upon the handoff event.Performance analyses show that the proposed handoff management incurs a low loss of performance duringfailure-free and achieves a quick recovery upon the process fault.展开更多
As an essential element of intelligent trans-port systems,Internet of vehicles(IoV)has brought an immersive user experience recently.Meanwhile,the emergence of mobile edge computing(MEC)has enhanced the computational ...As an essential element of intelligent trans-port systems,Internet of vehicles(IoV)has brought an immersive user experience recently.Meanwhile,the emergence of mobile edge computing(MEC)has enhanced the computational capability of the vehicle which reduces task processing latency and power con-sumption effectively and meets the quality of service requirements of vehicle users.However,there are still some problems in the MEC-assisted IoV system such as poor connectivity and high cost.Unmanned aerial vehicles(UAVs)equipped with MEC servers have become a promising approach for providing com-munication and computing services to mobile vehi-cles.Hence,in this article,an optimal framework for the UAV-assisted MEC system for IoV to minimize the average system cost is presented.Through joint consideration of computational offloading decisions and computational resource allocation,the optimiza-tion problem of our proposed architecture is presented to reduce system energy consumption and delay.For purpose of tackling this issue,the original non-convex issue is converted into a convex issue and the alternat-ing direction method of multipliers-based distributed optimal scheme is developed.The simulation results illustrate that the presented scheme can enhance the system performance dramatically with regard to other schemes,and the convergence of the proposed scheme is also significant.展开更多
The unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)has been deemed a promising solution for energy-constrained devices to run smart applications with computationintensive and latency-sensitive require...The unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)has been deemed a promising solution for energy-constrained devices to run smart applications with computationintensive and latency-sensitive requirements,especially in some infrastructure-limited areas or some emergency scenarios.However,the multi-UAVassisted MEC network remains largely unexplored.In this paper,the dynamic trajectory optimization and computation offloading are studied in a multi-UAVassisted MEC system where multiple UAVs fly over a target area with different trajectories to serve ground users.By considering the dynamic channel condition and random task arrival and jointly optimizing UAVs'trajectories,user association,and subchannel assignment,the average long-term sum of the user energy consumption minimization problem is formulated.To address the problem involving both discrete and continuous variables,a hybrid decision deep reinforcement learning(DRL)-based intelligent energyefficient resource allocation and trajectory optimization algorithm is proposed,named HDRT algorithm,where deep Q network(DQN)and deep deterministic policy gradient(DDPG)are invoked to process discrete and continuous variables,respectively.Simulation results show that the proposed HDRT algorithm converges fast and outperforms other benchmarks in the aspect of user energy consumption and latency.展开更多
By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-grow...By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-growing computational demands,it is impossible for a single MEC paradigm to effectively support high-quality intelligent services at end user equipments(UEs).To address this issue,we propose an air-ground collaborative MEC(AGCMEC)architecture in this article.The proposed AGCMEC integrates all potentially available MEC servers within air and ground in the envisioned 6G,by a variety of collaborative ways to provide computation services at their best for UEs.Firstly,we introduce the AGC-MEC architecture and elaborate three typical use cases.Then,we discuss four main challenges in the AGC-MEC as well as their potential solutions.Next,we conduct a case study of collaborative service placement for AGC-MEC to validate the effectiveness of the proposed collaborative service placement strategy.Finally,we highlight several potential research directions of the AGC-MEC.展开更多
Reliable communication and intensive computing power cannot be provided effectively by temporary hot spots in disaster areas and complex terrain ground infrastructure.Mitigating this has greatly developed the applicat...Reliable communication and intensive computing power cannot be provided effectively by temporary hot spots in disaster areas and complex terrain ground infrastructure.Mitigating this has greatly developed the application and integration of UAV and Mobile Edge Computing(MEC)to the Internet of Things(loT).However,problems such as multi-user and huge data flow in large areas,which contradict the reality that a single UAV is constrained by limited computing power,still exist.Due to allowing UAV collaboration to accomplish complex tasks,cooperative task offloading between multiple UAVs must meet the interdependence of tasks and realize parallel processing,which reduces the computing power consumption and endurance pressure of terminals.Considering the computing requirements of the user terminal,delay constraint of a computing task,energy constraint,and safe distance of UAV,we constructed a UAV-Assisted cooperative offloading energy efficiency system for mobile edge computing to minimize user terminal energy consumption.However,the resulting optimization problem is originally nonconvex and thus,difficult to solve optimally.To tackle this problem,we developed an energy efficiency optimization algorithm using Block Coordinate Descent(BCD)that decomposes the problem into three convex subproblems.Furthermore,we jointly optimized the number of local computing tasks,number of computing offloaded tasks,trajectories of UAV,and offloading matching relationship between multi-UAVs and multiuser terminals.Simulation results show that the proposed approach is suitable for different channel conditions and significantly saves the user terminal energy consumption compared with other benchmark schemes.展开更多
In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based ...In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based on the mMIMO under imperfect channel state information.Based on this,the SCE maximization problem is formulated by jointly optimizing the local computation frequency,the offloading time,the downloading time,the users and the base station transmit power.Due to its difficulty to directly solve the formulated problem,we first transform the fractional objective function into the subtractive form one via the dinkelbach method.Next,the original problem is transformed into a convex one by applying the successive convex approximation technique,and an iteration algorithm is proposed to obtain the solutions.Finally,the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes.展开更多
Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy....Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms.展开更多
In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of ...In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shift matrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes.展开更多
Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal ...Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal with this situation,we investigate online learning-based offloading decision and resource allocation in MEC-enabled STNs in this paper.The problem of minimizing the average sum task completion delay of all IoT devices over all time periods is formulated.We decompose this optimization problem into a task offloading decision problem and a computing resource allocation problem.A joint optimization scheme of offloading decision and resource allocation is then proposed,which consists of a task offloading decision algorithm based on the devices cooperation aided upper confidence bound(UCB)algorithm and a computing resource allocation algorithm based on the Lagrange multiplier method.Simulation results validate that the proposed scheme performs better than other baseline schemes.展开更多
Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC a...Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC and blockchain,processing users’tasks and then uploading the task related information to the blockchain.That is,each edge server runs both users’offloaded tasks and blockchain tasks simultaneously.Note that there is a trade-off between the resource allocation for MEC and blockchain tasks.Therefore,the allocation of the resources of edge servers to the blockchain and theMEC is crucial for the processing delay of blockchain-based MEC.Most of the existing research tackles the problem of resource allocation in either blockchain or MEC,which leads to unfavorable performance of the blockchain-based MEC system.In this paper,we study how to allocate the computing resources of edge servers to the MEC and blockchain tasks with the aimtominimize the total systemprocessing delay.For the problem,we propose a computing resource Allocation algorithmfor Blockchain-based MEC(ABM)which utilizes the Slater’s condition,Karush-Kuhn-Tucker(KKT)conditions,partial derivatives of the Lagrangian function and subgradient projection method to obtain the solution.Simulation results show that ABM converges and effectively reduces the processing delay of blockchain-based MEC.展开更多
This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization pr...This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users.展开更多
In this paper,we investigate the energy efficiency maximization for mobile edge computing(MEC)in intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)communications.In particular,UAVcan collect the ...In this paper,we investigate the energy efficiency maximization for mobile edge computing(MEC)in intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)communications.In particular,UAVcan collect the computing tasks of the terrestrial users and transmit the results back to them after computing.We jointly optimize the users’transmitted beamforming and uploading ratios,the phase shift matrix of IRS,and the UAV trajectory to improve the energy efficiency.The formulated optimization problem is highly non-convex and difficult to be solved directly.Therefore,we decompose the original problem into three sub-problems.We first propose the successive convex approximation(SCA)based method to design the beamforming of the users and the phase shift matrix of IRS,and apply the Lagrange dual method to obtain a closed-form expression of the uploading ratios.For the trajectory optimization,we propose a block coordinate descent(BCD)based method to obtain a local optimal solution.Finally,we propose the alternating optimization(AO)based overall algorithmand analyzed its complexity to be equivalent or lower than existing algorithms.Simulation results show the superiority of the proposedmethod compared with existing schemes in energy efficiency.展开更多
Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady perform...Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks.展开更多
Virtual Reality(VR)is a key industry for the development of the digital economy in the future.Mobile VR has advantages in terms of mobility,lightweight and cost-effectiveness,which has gradually become the mainstream ...Virtual Reality(VR)is a key industry for the development of the digital economy in the future.Mobile VR has advantages in terms of mobility,lightweight and cost-effectiveness,which has gradually become the mainstream implementation of VR.In this paper,a mobile VR video adaptive transmission mechanism based on intelligent caching and hierarchical buffering strategy in Mobile Edge Computing(MEC)-equipped 5G networks is proposed,aiming at the low latency requirements of mobile VR services and flexible buffer management for VR video adaptive transmission.To support VR content proactive caching and intelligent buffer management,users’behavioral similarity and head movement trajectory are jointly used for viewpoint prediction.The tile-based content is proactively cached in the MEC nodes based on the popularity of the VR content.Second,a hierarchical buffer-based adaptive update algorithm is presented,which jointly considers bandwidth,buffer,and predicted viewpoint status to update the tile chunk in client buffer.Then,according to the decomposition of the problem,the buffer update problem is modeled as an optimization problem,and the corresponding solution algorithms are presented.Finally,the simulation results show that the adaptive caching algorithm based on 5G intelligent edge and hierarchical buffer strategy can improve the user experience in the case of bandwidth fluctuations,and the proposed viewpoint prediction method can significantly improve the accuracy of viewpoint prediction by 15%.展开更多
In this paper,we study an Intelligent Reflecting Surface(IRS)assisted Mobile Edge Computing(MEC)system under eavesdropping threats,where the IRS is used to enhance the energy signal transmission and the offloading per...In this paper,we study an Intelligent Reflecting Surface(IRS)assisted Mobile Edge Computing(MEC)system under eavesdropping threats,where the IRS is used to enhance the energy signal transmission and the offloading performance between Wireless Devices(WDs)and the Access Point(AP).Specifically,in the proposed scheme,the AP first powers all WDs with the wireless power transfer through both direct and IRS-assisted links.Then,powered by the harvested energy,all WDs securely offload their computation tasks through the two links in the time division multiple access mode.To determine the local and offloading computational bits,we formulate an optimization problem to jointly design the IRS's phase shift and allocate the time slots constrained by the security and energy requirements.To cope with this non-convex optimization problem,we adopt semidefinite relaxations,singular value decomposition techniques,and Lagrange dual method.Moreover,we propose a dichotomy particle swarm algorithm based on the bisection method to process the overall optimization problem and improve the convergence speed.The numerical results illustrate that the proposed scheme can boost the performance of MEC and secure computation rates compared with other IRS-assisted MEC benchmark schemes.展开更多
文摘Mobility management is an essential component in enabling mobile hosts to move seamlessly from one location to another while maintaining the packet routing efficiency between the corresponding hosts. One of the concerns raised with the internet engineering task force(IETF)mobile IP standard is the excessive signaling generated for highly mobile computers. This paper introduces a scheme to address that issue by manipulating the inherent client-server interaction which exists in most applications to provide the correspondent host with the current mobile host binding. To evaluate the performance of the scheme, typical internet application sessions involving a mobile host is simulated and the signaling and routing costs are examined. Results show a substantial reduction in the mobility management overhead as well as the total cost of delivering packets to the mobile host.
文摘Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,potentially resulting in numerous internal network attacks.Most existing techniques use a central base station,which introduces several difficulties into the system due to the network’s reliance on a single point,while other ways generate more overhead while jeopardising network lifetime.In this research,an intelligent double hashing-based clone node identification scheme was used,which reduces communication and memory costs while performing the clone detection procedure.The approach works in two stages:in the first,the network is deployed using an intelligent double hashing procedure to avoid any network collisions and then in the second,the clone node identification procedure searches for any clone node in the network.This first phase verifies the node prior to network deployment,and then,whenever a node wants to interact,it executes the second level of authentication.End-to-end delay,which is bound to increase owing to the injection of clone nodes,and packet loss,which is reduced by the double hashing technique,were used to evaluate the performance of the aforementioned approach.
文摘Contact between mobile hosts and database servers presents many problems in theMobile Database System(MDS).It is harmed by a variety of causes,including handoff,inadequate capacity,frequent transaction updates,and repeated failures,both of which contribute to serious issues with the information system’s consistency.However,error tolerance technicality allows devices to continue performing their functions in the event of a failure.The aim of this paper is to identify the optimal recovery approach from among the available state-of-the-art techniques in MDS by employing game theory.Several of the presented recovery protocols are chosen and evaluated in order to determine the most critical factors affecting the recovery mechanism,such as the number of processes,the time required to deliver messages,and the number of messages logged-in time.Then,using the suggested payout matrix,the game theory strategy is adapted to choose the optimum recovery technique for the specified environmental variables.The NS2 simulatorwas used to carry out the tests and apply the chosen recovery protocols.The experiments validate the proposed model’s usefulness in comparison to other methods.
基金Sponsored by the National 863 Plan (Grant No.2002AA1Z2101)the National Tenth Five-Year Research Plan(Grant No. 41316.1.2).
文摘The mode of mobile computing originated from distributed computing and it has the un-idempotent operation property, therefore the deadlock detection algorithm designed for mobile computing systems will face challenges with regard to correctness and high efficiency. This paper attempts a fundamental study of deadlock detection for the AND model of mobile computing systems. First, the existing deadlock detection algorithms for distributed systems are classified into the resource node dependent (RD) and the resource node independent (RI) categories, and their corresponding weaknesses are discussed. Afterwards a new RI algorithm based on the AND model of mobile computing system is presented. The novelties of our algorithm are that: 1) the blocked nodes inform their predecessors and successors simultaneously; 2) the detection messages (agents) hold the predecessors information of their originator; 3) no agent is stored midway. Additionally, the quit-inform scheme is introduced to treat the excessive victim quitting problem raised by the overlapped cycles. By these methods the proposed algorithm can detect a cycle of size n within n-2 steps and with (n^2-n-2)/2 agents. The performance of our algorithm is compared with the most competitive RD and RI algorithms for distributed systems on a mobile agent simulation platform. Experiment results point out that our algorithm outperforms the two algorithms under the vast majority of resource configurations and concurrent workloads. The correctness of the proposed algorithm is formally proven by the invariant verification technique.
文摘With the rapid developments of wireless communication and microelectronic technology, the bandwidth of wireless communication is becoming wider than ever, up to 100Gbps and the computer can be designed as small as a match with powerful computing and controlling capability. These rapid developments have extended the mobile computing. There are many application forms of mobile computing, such as mobile databases, mobile data management, wearable computing etc. A great branch of mobile computing, Augmented Reality (AR), which is the combination of mobile computing and wearable computers was discussed.
基金Supported by the National Natural Science Foundation of China (No. 60873138)Postdoctoral Scientific Research Foundation of Heilongjiang (No. LBH-008124)the Fundamental Research Funds for the Central Universities (No. HEUCFT1007)
文摘Due to the mobility of mobile hosts,checkpoints and message logs of the computing process may disperseover different mobile support stations in the checkpointing and rollback recovery protocol for mobilecomputing.Three existing checkpoint handoff schemes do not give well consideration to the efficiency offailure-free process execution and the recovery speed of the failure process at the same time.A dynamicadaptive handoff management of the checkpointing and rollback recovery protocol for mobile computing isproposed in this paper.According to the individual feature and current state of each mobile host,differentimplementations are selected dynamically to complete the handoff process upon the handoff event.Performance analyses show that the proposed handoff management incurs a low loss of performance duringfailure-free and achieves a quick recovery upon the process fault.
基金in part by the National Natural Science Foundation of China(NSFC)under Grant 62371012in part by the Beijing Natural Science Foundation under Grant 4252001.
文摘As an essential element of intelligent trans-port systems,Internet of vehicles(IoV)has brought an immersive user experience recently.Meanwhile,the emergence of mobile edge computing(MEC)has enhanced the computational capability of the vehicle which reduces task processing latency and power con-sumption effectively and meets the quality of service requirements of vehicle users.However,there are still some problems in the MEC-assisted IoV system such as poor connectivity and high cost.Unmanned aerial vehicles(UAVs)equipped with MEC servers have become a promising approach for providing com-munication and computing services to mobile vehi-cles.Hence,in this article,an optimal framework for the UAV-assisted MEC system for IoV to minimize the average system cost is presented.Through joint consideration of computational offloading decisions and computational resource allocation,the optimiza-tion problem of our proposed architecture is presented to reduce system energy consumption and delay.For purpose of tackling this issue,the original non-convex issue is converted into a convex issue and the alternat-ing direction method of multipliers-based distributed optimal scheme is developed.The simulation results illustrate that the presented scheme can enhance the system performance dramatically with regard to other schemes,and the convergence of the proposed scheme is also significant.
基金supported by National Natural Science Foundation of China(No.62471254)National Natural Science Foundation of China(No.92367302)。
文摘The unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)has been deemed a promising solution for energy-constrained devices to run smart applications with computationintensive and latency-sensitive requirements,especially in some infrastructure-limited areas or some emergency scenarios.However,the multi-UAVassisted MEC network remains largely unexplored.In this paper,the dynamic trajectory optimization and computation offloading are studied in a multi-UAVassisted MEC system where multiple UAVs fly over a target area with different trajectories to serve ground users.By considering the dynamic channel condition and random task arrival and jointly optimizing UAVs'trajectories,user association,and subchannel assignment,the average long-term sum of the user energy consumption minimization problem is formulated.To address the problem involving both discrete and continuous variables,a hybrid decision deep reinforcement learning(DRL)-based intelligent energyefficient resource allocation and trajectory optimization algorithm is proposed,named HDRT algorithm,where deep Q network(DQN)and deep deterministic policy gradient(DDPG)are invoked to process discrete and continuous variables,respectively.Simulation results show that the proposed HDRT algorithm converges fast and outperforms other benchmarks in the aspect of user energy consumption and latency.
基金supported in part by the National Natural Science Foundation of China under Grant 62171465,62072303,62272223,U22A2031。
文摘By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-growing computational demands,it is impossible for a single MEC paradigm to effectively support high-quality intelligent services at end user equipments(UEs).To address this issue,we propose an air-ground collaborative MEC(AGCMEC)architecture in this article.The proposed AGCMEC integrates all potentially available MEC servers within air and ground in the envisioned 6G,by a variety of collaborative ways to provide computation services at their best for UEs.Firstly,we introduce the AGC-MEC architecture and elaborate three typical use cases.Then,we discuss four main challenges in the AGC-MEC as well as their potential solutions.Next,we conduct a case study of collaborative service placement for AGC-MEC to validate the effectiveness of the proposed collaborative service placement strategy.Finally,we highlight several potential research directions of the AGC-MEC.
基金supported by the Jiangsu Provincial Key Research and Development Program(No.BE2020084-4)the National Natural Science Foundation of China(No.92067201)+2 种基金the National Natural Science Foundation of China(61871446)the Open Research Fund of Jiangsu Key Laboratory of Wireless Communications(710020017002)the Natural Science Foundation of Nanjing University of Posts and telecommunications(NY220047).
文摘Reliable communication and intensive computing power cannot be provided effectively by temporary hot spots in disaster areas and complex terrain ground infrastructure.Mitigating this has greatly developed the application and integration of UAV and Mobile Edge Computing(MEC)to the Internet of Things(loT).However,problems such as multi-user and huge data flow in large areas,which contradict the reality that a single UAV is constrained by limited computing power,still exist.Due to allowing UAV collaboration to accomplish complex tasks,cooperative task offloading between multiple UAVs must meet the interdependence of tasks and realize parallel processing,which reduces the computing power consumption and endurance pressure of terminals.Considering the computing requirements of the user terminal,delay constraint of a computing task,energy constraint,and safe distance of UAV,we constructed a UAV-Assisted cooperative offloading energy efficiency system for mobile edge computing to minimize user terminal energy consumption.However,the resulting optimization problem is originally nonconvex and thus,difficult to solve optimally.To tackle this problem,we developed an energy efficiency optimization algorithm using Block Coordinate Descent(BCD)that decomposes the problem into three convex subproblems.Furthermore,we jointly optimized the number of local computing tasks,number of computing offloaded tasks,trajectories of UAV,and offloading matching relationship between multi-UAVs and multiuser terminals.Simulation results show that the proposed approach is suitable for different channel conditions and significantly saves the user terminal energy consumption compared with other benchmark schemes.
基金The Natural Science Foundation of Henan Province(No.232300421097)the Program for Science&Technology Innovation Talents in Universities of Henan Province(No.23HASTIT019,24HASTIT038)+2 种基金the China Postdoctoral Science Foundation(No.2023T160596,2023M733251)the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University(No.2023D11)the Song Shan Laboratory Foundation(No.YYJC022022003)。
文摘In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based on the mMIMO under imperfect channel state information.Based on this,the SCE maximization problem is formulated by jointly optimizing the local computation frequency,the offloading time,the downloading time,the users and the base station transmit power.Due to its difficulty to directly solve the formulated problem,we first transform the fractional objective function into the subtractive form one via the dinkelbach method.Next,the original problem is transformed into a convex one by applying the successive convex approximation technique,and an iteration algorithm is proposed to obtain the solutions.Finally,the stimulations are conducted to show that the performance of the proposed schemes is superior to that of the other schemes.
基金supported by Jilin Provincial Science and Technology Department Natural Science Foundation of China(20210101415JC)Jilin Provincial Science and Technology Department Free exploration research project of China(YDZJ202201ZYTS642).
文摘Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms.
基金This work was supported by the Key Scientific and Technological Project of Henan Province(Grant Number 222102210212)Doctoral Research Start Project of Henan Institute of Technology(Grant Number KQ2005)Key Research Projects of Colleges and Universities in Henan Province(Grant Number 23B510006).
文摘In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shift matrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes.
基金supported by National Key Research and Development Program of China(2018YFC1504502).
文摘Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal with this situation,we investigate online learning-based offloading decision and resource allocation in MEC-enabled STNs in this paper.The problem of minimizing the average sum task completion delay of all IoT devices over all time periods is formulated.We decompose this optimization problem into a task offloading decision problem and a computing resource allocation problem.A joint optimization scheme of offloading decision and resource allocation is then proposed,which consists of a task offloading decision algorithm based on the devices cooperation aided upper confidence bound(UCB)algorithm and a computing resource allocation algorithm based on the Lagrange multiplier method.Simulation results validate that the proposed scheme performs better than other baseline schemes.
基金supported by the Key Research and Development Project in Anhui Province of China(Grant No.202304a05020059)the Fundamental Research Funds for the Central Universities of China(Grant No.PA2023GDSK0055)the Project of Anhui Province Economic and Information Bureau(Grant No.JB20099).
文摘Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC and blockchain,processing users’tasks and then uploading the task related information to the blockchain.That is,each edge server runs both users’offloaded tasks and blockchain tasks simultaneously.Note that there is a trade-off between the resource allocation for MEC and blockchain tasks.Therefore,the allocation of the resources of edge servers to the blockchain and theMEC is crucial for the processing delay of blockchain-based MEC.Most of the existing research tackles the problem of resource allocation in either blockchain or MEC,which leads to unfavorable performance of the blockchain-based MEC system.In this paper,we study how to allocate the computing resources of edge servers to the MEC and blockchain tasks with the aimtominimize the total systemprocessing delay.For the problem,we propose a computing resource Allocation algorithmfor Blockchain-based MEC(ABM)which utilizes the Slater’s condition,Karush-Kuhn-Tucker(KKT)conditions,partial derivatives of the Lagrangian function and subgradient projection method to obtain the solution.Simulation results show that ABM converges and effectively reduces the processing delay of blockchain-based MEC.
基金supported in part by the Fundamental Research Funds for the Central Universities under Grant 2022JBGP003in part by the National Natural Science Foundation of China(NSFC)under Grant 62071033in part by ZTE IndustryUniversity-Institute Cooperation Funds under Grant No.IA20230217003。
文摘This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users.
基金the Key Scientific and Technological Project of Henan Province(Grant Number 222102210212)Doctoral Research Start Project of Henan Institute of Technology(Grant Number KQ2005)+1 种基金Doctoral Research Start Project of Henan Institute of Technology(Grant Number KQ2110)Key Research Projects of Colleges and Universities in Henan Province(Grant Number 23B510006).
文摘In this paper,we investigate the energy efficiency maximization for mobile edge computing(MEC)in intelligent reflecting surface(IRS)assisted unmanned aerial vehicle(UAV)communications.In particular,UAVcan collect the computing tasks of the terrestrial users and transmit the results back to them after computing.We jointly optimize the users’transmitted beamforming and uploading ratios,the phase shift matrix of IRS,and the UAV trajectory to improve the energy efficiency.The formulated optimization problem is highly non-convex and difficult to be solved directly.Therefore,we decompose the original problem into three sub-problems.We first propose the successive convex approximation(SCA)based method to design the beamforming of the users and the phase shift matrix of IRS,and apply the Lagrange dual method to obtain a closed-form expression of the uploading ratios.For the trajectory optimization,we propose a block coordinate descent(BCD)based method to obtain a local optimal solution.Finally,we propose the alternating optimization(AO)based overall algorithmand analyzed its complexity to be equivalent or lower than existing algorithms.Simulation results show the superiority of the proposedmethod compared with existing schemes in energy efficiency.
基金supported by the Natural Science Foundation of China (No.62171051)。
文摘Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks.
基金supported in part by the Chongqing Municipal Education Commission projects under Grant No.KJCX2020035,KJQN202200829Chongqing Science and Technology Commission projects under grant No.CSTB2022BSXM-JCX0117 and cstc2020jcyjmsxmX0339+1 种基金supported in part by National Natural Science Foundation of China under Grant No.(62171072,62172064,62003067,61901067)supported in part by Chongqing Technology and Business University projects under Grant no.(2156004,212017).
文摘Virtual Reality(VR)is a key industry for the development of the digital economy in the future.Mobile VR has advantages in terms of mobility,lightweight and cost-effectiveness,which has gradually become the mainstream implementation of VR.In this paper,a mobile VR video adaptive transmission mechanism based on intelligent caching and hierarchical buffering strategy in Mobile Edge Computing(MEC)-equipped 5G networks is proposed,aiming at the low latency requirements of mobile VR services and flexible buffer management for VR video adaptive transmission.To support VR content proactive caching and intelligent buffer management,users’behavioral similarity and head movement trajectory are jointly used for viewpoint prediction.The tile-based content is proactively cached in the MEC nodes based on the popularity of the VR content.Second,a hierarchical buffer-based adaptive update algorithm is presented,which jointly considers bandwidth,buffer,and predicted viewpoint status to update the tile chunk in client buffer.Then,according to the decomposition of the problem,the buffer update problem is modeled as an optimization problem,and the corresponding solution algorithms are presented.Finally,the simulation results show that the adaptive caching algorithm based on 5G intelligent edge and hierarchical buffer strategy can improve the user experience in the case of bandwidth fluctuations,and the proposed viewpoint prediction method can significantly improve the accuracy of viewpoint prediction by 15%.
基金supported in part by the National Natural Science Foundation of China under Grant 62271399 and 62206221in part by the Key Research and Development Program of Shaanxi Province under Grant 2022KW-07+1 种基金in part by National Key Research and Development Program of China under Grant 2020YFB1807003in part by the Shanghai Sailing Program under Grant 20YF1416700。
文摘In this paper,we study an Intelligent Reflecting Surface(IRS)assisted Mobile Edge Computing(MEC)system under eavesdropping threats,where the IRS is used to enhance the energy signal transmission and the offloading performance between Wireless Devices(WDs)and the Access Point(AP).Specifically,in the proposed scheme,the AP first powers all WDs with the wireless power transfer through both direct and IRS-assisted links.Then,powered by the harvested energy,all WDs securely offload their computation tasks through the two links in the time division multiple access mode.To determine the local and offloading computational bits,we formulate an optimization problem to jointly design the IRS's phase shift and allocate the time slots constrained by the security and energy requirements.To cope with this non-convex optimization problem,we adopt semidefinite relaxations,singular value decomposition techniques,and Lagrange dual method.Moreover,we propose a dichotomy particle swarm algorithm based on the bisection method to process the overall optimization problem and improve the convergence speed.The numerical results illustrate that the proposed scheme can boost the performance of MEC and secure computation rates compared with other IRS-assisted MEC benchmark schemes.