Abstract

Thanks to the wide deployment of heterogeneous radio access networks (RANs) in the past decades, the emerging paradigm of multi-access mobile edge computing, which allows mobile terminals to simultaneously offload the computation-workloads to several different edge-computing servers via multi-RANs, has provided a promising scheme for enabling the computation-intensive mobile Internet services in future wireless systems. The broadcasting nature of radio transmission, however, may lead to a potential secrecy-outage during the offloading transmission. In this paper, we thus investigate the energy-efficient multi-access mobile edge computing with secrecy provisioning. Specifically, we first investigate the scenario of one wireless device's (WD's) multi-access offloading subject to a malicious node's eavesdropping. By characterizing the WD's secrecy based throughput in its offloading transmission, we formulate a joint optimization of the WD's multi-access computation offloading, secrecy provisioning, and offloading-transmission duration, with the objective of minimizing the WD's total energy consumption, while providing a guaranteed secrecy-outage during offloading and a guaranteed overall-latency in completing the WD's workload. Despite the non-convexity of this joint optimization problem, we exploit its layered structure and propose an efficient algorithm for solving it. Based on the study on the single-WD scenario, we further investigate the scenario of multiple WDs, in which a group of WDs sequentially execute the multi-access computation offloading, while subject to a malicious node's eavesdropping. Taking the coupling effect among different WDs into account, we propose a swapping-heuristic based algorithm (that uses our proposed single-WD algorithm as a subroutine) for finding the ordering of the WDs to execute the multi-access computation offloading, with the objective of minimizing all WDs’ total energy consumption. Extensive numerical results are provided to validate the effectiveness and efficiency of our proposed algorithms. The results demonstrate that our algorithms can outperform some conventional fixed offloading scheduling scheme and randomized offloading ordering scheme.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call