Towards Green Mobile Edge Computing Offloading Systems with Security Enhancement
Abstract
Mobile edge computing (MEC) is an emerging communication scheme that aims at reducing latency. In this paper, we investigate a green MEC system under the existence of an eavesdropper. We use computation efficiency, which is defined as the total number of bits computed divided by the total energy consumption, as our main metric. To alleviate stringent latency requirement, a joint secure offloading and computation model is proposed. Additionally, we formulate an optimization problem for maximizing computation efficiency, under several practical constraints. The non-convex problem is tackled by successive convex approximation and an iterative algorithm. Simulation results have verified the superiority of our proposed scheme, as well as the effectiveness of our problem solution.
I Introduction
To meet the ever increasing latency requirement over wireless connections, mobile edge computing (MEC) has emerged to be a promising scheme for the next generation wireless system. Compared with cloud computing, MEC utilizes computation resources at the network edge hence transmission to super data center farther away can be largely avoided [1].
One of the main directions for MEC research is to exploit the advantage for data processing, or computation. Specifically, if a user (UE) has a large amount of data to be computed with time budget, it can send part of the data to MEC server and leave another part locally for simultaneous processing. After calculation, the server then sends the computed result back to users. This so-called joint offloading and computing scheme has received extensive attentions recently [2]-[6]. In general, there are two categories in offloading, namely 1) the binary model, which allows the user to either offload all computing bits to server (similar to cloud setting), 2) the joint model, which dynamically partition task into two parts: offloading and local computing. In this paper, we consider the latter case.
Different from existing works that focus on either computation data maximization or energy consumption minimization, our prior work [7] proposed computation efficiency, similar to energy efficiency in wireless communication, is defined as the number of bit computed divided by the total energy consumed. Several subsequent papers have adopted our metric and studied its performance under different scenarios. For example, [8] investigated computation efficiency maximization under wireless-powered MEC systems. It also compared two offloading schemes: joint and binary. An orthogonal frequency division multiple access (OFDMA)-based MEC system with computation efficiency maximization is proposed in [9], aiming for power and channel optimal allocation. Lastly, [10] applied computation efficiency in an unmanned aerial vehicle (UAV)-enabled MEC offloading system, which also seeks for computation efficiency maximization.
On the other hand, wireless offloading will unavoidably suffer from potential malicious activities due to the existence of eavesdropper. From physical layer information-theoretic perspective, achievable data rate with eavesdropper can be modeled as the difference of mutual information from transmitter to receiver and from transmitter to eavesdropper, regardless of security protection mechanisms. It can be considered as the lower bound of the actual data rate. This simplified analysis model has been adopted in various papers [11]-[12].
Our contributions are summarized as follows.
-
1.
We consider a secure offloading model, which allows wireless transmission with the presence of eavesdroppers. We adopt the physical layer security model from information-theoretic perspective and is irrelevant of encryption schemes.
-
2.
Computation efficiency is applied as the main metric, which finds the balance between maximizing computation bits and minimizing total energy consumption.
-
3.
An iterative algorithm together with convex approximation is proposed to tackle a non-convex problem and has good convergence speed and performance.
This paper is organized as follows. Section II describes the secure offloading and computation model. An optimization problem is formulated in Section III, followed by its approximation solution. Numeric results are presented in Section IV. Finally, Section V concludes this paper.
II System Model
We consider a typical MEC system with one server and UEs, the MEC system also mounts a wireless access point (AP) to communicate with other devices. We assume that both the AP and the UEs have a single antenna. There also exists a malicious eavesdropper that tries to intercept confidential information. Denoted as , the eavesdropper only has one antenna. At the beginning of a reference time , each UE has a large number of computation-intensive task to be computed, because of the limited computation resources at UE, due to either device size or power constraints or both, UEs cannot finish their tasks before . For timely processing, we require . Hence, UEs will offload part of their computation bits to the MEC server, where a more powerful processing can be supported. In general, each UE supports the following operation modes.

II-A Secure Offloading
In the presence of , each UE must securely offload part of their task to the MEC server. We assume the channel between each UE and the AP in MEC server follows block static model where it remains the same within the block time () but varies from one block to another. We denote the channel between UE and the AP be , where is the joint effect of large-scale and small-scale fading. Similarly, the channel between each UE and the is .
We consider the active eavesdropper scenario, where the is also a user in the system, its listening and transmitting can be captured by UEs (from authentication, etc). Therefore in this setting, we assume the channel between UE and the can be perfectly estimated, i.e., can be perfectly estimated. Similar setting can also be found in [12].
Let the number of total bits be computed for each UE be , since each UE cannot finish the calculation before the required time slot, it will send to MEC server for joint processing. Specifically, is the number of bits that UEs offloads to the MEC securely. The signal received at the AP and become:
(1) | |||
(2) |
here, is the information-bearing signal for UE , and are the complex Gaussian noise at the AP and , respectively. The secrecy rate, from information-theoretic perspective, is given as
(3) |
where .
For offloading, the energy consumption consists of two parts: transmission and fixed circuit. In particular, , where , a constant, is the power of other circuit except for the transmission unit.
The rest bits will be calculated locally, which will be described below.
II-B Local Computing
Traditionally, users will process all the computation locally. To model such a process, we first define some parameters. First, we assume user ’s CPU needs cycles to finish the computation of a single bit of data. Also, let be the clock speed of the CPU. For simplicity, we assume the clock speed does not change. Each user is allowed to start the local computing from the beginning to the end of the process, thus the total number of computation bits becomes .
II-C Receiving Computed Results
After receiving the computation task from each user, MEC server will start the calculation. When finished, it will send the result back to each user. Here, like [6] [8], we assume this process takes negligible time because of two reasons: 1) MEC server has powerful multi-thread processor, 2) compared with data bits to be computed, result takes way less space, hence downlink transmission is almost instant.
The whole process is illustrated in Fig. 2.

II-D Computation Efficiency in MEC Systems
Like previously mentioned, we define computation efficiency as the total number of calculated bits divided by total energy consumed. Thus, [7], where is the bandwidth for offloading.
III Computation Efficiency Maximization with Active Eavesdropper
We consider a green MEC system where the objective is to maximize the computation efficiency, the optimization problem is formulated as follows.
(4a) | |||||
(4b) | |||||
(4c) | |||||
(4d) | |||||
(4e) | |||||
(4f) |
Our objective is to find the maximum value of the weighted summation for each UE’s computation efficiency, is the weight for UE . The variables to be optimized here is the transmitted time for each UE , the CPU frequency , and the transmitted power for each user . (4b) is the time constraint which requires the whole process ends before time , (4c) combined with (4d) is the requirement for offloading and local computing rate. Furthermore, (4e) is the energy consumption constraint for each UE, where is the maximum allowed energy. Lastly, , , and should be non-negative variables, which is defined in (4f) 111Theoretically, should be an integer value, and (4d) becomes . However, we simplify this and allow to be fractional value, a feasible solution can take the round value if it is fractional, in [2], they also take the same approximation. When is very large as the most real-world cases, the approximation has minimal impact to the original problem..
Clearly, the formulated problem is non-convex, due to its sum-of-ratio objective function and C2, C4, C5, especially the coupling variables and . In the following, we tackle each non-convex term, mainly with successive convex approximation (SCA).
III-A SCA-based Optimization Algorithm
Firstly, we transform (4c) and (4e). Notice that we group these two constraints since they both involve with coupling variables. Let , then . For a function in the form of , it represents the entropy between and , and it is a concave function. Thus, is still non-convex due to the difference of concave and convex functions. For approximation, we apply SCA algorithm. Specifically, the entropy function has first-order Taylor series expansion at
where is the differentiable point. It is easy to verify that given , becomes an affine form, which is convex. In optimization problems, we solve for with given feasible point first, then in the next round, becomes the previous round’s . The process will continue until converges. SCA-based approach works well in the iterative algorithms and received much attention recently.
III-B Objective Function
Next, the objective function needs to be converted to the convex form as well. Currently, it is the summation of the fractional functions (represent each UE’s computation efficiency). Traditional Dinkelbach’s method cannot be applied directly since it can only deal with one fractional function. Instead, following [15], we can generalize Dinkelbach’s algorithm to tackle one fractional function to multiple ones by a simple transformation.
(6a) | |||||
s.t. | (6b) | ||||
(6c) | |||||
(6d) | |||||
(6e) | |||||
(6f) | |||||
(6g) |
Here, we let , and , for notational simplicity. is the auxiliary variable.
(7a) | |||
(7b) | |||
(7c) |
can be solved with the following Lemma.
Lemma III.1
For , if is the optimal solution of , there must exist such that satisfies the Karush-Kuhn-Tucker (KKT) condition of the following problem for and .
(8a) | |||||
s.t. | (8b) |
Furthermore, satisfies the following equations for and :
(9) |
Please refer to [15] for the detailed proof.
Based on the above Lemma, can be solved iteratively. At each iteration, the objective function becomes a convex one with giving and in (8a), then the auxiliary value of and will be updated according to the next section.
III-C Proposed Solution to with given
To summarize, for given , a complete version of is illustrated at the top of next page. Where , , and is replaced for notational simplicity.
It is easy to verify that, for given , and at each iteration, is a convex optimization problem and can be solved by standard method such as interior-point algorithm. The optimized variable, once computed from the optimization problem, will be used to update , and for the input of next iteration. Furthermore, the convergence of this iterative algorithm can be guaranteed by concave-convex procedure (CCCP).
Notice that for SCA algorithm, it is vital to select an appropriate initial value. The initial point used for iterative algorithm should be feasible for the optimization problem. We will discuss more details in the simulation part.
III-D Update
In this part, we give descriptions for updating the auxiliary variables and .
Notice that in Lemma 1, the optimal solution and should also satisfy the following system conditions:
(10) | |||
(11) |
Similarly, according to [15], we define functions for notational brevity. Specifically, let and , . The optimal solution for and can be obtained by solving We can apply iterative method to update the auxiliary variables. Specifically,
(12) | |||||
(13) |
where is the largest that satisfies , is the Jacobian matrix of , , , and . This update is also available in our prior paper [7]. To summarize, we list the detailed algorithm in Algorithm 1.
IV Numeric Evaluation
In this section, simulation results from our proposed scheme and algorithm are presented. Parameters for the simulation are given as follows. We assume the bandwidth for the system is KHz, number of users , time threshold s. For local computation, the CPU need operations to process one bit of data. In addition, the scaling factor for energy consumption , CPU for each user has a maximum frequency Hz. For offloading, we assume the channel from user to the server to be , where is the normal Gaussian variable. Similarly, . The value of and will be given later. We apply no bias to both users hence set . Lastly, the maximum allowed energy consumption is Joule.
In Fig. 3, we show the convergence performance of our iterative algorithm. Here, we set , , and . As a typical case, we only present the result for optimal time allocation here. It can be seen that our iterative algorithm has a good convergence speed, it only takes around 6 iterations to achieve the optimal value. In fact, we test with different initial points and manage to get the same performance. The other observation from Fig. 3 is that, when the required computation bits becomes larger, the transmission time is also longer. Intuitively, this explains that more offloading bits are required.
In Fig. 4, the computation efficiency under different Eves channels are presented. The x-axis is the number of required total computation bits. The first observation is that, under all scenarios, computation efficiency decreases with the increasing data size. If we break down the two parts for computation efficiency, we can easily see that pure local computing efficiency is square proportionally decreasing with the increasing of data size. Also, if the bit size is large, offloading part is also decreasing, due to, in part of the circuit power in the denominator.
Additionally, Fig. 4 also shows the relationship between computation efficiency with security threads from Eve. Specifically, we set channels from Eve to users to be different. If the channel of Eve is stronger, we see a setback in the performance, this is due to the impact from offloading, where achievable data rate is smaller.
Lastly, we compare our proposed joint offloading and local computation scheme with other two schemes: local computing only and offloading only. Here, we set . Clearly the proposed scheme outperforms both other two in terms of computation efficiency, which verifies the superiority of our scheme. Similar efficiency decreasing is also observed.
V Conclusions and Future Directions
In this work, we studied the computation efficiency for a joint offloading and local computing scheme under possible . We model the effect from with physical layer security and mutual entropy. An optimization problem is formulated which considers some practical constraints. This non-convex problem is transformed with SCA and a general ratio iterative algorithm. In the future, we plan to generalize the paper with multiple-antenna user/server and other access techniques.
References
- [1] H. Sun, Z. Zhang, R. Q. Hu, and Y. Qian, “Wearable communications in 5G: challenges and enabling technologies”, IEEE Veh. Technol. Mag., vol. 13, no. 3, Sept. 2018.
- [2] S. Bi and Y. Zhang, “Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading”, [Online]. Available: https://arxiv.org/pdf/1708.08810.pdf
- [3] Y. Mao, J. Zhang and K. B. Letaief, “Dynamic computation offloading for mobile-edge computing with energy harvesting devices,” IEEE J. Sel. Areas Commun., vol. 34, no. 12, pp. 3590-3605, Dec. 2016.
- [4] F. Wang, J. Xu, X. Wang and S. Cui, “Joint offloading and computing optimization in wireless powered mobile-edge computing systems,” submitted to IEEE Trans. Wireless Commun., https://arxiv.org/abs/1702.00606.
- [5] X. Cao, F. Wang, J. Xu, R. Zhang and S. Cui, “Joint computation and communication cooperation for mobile edge computing.” [Online]. Available: https://arxiv.org/pdf/1704.06777.pdf
- [6] L. Yang, H. Zhang, M. Li, J. Guo and H. Ji, “Mobile edge computing empowered energy efficient task offloading in 5G,” accepted by IEEE Trans. Veh. Technol., 2018
- [7] H. Sun, F. Zhou, R. Q. Hu, “Joint offloading and computation energy efficiency maximization in a mobile edge computing system”, IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 3052-3056, Mar. 2019.
- [8] F. Zhou and R. Q. Hu, “Computation efficiency maximization in wireless-powered mobile edge computing networks”, accepted, IEEE Trans. Wireless Commun, 2020.
- [9] Y. Wu, Y. Wang, F. Zhou, and R. Q. Hu, “Computation efficiency maximization in OFDMA-based mobile edge computing networks”, IEEE Commun. Lett., vol. 24, no. 1, Jan. 2020.
- [10] X. Zhang, Y. Zhong, P. Liu, F. Zhou, and Y. Wang, “Resource allocation for a UAV-enabled mobile- edge computing system: computation efficiency maximization”, IEEE Access, vol. 7, Aug. 2019.
- [11] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. H. Chen, “A survey on multiple-antenna techniques for physical layer security,” IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 1027-1053, Second Quarter, 2017
- [12] Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, “Secure massive MIMO transmission in the presence of an active eavesdropper,” in Proc. IEEE ICC 2015, London, UK, 2015.
- [13] Q. Wu, W. Chen, D. W. Kwan Ng, J. Li and R. Schober, “User-centric energy efficiency maximization for wireless powered communications,” IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6898-6912, Oct. 2016.
- [14] Y. Wang, M. Sheng, X. Wang, L. Wang and J. Li, “Mobile-edge computing: partial computation offloading using dynamic voltage scaling,” IEEE Trans. Commun., vol. 64, no. 10, pp. 4268-4282, Oct. 2016.
- [15] Y. Jong, “An efficient global optimization algorithm for nonlinear sum-of-ratios problem,” May 2012. [Online]. Available: http://www.optimization-online.org/DBFILE/2012/08/3586.pdf