This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Towards Green Mobile Edge Computing Offloading Systems with Security Enhancement

Haijian Sun, Member, IEEE, Qun Wang, Student Member, IEEE, Xiang Ma, Student Member, IEEE
Yongjun Xu, Member, IEEE, and Rose Qingyang Hu, Fellow, IEEE
H. Sun is with the Department of Computer Science, University of Wisconsin-Whitewater, Whitewater, WI, USA. Q. Wang, X. Ma, and R. Q. Hu is with Electrical and Computer Engineering Department, Utah State University, Logan, UT, USA. Y. Xu is with with the School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China. Y. Xu is also with the Shandong Provincial Key Lab of Wireless Communication Technologies, Shandong University, Jinan 250100, China.
Abstract

Mobile edge computing (MEC) is an emerging communication scheme that aims at reducing latency. In this paper, we investigate a green MEC system under the existence of an eavesdropper. We use computation efficiency, which is defined as the total number of bits computed divided by the total energy consumption, as our main metric. To alleviate stringent latency requirement, a joint secure offloading and computation model is proposed. Additionally, we formulate an optimization problem for maximizing computation efficiency, under several practical constraints. The non-convex problem is tackled by successive convex approximation and an iterative algorithm. Simulation results have verified the superiority of our proposed scheme, as well as the effectiveness of our problem solution.

I Introduction

To meet the ever increasing latency requirement over wireless connections, mobile edge computing (MEC) has emerged to be a promising scheme for the next generation wireless system. Compared with cloud computing, MEC utilizes computation resources at the network edge hence transmission to super data center farther away can be largely avoided [1].

One of the main directions for MEC research is to exploit the advantage for data processing, or computation. Specifically, if a user (UE) has a large amount of data to be computed with time budget, it can send part of the data to MEC server and leave another part locally for simultaneous processing. After calculation, the server then sends the computed result back to users. This so-called joint offloading and computing scheme has received extensive attentions recently [2]-[6]. In general, there are two categories in offloading, namely 1) the binary model, which allows the user to either offload all computing bits to server (similar to cloud setting), 2) the joint model, which dynamically partition task into two parts: offloading and local computing. In this paper, we consider the latter case.

Different from existing works that focus on either computation data maximization or energy consumption minimization, our prior work [7] proposed computation efficiency, similar to energy efficiency in wireless communication, is defined as the number of bit computed divided by the total energy consumed. Several subsequent papers have adopted our metric and studied its performance under different scenarios. For example, [8] investigated computation efficiency maximization under wireless-powered MEC systems. It also compared two offloading schemes: joint and binary. An orthogonal frequency division multiple access (OFDMA)-based MEC system with computation efficiency maximization is proposed in [9], aiming for power and channel optimal allocation. Lastly, [10] applied computation efficiency in an unmanned aerial vehicle (UAV)-enabled MEC offloading system, which also seeks for computation efficiency maximization.

On the other hand, wireless offloading will unavoidably suffer from potential malicious activities due to the existence of eavesdropper. From physical layer information-theoretic perspective, achievable data rate with eavesdropper can be modeled as the difference of mutual information from transmitter to receiver and from transmitter to eavesdropper, regardless of security protection mechanisms. It can be considered as the lower bound of the actual data rate. This simplified analysis model has been adopted in various papers [11]-[12].

Our contributions are summarized as follows.

  1. 1.

    We consider a secure offloading model, which allows wireless transmission with the presence of eavesdroppers. We adopt the physical layer security model from information-theoretic perspective and is irrelevant of encryption schemes.

  2. 2.

    Computation efficiency is applied as the main metric, which finds the balance between maximizing computation bits and minimizing total energy consumption.

  3. 3.

    An iterative algorithm together with convex approximation is proposed to tackle a non-convex problem and has good convergence speed and performance.

This paper is organized as follows. Section II describes the secure offloading and computation model. An optimization problem is formulated in Section III, followed by its approximation solution. Numeric results are presented in Section IV. Finally, Section V concludes this paper.

II System Model

We consider a typical MEC system with one server and KK UEs, the MEC system also mounts a wireless access point (AP) to communicate with other devices. We assume that both the AP and the UEs have a single antenna. There also exists a malicious eavesdropper that tries to intercept confidential information. Denoted as EveEve, the eavesdropper only has one antenna. At the beginning of a reference time tst_{s}, each UE has a large number of computation-intensive task to be computed, because of the limited computation resources at UE, due to either device size or power constraints or both, UEs cannot finish their tasks before tet_{e}. For timely processing, we require tetsTt_{e}-t_{s}\leq T. Hence, UEs will offload part of their computation bits to the MEC server, where a more powerful processing can be supported. In general, each UE supports the following operation modes.

Refer to caption
Figure 1: Secure MEC partial offloading model

II-A Secure Offloading

In the presence of EveEve, each UE must securely offload part of their task to the MEC server. We assume the channel between each UE and the AP in MEC server follows block static model where it remains the same within the block time T1T_{1} (T1TT_{1}\geq T) but varies from one block to another. We denote the channel between UE kk and the AP be hkh_{k}, where hk=lkh0h_{k}=l_{k}h_{0} is the joint effect of large-scale lkl_{k} and small-scale h0h_{0} fading. Similarly, the channel between each UE and the EveEve is gkg_{k}.

We consider the active eavesdropper scenario, where the EveEve is also a user in the system, its listening and transmitting can be captured by UEs (from authentication, etc). Therefore in this setting, we assume the channel between UE kk and the EveEve can be perfectly estimated, i.e., gkg_{k} can be perfectly estimated. Similar setting can also be found in [12].

Let the number of total bits be computed for each UE be LkL_{k}, since each UE cannot finish the calculation before the required time slot, it will send to MEC server for joint processing. Specifically, mkm_{k} is the number of bits that UEs offloads to the MEC securely. The signal received at the AP and EveEve become:

yk=hkHsk+nk,k=1,,K,\displaystyle y_{k}=h_{k}^{H}s_{k}+n_{k},\forall k=1,\ldots,K, (1)
yek=gkHsk+nek,k=1,,K,\displaystyle y_{e}^{k}=g_{k}^{H}s_{k}+n_{e}^{k},\forall k=1,\ldots,K, (2)

here, sks_{k}\in\mathbb{C} is the information-bearing signal for UE kk, nk𝒞𝒩(0,σk2)n_{k}\in\mathcal{CN}(0,\sigma_{k}^{2}) and nek𝒞𝒩(0,σek2){n}_{e}^{k}\in\mathcal{CN}(0,\sigma_{ek}^{2}) are the complex Gaussian noise at the AP and EveEve, respectively. The secrecy rate, from information-theoretic perspective, is given as

Rk,asec=[log(1+pkhk2σk2)log(1+pkgk2σek2)]+,R_{k,a}^{\text{sec}}=\big{[}\log(1+\frac{p_{k}h_{k}^{2}}{\sigma_{k}^{2}})-\log\big{(}1+\frac{p_{k}g_{k}^{2}}{\sigma_{ek}^{2}}\big{)}\big{]}^{+}, (3)

where [a]+=max(a,0)[a]^{+}=\max(a,0).

For offloading, the energy consumption consists of two parts: transmission and fixed circuit. In particular, Ekoff=pktk+prtkE_{k}^{\text{off}}=p_{k}t_{k}+p_{r}t_{k}, where prp_{r}, a constant, is the power of other circuit except for the transmission unit.

The rest LkmkL_{k}-m_{k} bits will be calculated locally, which will be described below.

II-B Local Computing

Traditionally, users will process all the computation locally. To model such a process, we first define some parameters. First, we assume user kk’s CPU needs CkC_{k} cycles to finish the computation of a single bit of data. Also, let fkf_{k} be the clock speed of the CPU. For simplicity, we assume the clock speed does not change. Each user is allowed to start the local computing from the beginning to the end of the process, thus the total number of computation bits becomes Tfk/CkTf_{k}/C_{k}.

Energy consumption for local computing can be modeled as Ekcomp=ϵkfk3TE_{k}^{\text{comp}}=\epsilon_{k}f_{k}^{3}T, where ϵk\epsilon_{k} is the CPU energy coefficient [13], [14].

II-C Receiving Computed Results

After receiving the computation task from each user, MEC server will start the calculation. When finished, it will send the result back to each user. Here, like [6] [8], we assume this process takes negligible time because of two reasons: 1) MEC server has powerful multi-thread processor, 2) compared with data bits to be computed, result takes way less space, hence downlink transmission is almost instant.

The whole process is illustrated in Fig. 2.

Refer to caption
Figure 2: Time sharing offloading scheduling

II-D Computation Efficiency in MEC Systems

Like previously mentioned, we define computation efficiency as the total number of calculated bits divided by total energy consumed. Thus, CEk=BRk,asectk+TfkCkpktk+prtk+ϵkfk3TCE_{k}=\frac{BR_{k,a}^{\text{sec}}t_{k}+\frac{Tf_{k}}{C_{k}}}{p_{k}t_{k}+p_{r}t_{k}+\epsilon_{k}f_{k}^{3}T} [7], where BB is the bandwidth for offloading.

III Computation Efficiency Maximization with Active Eavesdropper

We consider a green MEC system where the objective is to maximize the computation efficiency, the optimization problem is formulated as follows.

𝐏1\displaystyle\mathbf{P}_{1} max{tk},{fk},{mk},{pk}kwkBRk,asectk+TfkCkϵkfk3T+pktk+prtk\displaystyle\kern-10.00002pt\kern-10.00002pt\kern-10.00002pt\max_{\begin{subarray}{c}\{t_{k}\},\{f_{k}\},\\ \{m_{k}\},\{p_{k}\}\end{subarray}}\ \sum_{k}w_{k}\frac{BR_{k,a}^{\text{sec}}t_{k}+\frac{Tf_{k}}{C_{k}}}{\epsilon_{k}f_{k}^{3}T+p_{k}t_{k}+p_{r}t_{k}} (4a)
s.t.C1\displaystyle\text{s.t.}\ C1 :\displaystyle: ktkT,\displaystyle\sum_{k}t_{k}\leq T, (4b)
C2\displaystyle C2 :\displaystyle: BRk,asectkmk,k,\displaystyle BR_{k,a}^{\text{sec}}t_{k}\geq m_{k},\forall k, (4c)
C3\displaystyle C3 :\displaystyle: LkTfkmaxCkmkLk,k,\displaystyle L_{k}-\frac{Tf_{k}^{\text{max}}}{C_{k}}\leq m_{k}\leq L_{k},\forall k, (4d)
C4\displaystyle C4 :\displaystyle: ϵkfk3T+pktk+prtkEkth,k,\displaystyle\epsilon_{k}f_{k}^{3}T+p_{k}t_{k}+p_{r}t_{k}\leq E_{k}^{th},\forall k, (4e)
C6\displaystyle C6 :\displaystyle: 0fkfkmax,tk0,pk0k\displaystyle 0\leq f_{k}\leq f_{k}^{\text{max}},t_{k}\geq 0,p_{k}\geq 0\ \forall k (4f)

Our objective is to find the maximum value of the weighted summation for each UE’s computation efficiency, wkw_{k} is the weight for UE kk. The variables to be optimized here is the transmitted time for each UE tkt_{k}, the CPU frequency fkf_{k}, and the transmitted power for each user pkp_{k}. (4b) is the time constraint which requires the whole process ends before time TT, (4c) combined with (4d) is the requirement for offloading and local computing rate. Furthermore, (4e) is the energy consumption constraint for each UE, where EkthE_{k}^{th} is the maximum allowed energy. Lastly, fkf_{k}, tkt_{k}, and pkp_{k} should be non-negative variables, which is defined in (4f) 111Theoretically, mkm_{k} should be an integer value, and (4d) becomes mk{LkTfkmaxCk,LkTfkmaxCk+1,,Lk}m_{k}\in\{L_{k}-\frac{Tf_{k}^{\text{max}}}{C_{k}},L_{k}-\frac{Tf_{k}^{\text{max}}}{C_{k}}+1,\ldots,L_{k}\}. However, we simplify this and allow mkm_{k} to be fractional value, a feasible solution can take the round value if it is fractional, in [2], they also take the same approximation. When LkL_{k} is very large as the most real-world cases, the approximation has minimal impact to the original problem..

Clearly, the formulated problem is non-convex, due to its sum-of-ratio objective function and C2, C4, C5, especially the coupling variables pkp_{k} and tkt_{k}. In the following, we tackle each non-convex term, mainly with successive convex approximation (SCA).

III-A SCA-based Optimization Algorithm

Firstly, we transform (4c) and (4e). Notice that we group these two constraints since they both involve with coupling variables. Let p~k=pktk\tilde{p}_{k}={p}_{k}t_{k}, then Rk,asectk=tklog(1+1σk2p~khk2/tk)tklog(1+1σek2p~kgk2/tk){R}_{k,a}^{\text{sec}}t_{k}=t_{k}\log\big{(}1+\frac{1}{\sigma_{k}^{2}}\tilde{p}_{k}h_{k}^{2}/t_{k}\big{)}-t_{k}\log\big{(}1+\frac{1}{\sigma_{ek}^{2}}\tilde{p}_{k}g_{k}^{2}/t_{k}\big{)}. For a function in the form of f(x,y)=ylog(1+xy)f(x,y)=y\log(1+\frac{x}{y}), it represents the entropy between xx and yy, and it is a concave function. Thus, Rk,asec{R}_{k,a}^{\text{sec}} is still non-convex due to the difference of concave and convex functions. For approximation, we apply SCA algorithm. Specifically, the entropy function has first-order Taylor series expansion at (x,y)=(x0,y0)(x,y)=(x_{0},y_{0})

f(x,y)=y0log(1+x0y0)+[log(1+x0y0)x0x0+y0](yy0)\displaystyle f(x,y)=y_{0}\log(1+\frac{x_{0}}{y_{0}})+[\log(1+\frac{x_{0}}{y_{0}})-\frac{x_{0}}{x_{0}+y_{0}}](y-y_{0})
+y0x0+y0(xx0),\displaystyle+\frac{y_{0}}{x_{0}+y_{0}}(x-x_{0}),

where (x0,y0)(x_{0},y_{0}) is the differentiable point. It is easy to verify that given (x0,y0)(x_{0},y_{0}), f(x,y)f(x,y) becomes an affine form, which is convex. In optimization problems, we solve for (x,y)(x,y) with given feasible point (x0,y0)(x_{0},y_{0}) first, then in the next round, (x0,y0)(x_{0},y_{0}) becomes the previous round’s (x,y)(x,y). The process will continue until converges. SCA-based approach works well in the iterative algorithms and received much attention recently.

In the following, to simplify notations, we first transform (4d) to equation sets below:

τk1σek2p~kgk2,\displaystyle\tau_{k}\geq\frac{1}{\sigma_{ek}^{2}}{\tilde{p}_{k}g_{k}^{2}}, (5a)
tklog(1+Nktk)tklog(1+τktk)mkB,\displaystyle t_{k}\log\big{(}1+\frac{N_{k}}{t_{k}}\big{)}-t_{k}\log\big{(}1+\frac{\tau_{k}}{t_{k}}\big{)}\geq\frac{m_{k}}{B}, (5b)
Nk1σk2p~khk2,\displaystyle N_{k}\leq\frac{1}{\sigma_{k}^{2}}\tilde{p}_{k}h_{k}^{2}, (5c)

where τk\tau_{k} and NkN_{k} are auxiliary variables. It is easy to verify that the transformation is equivalent. Furthermore, (5b) should be transformed according to f(τk,tk)f(\tau_{k},t_{k}) and f(Nk,tk)f(N_{k},t_{k}) that mentioned above.

III-B Objective Function

Next, the objective function needs to be converted to the convex form as well. Currently, it is the summation of the fractional functions (represent each UE’s computation efficiency). Traditional Dinkelbach’s method cannot be applied directly since it can only deal with one fractional function. Instead, following [15], we can generalize Dinkelbach’s algorithm to tackle one fractional function to multiple ones by a simple transformation.

𝐏3\displaystyle\mathbf{P}_{3} max{tk},{fk},{mk},{p~k},{βk},{τk},{Nk}kwkβk\displaystyle\kern-10.00002pt\kern-10.00002pt\kern-10.00002pt\max_{\{t_{k}\},\{f_{k}\},\{m_{k}\},\{\tilde{p}_{k}\},\{\beta_{k}\},\{\tau_{k}\},\{N_{k}\}}\ \sum_{k}w_{k}\beta_{k} (6a)
s.t. C1:RkβkEk,k,\displaystyle C1:R_{k}\geq\beta_{k}E_{k},\forall k, (6b)
C2\displaystyle C2 :\displaystyle: ktkT,\displaystyle\sum_{k}t_{k}\leq T, (6c)
C3\displaystyle C3 :\displaystyle: LkTfkmaxCkmkLk,k,\displaystyle L_{k}-\frac{Tf_{k}^{\text{max}}}{C_{k}}\leq m_{k}\leq L_{k},\forall k, (6d)
C4\displaystyle C4 :\displaystyle: ϵkfk3T+p~k+prtkEkth,k,\displaystyle\epsilon_{k}f_{k}^{3}T+\tilde{p}_{k}+p_{r}t_{k}\leq E_{k}^{th},\forall k, (6e)
C5\displaystyle C5 :\displaystyle: 0fkfkmax,tk0,p~k0k,\displaystyle 0\leq f_{k}\leq f_{k}^{\text{max}},t_{k}\geq 0,\tilde{p}_{k}\geq 0\ \forall k, (6f)
C6\displaystyle C6 :\displaystyle: (5a)(5c).\displaystyle(\ref{transC21})-(\ref{transC23}). (6g)

Here, we let Rk=BRksectk+TfkCkR_{k}=BR_{k}^{\text{sec}}t_{k}+\frac{Tf_{k}}{C_{k}}, and Ek=ϵkfk3T+p~k+prtkE_{k}={\epsilon_{k}f_{k}^{3}T+\tilde{p}_{k}+p_{r}t_{k}}, for notational simplicity. βk\beta_{k} is the auxiliary variable.

max{tk},{fk},{mk},{p~k},{τk},{Nk}kλkwkB{(vk(i)θk(i))(tktk(i))+tk(i)tk(i)+Nk(i)(NkNk(i))tk(i)tk(i)+τk(i)(τkτk(i))}+kλkwkTfkCk\displaystyle\kern-10.00002pt\kern-10.00002pt\kern-10.00002pt\kern-10.00002pt\kern-10.00002pt\max_{\begin{subarray}{c}\{t_{k}\},\{f_{k}\},\{m_{k}\},\\ \{\tilde{p}_{k}\},\{\tau_{k}\},\{N_{k}\}\end{subarray}}\sum_{k}\lambda_{k}w_{k}B\bigg{\{}(v_{k}^{(i)}-\theta_{k}^{(i)})(t_{k}-t_{k}^{(i)})+\frac{t_{k}^{(i)}}{t_{k}^{(i)}+N_{k}^{(i)}}(N_{k}-N_{k}^{(i)})-\frac{t_{k}^{(i)}}{t_{k}^{(i)}+\tau_{k}^{(i)}}(\tau_{k}-\tau_{k}^{(i)})\bigg{\}}+\sum_{k}\frac{\lambda_{k}w_{k}Tf_{k}}{C_{k}} (7a)
kλkβk(ϵkfk3T+p~k+prtk)\displaystyle-\sum_{k}\lambda_{k}\beta_{k}\big{(}\epsilon_{k}f_{k}^{3}T+\tilde{p}_{k}+p_{r}t_{k}\big{)}
s.t.B{(vk(i)θk(i))(tktk(i))+tk(i)tk(i)+Nk(i)(NkNk(i))tk(i)tk(i)+τk(i)(τkτk(i))+φk(i)}+TfkCkLk,\displaystyle\text{s.t.}\ B\bigg{\{}(v_{k}^{(i)}-\theta_{k}^{(i)})(t_{k}-t_{k}^{(i)})+\frac{t_{k}^{(i)}}{t_{k}^{(i)}+N_{k}^{(i)}}(N_{k}-N_{k}^{(i)})-\frac{t_{k}^{(i)}}{t_{k}^{(i)}+\tau_{k}^{(i)}}(\tau_{k}-\tau_{k}^{(i)})+\varphi_{k}^{(i)}\bigg{\}}+\frac{Tf_{k}}{C_{k}}\geq L_{k}, (7b)
(6c),(6e),(6f),(5a),(5c)\displaystyle(\ref{p3c1}),(\ref{p3c4}),(\ref{p3c6}),(\ref{transC21}),(\ref{transC23}) (7c)

𝐏3\mathbf{P}_{3} can be solved with the following Lemma.

Lemma III.1

For k\forall k, if ({tk},{fk},{mk},{p~k},{βk},{τk},{Nk})(\{t_{k}^{*}\},\{f_{k}^{*}\},\{m_{k}^{*}\},\{\tilde{p}_{k}^{*}\},\{\beta_{k}^{*}\},\{\tau_{k}^{*}\},\{N_{k}^{*}\}) is the optimal solution of 𝐏3\mathbf{P}_{3}, there must exist {λk}\{\lambda_{k}^{*}\} such that ({tk},{fk},{mk},{p~k},{τk},{Nk})(\{t_{k}^{*}\},\{f_{k}^{*}\},\{m_{k}^{*}\},\{\tilde{p}_{k}^{*}\},\{\tau_{k}^{*}\},\{N_{k}^{*}\}) satisfies the Karush-Kuhn-Tucker (KKT) condition of the following problem for λk=λk\lambda_{k}=\lambda_{k}^{*} and βk=βk\beta_{k}=\beta_{k}^{*}.

𝐏4:\displaystyle\mathbf{P}_{4}: max{tk},{fk},{Pk}kλk(wkRkβkEk)\displaystyle\max_{\{t_{k}\},\{f_{k}\},\{P_{k}\}}\sum_{k}\lambda_{k}(w_{k}R_{k}-\beta_{k}E_{k}) (8a)
s.t. (6c)(6g).\displaystyle(\ref{p3c1})-(\ref{p3c7}). (8b)

Furthermore, ({tk},{fk},{mk},{p~k},{τk},{Nk})(\{t_{k}^{*}\},\{f_{k}^{*}\},\{m_{k}^{*}\},\{\tilde{p}_{k}^{*}\},\{\tau_{k}^{*}\},\{N_{k}^{*}\}) satisfies the following equations for λk=λk\lambda_{k}=\lambda_{k}^{\star} and βk=βk\beta_{k}=\beta_{k}^{\star}:

λk=wkEk,βk=wkRkEk,k.\lambda_{k}=\frac{w_{k}}{E_{k}},\ \beta_{k}=\frac{w_{k}R_{k}}{E_{k}},\forall k. (9)

Please refer to [15] for the detailed proof.

Based on the above Lemma, 𝐏3\mathbf{P}_{3} can be solved iteratively. At each iteration, the objective function becomes a convex one with giving λk\lambda_{k} and βk\beta_{k} in (8a), then the auxiliary value of λk\lambda_{k} and βk\beta_{k} will be updated according to the next section.

III-C Proposed Solution to 𝐏4\mathbf{P}_{4} with given (λk,βk)(\lambda_{k},\beta_{k})

To summarize, for given (λk,βk)(\lambda_{k},\beta_{k}), a complete version of 𝐏4\mathbf{P}_{4} is illustrated at the top of next page. Where θk(i)=[log(1+τk(i)tk(i))τk(i)τk(i)+tk(i)]\theta_{k}^{(i)}=[\log(1+\frac{\tau_{k}^{(i)}}{t_{k}^{(i)}})-\frac{\tau_{k}^{(i)}}{\tau_{k}^{(i)}+t_{k}^{(i)}}], vk(i)=[log(1+Nk(i)tk(i))Nk(i)Nk(i)+tk(i)]v_{k}^{(i)}=[\log(1+\frac{N_{k}^{(i)}}{t_{k}^{(i)}})-\frac{N_{k}^{(i)}}{N_{k}^{(i)}+t_{k}^{(i)}}], and φk(i)=tk(i)log(1+Nk(i)/tk(i))tk(i)log(1+τk(i)/tk(i))\varphi_{k}^{(i)}=t_{k}^{(i)}\log(1+N_{k}^{(i)}/t_{k}^{(i)})-t_{k}^{(i)}\log(1+\tau_{k}^{(i)}/t_{k}^{(i)}) is replaced for notational simplicity.

It is easy to verify that, for given vk(i),θk(i),tk(i),Nk(i)v_{k}^{(i)},\theta_{k}^{(i)},t_{k}^{(i)},N_{k}^{(i)}, and τk(i)\tau_{k}^{(i)} at each iteration, 𝐏4\mathbf{P}_{4} is a convex optimization problem and can be solved by standard method such as interior-point algorithm. The optimized variable, once computed from the optimization problem, will be used to update vk(i),θk(i),tk(i),Nk(i)v_{k}^{(i)},\theta_{k}^{(i)},t_{k}^{(i)},N_{k}^{(i)}, and τk(i)\tau_{k}^{(i)} for the input of next iteration. Furthermore, the convergence of this iterative algorithm can be guaranteed by concave-convex procedure (CCCP).

Notice that for SCA algorithm, it is vital to select an appropriate initial value. The initial point used for iterative algorithm should be feasible for the optimization problem. We will discuss more details in the simulation part.

III-D Update (λk,βk)(\lambda_{k},\beta_{k})

In this part, we give descriptions for updating the auxiliary variables λk\lambda_{k} and βk\beta_{k}.

Notice that in Lemma 1, the optimal solution p~k,tk,\tilde{p}_{k}^{*},t_{k}^{*}, and fkf_{k}^{*} should also satisfy the following system conditions:

βkEk(p~k,tk,fk)wkRk(p~k,tk,fk)=0,\displaystyle\beta_{k}E_{k}(\tilde{p}_{k}^{*},t_{k}^{*},f_{k}^{*})-w_{k}R_{k}(\tilde{p}_{k}^{*},t_{k}^{*},f_{k}^{*})=0, (10)
λkEk(p~k,tk,fk)wk=0.\displaystyle\lambda_{k}E_{k}(\tilde{p}_{k}^{*},t_{k}^{*},f_{k}^{*})-w_{k}=0. (11)

Similarly, according to [15], we define functions for notational brevity. Specifically, let Tj(βj)=βjEkwkRkT_{j}(\beta_{j})=\beta_{j}E_{k}-w_{k}R_{k} and Tj+K(λj)=λjEk1T_{j+K}(\lambda_{j})=\lambda_{j}E_{k}-1, j{1,2,,K}j\in\{1,2,\ldots,K\}. The optimal solution for λk\lambda_{k} and βk\beta_{k} can be obtained by solving 𝐓(λk,βk)=[T1,T2,,T2K]=𝟎.\mathbf{T}(\lambda_{k},\beta_{k})=[T_{1},T_{2},\ldots,T_{2K}]=\mathbf{0}. We can apply iterative method to update the auxiliary variables. Specifically,

λk(i+1)\displaystyle\lambda_{k}(i+1)\kern-10.00002pt =\displaystyle= (1θ(i))λk(i)+θ(i)Ek(p~k,tk,fk),\displaystyle\kern-10.00002pt(1-\theta(i))\lambda_{k}(i)+\frac{\theta(i)}{E_{k}(\tilde{p}_{k}^{*},t_{k}^{*},f_{k}^{*})}, (12)
βk(i+1)\displaystyle\beta_{k}(i+1)\kern-10.00002pt =\displaystyle= (1θ(i))βk(i)+θ(i)wkRk(p~k,tk,fk)Ek(p~k,tk,fk),\displaystyle\kern-10.00002pt(1-\theta(i))\beta_{k}(i)+\theta(i)\frac{w_{k}R_{k}(\tilde{p}_{k}^{*},t_{k}^{*},f_{k}^{*})}{E_{k}(\tilde{p}_{k}^{*},t_{k}^{*},f_{k}^{*})}, (13)

where θ(i)\theta(i) is the largest θ\theta that satisfies ||𝐓(λk(i)+θl𝐪K+1:2Ki,βk(i)+θl𝐪1:Ki)||(1zθl)||T(λk(i),βk(i)||||\mathbf{T}(\lambda_{k}(i)+\theta^{l}\mathbf{q}_{K+1:2K}^{i},\beta_{k}(i)+\theta^{l}\mathbf{q}_{1:K}^{i})||\leq(1-z\theta^{l})||T(\lambda_{k}(i),\beta_{k}(i)||, 𝐪\mathbf{q} is the Jacobian matrix of 𝐓\mathbf{T}, l{1,2,}l\in\{1,2,\ldots\}, θl(0,1)\theta_{l}\in(0,1), and z(0,1)z\in(0,1). This update is also available in our prior paper [7]. To summarize, we list the detailed algorithm in Algorithm 1.

Algorithm 1 Secure Computation Efficiency Maximization Algorithm
1:Initialization: the algorithm accuracy indicator u1u_{1} and u2u_{2}, set i=0i=0, give initial values for vk(i),θk(i),tk(i),Nk(i)v_{k}^{(i)},\theta_{k}^{(i)},t_{k}^{(i)},N_{k}^{(i)}, τk(i)\tau_{k}^{(i)}, λk(i)\lambda_{k}^{(i)} and βk(i)\beta_{k}^{(i)}.
2:while 𝐓(λk,βk)>u1||\mathbf{T}(\lambda_{k},\beta_{k})||>u_{1} do
3:   while |αk(j+1)αk(j)|>u2|\alpha_{k}(j+1)-\alpha_{k}(j)|>u_{2} do
4:      Solve for problem 𝐏4\mathbf{P}_{4}, obtain the intermediate optimal values {tk},{fk},{mk},{p~k},{τk},\{t_{k}\},\{f_{k}\},\{m_{k}\},\{\tilde{p}_{k}\},\{\tau_{k}\}, and {Nk}\{N_{k}\}.
5:      Let j=j+1j=j+1.
6:   end while
7:   Let i=i+1i=i+1, update auxiliary variables λk(i+1)\lambda_{k}(i+1) and βk(i+1)\beta_{k}(i+1) from (12) and (13).
8:end while
9:Output the optimal computation efficiency.

IV Numeric Evaluation

In this section, simulation results from our proposed scheme and algorithm are presented. Parameters for the simulation are given as follows. We assume the bandwidth for the system is B=200B=200 KHz, number of users K=2K=2, time threshold T=1T=1 s. For local computation, the CPU need Ck=1000C_{k}=1000 operations to process one bit of data. In addition, the scaling factor for energy consumption ϵk=1×1024\epsilon_{k}=1\times 10^{-24}, CPU for each user has a maximum frequency fkmax=1×109f_{k}^{\text{max}}=1\times 10^{9} Hz. For offloading, we assume the channel from user to the server to be hk2/σ2=Hkh0h_{k}^{2}/\sigma^{2}=H_{k}h_{0}, where h0h_{0} is the normal Gaussian variable. Similarly, gk2/σ2=Gkh0g_{k}^{2}/\sigma^{2}=G_{k}h_{0}. The value of HkH_{k} and GkG_{k} will be given later. We apply no bias to both users hence set w1=w2=1w_{1}=w_{2}=1. Lastly, the maximum allowed energy consumption is Ek=1E_{k}=1 Joule.

In Fig. 3, we show the convergence performance of our iterative algorithm. Here, we set H1=7,H2=5H_{1}=7,H_{2}=5, G1=G2=1G_{1}=G_{2}=1, and L1=L2={50000,60000}L_{1}=L_{2}=\{50000,60000\}. As a typical case, we only present the result for optimal time allocation tkt_{k} here. It can be seen that our iterative algorithm has a good convergence speed, it only takes around 6 iterations to achieve the optimal value. In fact, we test with different initial points and manage to get the same performance. The other observation from Fig. 3 is that, when the required computation bits becomes larger, the transmission time is also longer. Intuitively, this explains that more offloading bits are required.

Refer to caption
Figure 3: Iterative Algorithm Convergence Analysis

In Fig. 4, the computation efficiency under different Eves channels are presented. The x-axis is the number of required total computation bits. The first observation is that, under all scenarios, computation efficiency decreases with the increasing data size. If we break down the two parts for computation efficiency, we can easily see that pure local computing efficiency is square proportionally decreasing with the increasing of data size. Also, if the bit size is large, offloading part is also decreasing, due to, in part of the circuit power in the denominator.

Additionally, Fig. 4 also shows the relationship between computation efficiency with security threads from Eve. Specifically, we set channels from Eve to users to be different. If the channel of Eve is stronger, we see a setback in the performance, this is due to the impact from offloading, where achievable data rate is smaller.

Refer to caption
Figure 4: Computation Efficiency v.s. Required Computation Bits under Different Eve Channels
Refer to caption
Figure 5: Computation Efficiency v.s. Required Computation Bits under Different Computation Scheme

Lastly, we compare our proposed joint offloading and local computation scheme with other two schemes: local computing only and offloading only. Here, we set G1=G2=1G_{1}=G_{2}=1. Clearly the proposed scheme outperforms both other two in terms of computation efficiency, which verifies the superiority of our scheme. Similar efficiency decreasing is also observed.

V Conclusions and Future Directions

In this work, we studied the computation efficiency for a joint offloading and local computing scheme under possible EveEve. We model the effect from EveEve with physical layer security and mutual entropy. An optimization problem is formulated which considers some practical constraints. This non-convex problem is transformed with SCA and a general ratio iterative algorithm. In the future, we plan to generalize the paper with multiple-antenna user/server and other access techniques.

References

  • [1] H. Sun, Z. Zhang, R. Q. Hu, and Y. Qian, “Wearable communications in 5G: challenges and enabling technologies”, IEEE Veh. Technol. Mag., vol. 13, no. 3, Sept. 2018.
  • [2] S. Bi and Y. Zhang, “Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading”, [Online]. Available: https://arxiv.org/pdf/1708.08810.pdf
  • [3] Y. Mao, J. Zhang and K. B. Letaief, “Dynamic computation offloading for mobile-edge computing with energy harvesting devices,” IEEE J. Sel. Areas Commun., vol. 34, no. 12, pp. 3590-3605, Dec. 2016.
  • [4] F. Wang, J. Xu, X. Wang and S. Cui, “Joint offloading and computing optimization in wireless powered mobile-edge computing systems,” submitted to IEEE Trans. Wireless Commun., https://arxiv.org/abs/1702.00606.
  • [5] X. Cao, F. Wang, J. Xu, R. Zhang and S. Cui, “Joint computation and communication cooperation for mobile edge computing.” [Online]. Available: https://arxiv.org/pdf/1704.06777.pdf
  • [6] L. Yang, H. Zhang, M. Li, J. Guo and H. Ji, “Mobile edge computing empowered energy efficient task offloading in 5G,” accepted by IEEE Trans. Veh. Technol., 2018
  • [7] H. Sun, F. Zhou, R. Q. Hu, “Joint offloading and computation energy efficiency maximization in a mobile edge computing system”, IEEE Trans. Veh. Technol., vol. 68, no. 3, pp. 3052-3056, Mar. 2019.
  • [8] F. Zhou and R. Q. Hu, “Computation efficiency maximization in wireless-powered mobile edge computing networks”, accepted, IEEE Trans. Wireless Commun, 2020.
  • [9] Y. Wu, Y. Wang, F. Zhou, and R. Q. Hu, “Computation efficiency maximization in OFDMA-based mobile edge computing networks”, IEEE Commun. Lett., vol. 24, no. 1, Jan. 2020.
  • [10] X. Zhang, Y. Zhong, P. Liu, F. Zhou, and Y. Wang, “Resource allocation for a UAV-enabled mobile- edge computing system: computation efficiency maximization”, IEEE Access, vol. 7, Aug. 2019.
  • [11] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. H. Chen, “A survey on multiple-antenna techniques for physical layer security,” IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 1027-1053, Second Quarter, 2017
  • [12] Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, “Secure massive MIMO transmission in the presence of an active eavesdropper,” in Proc. IEEE ICC 2015, London, UK, 2015.
  • [13] Q. Wu, W. Chen, D. W. Kwan Ng, J. Li and R. Schober, “User-centric energy efficiency maximization for wireless powered communications,” IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6898-6912, Oct. 2016.
  • [14] Y. Wang, M. Sheng, X. Wang, L. Wang and J. Li, “Mobile-edge computing: partial computation offloading using dynamic voltage scaling,” IEEE Trans. Commun., vol. 64, no. 10, pp. 4268-4282, Oct. 2016.
  • [15] Y. Jong, “An efficient global optimization algorithm for nonlinear sum-of-ratios problem,” May 2012. [Online]. Available: http://www.optimization-online.org/DBFILE/2012/08/3586.pdf