Multi-access computing shunting method based on simulated annealing with safety guarantee

A simulated annealing and security guarantee technology, applied in the field of communication, can solve problems such as security overflow and malicious eavesdropping by mobile users

Inactive Publication Date: 2019-07-09
ZHEJIANG UNIV OF TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to realize data shunting, some mobile users are easy to be maliciously eavesdropped, which leads to security overflow problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-access computing shunting method based on simulated annealing with safety guarantee
  • Multi-access computing shunting method based on simulated annealing with safety guarantee
  • Multi-access computing shunting method based on simulated annealing with safety guarantee

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The present invention will be further described below in conjunction with the accompanying drawings.

[0080] refer to figure 1 , a simulated annealing-based multi-access computing shunt method with security guarantees. The implementation of this method can minimize the total energy consumption of the system and improve the utilization rate of wireless resources of the entire system under the premise of meeting the security requirements at the same time. The present invention can be applied to wireless networks, such as figure 1 in the scene shown. Designing an optimization method for this problem includes the following steps:

[0081] (1) Consider a mobile user i (Mobile User, MU i), which is within the service range of K base stations (Base Station, BS), and each base station is equipped with an edge computing server (Edge Server) that can provide mobile user i provides computing offloading services, edge servers use collection Indicates that the total amount of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-access calculation shunting method with safety guarantee based on simulated annealing. The method comprises the following steps: (1) considering a certain mobile user i, within K base station service ranges, each base station is provided with an edge computing server which can provide computing offloading service for the mobile user i, and the uplink transmission total energy of the mobile user is minimized while the service quality of the mobile user is met and the transmission information security of the user is ensured; (2) decomposing the problem TECM into two layers of optimization problems; (3) aiming at a bottom layer problem, applying a Lagrangian constant method, carrying out linear enumeration on an overflow probability, and optimizing the total energy consumption of the system; (4) according to the top layer problem, adopting a simulated annealing algorithm, and further optimizing the total energy consumption of the system; and (5) through interactive iteration of the bottom-layer problem and the top-layer problem, finally solving the problem TECM. The safety and the reliability are relatively high.

Description

technical field [0001] The invention belongs to the communication field, and relates to a simulated annealing-based multi-access calculation distribution method with safety guarantee. Background technique [0002] The massive growth of global mobile data volume will bring huge challenges to future mobile users. The emergence of edge computing technology makes it possible for mobile users to offload computing, thereby reducing their own computing pressure. In order to realize data distribution, some mobile users are easy to be maliciously eavesdropped, which leads to security overflow problem. Contents of the invention [0003] In order to overcome the disadvantage of relatively large uplink transmission energy in the prior art and meet the security performance requirements of mobile users, the present invention provides a simulated annealing-based multiplexer with security guarantees that minimizes uplink transmission energy on the premise of meeting security performance ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W52/02H04W72/04H04W12/128
CPCH04W52/0206H04W72/0473H04W72/0453H04W12/00Y02D30/70
Inventor 吴远汪道航张友钱丽萍黄亮孟利民
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products