Multi-user security energy-saving resource allocation method in mobile edge computing network

An edge computing and resource allocation technology, applied in the field of multi-user security and energy-saving resource allocation

Active Publication Date: 2020-12-08
XI AN JIAOTONG UNIV
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a multi-user security and energy-saving resource allocation method ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-user security energy-saving resource allocation method in mobile edge computing network
  • Multi-user security energy-saving resource allocation method in mobile edge computing network
  • Multi-user security energy-saving resource allocation method in mobile edge computing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0049] The system used in the multi-user security and energy-saving resource allocation method in the mobile edge computing network proposed by the present invention, such as figure 1 Shown:

[0050] It is assumed that there are K users who need to perform their respective computing tasks in a period T, and the task amount of each user is L k >0bits, k=1,...K.

[0051] Divide the amount of tasks corresponding to the kth user into l k and L k -l k Two parts, among them, setting l k Part of the tasks are calculated locally, while L k -l k Part of it is offloaded to a base station equipped with a mobile edge computing (MEC) server through non-orthogonal multiple access (NOMA).

[0052] At the same time, there is an illegal eavesdropping party set up in the system, trying to intercept the user's offloading tasks to the base station.

[0053] The base sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-user safe energy-saving resource allocation method in a mobile edge computing network, which comprises the following steps that: step 1, K users are accessed to a base station in a current time slot, and the base station obtains channel state information of the users through channel training; time division duplex, channel reciprocity and channel compliance with a quasi-static block fading model are set; step 2, energy consumed by local calculation of each user and energy consumed by task unloading of each user are calculated; 3, according to the energy consumed by the local calculation and the energy consumed by unloading the calculation task obtained in the step 2, an optimization problem is constructed, the optimization problem comprises an optimization target and constraint conditions, and the optimization target refers to minimizing the total energy consumption of the system; 4, the optimization problem is solved to obtain the minimum value of the total energy consumption of the system and each corresponding optimization variable when the minimum value is reached; according to the method, the energy consumption is remarkably reduced in the aspectof realizing MEC network security energy-saving task unloading.

Description

technical field [0001] The present invention relates to the problem of secure transmission at the physical layer of wireless communication, in particular to a multi-user security and energy-saving resource allocation method in a mobile edge computing network. Background technique [0002] The rapid development of wireless networks has spawned a series of computing-intensive and latency-sensitive smart devices (such as tablets and smartphones) and new applications (such as augmented reality, autonomous driving, and remote surgery). With the large-scale deployment of smart devices, how to accommodate them under limited resources is a challenging task. Therefore, providing ideal QoS for power-limited and size-constrained terminal devices is an urgent problem to be solved. Mobile Edge Computing (MEC) and Non-Orthogonal Multiple Access (NOMA) have emerged and are considered to be the two most promising technologies in next-generation wireless networks. [0003] In the MEC syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/50H04W12/02H04W52/02
CPCG06F9/5088G06F9/5072H04W12/02H04W52/0261G06F2209/502G06F2209/509Y02D30/70Y02D10/00
Inventor 郑通兴温雅婷刘浩文穆鹏程王慧明王文杰
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products