CN112333702A - Optimization method for delay minimization based on safe NOMA moving edge calculation - Google Patents
Optimization method for delay minimization based on safe NOMA moving edge calculation Download PDFInfo
- Publication number
- CN112333702A CN112333702A CN202011200311.4A CN202011200311A CN112333702A CN 112333702 A CN112333702 A CN 112333702A CN 202011200311 A CN202011200311 A CN 202011200311A CN 112333702 A CN112333702 A CN 112333702A
- Authority
- CN
- China
- Prior art keywords
- user
- task
- noma
- time
- eavesdropper
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0215—Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices
- H04W28/0221—Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices power availability or consumption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0231—Traffic management, e.g. flow control or congestion control based on communication conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/10—Flow control between communication endpoints
Abstract
The invention relates to the technical field of communication, and aims to provide a delay minimization optimization method based on safe NOMA moving edge calculation. The invention is realized by an uplink NOMA-based MEC network, which consists of an access point AP integrated with an MEC server, a plurality of end users and an external malicious eavesdropper. Under the NOMA and partial unloading settings, a user can simultaneously unload partial computing tasks to the AP through the same resource block; and the BSS algorithm is provided to find the optimal solution of the transformation problem, and the performance of the provided algorithm is evaluated by carrying out numerical simulation. The invention can minimize the maximum task delay of the uplink NOMA user under the constraint of the security rate, the transmission power and the security interruption probability under the worst condition. The invention unloads the task completion to the server through safe complete unloading, has no task leakage loss, and meets the requirement of ideal conditions.
Description
Technical Field
The invention relates to a delay minimization optimization method based on safe NOMA mobile edge calculation, and belongs to the technical field of communication.
Background
In recent years, the demand for mobile data traffic has proliferated in the internet of things (IoT) where large-scale wireless devices are deployed. Internet of things devices suffer from energy limitations due to strict device size limitations and production cost considerations. In addition, low computing power cannot support an increasing number of applications requiring sustainable and high-performance juicing, such as virtual/augmented reality (VR/AR), telesurgery, and autopilot.
To overcome these challenges, Mobile Edge Computing (MEC) and non-orthogonal multiple access (NOMA) are considered two promising technologies in internet of things networks. The basic idea of MEC is to utilize energy calculation facilities in the radio access network. Ding et al studied that the use of NOMA in combination with MEC can reduce energy consumption for delays and unloading. There are two modes of operation in MEC networks, referred to as partial computation offload (i.e., computation tasks are split into two parts, one of which is computed locally and the other is offloaded to an MEC server for computation) and binary computation offload (i.e., computation tasks are either executed locally or offloaded to an MEC server).
On the other hand, NOMA allows multiple users to operate simultaneously in the same frequency band at different power levels to improve spectral efficiency due to superposition coding at the transmitter and Successive Interference Cancellation (SIC) at the receiver. Wang et al first studied NOMA-based MEC networks with the goal of minimizing the weighted sum of the energy consumption of all mobile users, depending on the computational latency of the partial computation offload and binary computation offload modes. Ding et al studied the time and energy minimization problem based on NOMA-MEC networks, where different users require different computation times. Although extensive research has been conducted on MECs and NOMA in recent years, little work has been done to study the minimized completion time of NOMA MEC networks. In existing work, energy minimization is mainly focused on NOMA MEC networks. For example, to minimize the task delay of one NOMA user, the Dinkelbach method and Newton method of a hybrid NOMA MEC network are compared. In the aspects of power distribution, time distribution and task distribution for energy saving, the energy consumption of the NOMA MEC network is reduced to the maximum extent. Wu et al first studied the security offload problem in an upstream NOMA-MEC system with a malicious eavesdropper, where the privacy performance of computational offload was measured using privacy interruption probability by considering the actual passive eavesdropping scenario.
Due to the broadcast nature of wireless communication, the task of offloading from a terminal device to an access point over a wireless channel is vulnerable to eavesdroppers, leading to information leakage, and it is therefore of particular importance to investigate whether an MEC can successfully offload information and secure transmissions. The current research is based on the fact that under the condition that the channel state information of the eavesdropper is known, the indexes of the measurement are highly related to the instant or statistical channel state information of the eavesdropper. Based on this, a user unloads a computing task to an access point in a server through resource blocks in the network, and the unloaded task is attacked to cause information leakage due to interference of an eavesdropper in the unloading process.
Therefore, in the case of assuming the existence of an eavesdropper, it is important to study how to perform secure transmission of the uninstall information based on the existence of the eavesdropper. At present, no research result of related work is reported in the literature.
Disclosure of Invention
The technical problem to be solved by the invention is to overcome the defects in the prior art and provide a delay minimization optimization method based on safe NOMA moving edge calculation.
In order to solve the technical problem, the solution of the invention is as follows:
the delay minimization optimization method based on the safe NOMA moving edge calculation comprises the following steps:
(1) in an Internet of things system with wireless equipment deployed in a large scale, establishing a mobile edge computing MEC network based on uplink non-orthogonal multiple access (NOMA), wherein the network comprises an Access Point (AP) integrated with an MEC server and a plurality of users; all access point nodes AP are provided with single antennas, a wireless channel adopts a frequency non-selective quasi-static block fading model, and a partial unloading model is adopted for information transmission of a user; assuming that at least one external malicious eavesdropper accesses the MEC network through the access point AP;
the kth user is represented by an index K, where K ∈ {1, …, K }; user k obeys the initial assumptions of the model; in order to reduce the complexity of the system, only two users are supposed to be served in the same resource block, namely a user m and a user n, k belongs to { m, n }; in the same resource block, a user n is allowed to enter a time slot T; the time slot will be occupied by user n alone, but will not cause any performance interference to user m; (since NOMA systems are subject to strict interference constraints, it is also of practical interest to have two users dispatched to perform NOMA; in addition, it is more appropriate to group two users together than to perform NOMA with user pairing and implement LTE-A.)
(2) Obtaining the signal-to-noise ratio of a user receiving signals at an eavesdropper at an Access Point (AP) end according to a transmission model of an uplink NOMA;
(3) it is assumed that the eavesdropper eliminates the uplink interference before decoding the uplink user information, resulting in a message s at the eavesdropping endkThe received signal-to-noise ratio is processed, and the safety of the conservative task unloading is ensured under the worst-case assumption;
(4) the method comprises the steps of protecting transmission of messages by adopting wiener safety coding, and inserting redundant information into secret information to realize anti-monitoring; to ensure offloading security under any possible eavesdropping channel, the rate of confidential information per user must be no less than the offloading rate in the worst case;
(5) transferring a part of tasks of the user to an MEC server for remote execution, and calculating the task unloading time from the user to the MEC server;
(6) unloading a part of tasks of a user to an MEC server for remote calculation, and calculating the rest of tasks locally; introducing a privacy interruption probability to measure the privacy performance of task unloading, and calculating the optimization problem (P1) of the maximum task completion time of the uplink NOMA user under the condition of meeting the constraints of safety, transmission power and the privacy interruption probability;
(7) considering that the problem (P1) is non-convex, the optimization problem to be computed (P1) is further simplified by transformation, and the optimal solution of the optimization problem is found by using a bisection search algorithm.
In the present invention, in the step (1), the wireless channel is kept unchanged for a selected transmission period and has a limited duration; a task model that considers partial offloading of data partitions, where the input bits of each task are treated as independent subtasks; focusing on a particular time block having a duration T during which each user k needs to perform LkThe calculation task of more than 0 input bit;
in OMA-MEC, each user is typically allocated dedicated time or frequency resources in order to offload its tasks to the MEC server; by utilizing the NOMA principle, all users can unload own tasks on unified time or frequency resources at the same time; task model considering partial offloading of data, where the input bits of each task can be treated as independent subtasks, user k divides the respective task with/kAnd Lk-lkTwo parts of input bits are respectively calculated locally at a user and safely shunted to an AP for remote execution; the channel coefficients from user k to AP and eavesdropper are hAP,kAnd he,kIs represented by the formula (I) in which dAP,kAnd de,kRespectively representing the distances from user k to the AP and the eavesdropper; alpha is alphaThe path loss index is specified, and the normalized Rayleigh fading channel state is gAP,k,ge,kE.g. CN (0, 1); suppose that the AP knows exactly the instantaneous channel gain, i.e. | h, of each userAP,k|2But only the average channel gain of the eavesdropper over different fading realizations, i.e.
In the present invention, in the step (2), the signals received at the AP and the eavesdropper are respectively:
wherein s iskIs the task bearing signal E [ | s for user k to unloadk|2]=1,pk> 0 is the transmit power associated therewith, nAPIs at variance ofZero-mean Additive White Gaussian Noise (AWGN), n at the AP of (1)eIs a variance ofZero mean gaussian white noise (AWGN) at the eavesdropper;
the uplink adopts NOMA transmission, and the AP can successfully decode the received arbitrary sequence information; on the MEC server side, the message for user n is decoded before user m; s1NR received at the AP for decoding the user n message and the user m message is:
SINR4P,m=γAP,mpm
SINRAP,n=γAP,npn/1+γAP,mpm
in the formula, hAP,mAnd hAP,nRespectively representing the channel coefficients from user m to the AP and the channel coefficients from user n to the AP,represents the variance, p, of zero-mean Additive White Gaussian Noise (AWGN) at the APmRepresenting the transmission power, y, of user mAP,mRepresents the path loss, γ, from user m to the APAP,nRepresenting the path loss from user n to the AP.
(according to the uplink NOMA mechanism, the AP allows user n to enter user m's dedicated time slot without any performance degradation to user m; user n is decoded before user m at the MEC server
In the present invention, in the step (3), assuming that the eavesdropper can eliminate the uplink interference before decoding the information of the uplink user, the eavesdropper will decode the information of the uplink user in the message skWhere the received signal-to-noise ratio is:
SINRe,k=γe,kpk,k∈{m,n}
in the formula, gammae,kRepresenting the loss of k users at the eavesdropping end, k representing user m and user n.
In the present invention, in the step (4), redundant information is inserted into the secret information, and each user uses the code word transmission rate Rt,kAnd a secret information rate Rs,kThe rate of the whole code word is Rt,k=Rs,k+Re,k,k∈{m,n}。
In the present invention, in the step (5), in the unloading time phase, part of the tasks are unloaded to the MEC server for each user, and the task unloading time and the unloading energy consumption from the user k to the MEC server are respectively:
in the present invention, in the step (6), in the moving execution time phase, for the user k, a part of the task L is executedk-lkOff-load to MEC server for remote juice calculation, and remaining tasks lkThen the calculation is performed locally; indicates that the CPU frequency of user k isA period per second; ckRepresenting the number of CPU cycles required to compute a task;
the local juicing time and energy consumption of the user k are respectively as follows:
in the formula, LkThe input bit of the computing task which represents the user to execute is divided into two parts Lk-lkAnd lk,ξkRepresenting the effective capacitance coefficient of each CPU of a local user k;
defining a secret interruption probability to measure the secret performance of task offloading, using CAP,k=log2(1+SINRAP,kAnd Ce,k=log2(1+SINRe,k) Representing APs and eavesdroppersThe channel capacity of (a); message skIs denoted as Pso,k=P{Rt,k-Rs,k<Ce,k},For user k, if Ce,kOver Rt,k-Rs,kConfidential offload data may be decoded by an eavesdropper and a privacy disruption event may occur; therefore, an optimization problem that minimizes the maximum task completion time of upstream NOMA users is defined as a problem subject to computational task execution offload security, transmit power, and privacy outage probability constraints (P1):
Rt,k≤CAP,k,k∈{m,n} (f)
Rs,k≤Rt,k,k∈{m,n} (g)
Pso,k≤ε,k∈{m,n} (h)
wherein l ═ lm,ln],p=[pm,pn],Rt=[Rt,m,Rt,n]And Rs=[Rs,m,Rs,n];
Wherein B represents the system bandwidth, 0 < epsilon < 1 represents the maximum tolerable privacy interruption probability,represents the maximum allowed number of bits to be computed locally,indicates that the CPU frequency of user k isIs the user k to MEC server task offload time,local computation time of user k, CAP,kRepresenting the channel capacity of the AP, user k-code transmission rate Rt,kAnd a secret information rate Rs,k(ii) a The constraint (d) ensures that the energy consumed by each mobile user is limited to a maximum consumption Emax(ii) a In constraint (e), the worst-case privacy rate for each user k must not be less than the offload rate to ensure offload under any possible eavesdropper corridor; constraint (f) ensures that the AP can correctly decode the message Sk(ii) a The privacy constraint (h) represents the maximum allowed privacy disruption probability epsilon for each message.
In the present invention, in the step (7), the optimization problem (P1) is simplified by using lemma and theorem, and specifically includes:
introduction 1: introducing decision variables l, p, RtAnd RsTo meet the optimal solution requirements of the optimization problem (P1);
Rt,n=log2(1+γAP,npn/(1+γAP,mpm))
Rt,m=log2(1+γAP,mpm)
2, leading: to minimize the maximum task completion time for different users, if and only if the offload time for each user is equal to each otherAnd the unloading time is equal to the local juice calculating timeThen, an optimal solution can be obtainedNamely, it is
Theorem 1: based on the theorem 1, the probability constraint of the privacy interruption is defined as follows:
theorem 2: when the objective function is optimal, at least one equation is taken for the simplified inequality formula in the optimization problem (P1), the formula being:
In the formula, CmRepresenting the number of CPU cycles required by the user m to calculate a task; maximum energy consumption of the user EmaxUser n privacy interrupt probability xin(ii) a User n calculates time locallyThe transmission rate of the code word of the user m, n is Rt,m,Rt,n(ii) a Secret information rate Rs,m,Rs,n. TheAndthe optimal solution is the final result of the optimization method of delay minimization. The minimization of the delay refers to obtaining the optimal solution for the decision variables of the constraint conditions. Due to pnAnd pmHas constraint, solves the problem by BBS algorithm, and finds the optimum by binary search methodAndobtaining decision variablesAndthe optimal solution of (1).
Description of the inventive principles:
the invention studies how to perform secure transmission of offload information based on the presence of an eavesdropper, assuming the presence of the eavesdropper. In a scene with an eavesdropper, the maximum task completion time in a minimized NOMA uplink user in the NOMA mobile edge computing network is researched, the task delay of the NOMA user is optimized, and the energy consumption of the NOMA-MEC network is reduced to the maximum extent through efficient power distribution and task distribution.
The invention is realized by an MEC network based on uplink NOMA. The network consists of an Access Point (AP) integrated with the MEC server, a plurality of end users and an external malicious eavesdropper. Under NOMA and partial offload settings, a user may offload portions of the computational tasks to the AP simultaneously over the same resource block. The problem of minimizing the task completion time on the premise of ensuring security is studied, and the aim of the invention is to minimize the maximum task delay of the uplink NOMA user under the constraints of the security rate, transmission power and security interruption probability under the worst condition. Since the formulation problem is a non-convex problem, it is difficult to solve, but after gaining important insight into the above-described technique, the original formulation problem has been changed to a simplified form. Therefore, the invention provides a BSS algorithm to find the optimal solution of the transformation problem, and numerical simulation is carried out to evaluate the performance of the proposed algorithm.
Uplink non-orthogonal multiple access (NOMA) -based Mobile Edge Computing (MEC) networks in the presence of malicious eavesdroppers are contemplated herein. The optimal solution means that the task completion time minimization problem is researched on the premise of ensuring safety. The problem is determined by the worst-case secret rate, transmit power and secret interruption probability constraint variables, and the problem under study is optimized by solving the constraint variables optimally, with the aim of minimizing the maximum task latency of the upstream NOMA users. Because the non-convexity of the problem can not be directly solved, the invention provides an algorithm based on a Binary Search System (BSS), and because the transmitting power p of n users and m usersnAnd pmHas constraint between them to solve the problem by BBS algorithm, and uses binary search method to find out optimumAndobtaining the probability of a privacy break for decision variables n and m usersAndthe optimal solution of (2) minimizes the maximum task completion delay through the optimal solution, and then the optimization problem of minimizing the maximum task completion time can be solved. Since in NOMA-based MEC networks there is little research effort in minimizing the maximum task completion time of the network, this algorithm is used to optimize the minimization of NOMA user task delays.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the invention, under the condition that a malicious eavesdropper exists, the maximum task time problem is minimally completed by the MEC network which enables the uplink NOMA, wherein a plurality of users simultaneously unload part of computing tasks to the AP through the same resource block. The problem of minimizing the task completion time on the premise of ensuring safety is researched, and the maximum task delay of the uplink NOMA user is minimized under the constraints of the confidentiality rate, the transmission power and the confidentiality interruption probability under the worst condition.
2. Due to the non-salient problem of the proposed problem, the present invention reformulates the problem and proposes a BSS algorithm to achieve the minimum task completion time for the optimal solution. The correctness of theoretical analysis is verified by using a numerical result, the relationship between the task delay and the maximum power consumption of each user under different schemes is evaluated, and in fig. 3, the relationship between the task delay and the maximum power consumption of each user under different schemes is evaluated. As the maximum power increases, the task completion time of the proposed scheme decreases accordingly, because a larger power range can help provide a higher offload rate, so that the offload information task time decreases. The NOMA-based offload scheme may provide a higher offload data rate than the OFDM scheme, so performance is better than the OFMA scheme. Fig. 4 evaluates the relationship between the task delay and the number of calculation input bits, and the task completion time increases with the increase of the calculation input bits, and the proposed scheme can achieve a shorter task completion time and thus a better unloading rate than the OFMA scheme. And proves the advantages of the proposed algorithm over the existing OFMA secure ofdma offload scheme.
3. Compared with the two reference schemes of safe complete unloading and OFMA safe OFDMA unloading in the prior art, the invention unloads the task completion to the server through the safe complete unloading, has no task leakage loss, and meets the requirement of ideal conditions. In the case of eavesdropper-based, by comparing with the OFMA secure ofdma prior art, it can be analyzed through the graph that the task completion time obtains a higher offload rate than the OFDM offload scheme, and is lower than the secure full offload rate. It can be shown that a shorter task completion time is obtained than in the prior art OFMA secure ofdma offload.
Drawings
FIG. 1 is a block diagram of a secure NOMA mobile edge computing system model with anti-eavesdropping capability according to the present invention.
Fig. 2 shows the convergence performance and optimality of the BSS algorithm in the present invention, compared with the optimal analytic expression obtained by the lagrangian method.
Fig. 3 is a relationship between task delay and maximum power of each user in the BSS algorithm based on two reference schemes of safe complete offloading and safe ofdma.
FIG. 4 shows the task delay and calculation input bit L under the BSS algorithm and the two reference schemes of safe complete unloading and safe OFDMAkA quantitative relationship.
Detailed Description
The invention provides a delay minimization optimization method based on secure NOMA mobile edge calculation, which is used for researching the minimized maximum task completion time problem of an MEC network which enables uplink NOMA under the condition that a malicious eavesdropper exists, wherein a plurality of users simultaneously unload part of calculation tasks to an AP through one resource block. Due to the non-convexity of the problem, an optimal solution is sought to accomplish the minimum task completion time.
A delay minimization optimization method based on safe NOMA moving edge calculation comprises the following steps:
(1) in an Internet of things system with wireless equipment deployed in a large scale, establishing a mobile edge computing MEC network based on uplink non-orthogonal multiple access (NOMA), wherein the network comprises an Access Point (AP) integrated with an MEC server and a plurality of users; all access point nodes AP are provided with single antennas, a wireless channel adopts a frequency non-selective quasi-static block fading model, and a partial unloading model is adopted for information transmission of a user; assuming that at least one external malicious eavesdropper accesses the MEC network through the access point AP;
the kth user is represented by an index K, where K ∈ {1, …, K }; user k obeys the initial assumptions of the model; in order to reduce the complexity of the system, only two users are supposed to be served in the same resource block, namely a user m and a user n, k belongs to { m, n }; in the same resource block, a user n is allowed to enter a time slot T; the time slot will be occupied by user n alone, but will not cause any performance interference to user m; since NOMA systems are subject to strict interference limitations, it is also of practical interest to dispatch two users to perform NOMA. In addition, two users are grouped together, and NOMA is carried out on the user pair, so that LTE-A is more suitable.
The wireless channel remains unchanged for a selected transmission period and is limited in duration; a task model that considers partial offloading of data partitions, where the input bits of each task are treated as independent subtasks; focusing on a particular time block having a duration T during which each user k needs to perform LkThe calculation task of more than 0 input bit;
in OMA-MEC, each user is typically allocated dedicated time or frequency resources in order to offload its tasks to the MEC server; by using the NOMA principle, allThe user unloads own tasks on unified time or frequency resources at the same time; task model considering partial offloading of data, where the input bits of each task can be treated as independent subtasks, user k divides the respective task with/kAnd Lk-lkTwo parts of input bits are respectively calculated locally at a user and safely shunted to an AP for remote execution; the channel coefficients from user k to AP and eavesdropper are hAP,kAnd he,kIs represented by the formula (I) in which dAP,kAnd de,kRespectively representing the distances from user k to the AP and the eavesdropper; alpha is the path loss exponent and the normalized Rayleigh fading channel state is gAP,k,ge,kE.g. CN (0, 1); suppose that the AP knows exactly the instantaneous channel gain, i.e. | h, of each userAP,k|2But only the average channel gain of the eavesdropper over different fading realizations, i.e.
(2) Obtaining the signal-to-noise ratio of a user receiving signals at an eavesdropper at an Access Point (AP) end according to a transmission model of an uplink NOMA;
the signals received at the AP and the eavesdropper are:
wherein s iskIs the task bearing signal E [ | s for user k to unloadk|2]=1,pk> 0 is the transmit power associated therewith, nAPIs at variance ofOf AP, neIs a variance ofZero mean gaussian white noise at the eavesdropper;
the uplink adopts NOMA transmission, and the AP can successfully decode the received arbitrary sequence information; on the MEC server side, the message for user n is decoded before user m; the SINRs received at the AP to decode the user n message and the user m message are respectively:
SINRAP,m=γAP,mpm
SINRAP,n=γAP,npn/1+γAP,mPm
in the formula, hAP,mAnd hAP,nRespectively representing the channel coefficients from user m to the AP and the channel coefficients from user n to the AP,represents the variance, p, of zero-mean Additive White Gaussian Noise (AWGN) at the APmRepresenting the transmission power, y, of user mAP,mRepresents the path loss, γ, from user m to the APAP,nRepresenting the path loss from user n to the AP.
According to the uplink NOMA mechanism, the AP allows the user n to enter the dedicated timeslot of the user m without causing any performance degradation to the user m; the message for user n on the MEC server is decoded before user m. Therefore, the SINR of the messages received at the AP for decoding user n and user m, respectively, is given by the above equation.
(3) It is assumed that the eavesdropper eliminates the uplink interference before decoding the uplink user information, resulting in a message s at the eavesdropping endkThe received signal-to-noise ratio is processed, and the safety of the conservative task unloading is ensured under the worst-case assumption;
assuming that the eavesdropper can eliminate the uplink interference before decoding the information of the uplink user, the eavesdropper performs the decoding on the message skWhere the received signal-to-noise ratio is:
SINRe,k=γe,kpk,k∈{m,n}
in the formula, gammae,kRepresenting the loss of k users at the eavesdropping end, k representing user m and user n.
The assumption here overestimates the eavesdropper's capability, which is a so-called worst-case assumption from the perspective of the legitimate receiver (i.e., the AP) to ensure security of conservative task offloading, since the AP is neither aware of the eavesdropper's capability nor the instantaneous CSI.
(4) The method comprises the steps of protecting transmission of messages by adopting wiener safety coding, and inserting redundant information into secret information to realize anti-monitoring; to ensure offloading security under any possible eavesdropping channel, the rate of confidential information per user must be no less than the offloading rate in the worst case;
inserting redundant information in secret information, each user using code word transmission rate Rt,kAnd a secret information rate Rs,kThe rate of the whole code word is Rt,k=Rs,k+Re,k,k∈{m,n}。
(5) Transferring a part of tasks of the user to the MEC server for remote execution, and calculating the task unloading time from the user to the MEC server:
in the unloading time stage, partial tasks are unloaded to the MEC server for each user, and the task unloading time and the unloading energy consumption from the user k to the MEC server are respectively as follows:
(6) unloading a part of tasks of a user to an MEC server for remote calculation, and calculating the rest of tasks locally; introducing a privacy interruption probability to measure the privacy performance of task unloading, and calculating the optimization problem (P1) of the maximum task completion time of the uplink NOMA user under the condition of meeting the constraints of safety, transmission power and the privacy interruption probability;
in the mobile execution time phase, for a user k, part of a task Lk-lkOff-load to MEC server for remote computation, and remaining tasks lkThen the calculation is performed locally; indicates that the CPU frequency of user k isA period per second; ckRepresenting the number of CPU cycles required to compute a task;
the local computation time and energy consumption of user k are respectively:
in the formula, LkThe input bit of the computing task which represents the user to execute is divided into two parts Lk-lkAnd lk,ξkRepresenting the effective capacitance coefficient of each CPU of a local user k;
defining a secret interruption probability to measure the secret performance of task offloading, using CAP,k=log2(1+SINRAP,kAnd Ce,k=log2(1+SINRe,k) Representing the channel capacity of the AP and the eavesdropper; the secret interruption probability of the message sk is expressed asFor user k andin other words, if Ce,kOver Rt,k-Rs,kConfidential offload data may be decoded by an eavesdropper and a privacy disruption event may occur; therefore, an optimization problem that minimizes the maximum task completion time of upstream NOMA users is defined as a problem subject to computational task execution offload security, transmit power, and privacy outage probability constraints (P1):
Rt,k≤CAP,k,k∈{m,n} (f)
Rs,k≤Rt,k,k∈{m,n} (g)
Pso,k≤ε,k∈{m,n} (h)
wherein 1 ═ lm,ln],p=[pm,pn],Rt=[Rt,m,Rt,n]And Rs=[Rs,m,Rs,n];
Wherein B represents the system bandwidth, 0 < epsilon < 1 represents the maximum tolerable privacy interruption probability,representing the most locally computed bitsThe number of the large allowable number,indicates that the CPU frequency of user k isIs the user k to MEC server task offload time,local computation time of user k, CAP,kRepresenting the channel capacity of the AP, user k-code transmission rate Rt,kAnd a secret information rate Rs,k(ii) a The constraint (d) ensures that the energy consumed by each mobile user is limited to a maximum consumption Emax(ii) a In constraint (e), the worst-case privacy rate for each user k must not be less than the offload rate to ensure offload under any possible eavesdropper corridor; constraint (f) ensures that the AP can correctly decode the message sk(ii) a The privacy constraint (h) represents the maximum allowed privacy disruption probability epsilon for each message.
(7) Considering that the problem (P1) is non-convex, the optimization problem to be calculated (P1) is further simplified through transformation, the optimization problem is simplified by lemma and theorem, and a halving search algorithm is used for finding the optimal solution of the optimization problem.
Simplifying the optimization problem by using lemmas and theorems (P1), specifically including:
introduction 1: introducing decision variables l, p, RtAnd RsTo meet the optimal solution requirements of the optimization problem (P1);
Rt,n=log2(1+γAP,npn/(1+γAP,mpm))
Rt,m=log2(1+γAP,mpm)
2, leading: to minimize the maximum task completion time of different usersIf and only if the offload time of each user equals each otherAnd the offload time is equal to the local computation timeThen, an optimal solution can be obtainedNamely, it is
Theorem 1: based on the theorem 1, the probability constraint of the privacy interruption is defined as follows:
theorem 2: when the objective function is optimal, at least one equation is taken for the simplified inequality formula in the optimization problem (P1), the formula being:
In the formula, CmRepresenting the number of CPU cycles required by the user m to calculate a task; maximum energy consumption of the user EmaxUser n privacy interrupt probability xin(ii) a User n calculates time locallyThe transmission rate of the code word of the user m, n is Rt,m,Rt,n(ii) a Secret information rate Rs,m,Rs,n。
For a clearer explanation, the process of simplifying the optimization problem by using lemmas and theorems in the derivation of the optimization problem in steps (6) and (7) is further described below.
Step 1: the maximum task completion time of the uplink NOMA user is reduced to the maximum extent under the constraint of the unloading safety, the transmitting power and the secret interruption probability of the calculation task execution.
Mathematically, this optimization problem can be expressed as:
Rt,k≤CAP,k,k∈{m,n} (1f)
Rs,k≤Rt,k,k∈{m,n} (1g)
wherein l ═ lm,ln],p=[pm,pn],Rt=[Rt,m,Rt,n]And Rs=[Rs,m,Rs,n]. B represents the system bandwidth, 0 < epsilon < 1 represents the maximum allowed probability of a privacy interruption, andrepresenting the maximum allowed number of bits to be computed locally. The constraint (1d) ensures that the energy consumed by each mobile user is limited to a maximum consumption Emax. Note that in constraint (1e), the worst-case privacy rate for each user k must not be less than the offload rate to ensure offload in any possible eavesdropper path. Constraint (1f) ensures that the AP can correctly decode the message sk. The privacy constraint (1h) represents the maximum allowed privacy disruption probability epsilon for each message.
Some lemmas and theorems are proposed to simplify the optimization problem before solving it (P1). Then, a BSS algorithm is proposed to find the best solution to the problem (P1).
Introduction 1: decision variables l, p, RtAnd RsThe optimal solution to the problem (P1) should satisfy:
Rt,n=log2(1+γAP,npn/(1+γAP,mPm)) (2)
Rt,m=log2(1+γAP,mpm) (3)
2, leading: for any two users in a NOMA MEC network, in order to minimize the maximum task completion time of the different users, i.e. to minimize the number of different users
If and only if the offload time of each user equals each otherAnd the offload time is equal to the local computation timeThen, an optimal solution can be obtained
And (3) proving that: first, it provesSuppose inThe optimal solution is obtained, and the minimum time delay is T*And the optimal solutionSince user n decodes its signal first, if soIs increased toThenWill be reduced.Is fixed, andit will increase. Therefore, must existSatisfy the requirement ofTherefore, the temperature of the molten metal is controlled,should be an optimum time consumption, this is in contrast toThe assumption of being the best solution to the problem (P1) contradicts.
Secondly, prove thatSuppose inThe optimal solution is obtained, and the minimum time delay is T*And the optimal solutionPlease note that when lmWhen the number of the carbon atoms is increased,will increase andwill be reduced. Thus, the optimal solution can be written to satisfy both the energy constraint and the power constraintTherefore, there must be a solution toIs/are as followsTherefore, the temperature of the molten metal is controlled,should be the optimum time consumption, this is in conjunction with T*Is a minimum latency ofThe assumption of being the best solution to the problem (P1) contradicts.
Step 2: theorem 1: based on the lemma 1, the following restatement is performed on the privacy interruption probability constraint (1h), and the formula is as follows:
And (3) proving that: first of all, attention is paid to the probability of a privacy break Pso,n. By substituting (2) and (3)Pso,nCan be re-represented as
Then, Pso,nThe following can be calculated:
thus, substituting (9) for (1h) yieldsThe inequality in (16) can be obtained immediately after some basic mathematical transformation. Next, the privacy disruption probability P will be rewrittenso,m. Also, please note | he,m|2PDF ofIs provided with
Then, based on the inequality in (1h) in combination with the results given in (10), the inequality in (7) can be directly derived. The proof of theorem 1 is completed.
Then, the problem (P1) can be equivalently reconstructed as the problem (P2):
(Lm-lm)/Rs,m=(Ln-ln)/Rs,n. (11g)
from (11 h):
from (11g) and (12):
then, the problem (P2) is reduced to
(Lm-lm)/Rs,m=(Ln-ln)/Rs,n. (14g)
And step 3: theorem 2: when the objective function is optimal, at least one of (14c) and (14d) is an equation.
in this case, there must be a small positive valueΔpmAnd Δ lmOrder toAnd (4) meeting the requirement.Should be the best time consuming because of its low value. This is falseThe settings contradict, so the proof of theorem 2 is complete.
By substituting (13) and (15) into (14d), (14e) and (14f), the compounds are obtained
WhereinWhen R iss,mWhen increasing, the objective function will decrease, and when p is increasedmWhen increased, Rs,nWill be increased. P is to benAnd pmThe constraint between is expressed as:
thus, a binary search method can be used to findAndthe details are presented in algorithm 1. New lower bound r1And an upper bound r2Can be obtained by the inequality (17). Therefore, the temperature of the molten metal is controlled,can be obtained by (15), thenThe optimal solution of (2) can be obtained by (13).
Algorithm 1: BSS-based problem algorithm (P3)
7. Otherwise
9. End if cycle
10. End of cycle
Similarly, (13) and (20) are substituted into (14c), (14e) and (14f) at pnAnd pmWith constraints in between, and then solve the problem by algorithm 1 (P3) to obtain the optimumAndthat obtainsAndthe optimal solution of (1).
And 4, step 4: compared to the following two reference schemes of the prior art, numerical results will be provided to evaluate the performance of the proposed algorithm.
(1) Safe complete unloading: all users choose to offload all task input bits to the AP, calculated in the considered secure NOMA-MEC system. The scheme corresponds to passing the settingsThe problem is solved (P1).
(2) Secure Orthogonal Frequency Division Multiple Access (OFDMA): two users adopt OFDMA protocol to calculate and distribute, and each user occupies a frequency band to share the task.
Setting simulation parameters, and calculating the unloaded system bandwidth as B1 MHzThe path loss exponent α is 4, the secret break probability ∈ is 0.1, and the noise variance isCPU cycle of Cm=Cn=103Period/bit, effective capacitance coefficient xim=ξn=10-28Calculating the input digit as Lk=1.6×106Bit sum
Fig. 2 illustrates the convergence behavior and optimality of algorithm 1. As can be seen from fig. 2, the BSS algorithm converges to the same constant value in 8 iterations, thereby verifying the validity of the algorithm. The convergence point is completely matched with the optimal analytic solution obtained by the Lagrangian method.
The relationship between the task delay and the maximum power per user under different schemes is evaluated in fig. 3. As the maximum power increases, the task completion time of the proposed solution decreases accordingly. This is because a larger maximum power range can help provide a higher unload rate, thereby reducing unload time. Furthermore, the BSS algorithm has better performance than the OFDMA scheme since the NOMA-based offload scheme can provide a higher offload data rate than the OFDMA scheme.
FIG. 4 illustrates task delay and computation of input bit LkThe relationship of the quantities is shown. Task completion time dependent computation input bit LkIs increased. Also, the BSS algorithm scheme can achieve a shorter task completion time than the OFDMA scheme, thereby obtaining a better data transmission rate.
The above description is only for the preferred embodiments of the present invention, but the protection scope of the present invention is not limited thereto, and any person skilled in the art can substitute or change the technical solution of the present invention and the inventive concept within the scope of the present invention, which is disclosed by the present invention, and the equivalent or change thereof belongs to the protection scope of the present invention.
Claims (8)
1. A delay minimization optimization method based on safe NOMA moving edge calculation is characterized by comprising the following steps:
(1) in an Internet of things system with wireless equipment deployed in a large scale, establishing a mobile edge computing MEC network based on uplink non-orthogonal multiple access (NOMA), wherein the network comprises an Access Point (AP) integrated with an MEC server and a plurality of users; all access point nodes AP are provided with single antennas, a wireless channel adopts a frequency non-selective quasi-static block fading model, and a partial unloading model is adopted for information transmission of a user; assuming that at least one external malicious eavesdropper accesses the MEC network through the access point AP;
the kth user is represented by an index K, where K ∈ {1, …, K }; user k obeys the initial assumptions of the model; in order to reduce the complexity of the system, only two users are supposed to be served in the same resource block, namely a user m and a user n, k belongs to { m, n }; in the same resource block, a user n is allowed to enter a time slot T; the time slot will be occupied by user n alone, but will not cause any performance interference to user m;
(2) obtaining the signal-to-noise ratio of a user receiving signals at an eavesdropper at an Access Point (AP) end according to a transmission model of an uplink NOMA;
(3) it is assumed that the eavesdropper eliminates the uplink interference before decoding the uplink user information, resulting in a message s at the eavesdropping endkThe received signal-to-noise ratio is processed, and the safety of the conservative task unloading is ensured under the worst-case assumption;
(4) the method comprises the steps of protecting transmission of messages by adopting wiener safety coding, and inserting redundant information into secret information to realize anti-monitoring; to ensure offloading security under any possible eavesdropping channel, the rate of confidential information per user must be no less than the offloading rate in the worst case;
(5) transferring a part of tasks of the user to an MEC server for remote execution, and calculating the task unloading time from the user to the MEC server;
(6) unloading a part of tasks of a user to an MEC server for remote calculation, and calculating the rest of tasks locally; introducing a privacy interruption probability to measure the privacy performance of task unloading, and calculating the optimization problem (P1) of the maximum task completion time of the uplink NOMA user under the condition of meeting the constraints of safety, transmission power and the privacy interruption probability;
(7) considering that the problem (P1) is non-convex, the optimization problem to be computed (P1) is further simplified by transformation, and the optimal solution of the optimization problem is found by using a bisection search algorithm.
2. The method of claim 1, wherein in step (1), the wireless channel remains unchanged for a selected transmission period and has a limited duration; a task model that considers partial offloading of data partitions, where the input bits of each task are treated as independent subtasks; focusing on a particular time block having a duration T during which each user k needs to perform LkThe calculation task of more than 0 input bit;
in OMA-MEC, each user is typically allocated dedicated time or frequency resources in order to offload its tasks to the MEC server; by utilizing the NOMA principle, all users can unload own tasks on unified time or frequency resources at the same time; task model considering partial offloading of data, where the input bits of each task can be treated as independent subtasks, user k divides the respective task with/kAnd Lk-lkTwo parts of input bits are respectively calculated locally at a user and safely shunted to an AP for remote execution; the channel coefficients from user k to AP and eavesdropper are hAP,kAnd he,kIs represented by the formula (I) in which dAP,kAnd de,kRespectively representing the distances from user k to the AP and the eavesdropper; alpha is the path loss exponent and the normalized Rayleigh fading channel state is gAP,k,ge,kE.g. CN (0, 1); suppose that the AP knows exactly the instantaneous channel gain, i.e. | h, of each userAP,k|2But only the average channel gain of the eavesdropper over different fading realizations, i.e.
3. The method according to claim 1, wherein in the step (2), the signals received at the AP and the bug are respectively:
wherein s iskIs the task bearing signal E [ | s for user k to unloadk|2]=1,pk> 0 is the transmit power associated therewith, nAPIs at variance ofOf AP, neIs a variance ofZero mean gaussian white noise at the eavesdropper;
the uplink adopts NOMA transmission, and the AP can successfully decode the received arbitrary sequence information; on the MEC server side, the message for user n is decoded before user m; the SINRs received at the AP to decode the user n message and the user m message are respectively:
SINRAP,m=γAP,mpm
SINRAP,n=γAP,npn/1+γAP,mpm
in the formula,hAP,mAnd hAP,nRespectively representing the channel coefficients from user m to the AP and the channel coefficients from user n to the AP,represents the variance, p, of zero-mean Additive White Gaussian Noise (AWGN) at the APmRepresenting the transmission power, y, of user mAP,mRepresents the path loss, γ, from user m to the APAP,nRepresenting the path loss from user n to the AP.
4. The method according to claim 1, wherein in the step (3), assuming that the eavesdropper can eliminate the uplink interference before decoding the information of the uplink user, the eavesdropper performs the step of decoding the uplink user information by using the message skWhere the received signal-to-noise ratio is:
SINRe,k=γe,kpk,k∈{m,n}
in the formula, gammae,kRepresenting the loss of k users at the eavesdropping end, k representing user m and user n.
5. The method of claim 1, wherein in step (4), redundant information is inserted into the secret information, and the transmission rate R of the code word is used by each usert,kAnd a secret information rate Rs,kThe rate of the whole code word is Rt,k=Rs,k+Re,k,k∈{m,n}。
7. method according to claim 1, characterized in that in step (6), during the mobile execution time phase, for user k, part of task L is processedk-lkOff-load to MEC server for remote computation, and remaining tasks lkThen the calculation is performed locally; indicates that the CPU frequency of user k isA period per second; ckRepresenting the number of CPU cycles required to compute a task;
the local computation time and energy consumption of user k are respectively:
in the formula, LkThe input bit of the computing task which represents the user to execute is divided into two parts Lk-lkAnd lk,ξkRepresenting the effective capacitance coefficient of each CPU of a local user k;
defining a secret interruption probability to measure the secret performance of task offloading, using CAP,k=log2(1+SINRAP,kAnd Ce,k=log2(1+SINRe,k) Representing the channel capacity of the AP and the eavesdropper; message skIs denoted as Pso,k=P{Rt,k-Rs,k<Ce,k},For user k, if Ce,kOver Rt,k-Rs,kConfidential offload data may be decoded by an eavesdropper and a privacy disruption event may occur; therefore, an optimization problem that minimizes the maximum task completion time of upstream NOMA users is defined as a problem subject to computational task execution offload security, transmit power, and privacy outage probability constraints (P1):
Rt,k≤CAP,k,k∈{m,n} (f)
Rs,k≤Rt,k,k∈{m,n} (g)
Pso,k≤ε,k∈{m,n} (h)
wherein l ═ lm,ln],p=[pm,pn],Rt=[Rt,m,Rt,n]And Rs=[Rs,n,Rs,n];
Wherein B represents a system beltWide, 0 < epsilon < 1 represents the maximum tolerable privacy interruption probability,represents the maximum allowed number of bits to be computed locally,indicates that the CPU frequency of user k is Is the user k to MEC server task offload time,local computation time of user k, CAP,kRepresenting the channel capacity of the AP, user k-code transmission rate Rt,kAnd a secret information rate Rs,k(ii) a The constraint (d) ensures that the energy consumed by each mobile user is limited to a maximum consumption Emax(ii) a In constraint (e), the worst-case privacy rate for each user k must not be less than the offload rate to ensure offload under any possible eavesdropper corridor; constraint (f) ensures that the AP can correctly decode the message sk(ii) a The privacy constraint (h) represents the maximum allowed privacy disruption probability epsilon for each message.
8. The method according to claim 1, wherein in the step (7), the optimization problem (P1) is simplified by using lemmas and theorems, and specifically comprises:
introduction 1: introducing decision variables l, p, RtAnd RsTo meet the optimal solution requirements of the optimization problem (P1);
Rt,n=log2(1+γAP,npn/(1+γAP,mpm))
Rt,m=log2(1+γAP,m,pm)
2, leading: to minimize the maximum task completion time for different users, if and only if the offload time for each user is equal to each otherAnd the offload time is equal to the local computation timeThen, an optimal solution can be obtainedNamely, it is
Theorem 1: based on the theorem 1, the probability constraint of the privacy interruption is defined as follows:
theorem 2: when the objective function is optimal, at least one equation is taken for the simplified inequality formula in the optimization problem (P1), the formula being:
In the formula, CmRepresenting the number of CPU cycles required by the user m to calculate a task; maximum energy consumption of the user EmaxUser n privacy interrupt probability xin(ii) a User n calculates time locallyThe transmission rate of the code word of the user m, n is Rt,m,Rt,n(ii) a Secret information rate Rs,m,Rs,n。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011200311.4A CN112333702A (en) | 2020-10-30 | 2020-10-30 | Optimization method for delay minimization based on safe NOMA moving edge calculation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011200311.4A CN112333702A (en) | 2020-10-30 | 2020-10-30 | Optimization method for delay minimization based on safe NOMA moving edge calculation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112333702A true CN112333702A (en) | 2021-02-05 |
Family
ID=74324039
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011200311.4A Withdrawn CN112333702A (en) | 2020-10-30 | 2020-10-30 | Optimization method for delay minimization based on safe NOMA moving edge calculation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112333702A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113938997A (en) * | 2021-09-30 | 2022-01-14 | 中国人民解放军陆军工程大学 | Resource allocation method for secure MEC system in NOMA (non-access-oriented multi-media access) Internet of things |
CN114389654A (en) * | 2022-01-13 | 2022-04-22 | 郑州轻工业大学 | Mobile edge calculation safety calculation efficiency maximization method based on large-scale MIMO |
CN114531718A (en) * | 2022-02-24 | 2022-05-24 | 南京邮电大学 | NOMA-MEC system energy consumption optimization method under imperfect CSI condition |
CN114710493A (en) * | 2022-04-08 | 2022-07-05 | 南京邮电大学 | NOMA-MEC-based physical layer security and energy efficiency optimization method |
CN116320354A (en) * | 2023-01-16 | 2023-06-23 | 浙江大学 | 360-degree virtual reality video user access control system and control method |
CN116567725A (en) * | 2023-05-09 | 2023-08-08 | 中国人民解放军陆军工程大学 | Multi-edge server network task unloading method with minimum time delay |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110113190A (en) * | 2019-04-24 | 2019-08-09 | 西北工业大学 | Time delay optimization method is unloaded in a kind of mobile edge calculations scene |
CN111615129A (en) * | 2020-05-29 | 2020-09-01 | 南京邮电大学 | Resource allocation method in NOMA-based multi-user mobile edge computing system |
-
2020
- 2020-10-30 CN CN202011200311.4A patent/CN112333702A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110113190A (en) * | 2019-04-24 | 2019-08-09 | 西北工业大学 | Time delay optimization method is unloaded in a kind of mobile edge calculations scene |
CN111615129A (en) * | 2020-05-29 | 2020-09-01 | 南京邮电大学 | Resource allocation method in NOMA-based multi-user mobile edge computing system |
Non-Patent Citations (3)
Title |
---|
FANG FANG ET AL.: "Optimal Resource Allocation for Delay Minimization in NOMA-MEC Networks", 《IEEE TRANSACTIONS ON COMMUNICATIONS》 * |
XINXIN WANG ET AL.: "Delay Minimization for Secure NOMA Mobile-Edge Computing", 《2019 IEEE 19TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT)》 * |
景泽伟等: "移动边缘计算中的时延和能耗均衡优化算法", 《北京邮电大学学报》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113938997A (en) * | 2021-09-30 | 2022-01-14 | 中国人民解放军陆军工程大学 | Resource allocation method for secure MEC system in NOMA (non-access-oriented multi-media access) Internet of things |
CN113938997B (en) * | 2021-09-30 | 2024-04-30 | 中国人民解放军陆军工程大学 | Resource allocation method of secure MEC system in NOMA (non-volatile memory access) Internet of things |
CN114389654A (en) * | 2022-01-13 | 2022-04-22 | 郑州轻工业大学 | Mobile edge calculation safety calculation efficiency maximization method based on large-scale MIMO |
CN114531718A (en) * | 2022-02-24 | 2022-05-24 | 南京邮电大学 | NOMA-MEC system energy consumption optimization method under imperfect CSI condition |
CN114531718B (en) * | 2022-02-24 | 2023-06-06 | 南京邮电大学 | NOMA-MEC system energy consumption optimization method under imperfect CSI |
CN114710493A (en) * | 2022-04-08 | 2022-07-05 | 南京邮电大学 | NOMA-MEC-based physical layer security and energy efficiency optimization method |
CN114710493B (en) * | 2022-04-08 | 2023-07-18 | 南京邮电大学 | Physical layer security and energy efficiency optimization method based on NOMA-MEC |
CN116320354A (en) * | 2023-01-16 | 2023-06-23 | 浙江大学 | 360-degree virtual reality video user access control system and control method |
CN116320354B (en) * | 2023-01-16 | 2023-09-29 | 浙江大学 | 360-degree virtual reality video user access control system and control method |
CN116567725A (en) * | 2023-05-09 | 2023-08-08 | 中国人民解放军陆军工程大学 | Multi-edge server network task unloading method with minimum time delay |
CN116567725B (en) * | 2023-05-09 | 2024-02-13 | 中国人民解放军陆军工程大学 | Multi-edge server network task unloading method with minimum time delay |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112333702A (en) | Optimization method for delay minimization based on safe NOMA moving edge calculation | |
Timotheou et al. | Fairness for non-orthogonal multiple access in 5G systems | |
CN112052086B (en) | Multi-user safety energy-saving resource allocation method in mobile edge computing network | |
CN111614419B (en) | NOMA-based mobile edge computing network task high-security unloading resource allocation method | |
Wei et al. | Energy-efficient full-duplex cooperative nonorthogonal multiple access | |
CN111245539A (en) | NOMA-based efficient resource allocation method for mobile edge computing network | |
CN109640320B (en) | Safe unloading method of computing task of mobile edge computing system based on mixed NOMA | |
Moltafet et al. | Robust radio resource allocation in MISO-SCMA assisted C-RAN in 5G networks | |
Yang et al. | Adaptive power allocation for uplink non-orthogonal multiple access with semi-grant-free transmission | |
CN107528624B (en) | Design method of steady beam forming based on non-orthogonal multiple access technology | |
JP5999799B2 (en) | System and method for compression transfer relay scheme in joint signal processing | |
Zhou et al. | Flexible functional split design for downlink C-RAN with capacity-constrained fronthaul | |
Farhadi Zavleh et al. | Resource allocation in sparse code multiple access‐based systems for cloud‐radio access network in 5G networks | |
Li et al. | Resource allocation for multicarrier rate-splitting multiple access system | |
Seo et al. | Uplink NOMA random access systems with space–time line code | |
Reddy et al. | Analytical review on OMA vs. NOMA and challenges implementing NOMA | |
Wang et al. | Delay minimization for secure NOMA mobile-edge computing | |
Xia et al. | Joint optimization of fronthaul compression and bandwidth allocation in uplink H-CRAN with large system analysis | |
Qiu et al. | Energy-efficient rate allocation for NOMA-MEC offloading under outage constraints | |
Altin et al. | Novel OMA and hybrid NOMA schemes for MEC offloading | |
CN109769258B (en) | Resource optimization method based on secure URLLC communication protocol | |
Liu et al. | An efficient power allocation algorithm for relay assisted cognitive radio network | |
Li et al. | Finite SNR Diversity-Multiplexing Trade-off in Hybrid ABCom/RCom-Assisted NOMA Networks | |
Xu et al. | Energy efficiency optimization of NOMA IoT communication for 5G | |
CN113938997B (en) | Resource allocation method of secure MEC system in NOMA (non-volatile memory access) Internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20210205 |
|
WW01 | Invention patent application withdrawn after publication |