CN112333702A - Optimization method for delay minimization based on safe NOMA moving edge calculation - Google Patents

Optimization method for delay minimization based on safe NOMA moving edge calculation Download PDF

Info

Publication number
CN112333702A
CN112333702A CN202011200311.4A CN202011200311A CN112333702A CN 112333702 A CN112333702 A CN 112333702A CN 202011200311 A CN202011200311 A CN 202011200311A CN 112333702 A CN112333702 A CN 112333702A
Authority
CN
China
Prior art keywords
user
task
noma
time
eavesdropper
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011200311.4A
Other languages
Chinese (zh)
Inventor
朱敏
林笑盈
李创
柴秋子
汪抑非
付立
吕巧玲
王绪康
沈新荣
杨春节
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Zeta Technology Co ltd
Original Assignee
Hangzhou Zeta Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Zeta Technology Co ltd filed Critical Hangzhou Zeta Technology Co ltd
Priority to CN202011200311.4A priority Critical patent/CN112333702A/en
Publication of CN112333702A publication Critical patent/CN112333702A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0215Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices
    • H04W28/0221Traffic management, e.g. flow control or congestion control based on user or device properties, e.g. MTC-capable devices power availability or consumption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0231Traffic management, e.g. flow control or congestion control based on communication conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints

Abstract

The invention relates to the technical field of communication, and aims to provide a delay minimization optimization method based on safe NOMA moving edge calculation. The invention is realized by an uplink NOMA-based MEC network, which consists of an access point AP integrated with an MEC server, a plurality of end users and an external malicious eavesdropper. Under the NOMA and partial unloading settings, a user can simultaneously unload partial computing tasks to the AP through the same resource block; and the BSS algorithm is provided to find the optimal solution of the transformation problem, and the performance of the provided algorithm is evaluated by carrying out numerical simulation. The invention can minimize the maximum task delay of the uplink NOMA user under the constraint of the security rate, the transmission power and the security interruption probability under the worst condition. The invention unloads the task completion to the server through safe complete unloading, has no task leakage loss, and meets the requirement of ideal conditions.

Description

Optimization method for delay minimization based on safe NOMA moving edge calculation
Technical Field
The invention relates to a delay minimization optimization method based on safe NOMA mobile edge calculation, and belongs to the technical field of communication.
Background
In recent years, the demand for mobile data traffic has proliferated in the internet of things (IoT) where large-scale wireless devices are deployed. Internet of things devices suffer from energy limitations due to strict device size limitations and production cost considerations. In addition, low computing power cannot support an increasing number of applications requiring sustainable and high-performance juicing, such as virtual/augmented reality (VR/AR), telesurgery, and autopilot.
To overcome these challenges, Mobile Edge Computing (MEC) and non-orthogonal multiple access (NOMA) are considered two promising technologies in internet of things networks. The basic idea of MEC is to utilize energy calculation facilities in the radio access network. Ding et al studied that the use of NOMA in combination with MEC can reduce energy consumption for delays and unloading. There are two modes of operation in MEC networks, referred to as partial computation offload (i.e., computation tasks are split into two parts, one of which is computed locally and the other is offloaded to an MEC server for computation) and binary computation offload (i.e., computation tasks are either executed locally or offloaded to an MEC server).
On the other hand, NOMA allows multiple users to operate simultaneously in the same frequency band at different power levels to improve spectral efficiency due to superposition coding at the transmitter and Successive Interference Cancellation (SIC) at the receiver. Wang et al first studied NOMA-based MEC networks with the goal of minimizing the weighted sum of the energy consumption of all mobile users, depending on the computational latency of the partial computation offload and binary computation offload modes. Ding et al studied the time and energy minimization problem based on NOMA-MEC networks, where different users require different computation times. Although extensive research has been conducted on MECs and NOMA in recent years, little work has been done to study the minimized completion time of NOMA MEC networks. In existing work, energy minimization is mainly focused on NOMA MEC networks. For example, to minimize the task delay of one NOMA user, the Dinkelbach method and Newton method of a hybrid NOMA MEC network are compared. In the aspects of power distribution, time distribution and task distribution for energy saving, the energy consumption of the NOMA MEC network is reduced to the maximum extent. Wu et al first studied the security offload problem in an upstream NOMA-MEC system with a malicious eavesdropper, where the privacy performance of computational offload was measured using privacy interruption probability by considering the actual passive eavesdropping scenario.
Due to the broadcast nature of wireless communication, the task of offloading from a terminal device to an access point over a wireless channel is vulnerable to eavesdroppers, leading to information leakage, and it is therefore of particular importance to investigate whether an MEC can successfully offload information and secure transmissions. The current research is based on the fact that under the condition that the channel state information of the eavesdropper is known, the indexes of the measurement are highly related to the instant or statistical channel state information of the eavesdropper. Based on this, a user unloads a computing task to an access point in a server through resource blocks in the network, and the unloaded task is attacked to cause information leakage due to interference of an eavesdropper in the unloading process.
Therefore, in the case of assuming the existence of an eavesdropper, it is important to study how to perform secure transmission of the uninstall information based on the existence of the eavesdropper. At present, no research result of related work is reported in the literature.
Disclosure of Invention
The technical problem to be solved by the invention is to overcome the defects in the prior art and provide a delay minimization optimization method based on safe NOMA moving edge calculation.
In order to solve the technical problem, the solution of the invention is as follows:
the delay minimization optimization method based on the safe NOMA moving edge calculation comprises the following steps:
(1) in an Internet of things system with wireless equipment deployed in a large scale, establishing a mobile edge computing MEC network based on uplink non-orthogonal multiple access (NOMA), wherein the network comprises an Access Point (AP) integrated with an MEC server and a plurality of users; all access point nodes AP are provided with single antennas, a wireless channel adopts a frequency non-selective quasi-static block fading model, and a partial unloading model is adopted for information transmission of a user; assuming that at least one external malicious eavesdropper accesses the MEC network through the access point AP;
the kth user is represented by an index K, where K ∈ {1, …, K }; user k obeys the initial assumptions of the model; in order to reduce the complexity of the system, only two users are supposed to be served in the same resource block, namely a user m and a user n, k belongs to { m, n }; in the same resource block, a user n is allowed to enter a time slot T; the time slot will be occupied by user n alone, but will not cause any performance interference to user m; (since NOMA systems are subject to strict interference constraints, it is also of practical interest to have two users dispatched to perform NOMA; in addition, it is more appropriate to group two users together than to perform NOMA with user pairing and implement LTE-A.)
(2) Obtaining the signal-to-noise ratio of a user receiving signals at an eavesdropper at an Access Point (AP) end according to a transmission model of an uplink NOMA;
(3) it is assumed that the eavesdropper eliminates the uplink interference before decoding the uplink user information, resulting in a message s at the eavesdropping endkThe received signal-to-noise ratio is processed, and the safety of the conservative task unloading is ensured under the worst-case assumption;
(4) the method comprises the steps of protecting transmission of messages by adopting wiener safety coding, and inserting redundant information into secret information to realize anti-monitoring; to ensure offloading security under any possible eavesdropping channel, the rate of confidential information per user must be no less than the offloading rate in the worst case;
(5) transferring a part of tasks of the user to an MEC server for remote execution, and calculating the task unloading time from the user to the MEC server;
(6) unloading a part of tasks of a user to an MEC server for remote calculation, and calculating the rest of tasks locally; introducing a privacy interruption probability to measure the privacy performance of task unloading, and calculating the optimization problem (P1) of the maximum task completion time of the uplink NOMA user under the condition of meeting the constraints of safety, transmission power and the privacy interruption probability;
(7) considering that the problem (P1) is non-convex, the optimization problem to be computed (P1) is further simplified by transformation, and the optimal solution of the optimization problem is found by using a bisection search algorithm.
In the present invention, in the step (1), the wireless channel is kept unchanged for a selected transmission period and has a limited duration; a task model that considers partial offloading of data partitions, where the input bits of each task are treated as independent subtasks; focusing on a particular time block having a duration T during which each user k needs to perform LkThe calculation task of more than 0 input bit;
in OMA-MEC, each user is typically allocated dedicated time or frequency resources in order to offload its tasks to the MEC server; by utilizing the NOMA principle, all users can unload own tasks on unified time or frequency resources at the same time; task model considering partial offloading of data, where the input bits of each task can be treated as independent subtasks, user k divides the respective task with/kAnd Lk-lkTwo parts of input bits are respectively calculated locally at a user and safely shunted to an AP for remote execution; the channel coefficients from user k to AP and eavesdropper are hAP,kAnd he,kIs represented by the formula (I) in which dAP,kAnd de,kRespectively representing the distances from user k to the AP and the eavesdropper; alpha is alphaThe path loss index is specified, and the normalized Rayleigh fading channel state is gAP,k,ge,kE.g. CN (0, 1); suppose that the AP knows exactly the instantaneous channel gain, i.e. | h, of each userAP,k|2But only the average channel gain of the eavesdropper over different fading realizations, i.e.
Figure BDA0002754101340000031
In the present invention, in the step (2), the signals received at the AP and the eavesdropper are respectively:
Figure BDA0002754101340000032
Figure BDA0002754101340000033
wherein s iskIs the task bearing signal E [ | s for user k to unloadk|2]=1,pk> 0 is the transmit power associated therewith, nAPIs at variance of
Figure BDA0002754101340000041
Zero-mean Additive White Gaussian Noise (AWGN), n at the AP of (1)eIs a variance of
Figure BDA0002754101340000042
Zero mean gaussian white noise (AWGN) at the eavesdropper;
the uplink adopts NOMA transmission, and the AP can successfully decode the received arbitrary sequence information; on the MEC server side, the message for user n is decoded before user m; s1NR received at the AP for decoding the user n message and the user m message is:
SINR4P,m=γAP,mpm
SINRAP,n=γAP,npn/1+γAP,mpm
wherein the content of the first and second substances,
Figure BDA0002754101340000043
and
Figure BDA0002754101340000044
in the formula, hAP,mAnd hAP,nRespectively representing the channel coefficients from user m to the AP and the channel coefficients from user n to the AP,
Figure BDA0002754101340000045
represents the variance, p, of zero-mean Additive White Gaussian Noise (AWGN) at the APmRepresenting the transmission power, y, of user mAP,mRepresents the path loss, γ, from user m to the APAP,nRepresenting the path loss from user n to the AP.
(according to the uplink NOMA mechanism, the AP allows user n to enter user m's dedicated time slot without any performance degradation to user m; user n is decoded before user m at the MEC server
In the present invention, in the step (3), assuming that the eavesdropper can eliminate the uplink interference before decoding the information of the uplink user, the eavesdropper will decode the information of the uplink user in the message skWhere the received signal-to-noise ratio is:
SINRe,k=γe,kpk,k∈{m,n}
Figure BDA0002754101340000046
in the formula, gammae,kRepresenting the loss of k users at the eavesdropping end, k representing user m and user n.
In the present invention, in the step (4), redundant information is inserted into the secret information, and each user uses the code word transmission rate Rt,kAnd a secret information rate Rs,kThe rate of the whole code word is Rt,k=Rs,k+Re,k,k∈{m,n}。
In the present invention, in the step (5), in the unloading time phase, part of the tasks are unloaded to the MEC server for each user, and the task unloading time and the unloading energy consumption from the user k to the MEC server are respectively:
Figure BDA0002754101340000047
Figure BDA0002754101340000048
in the present invention, in the step (6), in the moving execution time phase, for the user k, a part of the task L is executedk-lkOff-load to MEC server for remote juice calculation, and remaining tasks lkThen the calculation is performed locally; indicates that the CPU frequency of user k is
Figure BDA0002754101340000051
A period per second; ckRepresenting the number of CPU cycles required to compute a task;
the local juicing time and energy consumption of the user k are respectively as follows:
Figure BDA0002754101340000052
Figure BDA0002754101340000053
in the formula, LkThe input bit of the computing task which represents the user to execute is divided into two parts Lk-lkAnd lk,ξkRepresenting the effective capacitance coefficient of each CPU of a local user k;
defining a secret interruption probability to measure the secret performance of task offloading, using CAP,k=log2(1+SINRAP,kAnd Ce,k=log2(1+SINRe,k) Representing APs and eavesdroppersThe channel capacity of (a); message skIs denoted as Pso,k=P{Rt,k-Rs,k<Ce,k},
Figure BDA0002754101340000054
For user k, if Ce,kOver Rt,k-Rs,kConfidential offload data may be decoded by an eavesdropper and a privacy disruption event may occur; therefore, an optimization problem that minimizes the maximum task completion time of upstream NOMA users is defined as a problem subject to computational task execution offload security, transmit power, and privacy outage probability constraints (P1):
(P1):
Figure BDA0002754101340000055
s.t.
Figure BDA0002754101340000056
Figure BDA0002754101340000057
Figure BDA0002754101340000058
Figure BDA0002754101340000059
Rt,k≤CAP,k,k∈{m,n} (f)
Rs,k≤Rt,k,k∈{m,n} (g)
Pso,k≤ε,k∈{m,n} (h)
wherein l ═ lm,ln],p=[pm,pn],Rt=[Rt,m,Rt,n]And Rs=[Rs,m,Rs,n];
Wherein B represents the system bandwidth, 0 < epsilon < 1 represents the maximum tolerable privacy interruption probability,
Figure BDA00027541013400000510
represents the maximum allowed number of bits to be computed locally,
Figure BDA00027541013400000511
indicates that the CPU frequency of user k is
Figure BDA00027541013400000512
Is the user k to MEC server task offload time,
Figure BDA00027541013400000513
local computation time of user k, CAP,kRepresenting the channel capacity of the AP, user k-code transmission rate Rt,kAnd a secret information rate Rs,k(ii) a The constraint (d) ensures that the energy consumed by each mobile user is limited to a maximum consumption Emax(ii) a In constraint (e), the worst-case privacy rate for each user k must not be less than the offload rate to ensure offload under any possible eavesdropper corridor; constraint (f) ensures that the AP can correctly decode the message Sk(ii) a The privacy constraint (h) represents the maximum allowed privacy disruption probability epsilon for each message.
In the present invention, in the step (7), the optimization problem (P1) is simplified by using lemma and theorem, and specifically includes:
introduction 1: introducing decision variables l, p, RtAnd RsTo meet the optimal solution requirements of the optimization problem (P1);
Rt,n=log2(1+γAP,npn/(1+γAP,mpm))
Rt,m=log2(1+γAP,mpm)
Figure BDA0002754101340000061
2, leading: to minimize the maximum task completion time for different users, if and only if the offload time for each user is equal to each other
Figure BDA0002754101340000062
And the unloading time is equal to the local juice calculating time
Figure BDA0002754101340000063
Then, an optimal solution can be obtained
Figure BDA0002754101340000064
Namely, it is
Figure BDA0002754101340000065
Theorem 1: based on the theorem 1, the probability constraint of the privacy interruption is defined as follows:
Figure BDA0002754101340000066
Figure BDA0002754101340000067
wherein the content of the first and second substances,
Figure BDA0002754101340000068
theorem 2: when the objective function is optimal, at least one equation is taken for the simplified inequality formula in the optimization problem (P1), the formula being:
Figure BDA0002754101340000069
Figure BDA00027541013400000610
when in use
Figure BDA00027541013400000611
Is provided with
Figure BDA00027541013400000612
When in use
Figure BDA00027541013400000613
Is provided with
Figure BDA00027541013400000614
In the formula, CmRepresenting the number of CPU cycles required by the user m to calculate a task; maximum energy consumption of the user EmaxUser n privacy interrupt probability xin(ii) a User n calculates time locally
Figure BDA0002754101340000071
The transmission rate of the code word of the user m, n is Rt,m,Rt,n(ii) a Secret information rate Rs,m,Rs,n. The
Figure BDA0002754101340000072
And
Figure BDA0002754101340000073
the optimal solution is the final result of the optimization method of delay minimization. The minimization of the delay refers to obtaining the optimal solution for the decision variables of the constraint conditions. Due to pnAnd pmHas constraint, solves the problem by BBS algorithm, and finds the optimum by binary search method
Figure BDA0002754101340000074
And
Figure BDA0002754101340000075
obtaining decision variables
Figure BDA0002754101340000076
And
Figure BDA0002754101340000077
the optimal solution of (1).
Description of the inventive principles:
the invention studies how to perform secure transmission of offload information based on the presence of an eavesdropper, assuming the presence of the eavesdropper. In a scene with an eavesdropper, the maximum task completion time in a minimized NOMA uplink user in the NOMA mobile edge computing network is researched, the task delay of the NOMA user is optimized, and the energy consumption of the NOMA-MEC network is reduced to the maximum extent through efficient power distribution and task distribution.
The invention is realized by an MEC network based on uplink NOMA. The network consists of an Access Point (AP) integrated with the MEC server, a plurality of end users and an external malicious eavesdropper. Under NOMA and partial offload settings, a user may offload portions of the computational tasks to the AP simultaneously over the same resource block. The problem of minimizing the task completion time on the premise of ensuring security is studied, and the aim of the invention is to minimize the maximum task delay of the uplink NOMA user under the constraints of the security rate, transmission power and security interruption probability under the worst condition. Since the formulation problem is a non-convex problem, it is difficult to solve, but after gaining important insight into the above-described technique, the original formulation problem has been changed to a simplified form. Therefore, the invention provides a BSS algorithm to find the optimal solution of the transformation problem, and numerical simulation is carried out to evaluate the performance of the proposed algorithm.
Uplink non-orthogonal multiple access (NOMA) -based Mobile Edge Computing (MEC) networks in the presence of malicious eavesdroppers are contemplated herein. The optimal solution means that the task completion time minimization problem is researched on the premise of ensuring safety. The problem is determined by the worst-case secret rate, transmit power and secret interruption probability constraint variables, and the problem under study is optimized by solving the constraint variables optimally, with the aim of minimizing the maximum task latency of the upstream NOMA users. Because the non-convexity of the problem can not be directly solved, the invention provides an algorithm based on a Binary Search System (BSS), and because the transmitting power p of n users and m usersnAnd pmHas constraint between them to solve the problem by BBS algorithm, and uses binary search method to find out optimum
Figure BDA0002754101340000078
And
Figure BDA0002754101340000079
obtaining the probability of a privacy break for decision variables n and m users
Figure BDA0002754101340000081
And
Figure BDA0002754101340000082
the optimal solution of (2) minimizes the maximum task completion delay through the optimal solution, and then the optimization problem of minimizing the maximum task completion time can be solved. Since in NOMA-based MEC networks there is little research effort in minimizing the maximum task completion time of the network, this algorithm is used to optimize the minimization of NOMA user task delays.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the invention, under the condition that a malicious eavesdropper exists, the maximum task time problem is minimally completed by the MEC network which enables the uplink NOMA, wherein a plurality of users simultaneously unload part of computing tasks to the AP through the same resource block. The problem of minimizing the task completion time on the premise of ensuring safety is researched, and the maximum task delay of the uplink NOMA user is minimized under the constraints of the confidentiality rate, the transmission power and the confidentiality interruption probability under the worst condition.
2. Due to the non-salient problem of the proposed problem, the present invention reformulates the problem and proposes a BSS algorithm to achieve the minimum task completion time for the optimal solution. The correctness of theoretical analysis is verified by using a numerical result, the relationship between the task delay and the maximum power consumption of each user under different schemes is evaluated, and in fig. 3, the relationship between the task delay and the maximum power consumption of each user under different schemes is evaluated. As the maximum power increases, the task completion time of the proposed scheme decreases accordingly, because a larger power range can help provide a higher offload rate, so that the offload information task time decreases. The NOMA-based offload scheme may provide a higher offload data rate than the OFDM scheme, so performance is better than the OFMA scheme. Fig. 4 evaluates the relationship between the task delay and the number of calculation input bits, and the task completion time increases with the increase of the calculation input bits, and the proposed scheme can achieve a shorter task completion time and thus a better unloading rate than the OFMA scheme. And proves the advantages of the proposed algorithm over the existing OFMA secure ofdma offload scheme.
3. Compared with the two reference schemes of safe complete unloading and OFMA safe OFDMA unloading in the prior art, the invention unloads the task completion to the server through the safe complete unloading, has no task leakage loss, and meets the requirement of ideal conditions. In the case of eavesdropper-based, by comparing with the OFMA secure ofdma prior art, it can be analyzed through the graph that the task completion time obtains a higher offload rate than the OFDM offload scheme, and is lower than the secure full offload rate. It can be shown that a shorter task completion time is obtained than in the prior art OFMA secure ofdma offload.
Drawings
FIG. 1 is a block diagram of a secure NOMA mobile edge computing system model with anti-eavesdropping capability according to the present invention.
Fig. 2 shows the convergence performance and optimality of the BSS algorithm in the present invention, compared with the optimal analytic expression obtained by the lagrangian method.
Fig. 3 is a relationship between task delay and maximum power of each user in the BSS algorithm based on two reference schemes of safe complete offloading and safe ofdma.
FIG. 4 shows the task delay and calculation input bit L under the BSS algorithm and the two reference schemes of safe complete unloading and safe OFDMAkA quantitative relationship.
Detailed Description
The invention provides a delay minimization optimization method based on secure NOMA mobile edge calculation, which is used for researching the minimized maximum task completion time problem of an MEC network which enables uplink NOMA under the condition that a malicious eavesdropper exists, wherein a plurality of users simultaneously unload part of calculation tasks to an AP through one resource block. Due to the non-convexity of the problem, an optimal solution is sought to accomplish the minimum task completion time.
A delay minimization optimization method based on safe NOMA moving edge calculation comprises the following steps:
(1) in an Internet of things system with wireless equipment deployed in a large scale, establishing a mobile edge computing MEC network based on uplink non-orthogonal multiple access (NOMA), wherein the network comprises an Access Point (AP) integrated with an MEC server and a plurality of users; all access point nodes AP are provided with single antennas, a wireless channel adopts a frequency non-selective quasi-static block fading model, and a partial unloading model is adopted for information transmission of a user; assuming that at least one external malicious eavesdropper accesses the MEC network through the access point AP;
the kth user is represented by an index K, where K ∈ {1, …, K }; user k obeys the initial assumptions of the model; in order to reduce the complexity of the system, only two users are supposed to be served in the same resource block, namely a user m and a user n, k belongs to { m, n }; in the same resource block, a user n is allowed to enter a time slot T; the time slot will be occupied by user n alone, but will not cause any performance interference to user m; since NOMA systems are subject to strict interference limitations, it is also of practical interest to dispatch two users to perform NOMA. In addition, two users are grouped together, and NOMA is carried out on the user pair, so that LTE-A is more suitable.
The wireless channel remains unchanged for a selected transmission period and is limited in duration; a task model that considers partial offloading of data partitions, where the input bits of each task are treated as independent subtasks; focusing on a particular time block having a duration T during which each user k needs to perform LkThe calculation task of more than 0 input bit;
in OMA-MEC, each user is typically allocated dedicated time or frequency resources in order to offload its tasks to the MEC server; by using the NOMA principle, allThe user unloads own tasks on unified time or frequency resources at the same time; task model considering partial offloading of data, where the input bits of each task can be treated as independent subtasks, user k divides the respective task with/kAnd Lk-lkTwo parts of input bits are respectively calculated locally at a user and safely shunted to an AP for remote execution; the channel coefficients from user k to AP and eavesdropper are hAP,kAnd he,kIs represented by the formula (I) in which dAP,kAnd de,kRespectively representing the distances from user k to the AP and the eavesdropper; alpha is the path loss exponent and the normalized Rayleigh fading channel state is gAP,k,ge,kE.g. CN (0, 1); suppose that the AP knows exactly the instantaneous channel gain, i.e. | h, of each userAP,k|2But only the average channel gain of the eavesdropper over different fading realizations, i.e.
Figure BDA0002754101340000101
(2) Obtaining the signal-to-noise ratio of a user receiving signals at an eavesdropper at an Access Point (AP) end according to a transmission model of an uplink NOMA;
the signals received at the AP and the eavesdropper are:
Figure BDA0002754101340000102
Figure BDA0002754101340000103
wherein s iskIs the task bearing signal E [ | s for user k to unloadk|2]=1,pk> 0 is the transmit power associated therewith, nAPIs at variance of
Figure BDA0002754101340000104
Of AP, neIs a variance of
Figure BDA0002754101340000105
Zero mean gaussian white noise at the eavesdropper;
the uplink adopts NOMA transmission, and the AP can successfully decode the received arbitrary sequence information; on the MEC server side, the message for user n is decoded before user m; the SINRs received at the AP to decode the user n message and the user m message are respectively:
SINRAP,m=γAP,mpm
SINRAP,n=γAP,npn/1+γAP,mPm
wherein the content of the first and second substances,
Figure BDA0002754101340000106
and
Figure BDA0002754101340000107
in the formula, hAP,mAnd hAP,nRespectively representing the channel coefficients from user m to the AP and the channel coefficients from user n to the AP,
Figure BDA0002754101340000108
represents the variance, p, of zero-mean Additive White Gaussian Noise (AWGN) at the APmRepresenting the transmission power, y, of user mAP,mRepresents the path loss, γ, from user m to the APAP,nRepresenting the path loss from user n to the AP.
According to the uplink NOMA mechanism, the AP allows the user n to enter the dedicated timeslot of the user m without causing any performance degradation to the user m; the message for user n on the MEC server is decoded before user m. Therefore, the SINR of the messages received at the AP for decoding user n and user m, respectively, is given by the above equation.
(3) It is assumed that the eavesdropper eliminates the uplink interference before decoding the uplink user information, resulting in a message s at the eavesdropping endkThe received signal-to-noise ratio is processed, and the safety of the conservative task unloading is ensured under the worst-case assumption;
assuming that the eavesdropper can eliminate the uplink interference before decoding the information of the uplink user, the eavesdropper performs the decoding on the message skWhere the received signal-to-noise ratio is:
SINRe,k=γe,kpk,k∈{m,n}
Figure BDA0002754101340000111
in the formula, gammae,kRepresenting the loss of k users at the eavesdropping end, k representing user m and user n.
The assumption here overestimates the eavesdropper's capability, which is a so-called worst-case assumption from the perspective of the legitimate receiver (i.e., the AP) to ensure security of conservative task offloading, since the AP is neither aware of the eavesdropper's capability nor the instantaneous CSI.
(4) The method comprises the steps of protecting transmission of messages by adopting wiener safety coding, and inserting redundant information into secret information to realize anti-monitoring; to ensure offloading security under any possible eavesdropping channel, the rate of confidential information per user must be no less than the offloading rate in the worst case;
inserting redundant information in secret information, each user using code word transmission rate Rt,kAnd a secret information rate Rs,kThe rate of the whole code word is Rt,k=Rs,k+Re,k,k∈{m,n}。
(5) Transferring a part of tasks of the user to the MEC server for remote execution, and calculating the task unloading time from the user to the MEC server:
in the unloading time stage, partial tasks are unloaded to the MEC server for each user, and the task unloading time and the unloading energy consumption from the user k to the MEC server are respectively as follows:
Figure BDA0002754101340000112
Figure BDA0002754101340000113
(6) unloading a part of tasks of a user to an MEC server for remote calculation, and calculating the rest of tasks locally; introducing a privacy interruption probability to measure the privacy performance of task unloading, and calculating the optimization problem (P1) of the maximum task completion time of the uplink NOMA user under the condition of meeting the constraints of safety, transmission power and the privacy interruption probability;
in the mobile execution time phase, for a user k, part of a task Lk-lkOff-load to MEC server for remote computation, and remaining tasks lkThen the calculation is performed locally; indicates that the CPU frequency of user k is
Figure BDA0002754101340000114
A period per second; ckRepresenting the number of CPU cycles required to compute a task;
the local computation time and energy consumption of user k are respectively:
Figure BDA0002754101340000121
Figure BDA0002754101340000122
in the formula, LkThe input bit of the computing task which represents the user to execute is divided into two parts Lk-lkAnd lk,ξkRepresenting the effective capacitance coefficient of each CPU of a local user k;
defining a secret interruption probability to measure the secret performance of task offloading, using CAP,k=log2(1+SINRAP,kAnd Ce,k=log2(1+SINRe,k) Representing the channel capacity of the AP and the eavesdropper; the secret interruption probability of the message sk is expressed as
Figure BDA0002754101340000123
For user k andin other words, if Ce,kOver Rt,k-Rs,kConfidential offload data may be decoded by an eavesdropper and a privacy disruption event may occur; therefore, an optimization problem that minimizes the maximum task completion time of upstream NOMA users is defined as a problem subject to computational task execution offload security, transmit power, and privacy outage probability constraints (P1):
(P1):
Figure BDA0002754101340000124
s.t.
Figure BDA0002754101340000125
Figure BDA0002754101340000126
Figure BDA0002754101340000127
Figure BDA0002754101340000128
Rt,k≤CAP,k,k∈{m,n} (f)
Rs,k≤Rt,k,k∈{m,n} (g)
Pso,k≤ε,k∈{m,n} (h)
wherein 1 ═ lm,ln],p=[pm,pn],Rt=[Rt,m,Rt,n]And Rs=[Rs,m,Rs,n];
Wherein B represents the system bandwidth, 0 < epsilon < 1 represents the maximum tolerable privacy interruption probability,
Figure BDA0002754101340000129
representing the most locally computed bitsThe number of the large allowable number,
Figure BDA00027541013400001210
indicates that the CPU frequency of user k is
Figure BDA00027541013400001211
Is the user k to MEC server task offload time,
Figure BDA00027541013400001212
local computation time of user k, CAP,kRepresenting the channel capacity of the AP, user k-code transmission rate Rt,kAnd a secret information rate Rs,k(ii) a The constraint (d) ensures that the energy consumed by each mobile user is limited to a maximum consumption Emax(ii) a In constraint (e), the worst-case privacy rate for each user k must not be less than the offload rate to ensure offload under any possible eavesdropper corridor; constraint (f) ensures that the AP can correctly decode the message sk(ii) a The privacy constraint (h) represents the maximum allowed privacy disruption probability epsilon for each message.
(7) Considering that the problem (P1) is non-convex, the optimization problem to be calculated (P1) is further simplified through transformation, the optimization problem is simplified by lemma and theorem, and a halving search algorithm is used for finding the optimal solution of the optimization problem.
Simplifying the optimization problem by using lemmas and theorems (P1), specifically including:
introduction 1: introducing decision variables l, p, RtAnd RsTo meet the optimal solution requirements of the optimization problem (P1);
Rt,n=log2(1+γAP,npn/(1+γAP,mpm))
Rt,m=log2(1+γAP,mpm)
Figure BDA0002754101340000131
2, leading: to minimize the maximum task completion time of different usersIf and only if the offload time of each user equals each other
Figure BDA0002754101340000132
And the offload time is equal to the local computation time
Figure BDA0002754101340000133
Then, an optimal solution can be obtained
Figure BDA0002754101340000134
Namely, it is
Figure BDA0002754101340000135
Theorem 1: based on the theorem 1, the probability constraint of the privacy interruption is defined as follows:
Figure BDA0002754101340000136
Figure BDA0002754101340000137
wherein the content of the first and second substances,
Figure BDA0002754101340000138
theorem 2: when the objective function is optimal, at least one equation is taken for the simplified inequality formula in the optimization problem (P1), the formula being:
Figure BDA0002754101340000139
Figure BDA00027541013400001310
when in use
Figure BDA00027541013400001311
Is provided with
Figure BDA00027541013400001312
When in use
Figure BDA00027541013400001313
Is provided with
Figure BDA00027541013400001314
In the formula, CmRepresenting the number of CPU cycles required by the user m to calculate a task; maximum energy consumption of the user EmaxUser n privacy interrupt probability xin(ii) a User n calculates time locally
Figure BDA0002754101340000141
The transmission rate of the code word of the user m, n is Rt,m,Rt,n(ii) a Secret information rate Rs,m,Rs,n
For a clearer explanation, the process of simplifying the optimization problem by using lemmas and theorems in the derivation of the optimization problem in steps (6) and (7) is further described below.
Step 1: the maximum task completion time of the uplink NOMA user is reduced to the maximum extent under the constraint of the unloading safety, the transmitting power and the secret interruption probability of the calculation task execution.
Mathematically, this optimization problem can be expressed as:
problem (P1):
Figure BDA0002754101340000142
s.t.
Figure BDA0002754101340000143
Figure BDA0002754101340000144
Figure BDA0002754101340000145
Figure BDA0002754101340000146
Rt,k≤CAP,k,k∈{m,n} (1f)
Rs,k≤Rt,k,k∈{m,n} (1g)
Figure BDA0002754101340000147
wherein l ═ lm,ln],p=[pm,pn],Rt=[Rt,m,Rt,n]And Rs=[Rs,m,Rs,n]. B represents the system bandwidth, 0 < epsilon < 1 represents the maximum allowed probability of a privacy interruption, and
Figure BDA0002754101340000148
representing the maximum allowed number of bits to be computed locally. The constraint (1d) ensures that the energy consumed by each mobile user is limited to a maximum consumption Emax. Note that in constraint (1e), the worst-case privacy rate for each user k must not be less than the offload rate to ensure offload in any possible eavesdropper path. Constraint (1f) ensures that the AP can correctly decode the message sk. The privacy constraint (1h) represents the maximum allowed privacy disruption probability epsilon for each message.
Some lemmas and theorems are proposed to simplify the optimization problem before solving it (P1). Then, a BSS algorithm is proposed to find the best solution to the problem (P1).
Introduction 1: decision variables l, p, RtAnd RsThe optimal solution to the problem (P1) should satisfy:
Rt,n=log2(1+γAP,npn/(1+γAP,mPm)) (2)
Rt,m=log2(1+γAP,mpm) (3)
Figure BDA0002754101340000151
2, leading: for any two users in a NOMA MEC network, in order to minimize the maximum task completion time of the different users, i.e. to minimize the number of different users
Figure BDA0002754101340000152
If and only if the offload time of each user equals each other
Figure BDA0002754101340000153
And the offload time is equal to the local computation time
Figure BDA0002754101340000154
Then, an optimal solution can be obtained
Figure BDA0002754101340000155
And (3) proving that: first, it proves
Figure BDA0002754101340000156
Suppose in
Figure BDA0002754101340000157
The optimal solution is obtained, and the minimum time delay is T*And the optimal solution
Figure BDA0002754101340000158
Since user n decodes its signal first, if so
Figure BDA0002754101340000159
Is increased to
Figure BDA00027541013400001510
Then
Figure BDA00027541013400001511
Will be reduced.
Figure BDA00027541013400001512
Is fixed, and
Figure BDA00027541013400001513
it will increase. Therefore, must exist
Figure BDA00027541013400001514
Satisfy the requirement of
Figure BDA00027541013400001515
Therefore, the temperature of the molten metal is controlled,
Figure BDA00027541013400001516
should be an optimum time consumption, this is in contrast to
Figure BDA00027541013400001517
The assumption of being the best solution to the problem (P1) contradicts.
Secondly, prove that
Figure BDA00027541013400001518
Suppose in
Figure BDA00027541013400001519
The optimal solution is obtained, and the minimum time delay is T*And the optimal solution
Figure BDA00027541013400001520
Please note that when lmWhen the number of the carbon atoms is increased,
Figure BDA00027541013400001521
will increase and
Figure BDA00027541013400001522
will be reduced. Thus, the optimal solution can be written to satisfy both the energy constraint and the power constraint
Figure BDA00027541013400001523
Therefore, there must be a solution to
Figure BDA00027541013400001524
Is/are as follows
Figure BDA00027541013400001525
Therefore, the temperature of the molten metal is controlled,
Figure BDA00027541013400001526
should be the optimum time consumption, this is in conjunction with T*Is a minimum latency of
Figure BDA00027541013400001527
The assumption of being the best solution to the problem (P1) contradicts.
Step 2: theorem 1: based on the lemma 1, the following restatement is performed on the privacy interruption probability constraint (1h), and the formula is as follows:
Figure BDA00027541013400001528
Figure BDA00027541013400001529
wherein
Figure BDA00027541013400001530
And (3) proving that: first of all, attention is paid to the probability of a privacy break Pso,n. By substituting (2) and (3)
Figure BDA0002754101340000161
Pso,nCan be re-represented as
Figure BDA0002754101340000162
Wherein
Figure BDA0002754101340000163
|he,n|2Is a Probability Density Function (PDF)
Figure BDA0002754101340000164
Then, Pso,nThe following can be calculated:
Figure BDA0002754101340000165
thus, substituting (9) for (1h) yields
Figure BDA0002754101340000166
The inequality in (16) can be obtained immediately after some basic mathematical transformation. Next, the privacy disruption probability P will be rewrittenso,m. Also, please note | he,m|2PDF of
Figure BDA0002754101340000167
Is provided with
Figure BDA0002754101340000168
Wherein
Figure BDA0002754101340000169
Then, based on the inequality in (1h) in combination with the results given in (10), the inequality in (7) can be directly derived. The proof of theorem 1 is completed.
Then, the problem (P1) can be equivalently reconstructed as the problem (P2):
(P2):
Figure BDA00027541013400001610
s.t.
Figure BDA00027541013400001611
Figure BDA00027541013400001612
Figure BDA00027541013400001613
Figure BDA00027541013400001614
Figure BDA0002754101340000171
(Lm-lm)/Rs,m=(Ln-ln)/Rs,n. (11g)
Figure BDA0002754101340000172
from (11 h):
Figure BDA0002754101340000173
from (11g) and (12):
Figure BDA0002754101340000174
then, the problem (P2) is reduced to
(P3):
Figure BDA0002754101340000175
Figure BDA0002754101340000176
Figure BDA0002754101340000177
Figure BDA0002754101340000178
Figure BDA0002754101340000179
Figure BDA00027541013400001710
(Lm-lm)/Rs,m=(Ln-ln)/Rs,n. (14g)
And step 3: theorem 2: when the objective function is optimal, at least one of (14c) and (14d) is an equation.
And (3) proving that: suppose when and
Figure BDA00027541013400001711
obtaining an optimal solution in time
Figure BDA00027541013400001712
And
Figure BDA00027541013400001713
in this case, there must be a small positive value
Figure BDA00027541013400001714
ΔpmAnd Δ lmOrder to
Figure BDA00027541013400001715
And (4) meeting the requirement.
Figure BDA00027541013400001716
Should be the best time consuming because of its low value. This is falseThe settings contradict, so the proof of theorem 2 is complete.
Case 1: when (14c) is taken as an equation, i.e.
Figure BDA00027541013400001717
To obtain
Figure BDA00027541013400001718
By substituting (13) and (15) into (14d), (14e) and (14f), the compounds are obtained
Figure BDA0002754101340000181
Figure BDA0002754101340000182
Figure BDA0002754101340000183
Wherein
Figure BDA0002754101340000184
When R iss,mWhen increasing, the objective function will decrease, and when p is increasedmWhen increased, Rs,nWill be increased. P is to benAnd pmThe constraint between is expressed as:
Figure BDA00027541013400001818
thus, a binary search method can be used to find
Figure BDA0002754101340000185
And
Figure BDA0002754101340000186
the details are presented in algorithm 1. New lower bound r1And an upper bound r2Can be obtained by the inequality (17). Therefore, the temperature of the molten metal is controlled,
Figure BDA0002754101340000187
can be obtained by (15), then
Figure BDA0002754101340000188
The optimal solution of (2) can be obtained by (13).
Algorithm 1: BSS-based problem algorithm (P3)
1. Initialization
Figure BDA0002754101340000189
And precision
Figure BDA00027541013400001819
2.while
Figure BDA00027541013400001810
When the temperature of the water is higher than the set temperature,
3. is provided with
Figure BDA00027541013400001811
4. Finding
Figure BDA00027541013400001812
5.if
Figure BDA00027541013400001813
Then
6. Updating
Figure BDA00027541013400001814
7. Otherwise
8. Updating
Figure BDA00027541013400001815
9. End if cycle
10. End of cycle
11. Output of:
Figure BDA00027541013400001816
Case 2: when (14d) is taken as equation
Figure BDA00027541013400001817
When there is
Figure BDA0002754101340000191
Similarly, (13) and (20) are substituted into (14c), (14e) and (14f) at pnAnd pmWith constraints in between, and then solve the problem by algorithm 1 (P3) to obtain the optimum
Figure BDA0002754101340000192
And
Figure BDA0002754101340000193
that obtains
Figure BDA0002754101340000194
And
Figure BDA0002754101340000195
the optimal solution of (1).
And 4, step 4: compared to the following two reference schemes of the prior art, numerical results will be provided to evaluate the performance of the proposed algorithm.
(1) Safe complete unloading: all users choose to offload all task input bits to the AP, calculated in the considered secure NOMA-MEC system. The scheme corresponds to passing the settings
Figure BDA0002754101340000196
The problem is solved (P1).
(2) Secure Orthogonal Frequency Division Multiple Access (OFDMA): two users adopt OFDMA protocol to calculate and distribute, and each user occupies a frequency band to share the task.
Setting simulation parameters, and calculating the unloaded system bandwidth as B1 MHzThe path loss exponent α is 4, the secret break probability ∈ is 0.1, and the noise variance is
Figure BDA0002754101340000197
CPU cycle of Cm=Cn=103Period/bit, effective capacitance coefficient xim=ξn=10-28Calculating the input digit as Lk=1.6×106Bit sum
Figure BDA0002754101340000198
Fig. 2 illustrates the convergence behavior and optimality of algorithm 1. As can be seen from fig. 2, the BSS algorithm converges to the same constant value in 8 iterations, thereby verifying the validity of the algorithm. The convergence point is completely matched with the optimal analytic solution obtained by the Lagrangian method.
The relationship between the task delay and the maximum power per user under different schemes is evaluated in fig. 3. As the maximum power increases, the task completion time of the proposed solution decreases accordingly. This is because a larger maximum power range can help provide a higher unload rate, thereby reducing unload time. Furthermore, the BSS algorithm has better performance than the OFDMA scheme since the NOMA-based offload scheme can provide a higher offload data rate than the OFDMA scheme.
FIG. 4 illustrates task delay and computation of input bit LkThe relationship of the quantities is shown. Task completion time dependent computation input bit LkIs increased. Also, the BSS algorithm scheme can achieve a shorter task completion time than the OFDMA scheme, thereby obtaining a better data transmission rate.
The above description is only for the preferred embodiments of the present invention, but the protection scope of the present invention is not limited thereto, and any person skilled in the art can substitute or change the technical solution of the present invention and the inventive concept within the scope of the present invention, which is disclosed by the present invention, and the equivalent or change thereof belongs to the protection scope of the present invention.

Claims (8)

1. A delay minimization optimization method based on safe NOMA moving edge calculation is characterized by comprising the following steps:
(1) in an Internet of things system with wireless equipment deployed in a large scale, establishing a mobile edge computing MEC network based on uplink non-orthogonal multiple access (NOMA), wherein the network comprises an Access Point (AP) integrated with an MEC server and a plurality of users; all access point nodes AP are provided with single antennas, a wireless channel adopts a frequency non-selective quasi-static block fading model, and a partial unloading model is adopted for information transmission of a user; assuming that at least one external malicious eavesdropper accesses the MEC network through the access point AP;
the kth user is represented by an index K, where K ∈ {1, …, K }; user k obeys the initial assumptions of the model; in order to reduce the complexity of the system, only two users are supposed to be served in the same resource block, namely a user m and a user n, k belongs to { m, n }; in the same resource block, a user n is allowed to enter a time slot T; the time slot will be occupied by user n alone, but will not cause any performance interference to user m;
(2) obtaining the signal-to-noise ratio of a user receiving signals at an eavesdropper at an Access Point (AP) end according to a transmission model of an uplink NOMA;
(3) it is assumed that the eavesdropper eliminates the uplink interference before decoding the uplink user information, resulting in a message s at the eavesdropping endkThe received signal-to-noise ratio is processed, and the safety of the conservative task unloading is ensured under the worst-case assumption;
(4) the method comprises the steps of protecting transmission of messages by adopting wiener safety coding, and inserting redundant information into secret information to realize anti-monitoring; to ensure offloading security under any possible eavesdropping channel, the rate of confidential information per user must be no less than the offloading rate in the worst case;
(5) transferring a part of tasks of the user to an MEC server for remote execution, and calculating the task unloading time from the user to the MEC server;
(6) unloading a part of tasks of a user to an MEC server for remote calculation, and calculating the rest of tasks locally; introducing a privacy interruption probability to measure the privacy performance of task unloading, and calculating the optimization problem (P1) of the maximum task completion time of the uplink NOMA user under the condition of meeting the constraints of safety, transmission power and the privacy interruption probability;
(7) considering that the problem (P1) is non-convex, the optimization problem to be computed (P1) is further simplified by transformation, and the optimal solution of the optimization problem is found by using a bisection search algorithm.
2. The method of claim 1, wherein in step (1), the wireless channel remains unchanged for a selected transmission period and has a limited duration; a task model that considers partial offloading of data partitions, where the input bits of each task are treated as independent subtasks; focusing on a particular time block having a duration T during which each user k needs to perform LkThe calculation task of more than 0 input bit;
in OMA-MEC, each user is typically allocated dedicated time or frequency resources in order to offload its tasks to the MEC server; by utilizing the NOMA principle, all users can unload own tasks on unified time or frequency resources at the same time; task model considering partial offloading of data, where the input bits of each task can be treated as independent subtasks, user k divides the respective task with/kAnd Lk-lkTwo parts of input bits are respectively calculated locally at a user and safely shunted to an AP for remote execution; the channel coefficients from user k to AP and eavesdropper are hAP,kAnd he,kIs represented by the formula (I) in which dAP,kAnd de,kRespectively representing the distances from user k to the AP and the eavesdropper; alpha is the path loss exponent and the normalized Rayleigh fading channel state is gAP,k,ge,kE.g. CN (0, 1); suppose that the AP knows exactly the instantaneous channel gain, i.e. | h, of each userAP,k|2But only the average channel gain of the eavesdropper over different fading realizations, i.e.
Figure FDA0002754101330000021
3. The method according to claim 1, wherein in the step (2), the signals received at the AP and the bug are respectively:
Figure FDA0002754101330000022
Figure FDA0002754101330000023
wherein s iskIs the task bearing signal E [ | s for user k to unloadk|2]=1,pk> 0 is the transmit power associated therewith, nAPIs at variance of
Figure FDA0002754101330000024
Of AP, neIs a variance of
Figure FDA0002754101330000025
Zero mean gaussian white noise at the eavesdropper;
the uplink adopts NOMA transmission, and the AP can successfully decode the received arbitrary sequence information; on the MEC server side, the message for user n is decoded before user m; the SINRs received at the AP to decode the user n message and the user m message are respectively:
SINRAP,m=γAP,mpm
SINRAP,n=γAP,npn/1+γAP,mpm
wherein the content of the first and second substances,
Figure FDA0002754101330000026
and
Figure FDA0002754101330000027
in the formula,hAP,mAnd hAP,nRespectively representing the channel coefficients from user m to the AP and the channel coefficients from user n to the AP,
Figure FDA0002754101330000028
represents the variance, p, of zero-mean Additive White Gaussian Noise (AWGN) at the APmRepresenting the transmission power, y, of user mAP,mRepresents the path loss, γ, from user m to the APAP,nRepresenting the path loss from user n to the AP.
4. The method according to claim 1, wherein in the step (3), assuming that the eavesdropper can eliminate the uplink interference before decoding the information of the uplink user, the eavesdropper performs the step of decoding the uplink user information by using the message skWhere the received signal-to-noise ratio is:
SINRe,k=γe,kpk,k∈{m,n}
Figure FDA0002754101330000031
in the formula, gammae,kRepresenting the loss of k users at the eavesdropping end, k representing user m and user n.
5. The method of claim 1, wherein in step (4), redundant information is inserted into the secret information, and the transmission rate R of the code word is used by each usert,kAnd a secret information rate Rs,kThe rate of the whole code word is Rt,k=Rs,k+Re,k,k∈{m,n}。
6. The method according to claim 1, wherein in the step (5), in the unloading time phase, partial tasks are unloaded to the MEC server for each user, and the task unloading time and the unloading energy consumption from user k to the MEC server are respectively:
Figure FDA0002754101330000032
Figure FDA0002754101330000033
7. method according to claim 1, characterized in that in step (6), during the mobile execution time phase, for user k, part of task L is processedk-lkOff-load to MEC server for remote computation, and remaining tasks lkThen the calculation is performed locally; indicates that the CPU frequency of user k is
Figure FDA0002754101330000034
A period per second; ckRepresenting the number of CPU cycles required to compute a task;
the local computation time and energy consumption of user k are respectively:
Figure FDA0002754101330000035
Figure FDA0002754101330000036
in the formula, LkThe input bit of the computing task which represents the user to execute is divided into two parts Lk-lkAnd lk,ξkRepresenting the effective capacitance coefficient of each CPU of a local user k;
defining a secret interruption probability to measure the secret performance of task offloading, using CAP,k=log2(1+SINRAP,kAnd Ce,k=log2(1+SINRe,k) Representing the channel capacity of the AP and the eavesdropper; message skIs denoted as Pso,k=P{Rt,k-Rs,k<Ce,k},
Figure FDA0002754101330000037
For user k, if Ce,kOver Rt,k-Rs,kConfidential offload data may be decoded by an eavesdropper and a privacy disruption event may occur; therefore, an optimization problem that minimizes the maximum task completion time of upstream NOMA users is defined as a problem subject to computational task execution offload security, transmit power, and privacy outage probability constraints (P1):
(P1):
Figure FDA0002754101330000041
Figure FDA0002754101330000042
Figure FDA0002754101330000043
Figure FDA0002754101330000044
Figure FDA0002754101330000045
Rt,k≤CAP,k,k∈{m,n} (f)
Rs,k≤Rt,k,k∈{m,n} (g)
Pso,k≤ε,k∈{m,n} (h)
wherein l ═ lm,ln],p=[pm,pn],Rt=[Rt,m,Rt,n]And Rs=[Rs,n,Rs,n];
Wherein B represents a system beltWide, 0 < epsilon < 1 represents the maximum tolerable privacy interruption probability,
Figure FDA0002754101330000046
represents the maximum allowed number of bits to be computed locally,
Figure FDA0002754101330000047
indicates that the CPU frequency of user k is
Figure FDA0002754101330000048
Figure FDA0002754101330000049
Is the user k to MEC server task offload time,
Figure FDA00027541013300000410
local computation time of user k, CAP,kRepresenting the channel capacity of the AP, user k-code transmission rate Rt,kAnd a secret information rate Rs,k(ii) a The constraint (d) ensures that the energy consumed by each mobile user is limited to a maximum consumption Emax(ii) a In constraint (e), the worst-case privacy rate for each user k must not be less than the offload rate to ensure offload under any possible eavesdropper corridor; constraint (f) ensures that the AP can correctly decode the message sk(ii) a The privacy constraint (h) represents the maximum allowed privacy disruption probability epsilon for each message.
8. The method according to claim 1, wherein in the step (7), the optimization problem (P1) is simplified by using lemmas and theorems, and specifically comprises:
introduction 1: introducing decision variables l, p, RtAnd RsTo meet the optimal solution requirements of the optimization problem (P1);
Rt,n=log2(1+γAP,npn/(1+γAP,mpm))
Rt,m=log2(1+γAP,m,pm)
Figure FDA00027541013300000411
2, leading: to minimize the maximum task completion time for different users, if and only if the offload time for each user is equal to each other
Figure FDA0002754101330000051
And the offload time is equal to the local computation time
Figure FDA0002754101330000052
Then, an optimal solution can be obtained
Figure FDA0002754101330000053
Namely, it is
Figure FDA0002754101330000054
Theorem 1: based on the theorem 1, the probability constraint of the privacy interruption is defined as follows:
Figure FDA0002754101330000055
Figure FDA0002754101330000056
wherein the content of the first and second substances,
Figure FDA0002754101330000057
theorem 2: when the objective function is optimal, at least one equation is taken for the simplified inequality formula in the optimization problem (P1), the formula being:
Figure FDA0002754101330000058
Figure FDA0002754101330000059
when in use
Figure FDA00027541013300000510
Is provided with
Figure FDA00027541013300000511
When in use
Figure FDA00027541013300000512
Is provided with
Figure FDA00027541013300000513
In the formula, CmRepresenting the number of CPU cycles required by the user m to calculate a task; maximum energy consumption of the user EmaxUser n privacy interrupt probability xin(ii) a User n calculates time locally
Figure FDA00027541013300000514
The transmission rate of the code word of the user m, n is Rt,m,Rt,n(ii) a Secret information rate Rs,m,Rs,n
CN202011200311.4A 2020-10-30 2020-10-30 Optimization method for delay minimization based on safe NOMA moving edge calculation Withdrawn CN112333702A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011200311.4A CN112333702A (en) 2020-10-30 2020-10-30 Optimization method for delay minimization based on safe NOMA moving edge calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011200311.4A CN112333702A (en) 2020-10-30 2020-10-30 Optimization method for delay minimization based on safe NOMA moving edge calculation

Publications (1)

Publication Number Publication Date
CN112333702A true CN112333702A (en) 2021-02-05

Family

ID=74324039

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011200311.4A Withdrawn CN112333702A (en) 2020-10-30 2020-10-30 Optimization method for delay minimization based on safe NOMA moving edge calculation

Country Status (1)

Country Link
CN (1) CN112333702A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938997A (en) * 2021-09-30 2022-01-14 中国人民解放军陆军工程大学 Resource allocation method for secure MEC system in NOMA (non-access-oriented multi-media access) Internet of things
CN114389654A (en) * 2022-01-13 2022-04-22 郑州轻工业大学 Mobile edge calculation safety calculation efficiency maximization method based on large-scale MIMO
CN114531718A (en) * 2022-02-24 2022-05-24 南京邮电大学 NOMA-MEC system energy consumption optimization method under imperfect CSI condition
CN114710493A (en) * 2022-04-08 2022-07-05 南京邮电大学 NOMA-MEC-based physical layer security and energy efficiency optimization method
CN116320354A (en) * 2023-01-16 2023-06-23 浙江大学 360-degree virtual reality video user access control system and control method
CN116567725A (en) * 2023-05-09 2023-08-08 中国人民解放军陆军工程大学 Multi-edge server network task unloading method with minimum time delay

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110113190A (en) * 2019-04-24 2019-08-09 西北工业大学 Time delay optimization method is unloaded in a kind of mobile edge calculations scene
CN111615129A (en) * 2020-05-29 2020-09-01 南京邮电大学 Resource allocation method in NOMA-based multi-user mobile edge computing system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110113190A (en) * 2019-04-24 2019-08-09 西北工业大学 Time delay optimization method is unloaded in a kind of mobile edge calculations scene
CN111615129A (en) * 2020-05-29 2020-09-01 南京邮电大学 Resource allocation method in NOMA-based multi-user mobile edge computing system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
FANG FANG ET AL.: "Optimal Resource Allocation for Delay Minimization in NOMA-MEC Networks", 《IEEE TRANSACTIONS ON COMMUNICATIONS》 *
XINXIN WANG ET AL.: "Delay Minimization for Secure NOMA Mobile-Edge Computing", 《2019 IEEE 19TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT)》 *
景泽伟等: "移动边缘计算中的时延和能耗均衡优化算法", 《北京邮电大学学报》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938997A (en) * 2021-09-30 2022-01-14 中国人民解放军陆军工程大学 Resource allocation method for secure MEC system in NOMA (non-access-oriented multi-media access) Internet of things
CN113938997B (en) * 2021-09-30 2024-04-30 中国人民解放军陆军工程大学 Resource allocation method of secure MEC system in NOMA (non-volatile memory access) Internet of things
CN114389654A (en) * 2022-01-13 2022-04-22 郑州轻工业大学 Mobile edge calculation safety calculation efficiency maximization method based on large-scale MIMO
CN114531718A (en) * 2022-02-24 2022-05-24 南京邮电大学 NOMA-MEC system energy consumption optimization method under imperfect CSI condition
CN114531718B (en) * 2022-02-24 2023-06-06 南京邮电大学 NOMA-MEC system energy consumption optimization method under imperfect CSI
CN114710493A (en) * 2022-04-08 2022-07-05 南京邮电大学 NOMA-MEC-based physical layer security and energy efficiency optimization method
CN114710493B (en) * 2022-04-08 2023-07-18 南京邮电大学 Physical layer security and energy efficiency optimization method based on NOMA-MEC
CN116320354A (en) * 2023-01-16 2023-06-23 浙江大学 360-degree virtual reality video user access control system and control method
CN116320354B (en) * 2023-01-16 2023-09-29 浙江大学 360-degree virtual reality video user access control system and control method
CN116567725A (en) * 2023-05-09 2023-08-08 中国人民解放军陆军工程大学 Multi-edge server network task unloading method with minimum time delay
CN116567725B (en) * 2023-05-09 2024-02-13 中国人民解放军陆军工程大学 Multi-edge server network task unloading method with minimum time delay

Similar Documents

Publication Publication Date Title
CN112333702A (en) Optimization method for delay minimization based on safe NOMA moving edge calculation
Timotheou et al. Fairness for non-orthogonal multiple access in 5G systems
CN112052086B (en) Multi-user safety energy-saving resource allocation method in mobile edge computing network
CN111614419B (en) NOMA-based mobile edge computing network task high-security unloading resource allocation method
Wei et al. Energy-efficient full-duplex cooperative nonorthogonal multiple access
CN111245539A (en) NOMA-based efficient resource allocation method for mobile edge computing network
CN109640320B (en) Safe unloading method of computing task of mobile edge computing system based on mixed NOMA
Moltafet et al. Robust radio resource allocation in MISO-SCMA assisted C-RAN in 5G networks
Yang et al. Adaptive power allocation for uplink non-orthogonal multiple access with semi-grant-free transmission
CN107528624B (en) Design method of steady beam forming based on non-orthogonal multiple access technology
JP5999799B2 (en) System and method for compression transfer relay scheme in joint signal processing
Zhou et al. Flexible functional split design for downlink C-RAN with capacity-constrained fronthaul
Farhadi Zavleh et al. Resource allocation in sparse code multiple access‐based systems for cloud‐radio access network in 5G networks
Li et al. Resource allocation for multicarrier rate-splitting multiple access system
Seo et al. Uplink NOMA random access systems with space–time line code
Reddy et al. Analytical review on OMA vs. NOMA and challenges implementing NOMA
Wang et al. Delay minimization for secure NOMA mobile-edge computing
Xia et al. Joint optimization of fronthaul compression and bandwidth allocation in uplink H-CRAN with large system analysis
Qiu et al. Energy-efficient rate allocation for NOMA-MEC offloading under outage constraints
Altin et al. Novel OMA and hybrid NOMA schemes for MEC offloading
CN109769258B (en) Resource optimization method based on secure URLLC communication protocol
Liu et al. An efficient power allocation algorithm for relay assisted cognitive radio network
Li et al. Finite SNR Diversity-Multiplexing Trade-off in Hybrid ABCom/RCom-Assisted NOMA Networks
Xu et al. Energy efficiency optimization of NOMA IoT communication for 5G
CN113938997B (en) Resource allocation method of secure MEC system in NOMA (non-volatile memory access) Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210205

WW01 Invention patent application withdrawn after publication