Intelligent secure mobile edge computing for beyond 5G wireless networks
Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eave...
Ausführliche Beschreibung
Autor*in: |
Lai, Shiwei [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2021transfer abstract |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions - Soroush Karimi Madahi, Seyed ELSEVIER, 2022, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:45 ; year:2021 ; pages:0 |
Links: |
---|
DOI / URN: |
10.1016/j.phycom.2021.101283 |
---|
Katalog-ID: |
ELV053250966 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV053250966 | ||
003 | DE-627 | ||
005 | 20230626034511.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210910s2021 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.phycom.2021.101283 |2 doi | |
028 | 5 | 2 | |a /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001313.pica |
035 | |a (DE-627)ELV053250966 | ||
035 | |a (ELSEVIER)S1874-4907(21)00020-3 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 620 |q VZ |
084 | |a 53.30 |2 bkl | ||
100 | 1 | |a Lai, Shiwei |e verfasserin |4 aut | |
245 | 1 | 0 | |a Intelligent secure mobile edge computing for beyond 5G wireless networks |
264 | 1 | |c 2021transfer abstract | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. | ||
520 | |a Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. | ||
650 | 7 | |a Mobile edge computing |2 Elsevier | |
650 | 7 | |a Physical layer security |2 Elsevier | |
650 | 7 | |a Deep reinforcement learning |2 Elsevier | |
700 | 1 | |a Zhao, Rui |4 oth | |
700 | 1 | |a Tang, Shunpu |4 oth | |
700 | 1 | |a Xia, Junjuan |4 oth | |
700 | 1 | |a Zhou, Fasheng |4 oth | |
700 | 1 | |a Fan, Liseng |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier |a Soroush Karimi Madahi, Seyed ELSEVIER |t A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions |d 2022 |g Amsterdam [u.a.] |w (DE-627)ELV008049807 |
773 | 1 | 8 | |g volume:45 |g year:2021 |g pages:0 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.phycom.2021.101283 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
936 | b | k | |a 53.30 |j Elektrische Energietechnik: Allgemeines |q VZ |
951 | |a AR | ||
952 | |d 45 |j 2021 |h 0 |
author_variant |
s l sl |
---|---|
matchkey_str |
laishiweizhaoruitangshunpuxiajunjuanzhou:2021----:nelgnscrmblegcmuigobyn |
hierarchy_sort_str |
2021transfer abstract |
bklnumber |
53.30 |
publishDate |
2021 |
allfields |
10.1016/j.phycom.2021.101283 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001313.pica (DE-627)ELV053250966 (ELSEVIER)S1874-4907(21)00020-3 DE-627 ger DE-627 rakwb eng 620 VZ 53.30 bkl Lai, Shiwei verfasserin aut Intelligent secure mobile edge computing for beyond 5G wireless networks 2021transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. Mobile edge computing Elsevier Physical layer security Elsevier Deep reinforcement learning Elsevier Zhao, Rui oth Tang, Shunpu oth Xia, Junjuan oth Zhou, Fasheng oth Fan, Liseng oth Enthalten in Elsevier Soroush Karimi Madahi, Seyed ELSEVIER A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions 2022 Amsterdam [u.a.] (DE-627)ELV008049807 volume:45 year:2021 pages:0 https://doi.org/10.1016/j.phycom.2021.101283 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 53.30 Elektrische Energietechnik: Allgemeines VZ AR 45 2021 0 |
spelling |
10.1016/j.phycom.2021.101283 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001313.pica (DE-627)ELV053250966 (ELSEVIER)S1874-4907(21)00020-3 DE-627 ger DE-627 rakwb eng 620 VZ 53.30 bkl Lai, Shiwei verfasserin aut Intelligent secure mobile edge computing for beyond 5G wireless networks 2021transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. Mobile edge computing Elsevier Physical layer security Elsevier Deep reinforcement learning Elsevier Zhao, Rui oth Tang, Shunpu oth Xia, Junjuan oth Zhou, Fasheng oth Fan, Liseng oth Enthalten in Elsevier Soroush Karimi Madahi, Seyed ELSEVIER A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions 2022 Amsterdam [u.a.] (DE-627)ELV008049807 volume:45 year:2021 pages:0 https://doi.org/10.1016/j.phycom.2021.101283 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 53.30 Elektrische Energietechnik: Allgemeines VZ AR 45 2021 0 |
allfields_unstemmed |
10.1016/j.phycom.2021.101283 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001313.pica (DE-627)ELV053250966 (ELSEVIER)S1874-4907(21)00020-3 DE-627 ger DE-627 rakwb eng 620 VZ 53.30 bkl Lai, Shiwei verfasserin aut Intelligent secure mobile edge computing for beyond 5G wireless networks 2021transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. Mobile edge computing Elsevier Physical layer security Elsevier Deep reinforcement learning Elsevier Zhao, Rui oth Tang, Shunpu oth Xia, Junjuan oth Zhou, Fasheng oth Fan, Liseng oth Enthalten in Elsevier Soroush Karimi Madahi, Seyed ELSEVIER A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions 2022 Amsterdam [u.a.] (DE-627)ELV008049807 volume:45 year:2021 pages:0 https://doi.org/10.1016/j.phycom.2021.101283 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 53.30 Elektrische Energietechnik: Allgemeines VZ AR 45 2021 0 |
allfieldsGer |
10.1016/j.phycom.2021.101283 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001313.pica (DE-627)ELV053250966 (ELSEVIER)S1874-4907(21)00020-3 DE-627 ger DE-627 rakwb eng 620 VZ 53.30 bkl Lai, Shiwei verfasserin aut Intelligent secure mobile edge computing for beyond 5G wireless networks 2021transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. Mobile edge computing Elsevier Physical layer security Elsevier Deep reinforcement learning Elsevier Zhao, Rui oth Tang, Shunpu oth Xia, Junjuan oth Zhou, Fasheng oth Fan, Liseng oth Enthalten in Elsevier Soroush Karimi Madahi, Seyed ELSEVIER A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions 2022 Amsterdam [u.a.] (DE-627)ELV008049807 volume:45 year:2021 pages:0 https://doi.org/10.1016/j.phycom.2021.101283 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 53.30 Elektrische Energietechnik: Allgemeines VZ AR 45 2021 0 |
allfieldsSound |
10.1016/j.phycom.2021.101283 doi /cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001313.pica (DE-627)ELV053250966 (ELSEVIER)S1874-4907(21)00020-3 DE-627 ger DE-627 rakwb eng 620 VZ 53.30 bkl Lai, Shiwei verfasserin aut Intelligent secure mobile edge computing for beyond 5G wireless networks 2021transfer abstract nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. Mobile edge computing Elsevier Physical layer security Elsevier Deep reinforcement learning Elsevier Zhao, Rui oth Tang, Shunpu oth Xia, Junjuan oth Zhou, Fasheng oth Fan, Liseng oth Enthalten in Elsevier Soroush Karimi Madahi, Seyed ELSEVIER A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions 2022 Amsterdam [u.a.] (DE-627)ELV008049807 volume:45 year:2021 pages:0 https://doi.org/10.1016/j.phycom.2021.101283 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 53.30 Elektrische Energietechnik: Allgemeines VZ AR 45 2021 0 |
language |
English |
source |
Enthalten in A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions Amsterdam [u.a.] volume:45 year:2021 pages:0 |
sourceStr |
Enthalten in A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions Amsterdam [u.a.] volume:45 year:2021 pages:0 |
format_phy_str_mv |
Article |
bklname |
Elektrische Energietechnik: Allgemeines |
institution |
findex.gbv.de |
topic_facet |
Mobile edge computing Physical layer security Deep reinforcement learning |
dewey-raw |
620 |
isfreeaccess_bool |
false |
container_title |
A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions |
authorswithroles_txt_mv |
Lai, Shiwei @@aut@@ Zhao, Rui @@oth@@ Tang, Shunpu @@oth@@ Xia, Junjuan @@oth@@ Zhou, Fasheng @@oth@@ Fan, Liseng @@oth@@ |
publishDateDaySort_date |
2021-01-01T00:00:00Z |
hierarchy_top_id |
ELV008049807 |
dewey-sort |
3620 |
id |
ELV053250966 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV053250966</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626034511.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210910s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.phycom.2021.101283</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001313.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV053250966</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1874-4907(21)00020-3</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">53.30</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lai, Shiwei</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligent secure mobile edge computing for beyond 5G wireless networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021transfer abstract</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mobile edge computing</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Physical layer security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Deep reinforcement learning</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhao, Rui</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tang, Shunpu</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xia, Junjuan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Fasheng</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fan, Liseng</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Soroush Karimi Madahi, Seyed ELSEVIER</subfield><subfield code="t">A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions</subfield><subfield code="d">2022</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV008049807</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:45</subfield><subfield code="g">year:2021</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.phycom.2021.101283</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">53.30</subfield><subfield code="j">Elektrische Energietechnik: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">45</subfield><subfield code="j">2021</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
author |
Lai, Shiwei |
spellingShingle |
Lai, Shiwei ddc 620 bkl 53.30 Elsevier Mobile edge computing Elsevier Physical layer security Elsevier Deep reinforcement learning Intelligent secure mobile edge computing for beyond 5G wireless networks |
authorStr |
Lai, Shiwei |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV008049807 |
format |
electronic Article |
dewey-ones |
620 - Engineering & allied operations |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
620 VZ 53.30 bkl Intelligent secure mobile edge computing for beyond 5G wireless networks Mobile edge computing Elsevier Physical layer security Elsevier Deep reinforcement learning Elsevier |
topic |
ddc 620 bkl 53.30 Elsevier Mobile edge computing Elsevier Physical layer security Elsevier Deep reinforcement learning |
topic_unstemmed |
ddc 620 bkl 53.30 Elsevier Mobile edge computing Elsevier Physical layer security Elsevier Deep reinforcement learning |
topic_browse |
ddc 620 bkl 53.30 Elsevier Mobile edge computing Elsevier Physical layer security Elsevier Deep reinforcement learning |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
r z rz s t st j x jx f z fz l f lf |
hierarchy_parent_title |
A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions |
hierarchy_parent_id |
ELV008049807 |
dewey-tens |
620 - Engineering |
hierarchy_top_title |
A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV008049807 |
title |
Intelligent secure mobile edge computing for beyond 5G wireless networks |
ctrlnum |
(DE-627)ELV053250966 (ELSEVIER)S1874-4907(21)00020-3 |
title_full |
Intelligent secure mobile edge computing for beyond 5G wireless networks |
author_sort |
Lai, Shiwei |
journal |
A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions |
journalStr |
A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
600 - Technology |
recordtype |
marc |
publishDateSort |
2021 |
contenttype_str_mv |
zzz |
container_start_page |
0 |
author_browse |
Lai, Shiwei |
container_volume |
45 |
class |
620 VZ 53.30 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Lai, Shiwei |
doi_str_mv |
10.1016/j.phycom.2021.101283 |
dewey-full |
620 |
title_sort |
intelligent secure mobile edge computing for beyond 5g wireless networks |
title_auth |
Intelligent secure mobile edge computing for beyond 5G wireless networks |
abstract |
Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. |
abstractGer |
Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. |
abstract_unstemmed |
Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U |
title_short |
Intelligent secure mobile edge computing for beyond 5G wireless networks |
url |
https://doi.org/10.1016/j.phycom.2021.101283 |
remote_bool |
true |
author2 |
Zhao, Rui Tang, Shunpu Xia, Junjuan Zhou, Fasheng Fan, Liseng |
author2Str |
Zhao, Rui Tang, Shunpu Xia, Junjuan Zhou, Fasheng Fan, Liseng |
ppnlink |
ELV008049807 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth oth oth |
doi_str |
10.1016/j.phycom.2021.101283 |
up_date |
2024-07-06T18:25:50.355Z |
_version_ |
1803855174414893056 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV053250966</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230626034511.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210910s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.phycom.2021.101283</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">/cbs_pica/cbs_olc/import_discovery/elsevier/einzuspielen/GBV00000000001313.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV053250966</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1874-4907(21)00020-3</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">53.30</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lai, Shiwei</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligent secure mobile edge computing for beyond 5G wireless networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2021transfer abstract</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Computational task offloading at the mobile edge servers is a promising strategy to reduce latency and energy consumption in 5G wireless networks. In this paper, we study the problem of offloading decision and system design in the intelligent secure mobile edge computing (MEC) system with a UAV eavesdropper, where the eavesdropper can overhear the secure computational task from the user to the computational access point (CAP). The proposed framework is aimed to ensure the physical-layer security and decrease the latency and energy consumption in communication and computation. We firstly formulate the optimization of the MEC networks as a multi-objective optimization problem and then use a linear combination of the latency and energy consumption to measure the system cost. We devise an adaptive offloading strategy by incorporating the wireless bandwidth allocation and the transmit power allocation among users through the deep reinforcement learning (DRL) algorithm. In particular, we propose a deep Q-network (DQN) based strategy to automatically solve the optimization problem by designing the system state, action, and the reward function at detail. At last, we demonstrate the usefulness of the considered intelligent offloading strategy for the design of the MEC networks by comparing with the other schemes. The proposed strategy can perform significant system cost saving of the considered MEC networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mobile edge computing</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Physical layer security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Deep reinforcement learning</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhao, Rui</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tang, Shunpu</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xia, Junjuan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Fasheng</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fan, Liseng</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier</subfield><subfield code="a">Soroush Karimi Madahi, Seyed ELSEVIER</subfield><subfield code="t">A new DFT-based frequency estimation algorithm for protection devices under normal and fault conditions</subfield><subfield code="d">2022</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV008049807</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:45</subfield><subfield code="g">year:2021</subfield><subfield code="g">pages:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.phycom.2021.101283</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">53.30</subfield><subfield code="j">Elektrische Energietechnik: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">45</subfield><subfield code="j">2021</subfield><subfield code="h">0</subfield></datafield></record></collection>
|
score |
7.399809 |