2019
DOI: 10.1109/jiot.2018.2875241
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy-Based Delay-Aware Computation Offloading via Mobile Edge Computing for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(35 citation statements)
references
References 40 publications
0
35
0
Order By: Relevance
“…In [30], the authors formulate the energy management problem as a stochastic optimization programming by using the Lyapunov optimization-based online algorithm. Wu et al [31] propose a delay-aware computation offloading algorithm with joint optimization of secrecy-provisioning, computation workload, and radio resource allocation to minimize the overall execution delay. Authors in [32] propose a binary-search water-filling algorithm to optimize the MEC server's available resources by investigating resource allocation policy in a multi-user scenario.…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [30], the authors formulate the energy management problem as a stochastic optimization programming by using the Lyapunov optimization-based online algorithm. Wu et al [31] propose a delay-aware computation offloading algorithm with joint optimization of secrecy-provisioning, computation workload, and radio resource allocation to minimize the overall execution delay. Authors in [32] propose a binary-search water-filling algorithm to optimize the MEC server's available resources by investigating resource allocation policy in a multi-user scenario.…”
Section: B Related Workmentioning
confidence: 99%
“…That is, if λ m T ≤ µ e T , then φ e = 1 (from (11)). Substituting this in (25), the optimization problem reduces to the analytical expression (31). Next, we consider the case of (λ m T > µ e T ), hence, φ e = µ e T /λ m T (from (14)).…”
Section: Problem Formulation and Proposed Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this paper mainly focuses on the detection of security threats. In [33], a joint optimization problem which includes the secrecy provisioning, computation offloading, and radio resource allocation is formulated, and an efficient algorithm is proposed to solve this joint optimization problem. However, this paper failed to optimize the long-term computation task offloading cost.…”
Section: Related Workmentioning
confidence: 99%
“…The scenario of multi-user MEC is close to our study here. Focusing on minimizing the delay in completing the computation tasks, there have been many studies investigating the proper multi-user computational resource allocation [ 33 , 34 ]. In [ 35 ], a multi-user computational resource allocation (i.e., the CPU cycle) scheme has been proposed to save the users’ energy consumption.…”
Section: Introductionmentioning
confidence: 99%