CN113784340B - Secret unloading rate optimization method and system - Google Patents

Secret unloading rate optimization method and system Download PDF

Info

Publication number
CN113784340B
CN113784340B CN202111080352.9A CN202111080352A CN113784340B CN 113784340 B CN113784340 B CN 113784340B CN 202111080352 A CN202111080352 A CN 202111080352A CN 113784340 B CN113784340 B CN 113784340B
Authority
CN
China
Prior art keywords
user
representing
mec server
optimal
mec
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111080352.9A
Other languages
Chinese (zh)
Other versions
CN113784340A (en
Inventor
赵明雄
张榕倩
张贤琪
杨昭杰
肖一鸣
王子睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan University YNU
Original Assignee
Yunnan University YNU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan University YNU filed Critical Yunnan University YNU
Priority to CN202111080352.9A priority Critical patent/CN113784340B/en
Publication of CN113784340A publication Critical patent/CN113784340A/en
Application granted granted Critical
Publication of CN113784340B publication Critical patent/CN113784340B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/22Traffic simulation tools or models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/02Resource partitioning among network components, e.g. reuse partitioning
    • H04W16/10Dynamic resource partitioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a method and a system for optimizing security unloading rate. The method comprises the following steps: establishing a system model; the system model comprises a plurality of users, a plurality of MEC servers and an eavesdropper; constructing an objective function and constraint conditions of the system model; and solving the objective function by adopting a Lagrange dual method to obtain the optimal transmission power, the optimal subcarrier allocation, the optimal unloading ratio and the optimal computing resource. The invention jointly optimizes communication and distribution of computing resources in a multi-user environment through a Lagrange dual method, thereby realizing an efficient MEC system and improving the unloading rate of users.

Description

Secret unloading rate optimization method and system
Technical Field
The invention relates to the technical field of data transmission, in particular to a method and a system for optimizing a security unloading rate.
Background
With the continuous popularization of 5G in the world, higher data transmission rate attracts more and more network terminal devices, such as Internet of things devices, mobile phones, computers and the like related to production and life. At the same time, the size and number of tasks on these clients is also growing rapidly, forcing these limited computing power user devices to have to offload tasks to server-side processing. Meanwhile, the existence of "malicious eavesdroppers" makes it a challenging problem how to improve the security performance of the communication system due to the broadcast of the wireless transmission.
In the current invention, most of them do not adapt to 5G data transmission rate, and do not consider the OFDMA (orthogonal frequency division multiple access) based secure MEC (mobile edge computing) system. The OFDMA is optimal in all medium access technologies, so that the spectrum efficiency can be greatly improved, and the requirement of the 5G technology is met; meanwhile, in the inventions considering the MEC, the security of the system is not put in the research range in many cases, and the problem that the probability of the system being eavesdropped maliciously becomes high in the case of wireless transmission is not considered.
Disclosure of Invention
The invention aims to provide a method and a system for optimizing the security unloading rate, which adopt a physical layer security technology to improve the security of the system and improve the unloading rate of a user by optimizing communication and computing resource allocation.
In order to achieve the purpose, the invention provides the following scheme:
a method of secure offload rate optimization, comprising:
establishing a system model; the system model comprises a plurality of users, a plurality of MEC servers and an eavesdropper;
constructing an objective function and constraint conditions of the system model;
and solving the objective function by adopting a Lagrange dual method to obtain the optimal transmission power, the optimal subcarrier allocation, the optimal unloading ratio and the optimal computing resource.
Optionally, the objective function of the system model is as follows:
Figure BDA0003263750250000021
wherein P represents transmission power; Λ represents the unload ratio; x represents a subcarrier; f represents the computing resources of the user; f denotes the computing resources of the MEC server; k represents the number of users; n represents the number of subcarriers; m represents the MEC server number;
Figure BDA0003263750250000022
the allocation of the sub-carriers is performed,
Figure BDA0003263750250000023
means that a subcarrier n is allocated to a user k for offloading the task of the user k to the MEC server m, otherwise
Figure BDA0003263750250000024
Figure BDA0003263750250000025
Show thatAnd after the subcarrier n is distributed to the user k, the task security unloading rate unloaded to the server m is ensured.
Optionally, the constraint is as follows:
Figure BDA0003263750250000026
Figure BDA0003263750250000027
Figure BDA0003263750250000028
Figure BDA0003263750250000029
Figure BDA00032637502500000210
Figure BDA00032637502500000211
Figure BDA00032637502500000212
Figure BDA00032637502500000213
Figure BDA00032637502500000214
Figure BDA00032637502500000215
Figure BDA00032637502500000216
Figure BDA0003263750250000031
wherein the content of the first and second substances,
Figure BDA0003263750250000032
representing the local computation time of user k;
Figure BDA0003263750250000033
representing the delay time of the communication between the user k and the MEC server m; t is k Represents the time delay that user k can tolerate to the maximum;
Figure BDA0003263750250000034
representing the energy consumption of the user K belonging to the K for local calculation;
Figure BDA0003263750250000035
representing that for the data unloaded to the MEC server, a user K belongs to the transmission energy consumption of K; e k Represents the total energy consumption of user k;
Figure BDA0003263750250000036
representing the estimation error of a user k on the MEC server, wherein the epsilon is more than or equal to 0;
Figure BDA0003263750250000037
representing the data amount processed by the user k to the MEC server m;
Figure BDA0003263750250000038
representing the transmission power of the user K belonging to K on the subcarrier N belonging to N;
Figure BDA0003263750250000039
representing the maximum transmission power of the user K belonging to K;
Figure BDA00032637502500000310
indicates the CPU frequency allocated to the MEC server m;
Figure BDA00032637502500000311
represents the CPU frequency assigned to user k; f k Represents the computational power of user k; f m Representing the computing power of the MEC server m.
Optionally, the calculation formula of the optimal subcarrier allocation is as follows:
Figure BDA00032637502500000312
wherein the content of the first and second substances,
Figure BDA00032637502500000313
indicates the optimal subcarrier allocation, k * Indicating unassigned users, m * Indicating an unallocated MEC service.
Optionally, the calculation formula of the optimal transmission power is as follows:
Figure BDA00032637502500000314
wherein the content of the first and second substances,
Figure BDA00032637502500000315
which indicates the optimum transmission power for the transmission of the data,
Figure BDA00032637502500000316
representing the channel power-to-noise ratio of the channel from user K e K to MEC server M e M,
Figure BDA00032637502500000317
representing the path from user K e K to eavesdropper N e N,
Figure BDA00032637502500000318
γ k 、θ k are all represented by the lagrange multipliers,
Figure BDA00032637502500000319
lagrange auxiliary variable representing that a user K belongs to K to an MEC server M belongs to M, B represents bandwidth, s k Representing the data that user k needs to process.
Optionally, the calculation formula of the optimal calculation resource is as follows:
Figure BDA00032637502500000320
Figure BDA00032637502500000321
wherein the content of the first and second substances,
Figure BDA00032637502500000322
indicates the optimal CPU frequency allocated to the MEC server m,
Figure BDA00032637502500000323
representing Lagrange multipliers, c m Representing the computing power of server m, s k Data, μ, representing that user k needs to process m 、α k 、c k 、η k 、φ k Both represent lagrangian multipliers.
The invention also provides a secure offload rate optimization system, comprising:
the model building module is used for building a system model; the system model comprises a plurality of users, a plurality of MEC servers and an eavesdropper;
the system comprises an objective function and constraint condition construction module, a constraint condition construction module and a constraint condition construction module, wherein the objective function and constraint condition construction module is used for constructing an objective function and a constraint condition of the system model;
and the objective function solving module is used for solving the objective function by adopting a Lagrange dual method to obtain the optimal transmission power, the optimal subcarrier distribution, the optimal unloading ratio and the optimal computing resource.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
the invention provides a method for optimizing secrecy unloading rate, which comprises the following steps: establishing a system model; the system model comprises a plurality of users, a plurality of MEC servers and an eavesdropper; constructing an objective function and constraint conditions of the system model; and solving the objective function by adopting a Lagrange dual method to obtain the optimal transmission power, the optimal subcarrier allocation, the optimal unloading ratio and the optimal computing resource. The invention jointly optimizes communication and distribution of computing resources in a multi-user environment through a Lagrange dual method, thereby realizing an efficient MEC system and improving the unloading rate of users.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a flow chart of a security offload rate optimization method according to an embodiment of the present invention;
FIG. 2 is a graph of secure unload rate and local computation rate versus latency requirements of a task;
FIG. 3 is a graph of secret offload rate and local calculated ratio versus maximum transmit power of a user;
FIG. 4 is a graph of privacy offload rate and local computation ratio versus the number of MEC servers.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a method and a system for optimizing the security unloading rate, which adopt a physical layer security technology to improve the security of the system and improve the unloading rate of a user by optimizing communication and computing resource allocation.
The invention adopts the physical layer security technology to improve the security of the system and improves the unloading rate of the user by optimizing communication and computing resource allocation. By adopting OFDMA, the frequency spectrum efficiency is greatly improved, and the requirement of 5G technology is met. The system includes a plurality of mobile edge computing servers, a plurality of users, and a malicious eavesdropper. Each user can split their task into two parts, one part for local computation and the other part for secure offloading to the MEC server. Considering that the task type of the user is time sensitive, and the task unloading amount cannot exceed the task requirement of the user; considering that the energy storage of a user is limited, when the transmitting power exceeds a certain range, the transmitting antenna is easy to damage; each sub-operator can only connect one user and one server, and the computation frequency allocated to the user by the server cannot exceed the computation capacity of the server. And jointly optimizing communication and optimizing the distribution of computing resources under the multi-user environment by taking the conditions as constraint conditions through a Lagrange dual method, thereby realizing an efficient MEC system.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
As shown in fig. 1, the present invention provides a secure offload rate optimization method, which includes the following steps:
step 101: establishing a system model; the system model includes a plurality of users, a plurality of MEC servers, and an eavesdropper.
The first is to employ an Orthogonal Frequency Division Multiple Access (OFDMA) based MEC system with N subcarriers. The invention sets the system to have K users and M MEC servers which belong to different base stations, and sets an eavesdropper E, wherein each eavesdropper has an antenna to simulate the communication environment in real life. K = {1, \8230;, K }, M = {1, \8230;, M } and N = {1, \8230;, N } are expressed as a user, a MEC server, and a child of bandwidth B, respectivelyAnd (4) carrying wave. Using a combination of three parameters s k ,c k ,T k Triple of K ∈ K to represent the task of user K, where s k Representing the amount of input data that needs to be processed, c k Indicating the number of CPU cycles, T, to calculate 1 bit of input data k Is the maximum delay that the system can tolerate. Due to the limited computing and energy resources of user k, the invention sets it to access multiple MEC servers to achieve potential load balancing and will
Figure BDA0003263750250000061
M belongs to M, K belongs to K and is set as the data volume processed by the user K to the mth MEC server, then
Figure BDA0003263750250000062
Is the amount of data that user k processes locally. Make it
Figure BDA0003263750250000063
And
Figure BDA0003263750250000064
(in cycles per second) represents the assigned CPU frequency, i.e. the computing power, to user k and MEC server m, respectively. Since the computing power of the MEC server is limited, the CPU frequency allocated to the relevant user should not exceed the computing power of the user, with F m Is shown by
Figure BDA0003263750250000065
Figure BDA0003263750250000066
System delay: the delay of the whole system comprises two parts, namely local calculation time of a user and delay generated in a secret communication stage.
Firstly, considering the local calculation time of the user, the data volume processed locally is calculated
Figure BDA0003263750250000067
Figure BDA0003263750250000068
Time taken
Figure BDA0003263750250000069
Namely, it is
Figure BDA00032637502500000610
Second is the delay incurred during secure communication. On the basis of an OFDMA system, the invention allocates subcarriers to different users so as to avoid interference in each waveband cell. The invention is to
Figure BDA00032637502500000611
Indicated as the allocation of subcarriers, specifically,
Figure BDA00032637502500000612
the sub-carrier n is intended to be allocated to user k for offloading the user's task to MEC server m, otherwise
Figure BDA00032637502500000613
Is provided with
Figure BDA00032637502500000614
And
Figure BDA00032637502500000615
respectively representing the channels from the user K to the eavesdropper N to the N and the MEC server M to the M. Definition of
Figure BDA00032637502500000616
Figure BDA00032637502500000617
And
Figure BDA00032637502500000618
is the corresponding channel power-to-noise ratio, where σ 2 Is the variance of gaussian white noise. The invention assumes that the MEC server is fully aware of
Figure BDA00032637502500000619
But only a part of the Channel State Information (CSI) is known
Figure BDA00032637502500000620
The present invention defines the method for physical layer security, which is commonly used at present
Figure BDA00032637502500000621
Is a CSI uncertainty model wherein
Figure BDA00032637502500000622
K belongs to K, and N belongs to N. Wherein, the first and the second end of the pipe are connected with each other,
Figure BDA00032637502500000623
to represent
Figure BDA00032637502500000624
The estimated value at the MEC server is,
Figure BDA0003263750250000071
indicating the error of its estimate, i.e.
Figure BDA0003263750250000072
Wherein ∈ ≧ 0 is as the boundary (MEC server synchronizes the condition). Thus, the secure offload rate (in bits/second) from user K ∈ K to MEC server M ∈ M is
Figure BDA0003263750250000073
Wherein
Figure BDA0003263750250000074
The received noise power on the MEC server is consistent with the eavesdropper's view, then
Figure BDA0003263750250000075
And the transmission power of the user K epsilon K on the subcarrier N epsilon N is defined. Thus in the communication phaseTime delay of
Figure BDA0003263750250000076
The method is divided into two parts: time to task secure offload
Figure BDA0003263750250000077
And the time of the task in the MEC server M E M
Figure BDA0003263750250000078
The time delay in the communication phase is then:
Figure BDA0003263750250000079
wherein
Figure BDA00032637502500000710
Since the user local computation and task unloading are carried out concurrently, the total time delay of the user K belonging to the K is the user local computation time
Figure BDA00032637502500000711
And delays caused by secure communication phases
Figure BDA00032637502500000712
Can be expressed as
Figure BDA00032637502500000713
Energy loss: since the MEC server is usually supplied by the grid, the invention only considers the energy consumption of the user.
Likewise, the local computation mode is considered first. Recording the energy efficiency coefficient calculated by the CPU chip of the user K belonging to K as eta k Then the power consumption model of the processor is
Figure BDA00032637502500000714
(joules/second). Thus, user K ∈ K is local toThe calculated energy consumption is:
Figure BDA0003263750250000081
for the data unloaded to the MEC server, the transmission energy consumption of the user K belonging to K is as follows:
Figure BDA0003263750250000082
thus, the total energy consumption of user K ∈ K is
Figure BDA0003263750250000083
Step 102: and constructing an objective function and a constraint condition of the system model.
The aim of the invention is to maximize the user's secret offload rate by jointly optimizing the transmission power P, the offload ratio Λ, the subcarriers X and the computational resources (F, F). For convenience of notation, define
Figure BDA0003263750250000084
Figure BDA0003263750250000085
I.e. formulating the problem as follows:
Figure BDA0003263750250000086
Figure BDA0003263750250000087
Figure BDA0003263750250000088
Figure BDA0003263750250000089
Figure BDA00032637502500000810
Figure BDA00032637502500000811
Figure BDA00032637502500000812
Figure BDA00032637502500000813
Figure BDA00032637502500000814
Figure BDA0003263750250000091
Figure BDA0003263750250000092
Figure BDA0003263750250000093
Figure BDA0003263750250000094
wherein E k The maximum energy of the system is the maximum energy,
Figure BDA0003263750250000095
the maximum transmission power for user K ∈ K. The above formula formulatesA series of constraints that make it possible to guarantee: completing tasks under the time delay requirement of a user; the total energy consumption and power allocation among subcarriers do not exceed the maximum energy budget and transmission power of each user; each subcarrier can be used by only one User-MEC pair to avoid same frequency interference, and the MEC server m occupies the most U m The subcarrier ensures a certain degree of unloaded data volume for the MEC server to process; the sum of the allocated CPU frequencies must be less than the computing power of the MEC server.
Step 103: and solving the objective function by adopting a Lagrange dual method to obtain the optimal transmission power, the optimal subcarrier allocation, the optimal unloading ratio and the optimal computing resource.
The current form of OP is difficult to handle due to the coupled variables of the constraint and the objective function. To solve this problem, the formulation problem can be converted into five sub-problems: 1) P Λ Optimizing the unloading ratio; 2) P c Communication resource allocation; 3) P F Optimizing computing resources of the MEC server; 4) P is f Optimizing user computing resources; 5)
Figure BDA0003263750250000096
And updating the auxiliary variable. The invention then optimizes them in an iterative manner while keeping the other variables unchanged. And takes into account the worst case security offload rate, i.e.
Figure BDA0003263750250000097
n∈N。
1) Optimization of unloading ratio
Since the objective function of OP is independent of Λ, the corresponding problem can be considered as a feasible problem given (X, P, F), leading to a feasible solution for the unload ratio as
Figure BDA0003263750250000098
Figure BDA0003263750250000099
Figure BDA00032637502500000910
Figure BDA0003263750250000101
This is about
Figure BDA0003263750250000102
The linear programming problem of m.di-elect cons.M can be solved by tools like CVX (a convex optimized software package). However, even if a feasible solution Λ is obtained * OP is still a mixed integer nonlinear programming, and it is often difficult to find an optimal solution due to high computational complexity. But according to the principle of time-sharing condition: when the number of subcarriers tends to infinity in a multicarrier system, the dual gap becomes zero. Therefore, for the non-convex resource allocation problem of the multi-carrier system, an optimal solution can be obtained in the dual domain.
However, due to derivation
Figure BDA0003263750250000103
Is in a constraint condition
Figure BDA0003263750250000104
On the denominator of (a), then OP cannot be directly converted into the dual domain. Therefore, the invention needs to set a new non-negative auxiliary variable
Figure BDA0003263750250000105
M is in the same order as M, and OP is converted into the following problem
Figure BDA0003263750250000106
Figure BDA0003263750250000107
Figure BDA0003263750250000108
Figure BDA0003263750250000109
Figure BDA00032637502500001010
Figure BDA00032637502500001011
Figure BDA00032637502500001012
Figure BDA0003263750250000111
Figure BDA0003263750250000112
Figure BDA0003263750250000113
Figure BDA0003263750250000114
Figure BDA0003263750250000115
Figure BDA0003263750250000116
And a Lagrangian function of OP of
Figure BDA0003263750250000117
Wherein α, β, γ, θ, μ, ψ,
Figure BDA0003263750250000118
ν is a correspondingly constrained non-negative lagrange multiplier. Definition of
Figure BDA0003263750250000119
To satisfy the constraint
Figure BDA00032637502500001110
N is the set of all possible P's for N, χ is the constraint
Figure BDA00032637502500001111
Figure BDA00032637502500001112
Of all possible sets of X's of (a),
Figure BDA00032637502500001113
to satisfy the constraint
Figure BDA00032637502500001114
Of all the possible sets of F's,
Figure BDA00032637502500001115
to satisfy the constraint
Figure BDA00032637502500001116
Of all possible sets of f (f) of,
Figure BDA00032637502500001117
to satisfy the constraint
Figure BDA00032637502500001118
And M belongs to all possible phi sets of M, defining a Lagrangian dual function as:
Figure BDA0003263750250000121
wherein
Figure BDA0003263750250000122
The lagrangian dual problem is further given:
Figure BDA0003263750250000123
Figure BDA0003263750250000124
for a given auxiliary variable and a Lagrange multiplier, the resource related variable is obtained by adopting a primal-dual method, and then is updated according to a closed form of the auxiliary variable. And finally, updating the corresponding Lagrange multiplier by using a secondary gradient method. Four other sub-problems are given below
Figure BDA0003263750250000125
Figure BDA0003263750250000126
Figure BDA0003263750250000127
Figure BDA0003263750250000128
Wherein
Figure BDA0003263750250000129
Figure BDA00032637502500001210
Figure BDA00032637502500001211
Figure BDA00032637502500001212
2) Communication resource allocation
Regarding the system communication resource, the allocation of sub-carriers and the optimization of transmission power are mainly divided.
For a subcarrier, given { P, F, F, Λ, Φ }, it is assumed that all subcarriers are allocated to users, i.e., all subcarriers are allocated to users
Figure BDA0003263750250000131
Then there is k * ,m * Make
Figure BDA0003263750250000132
And by
Figure BDA0003263750250000133
Find out
Figure BDA0003263750250000134
Thereby completing the optimization of the sub-carriers.
For transmission power, X can be obtained by using the above equation * Using KKT conditions and
Figure BDA0003263750250000135
as a requirement for transmission power optimizationTo solve, the optimum transmission power can be obtained as
Figure BDA0003263750250000136
The quadratic equation and the sum can be obtained by the root-solving formula of a
Figure BDA0003263750250000137
And (4) deducing the proof.
3) MEC server computing resource optimization
With newly obtained (X) * ,P * ) And given
Figure BDA0003263750250000138
According to KKT conditions and solving, the optimal computing resource distributed to the user k can be obtained as
Figure BDA0003263750250000139
Find the optimal solution as
Figure BDA00032637502500001310
4) User server computing resource optimization
Similarly, with newly obtained (X) * ,P * ,F * ) Optimal capacity allocation f for the user * Can be obtained by the following formula
Figure BDA0003263750250000141
According to the given KKT condition (Λ, Φ). Furthermore, it can be deduced from the above formula
Figure BDA0003263750250000142
And solving by a secant method.
5) Auxiliary variable update
Similarly, with newly obtained (X) * ,P * ,F * ,f * ,Λ * ) The invention can solve the equation
Figure BDA0003263750250000143
Obtaining an optimal solution
Figure BDA0003263750250000144
Is composed of
Figure BDA0003263750250000145
6) Lagrange multiplier update
Completing the optimization to obtain W * And in turn begins updating the lagrange multipliers (α, β, γ, μ, ψ, φ, ν). Since the lagrangian dual problem is always convex, these variables can be updated using a secondary gradient method.
7) Convergence and complexity
Since each sub-problem can be solved by an optimal solution, the algorithm of the present invention can converge to a locally optimal solution of OP with a total computational complexity of
Figure BDA0003263750250000146
Wherein L is iter The number of iterations is optimized for the alternation. The details of the algorithm proposed by the present invention are given in algorithm 1.
Algorithm 1: suggestion algorithm
Initialization (W, alpha, beta, gamma, theta, mu, psi, phi, v) and algorithm precision index epsilon 1 Wherein e is 1 Is a very small constant control accuracy, sets the loop variable z =0, and specifies z max Is the maximum number of iterations.
1 repetition (from 1 to 14)
By solving problem P Λ Finding a feasible solution to the unload ratio
3: repeat (from 3 to 12)
4: repeat (from 4 to 10)
5 determination of optimal subcarrier allocation by equation 15
6-determination of optimum Transmission Power by equation 16
Optimizing MEC Server computing resource Allocation by equation 19
Optimization of user computing resource allocation by equation 20 and secant method
9 updating the auxiliary variable Φ by equation 22
10 until convergence of the Lagrangian function
11 updating of alpha, beta, gamma, theta, mu, psi, phi and v
12 until α, β, γ, θ, μ, ψ, φ and v converge
13: z=z+1
14 until the continuous interpolation of the objective function is less than e 1 Or z>z max
It should be noted in the above method that the number of sub-carriers does not accurately represent the data unloading amount, but at least to some extent, because the number of sub-carriers affects the transmission rate and greatly affects the data unloading amount. Therefore, the method adopts the number of the subcarriers to simplify the unloading data amount which can be processed on the MEC server, and can further refine the data unloading amount if a more accurate simulation reality communication environment is needed. Meanwhile, in a communication system where the load is not heavy, interference between sub-carrier cells can be more effectively suppressed using a frequency hopping OFDMA technique.
Meanwhile, the present invention uses the following settings in the simulation: the channel model follows Rayleigh fading, and the average channel power gain is specified
Figure BDA0003263750250000151
Wherein beta is 0 Path loss d for reference distance of = -30dBm 0 1m, d is the distance between the respective transceiving nodes, α =2.1 is the path loss exponent. Moreover, the present invention isMing set z max =100,K=5,N=64,M=3,T k =T max =0.12s,
Figure BDA0003263750250000152
Figure BDA0003263750250000153
B=12.5KHz,d k =9×10 5 bits,η k =10 -24 ,c k =1100cycles/bit,F k =0.7GHz,F m =1.1GHz,
Figure BDA0003263750250000154
And
Figure BDA0003263750250000155
in the range of [50, 55 ]]m,
Figure BDA0003263750250000156
Figure BDA0003263750250000157
m∈M。
The numerical result of the final simulation proves the superior performance of the algorithm (PA) provided by the invention compared with the reference scheme, namely 1) equal power distribution (EPA), namely, the user equivalently distributes the transmission power to the distributed sub-carriers; 2) And (FO) completely unloading, namely completely unloading the tasks to the MEC server by the user for processing.
In fig. 2, the present invention gives the latency requirements of the task and the secret offload rate and local computation ratio. As the task delay requirements gradually decrease, both the privacy offload rate and the Local Computation Ratio (LCR) increase. This is because when the latency requirements of a task get loose, the user will have more ample local computation time, resulting in a local CPU frequency
Figure BDA0003263750250000161
The method reduces the local computing energy consumption. Thus, more energy is available for transmission, which in turn allows for higher transmit power and LCR. In addition, the inventive method is characterized in thatSince the security offload rate is proportional to the transmit power, the greater the transmit power, the higher the security offload rate. It was also observed that PA can achieve additional 0.77% to 1.14% and 1.49% to 2.89% secure unload rates at different delay requirements compared to EPA and FO.
In fig. 3, the present invention studies the relationship of the secret offload rate and the locally calculated ratio to the maximum transmission power of the user. The results show that the privacy offload rate and LCR increase with increasing maximum transmit power of the user. This is because the greater the maximum transmit power of a user, the greater the transmit power of the user. In the case of the same total transmission energy consumption, the larger the instantaneous transmission power, the higher the rate, and the shorter the transmission time, but the less the total transmission data, the higher the LCR. As the maximum transmit power increases, additional 1.07% to 14.32% and 2.36% to 20.29% security offload rates are available for PA versus EPA and FO.
In fig. 4, the present invention explores the relationship of privacy offload rate and local computation ratio to the number of MEC servers. The results show that as the number of MEC servers increases, the security offload rate increases and LCR decreases. This is because as the number of MEC servers increases, users may gain better channels and be more likely to offload more data during the same time period, resulting in higher privacy rates and lower LCRs.
The invention also provides a secure offload rate optimization system, comprising:
the model building module is used for building a system model; the system model includes a plurality of users, a plurality of MEC servers, and an eavesdropper.
And the object function and constraint condition building module is used for building the object function and the constraint condition of the system model.
And the objective function solving module is used for solving the objective function by adopting a Lagrange dual method to obtain the optimal transmission power, the optimal subcarrier distribution, the optimal unloading ratio and the optimal computing resource.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the description of the method part.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the foregoing, the description is not to be taken in a limiting sense.

Claims (5)

1. A secure offload rate optimization method, comprising:
establishing a system model; the system model comprises a plurality of users and a plurality of mobile edge computing MEC servers; an eavesdropper eavesdrops on the system model;
constructing an objective function and a constraint condition of the system model;
solving the objective function by adopting a Lagrange dual method to obtain optimal transmission power, optimal subcarrier allocation, optimal unloading ratio and optimal computing resources;
the objective function of the system model is as follows:
Figure FDA0004059070590000011
wherein P represents transmission power; Λ represents the unload ratio; x represents a subcarrier; f represents the computing resources of the user; f denotes the computing resources of the MEC server; k represents the number of users; n represents the number of subcarriers; m represents the number of MEC servers;
Figure FDA0004059070590000012
indicating the allocation of the sub-carriers,
Figure FDA0004059070590000013
means that the nth sub-carrier is allocated to user k for offloading the task of user k to MEC server m, otherwise
Figure FDA0004059070590000014
Figure FDA0004059070590000015
Indicating a task secrecy unloading rate for unloading to the MEC server m after the subcarrier n is allocated to the user k;
the constraints are as follows:
Figure FDA0004059070590000016
Figure FDA0004059070590000017
Figure FDA0004059070590000018
Figure FDA0004059070590000019
Figure FDA00040590705900000110
Figure FDA00040590705900000111
Figure FDA00040590705900000112
Figure FDA00040590705900000113
Figure FDA00040590705900000114
Figure FDA0004059070590000021
Figure FDA0004059070590000022
Figure FDA0004059070590000023
wherein the content of the first and second substances,
Figure FDA0004059070590000024
representing the local computation time of a user k, and l represents the local;
Figure FDA0004059070590000025
representing the delay time of the communication between the user k and the MEC server m; t is a unit of k Represents the time delay that user k can tolerate to the maximum;
Figure FDA0004059070590000026
representing the energy consumption of a user K belonging to K for local calculation;
Figure FDA0004059070590000027
representing the transmission energy consumption of a user K belonging to K for the data unloaded to the MEC server; e k Represents the total energy consumption of user k;
Figure FDA0004059070590000028
representing the estimation error of user k on the MEC server;
Figure FDA0004059070590000029
representing the data amount processed by the user k to the MEC server m;
Figure FDA00040590705900000210
representing the transmission power of a user K belonging to K on a subcarrier N belonging to N;
Figure FDA00040590705900000211
representing the maximum transmission power of the user K belonging to K;
Figure FDA00040590705900000212
indicates the CPU frequency allocated to the MEC server m;
Figure FDA00040590705900000213
represents the CPU frequency assigned to user k; f k Represents the computational power of user k; f m Representing the computing power of the MEC server m.
2. The secure offload rate optimization method of claim 1, wherein the optimal subcarrier allocation is calculated as follows:
Figure FDA00040590705900000214
indicating an unallocated MEC service.
3. The secure offload rate optimization method of claim 1, wherein the optimal transmit power is calculated as follows:
Figure FDA00040590705900000215
wherein the content of the first and second substances,
Figure FDA00040590705900000216
which indicates the optimum transmission power for the transmission of the data,
Figure FDA00040590705900000217
representing the channel power-to-noise ratio of the channel from user K e K to MEC server M e M,
Figure FDA00040590705900000218
representing the path from user K e K to eavesdropper N e N,
Figure FDA00040590705900000219
γ k 、θ k are all representative of the lagrange multipliers,
Figure FDA00040590705900000220
lagrange auxiliary variable representing that a user K belongs to K to an MEC server M belongs to M, B represents bandwidth, s k Representing the data that user k needs to process.
4. The secure offload rate optimization method of claim 1, wherein the optimal computational resource is calculated as follows:
Figure FDA0004059070590000031
Figure FDA0004059070590000032
wherein, the first and the second end of the pipe are connected with each other,
Figure FDA0004059070590000033
indicates the optimal CPU frequency allocated to the MEC server m,
Figure FDA0004059070590000034
representing the Lagrangian multiplier, c m Representing the computing power, s, of the server m k Data representing the user k needs to process, mu m 、α k 、c k 、η k 、φ k Both represent lagrange multipliers.
5. A secure offload rate optimization system, comprising:
the model building module is used for building a system model; the system model comprises a plurality of users and a plurality of mobile edge computing MEC servers; an eavesdropper eavesdrops on the system model;
the system comprises an objective function and constraint condition construction module, a constraint condition construction module and a constraint condition construction module, wherein the objective function and constraint condition construction module is used for constructing an objective function and a constraint condition of the system model;
the target function solving module is used for solving the target function by adopting a Lagrange dual method to obtain the optimal transmission power, the optimal subcarrier distribution, the optimal unloading ratio and the optimal computing resource;
the objective function of the system model is as follows:
Figure FDA0004059070590000035
wherein P represents transmission power; Λ represents the unload ratio; x represents a subcarrier; f represents the computing resources of the user; f represents the computing resources of the MEC server; k represents the number of users; n represents the number of subcarriers; m represents the number of MEC servers;
Figure FDA0004059070590000036
indicating the allocation of the sub-carriers,
Figure FDA0004059070590000037
means that the nth sub-carrier is allocated to user k for offloading the task of user k to MEC server m, otherwise
Figure FDA0004059070590000038
Figure FDA0004059070590000039
Indicating a task secrecy unloading rate for unloading to the MEC server m after the subcarrier n is allocated to the user k;
the constraints are as follows:
Figure FDA00040590705900000310
Figure FDA00040590705900000311
Figure FDA00040590705900000312
Figure FDA0004059070590000041
Figure FDA0004059070590000042
Figure FDA0004059070590000043
Figure FDA0004059070590000044
Figure FDA0004059070590000045
Figure FDA0004059070590000046
Figure FDA0004059070590000047
Figure FDA0004059070590000048
Figure FDA0004059070590000049
wherein the content of the first and second substances,
Figure FDA00040590705900000410
the local computation time of the user k is represented, and l represents the local;
Figure FDA00040590705900000411
representing the delay time of the communication between the user k and the MEC server m; t is k Represents the time delay that user k can tolerate to the maximum;
Figure FDA00040590705900000412
representing the energy consumption of the user K belonging to the K for local calculation;
Figure FDA00040590705900000413
representing the transmission energy consumption of a user K belonging to K for the data unloaded to the MEC server; e k Represents the total energy consumption of user k;
Figure FDA00040590705900000414
representing the estimated error of user k on the MEC server;
Figure FDA00040590705900000415
representing the data amount processed by the user k to the MEC server m;
Figure FDA00040590705900000416
representing the transmission power of the user K belonging to K on the subcarrier N belonging to N;
Figure FDA00040590705900000417
representing the maximum transmission power of the user K belonging to K;
Figure FDA00040590705900000418
indicates the CPU frequency allocated to the MEC server m;
Figure FDA00040590705900000419
represents the CPU frequency assigned to user k; f k Represents the computational power of user k; f m Representing the computing power of the MEC server m.
CN202111080352.9A 2021-09-15 2021-09-15 Secret unloading rate optimization method and system Active CN113784340B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111080352.9A CN113784340B (en) 2021-09-15 2021-09-15 Secret unloading rate optimization method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111080352.9A CN113784340B (en) 2021-09-15 2021-09-15 Secret unloading rate optimization method and system

Publications (2)

Publication Number Publication Date
CN113784340A CN113784340A (en) 2021-12-10
CN113784340B true CN113784340B (en) 2023-03-14

Family

ID=78844008

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111080352.9A Active CN113784340B (en) 2021-09-15 2021-09-15 Secret unloading rate optimization method and system

Country Status (1)

Country Link
CN (1) CN113784340B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115276768B (en) * 2022-07-22 2023-07-28 南京邮电大学 Unmanned aerial vehicle time delay minimization method integrating interference mitigation and resource allocation

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109167787B (en) * 2018-09-06 2020-01-31 电子科技大学 resource optimization method for safety calculation unloading in mobile edge calculation network
CN111132077B (en) * 2020-02-25 2021-07-20 华南理工大学 Multi-access edge computing task unloading method based on D2D in Internet of vehicles environment
CN111586720B (en) * 2020-05-11 2022-04-22 重庆邮电大学 Task unloading and resource allocation combined optimization method in multi-cell scene
CN111901400A (en) * 2020-07-13 2020-11-06 兰州理工大学 Edge computing network task unloading method equipped with cache auxiliary device
CN112911587B (en) * 2021-01-26 2023-02-28 南京邮电大学 Method for safely unloading anti-eavesdropping task by using physical layer under MEC-D2D environment

Also Published As

Publication number Publication date
CN113784340A (en) 2021-12-10

Similar Documents

Publication Publication Date Title
Lai et al. Intelligent secure mobile edge computing for beyond 5G wireless networks
CN110392079B (en) Node computing task scheduling method and device for fog computing
CN110417496B (en) Cognitive NOMA network stubborn resource allocation method based on energy efficiency
Nduwayezu et al. Online computation offloading in NOMA-based multi-access edge computing: A deep reinforcement learning approach
CN112105062B (en) Mobile edge computing network energy consumption minimization strategy method under time-sensitive condition
Wang et al. Adaptive proportional fairness resource allocation for OFDM-based cognitive radio networks
CN112052086A (en) Multi-user safe energy-saving resource allocation method in mobile edge computing network
CN113115459B (en) Multi-scale and multi-dimensional resource allocation method for power Internet of things mass terminal
Budhiraja et al. ISHU: Interference reduction scheme for D2D mobile groups using uplink NOMA
El Haber et al. Latency and reliability aware edge computation offloading via an intelligent reflecting surface
Saleem et al. Performance guaranteed partial offloading for mobile edge computing
Thinh et al. Adaptive computation scaling and task offloading in mobile edge computing
CN112333702A (en) Optimization method for delay minimization based on safe NOMA moving edge calculation
CN112738822A (en) NOMA-based security offload and resource allocation method in mobile edge computing environment
CN113784340B (en) Secret unloading rate optimization method and system
He et al. Joint optimization of channel allocation and power control for cognitive radio networks with multiple constraints
CN113473499A (en) Energy efficiency fair non-cellular network resource allocation and pre-coding method and device
Wang et al. Fair resource allocation in an MEC-enabled ultra-dense IoT network with NOMA
Khan et al. Federated learning for cellular networks: Joint user association and resource allocation
Li et al. Offloading and system resource allocation optimization in TDMA based wireless powered mobile edge computing
Zhao et al. Secrecy offloading rate maximization for multi-access mobile edge computing networks
Abd-Elnaby et al. Efficient user pairing algorithm for enhancement of spectral efficiency and interference cancelation in downlink NOMA system
El Haber et al. Latency and reliability aware edge computation offloading in IRS-aided networks
CN116089091A (en) Resource allocation and task unloading method based on edge calculation of Internet of things
Waqar et al. Deep multi-agent reinforcement learning for resource allocation in NOMA-enabled MEC

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant