Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
Author | Elgendy, Ibrahim A. |
Author | Muthanna, Ammar |
Author | Hammoudeh, Mohammad |
Author | Shaiba, Hadil |
Author | Unal, Devrim |
Author | Khayyat, Mashael |
Available date | 2024-04-22T12:37:17Z |
Publication Date | 2021-08-01 |
Publication Name | Big Data |
Identifier | http://dx.doi.org/10.1089/big.2020.0284 |
Citation | Elgendy, I. A., Muthanna, A., Hammoudeh, M., Shaiba, H., Unal, D., & Khayyat, M. (2021). Advanced deep learning for resource allocation and security aware data offloading in industrial mobile edge computing. Big Data, 9(4), 265-278. |
ISSN | 21676461 |
Abstract | The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization lead to the shift from mobile cloud computing to mobile edge computing. In this study, we propose an advanced deep reinforcement resource allocation and security-aware data offloading model that considers the constrained computation and radio resources of industrial IoT devices to guarantee efficient sharing of resources between multiple users. This model is formulated as an optimization problem with the goal of decreasing energy consumption and computation delay. This type of problem is non-deterministic polynomial time-hard due to the curse-of-dimensionality challenge, thus, a deep learning optimization approach is presented to find an optimal solution. In addition, a 128-bit Advanced Encryption Standard-based cryptographic approach is proposed to satisfy the data security requirements. Experimental evaluation results show that the proposed model can reduce offloading overhead in terms of energy and time by up to 64.7% in comparison with the local execution approach. It also outperforms the full offloading scenario by up to 13.2%, where it can select some computation tasks to be offloaded while optimally rejecting others. Finally, it is adaptable and scalable for a large number of mobile devices. |
Sponsor | This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program. |
Language | en |
Publisher | Mary Ann Liebert Inc. |
Subject | 5G computation offloading deep reinforcement learning mobile edge computing security |
Type | Article |
Pagination | 265-278 |
Issue Number | 4 |
Volume Number | 9 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Information Intelligence [93 items ]