Next Article in Journal
A Sensitive Electrochemical Immunosensor Based on PAMAM Dendrimer-Encapsulated Au for Detection of Norfloxacin in Animal-Derived Foods
Next Article in Special Issue
A Software-Defined Networking Framework to Provide Dynamic QoS Management in IEEE 802.11 Networks
Previous Article in Journal
Detection of Oil Chestnuts Infected by Blue Mold Using Near-Infrared Hyperspectral Imaging Combined with Artificial Neural Networks
Previous Article in Special Issue
A Convex Constraint Variational Method for Restoring Blurred Images in the Presence of Alpha-Stable Noises
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing

1
Tsinghua National Laboratory for Information Science and Technology, Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
2
School of Cyber Science and Technology, Beihang University, Beijing 100191, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(6), 1945; https://doi.org/10.3390/s18061945
Submission received: 24 May 2018 / Revised: 6 June 2018 / Accepted: 11 June 2018 / Published: 15 June 2018
(This article belongs to the Special Issue Software-Defined Networking Based Mobile Networks)

Abstract

:
Mobile edge computing is proposed as a promising computing paradigm to relieve the excessive burden of data centers and mobile networks, which is induced by the rapid growth of Internet of Things (IoT). This work introduces the cloud-assisted multi-cloudlet framework to provision scalable services in cloudlet-based mobile edge computing. Due to the constrained computation resources of cloudlets and limited communication resources of wireless access points (APs), IoT sensors with identical computation offloading decisions interact with each other. To optimize the processing delay and energy consumption of computation tasks, theoretic analysis of the computation offloading decision problem of IoT sensors is presented in this paper. In more detail, the computation offloading decision problem of IoT sensors is formulated as a computation offloading game and the condition of Nash equilibrium is derived by introducing the tool of a potential game. By exploiting the finite improvement property of the game, the Computation Offloading Decision (COD) algorithm is designed to provide decentralized computation offloading strategies for IoT sensors. Simulation results demonstrate that the COD algorithm can significantly reduce the system cost compared with the random-selection algorithm and the cloud-first algorithm. Furthermore, the COD algorithm can scale well with increasing IoT sensors.

1. Introduction

With the rapid emergence and sharp growth of Internet of Things (IoT), enormous computation and communication requirements are induced, exceeding the capacity of current data centers and mobile networks [1,2,3,4]. Mobile edge computing, e.g., cloudlet-based mobile edge computing [5] and fog computing [6,7], introduces promising solutions to overcoming this challenge in a distributed manner. In mobile edge computing, ubiquitous communication and computation resource provisioning is enabled by shifting computation resources to the edge of the Internet, i.e., wireless access networks [8,9,10,11]. Due to the advantages of low latency and high bandwidth, many efforts have been devoted to exploring the potentials of mobile edge computing in practical applications, such as IoT  [12] caching [13,14,15], security services [16] and vehicular networks [17]. However, the resources of mobile edge computing are limited, especially in the scenario with dense population. To deal with this problem, cloud-edge interoperation frameworks have been proposed to provision scalable services [18,19].
In this paper, the cloud-assisted multi-cloudlet framework is introduced, as shown in Figure 1. A cloudlet is a multi-core computer or a cluster of well-connected computers [5]. Each sensor is able to offload its computation task to a cloudlet via a wireless AP, or to the remote cloud through the base station and Internet core. Due to the constrained computation resources of cloudlets and limited communication resources of wireless APs, the computation offloading decision of one sensor can have a significant influence on the processing delay and energy consumption of other sensors with identical computation offloading decisions. As processing delay and energy consumption of computation tasks are critical quality of service (QoS) metrics of IoT sensors, coordinating the computation offloading decisions of different IoT sensors is of vital importance.
This paper investigates the computation offloading decision problem of IoT sensors in the cloud-assisted multi-cloudlet framework. Many existing works have focused on computation offloading problems, including computation offloading problems of mobile devices [20,21,22,23], mobile data traffic offloading problems [24,25] and service migration problems [26]. Solving the computation offloading problem of IoT sensors in the cloud-assisted multi-cloudlet framework is challenging. First, IoT sensors are owned by different users with diversified interests. As IoT sensors with identical computation offloading decisions interact with each other, how to coordinate the computation offloading decisions of different sensors is challenging. This work solves the computation offloading decision problem of IoT sensors based on game theory, which is widely adopted to analyze systems with multiple selfish individuals [27]. Another challenge is that the cloud-assisted multi-cloud framework has heterogeneous computation and communication resources. Cloud resources can be provided on demand while computation resources of cloudlets are constrained. Each time one sensor changes its computation offloading decision, the computation and communication resources obtained by this sensor are changed simultaneously. Furthermore, due to the heterogeneous mobile networks (i.e., wireless access network and cellular network) in this framework, IoT sensors can have distinct energy consumption models when making different computation offloading decisions.
In this work, the computation offloading decision problem of IoT sensors is analyzed based on game theory. In more detail, the computation offloading decision problem of IoT sensors is formulated as a computation offloading game. To analyze the property of this game, the tool of potential game is introduced. Based on the definition of potential game, the condition of Nash equilibrium is derived, and the Computation Offloading Decision (COD) algorithm is further designed by leveraging the finite improvement property of potential game. In the COD algorithm, the improvement range is optimized in each improvement iteration, such that the computation complexity of the algorithm is significantly reduced. We implement extensive simulations to evaluate the COD algorithm. Simulation results demonstrate that the COD algorithm can effectively reduce the system cost (defined as the average weighted sum of processing delay and energy consumption of all sensors), compared with the random-selection algorithm and the cloud-first algorithm. Furthermore, the COD algorithm can scale well with increasing IoT sensors.
This paper is organized as follows. Section 2 presents the system model and Section 3 provides problem formulation and analysis. Algorithm design is presented in Section 4 and simulation results are illustrated and analyzed in Section 5. Finally, this work is concluded in Section 6.

2. System Model

This section presents the system model. As shown in Figure 1, there are a set of Γ = { 1 , 2 , , N } IoT sensors, each of which has a computation-intensive delay-sensitive computation task. Consider K cloudlets, to which IoT sensors can offload the computation tasks through wireless access points (APs). Since processing delay and energy consumption are two important factors that influence the performance of IoT sensors, this work considers these two issues as the metrics of QoS. In the cloudlet-based mobile edge computing framework, computation resources of each cloudlet are limited. In addition, IoT sensors connected to the identical wireless APs interfere with each other. Therefore, the performance of one sensor can be affected by the other sensors with identical computation offloading decisions. As both the computation process and the communication process play a significant role in computation offloading of IoT sensors, analysis of these two processes is provided as follows.

2.1. Computation Process

In the cloud-assisted cloudlet-based mobile edge computing framework, each IoT sensor n has a computation task M n , which is defined as
M n = Δ { d n , u n } ,
where d n represents the data block transmitted during computation offloading and u n represents the computation requirements of the computation task. Denote by s = ( s 1 , s 2 , , s N ) the computation offloading decision profile of sensors. Considering K cloudlets, then s n = i ( i { 1 , 2 , , K } ) when the computation task of sensor n is offloaded to cloudlet i, and s n = 0 if sensor n offloads the computation task to the cloud. Denote by S n the strategy set of sensor n.
As scalable computation resources can be provided by the cloud, when the computation task is offloaded to the cloud, the computation rate of each sensor can be guaranteed, denoted as f n c . Denote by f e the computation rate of each cloudlet and v n the ratio of computation resources that sensor n can obtain when offloading computation task to the cloudlet. Then, the computation rate of sensor n can be represented as
r n comp ( s ) = f e v n m Γ : s m = s n N v m s n > 0 f n c s n = 0 .
Thus, the computation delay of sensor n is
t n comp ( s ) = u n r n comp ( s ) .

2.2. Communication Process

As shown in Figure 1, each IoT sensor can offload computation tasks to a cloudlet via a wireless AP. Consider the IoT sensors that offload computation tasks to the identical cloudlet via the wireless AP. The spectrum of this wireless AP is shared among these sensors. In this paper, the CSMA access control protocol in [28] is adopted to distribute the spectrum among these sensors. In this access control protocol, sensors connected to the wireless AP compete for the channel to transmit the computation tasks. Once one sensor captures this channel, the computation task of this sensor is transmitted in the entirety of the channel. Thus, the expected transmission rate of an IoT sensor can be computed as
R n e ( s ) = b n w n m Γ : s m = s n w m ,
where b n is the transmission rate that sensor n can achieve when capturing this channel, and w n represents the probability of obtaining the channel.
As computation and communication resources of cloudlets are constrained, when cloudlets have dense population, IoT sensors can connect to the Internet core via the base station and further offload computation tasks to the cloud. With the development of cellular network, especially the rapid emergence and deployment of 5G network, sufficient spectrum is provided and extreme low latency is guaranteed. Thus, interference between IoT sensors are not considered when transmitting via the base station. According to the above analysis, the communication delay of sensor n can be summarized as
t n comm ( s ) = d n R n e ( s ) , s n > 0 , d n R n BS + t RTT , s n = 0 .
Here, R n BS represents the transmission rate of sensor n in the cellular network, and t RTT is the round trip delay between the base station and the cloud.

2.3. Delay and Energy Model

Processing delay and energy consumption are two important QoS metrics of mobile applications. Processing delay consists of computation delay and communication delay, which is given as
t n ( s ) = t n comp ( s ) + t n comm ( s ) .
During the computation offloading of IoT sensors, energy consumption only contains the energy consumed to offload computation tasks to cloudlets or to the cloud. When offloading computation tasks to cloudlets, IoT sensors transmit data blocks via wireless APs. This work adopts the energy model similar to the energy model in [29]. The energy consumption when offloading to cloudlets e n e contains three parts:
  • scanning energy e n s : energy consumption during scanning available APs,
  • transmission energy e n t : energy consumption during data transmission,
  • maintaining energy e n m : energy consumed to maintain interfaces on during computation offloading.
Scanning energy e n s can be represented by a constant. Transmission energy e n t is given by
e n t = a 0 d n ,
where a 0 is the energy consumed to transfer one unit of data via wireless APs. Maintaining energy e n m is computed as
e n m ( s ) = p n m · t n comm ( s ) .
Here, p n m is the transmission power of sensor n. Therefore, the energy consumption when offloading to cloudlets ( s n { 1 , 2 , , K } ) is
e n ( s ) = e n s + a 0 d n + p n m · t n comm ( s ) .
When offloading computation tasks to the cloud through the base station and Internet core, the energy consumption of IoT sensors during computation offloading contains includes tail energy e n tail as well. Thus, the energy consumption when offloading to the cloud ( s n = 0 ) is
e n ( s ) = e n s + e n tail + a 1 d n + p n m · t n comm ( s ) ,
where e n s and p n m are scanning energy and maintaining power, respectively, when offloading to the cloud, and a 1 is the energy consumed to transfer one unit of data via the base station.

3. Problem Formulation and Analysis

In the cloud-assisted multi-cloudlet framework, IoT sensors contend for the computation and communication resources of the cloudlets and wireless APs to meet the QoS requirements of IoT applications. Since IoT sensors are owned by different individuals that pursue diversified interests, decentralized computation offloading decisions should be made to mimic the selfish property of the sensor users. As systems consisting of multiple selfish individuals are usually analyzed based on game theory [27], this work formulates the computation offloading problem of multiple IoT sensors as a computation offloading game. The details are presented as follows.

3.1. Computation Offloading Game

In the cloud-assisted multi-cloudlet framework, the computation offloading problem of IoT sensors is formulated as a computation offloading game. The players are the IoT sensors that have computation tasks to offload. The strategy of each player n ( n Γ ) is the computation offloading decision s n ( s n { 0 , 1 , , K } ). Denote by s n the computation offloading decisions of all IoT sensors except n, i.e.,
s n = Δ { s 1 , s n 1 , s n + 1 , , s N } .
For each IoT sensor, the processing delay and energy consumption of the computation task are important QoS metrics, thus the cost function of IoT sensor n is defined as
C n ( s ) = C n ( s n , s n ) = t n ( s ) + λ n · e n ( s ) .
Here, λ n represents the weight parameter of energy consumption over processing delay, which is assigned by sensor n based on its interest.
According to the results in Section 2, when sensor n offloads the computation task to a cloudlet via a wireless AP (i.e., s n { 1 , 2 , , K } ), the cost function of sensor n can be represented as
C n ( s ) = ( u n m Γ : s m = s n N v m f e v n + d n m Γ : s m = s n w m b n w n ) + λ n · ( e n s + a 0 d n + p n m · d n m Γ : s m = s n w m b n w n ) = u n f e · m Γ : s m = s n N v m v n + d n b n ( 1 + λ n p n m ) · m Γ : s m = s n w m w n + ( λ n e n s + λ n a 0 d n ) .
When sensor n offloads the computation task to the cloud (i.e., s n = 0 ), the cost function is
C n 0 = ( u n f n c + d n R n BS + t RTT ) + λ n · [ e n s + e n tail + a 1 d n + p n m · ( d n R n BS + t RTT ) ] .

3.2. Analysis

Based on game theory, a Nash equilibrium of a game is defined as in Definition 1 [27].
Definition 1.
A strategy profile s * = { s 1 * , s 2 * , , s n * } is a Nash equilibrium, if for any n Γ and any s n { 0 , 1 , , K } , it is satisfied that
C n ( s n * , s n ) C n ( s n , s n ) .
According to Definition 1, when the computation offloading game of IoT sensors reaches Nash equilibrium, the strategy of each player is the best computation offloading decision that minimizes its cost function, given the strategies of all the other players. Thus, no player has the motivation to violate the current computation offloading decision.
For the computation offloading game of IoT sensors, each IoT sensor chooses the computation offloading strategy to minimize its cost function selfishly. Since the sensors offloading to the identical cloudlet via the wireless AP contend for the computation and communication resources, when one sensor n changes its strategy from s n to s n , the cost of sensor m that has the strategy of s n (i.e., s m = s n ) is influenced. Denote by s m * the current computation offloading decision of sensor m and define Δ m as
Δ m = min s m s m * c m ( s m , s m ) c m ( s m * , s m ) .
Then, Δ m represents the smallest difference between all the other strategies and the current strategy of sensor m. Denote by m * the sensor that has the smallest Δ m , i.e.,
m * = arg min Δ m s m = s n .
When sensor n changes its strategy from s n to s n , the costs of sensors that offload computation tasks to s n increase due to the reduced computation and communication resources allocated to these sensors. It is intuitive that sensor m * is most likely to change its current computation offloading strategy, and the strategy is only changed when new sensors with larger Δ choose to offload the computation tasks to s m (i.e., s n ). When sensor m * chooses a new computation offloading strategy  s m , it may further motivate sensors with the computation offloading strategy of s m and smaller Δ to change the computation offloading strategies.
According to the above analysis, when one sensor changes its computation offloading strategy, a chain reaction of strategy changes can be incurred. In the following work, we further explore the properties of the computation offloading game and analyze the existence of Nash equilibrium.

4. Algorithm Design

This section first derives the condition of Nash equilibrium by introducing the concept of a potential game [30]. Then, the Computation Offloading Decision (COD) algorithm is designed by exploiting the property of the computation offloading game.

4.1. Condition of Nash Equilibrium

According to [30], a potential game is defined as follows:
Definition 2.
The computation offloading game of IoT sensors is a potential game if there exists a function Θ ( s ) such that if for any n, s n , s n S n and s n m Γ \ { n } S n , if
C n ( s n , s n ) < C n ( s n , s n ) ,
there is
Θ ( s n , s n ) < Θ ( s n , s n ) .
The function Θ ( s ) is called potential function.
It is indicated from Definition 2 that in a potential game, when any IoT sensor n Γ changes its computation offloading decision from s n to s n so as to reduce its cost function, the value of the potential function also decreases. When the potential game reaches a Nash equilibrium, the potential function can not be further reduced. It has been proved that any finite potential game has a Nash equilibrium [30]. Therefore, if we want to derive the condition of Nash equilibrium in the computation offloading game of IoT sensors, we simply need to investigate the condition of a potential game.
Theorem 1.
The computation offloading game of IoT sensors is a potential game if for every sensor n Γ , there  is
w n m Γ : s m = s n N w m = v n m Γ : s m = s n N v m .
Proof. 
Substitute Equation (20) into Equation (13), and it is derived that when sensor n offloads the computation task to a cloudlet (i.e., s n { 1 , 2 , , K } ), the cost function is
C n ( s ) = [ u n f e + d n b n ( 1 + λ n p n m ) ] · m Γ : s m = s n w m w n + ( λ n e n s + λ n a 0 d n ) .
Define Ω n as
Ω n = w n [ C n 0 ( λ n e n s + λ n a 0 d n ) ] / [ u n f e + d n b n ( 1 + λ n p n m ) ] ,
where C n 0 is represented in Equation (14). Then, it can be proved that there exists a potential function Θ ( s )
Θ ( s ) = 1 2 n = 1 N m = 1 N w n w m f ( s m = s n ) f ( s n > 0 ) + n = 1 N Ω n w n f ( s n = 0 )
in two cases:
Case 1: if s n > 0 , s n > 0 , then
C n ( s n , s n ) C n ( s n , s n ) = [ u n f e + d n b n ( 1 + λ n p n m ) ] · m Γ : s m = s n w m l Γ : s m = s n , w l w n
and
Θ n ( s n , s n ) Θ n ( s n , s n ) = w n ( m Γ : s m = s n w m l Γ : s m = s n w l ) = ( w n ) 2 [ u n f e + d n b n ( 1 + λ n p n m ) ] [ C n ( s n , s n ) C n ( s n , s n ) ] .
In this case, if C n ( s n , s n ) C n ( s n , s n ) > 0 , it is satisfied that Θ n ( s n , s n ) Θ n ( s n , s n ) > 0 .
Case 2: if s n > 0 , s n = 0 , then
C n ( s n , s n ) C n ( s n , s n ) = [ u n f e + d n b n ( 1 + λ n p n m ) ] · m Γ : s m = s n w m w n + ( λ n e n s + λ n a 0 d n ) C n 0 ,
and
Θ n ( s n , s n ) Θ n ( s n , s n ) = w n ( m Γ : s m = s n w m l Γ : s m = s n w l ) = ( w n ) 2 [ u n f e + d n b n ( 1 + λ n p n m ) ] [ C n ( s n , s n ) C n ( s n , s n ) ] .
In this case, if C n ( s n , s n ) C n ( s n , s n ) > 0 , Θ n ( s n , s n ) Θ n ( s n , s n ) > 0 is satisfied too.
Therefore, if the condition in Equation (20) is satisfied in the computation offloading game of IoT sensors, the game is a potential game with the potential function presented in Equation (23). ☐

4.2. Computation Offloading Decision Algorithm

It has been proved that the computation offloading game of IoT sensors is a potential game when the condition in Equation (20) is satisfied. In a potential game, the Nash equilibrium can always be achieved after finite improvement iterations, which is called finite improvement property [30]. This part provides the design of the Computation Offloading Decision (COD) algorithm by exploiting the finite improvement property of the computation offloading game. The details are shown in Algorithm 1.
Denote by ρ n t the better strategy set of sensor n in the tth iteration: if C n ( s n t 1 , s n ) > C n ( k , s n ) , then k ρ n t . d n t represents the improvement decision of sensor n in the tth iteration and ξ n t is the improvement range of cost function defined as ξ n t = C n ( s n t 1 , s n ) C n ( d n t , s n ) .
Algorithm 1 Computation Offloading Decision (COD) algorithm
Input:
   Computation tasks of sensors M n ( n Γ ).
Output:
   Computation offloading strategy of sensors s n ( n Γ ).
   Initialization
   Each sensor initially offloads its computation task to the cloud, s n 0 = 0 ( n Γ ).
1:
Compute the cost of each sensor n when offloading the computation task to the cloud, C n 0 , based on Equation (14).
2:
for each improvement iteration t do
3:
for each sensor n Ψ ( t 1 ) do
4:
  obtain the computation and communication resources allocated to sensor n when offloading the computation task to each cloudlet according to s n t 1 .
5:
  compute the better strategy set ρ n t based on Equations (13) and (14).
6:
  choose the improvement decision d n t from ρ n t to minimize the cost function.
7:
end for
8:
if the better strategy set of all sensors n = 1 N ρ n t then
9:
  each sensor n with ρ n t competes for the improvement opportunity, and the sensor with larger ξ n t is endowed with higher priority of winning the contention.
10:
  if sensor n wins the contention then
11:
    s n t = d n t .
12:
  end if
13:
else
14:
  break;
15:
end if
16:
end for
It is indicated in Definition 2 that the potential function decreases when each player changes its strategy to reduce its cost function. In addition, the computation offloading game of IoT sensors has a finite improvement property. As in each improvement iteration sensors with larger ξ n t are endowed with a higher priority of winning the improvement opportunity (as presented in step 9), the improvement range of the potential function is optimized in each iteration. Therefore, the number of improvement iterations is reduced and the COD algorithm can have good scalability.

5. Simulations and Results

In this section, extensive simulations are conducted to evaluate the COD algorithm. Consider the simulation scenario in which there are N IoT sensors, each of which has a computation task M n = { d n , u n } to offload. The simulations take the face recognition application in [31] as the example of the IoT computation tasks. As IoT sensors have heterogeneous computation requests, the data load d n and computation requirements u n follow normal distribution in these simulations, with the parameters of (420, 42) KB and (2, 0.2) Giga CPU cycles, respectively. There are 10 cloudlets, each of which has the computation capacity of 24 GHz. IoT sensors can offload computation tasks to each cloudlet via a wireless AP. The transmission rates of these wireless APs follow normal distribution, with the expectation of 5 Mbps and the standard deviation of 1 Mbps. When offloading the computation task to the cloud, a T2.nano instance is provided to serve each sensor, the computation rate of which is 2.4 GHz [32]. The upload rate of each sensor to the base station is 2 Mbps. The round trip delay from the base station to the cloud is 50 ms [33,34]. The energy consumption parameters are based on the measurement results in [29], as shown in Table 1.
The performance of the COD algorithm is compared with the random-selection algorithm and the cloud-first algorithm. In the random-selection algorithm, each IoT sensor randomly selects a computation offloading decision among the cloudlets and the cloud. In the cloud-first algorithm, all IoT sensors offload the computation tasks to the cloud.

5.1. Performance of the COD Algorithm

Defining the system cost as the average cost of all IoT sensors,
C sys = n = 1 N C n ( s ) N ,
then the system costs of the three algorithms are illustrated as Figure 2a.
As shown in Figure 2a, the COD algorithm can significantly reduce the system cost compared with the random-selection algorithm and the cloud first algorithm. In the cloud-assisted system, the base station provides abundant communication resources and the cloud has scalable computation resources. Thus, the system cost of the cloud-first algorithm remains almost unchanged with increasing sensor number.
When the sensor number is small, the cloudlets can provide sufficient computation resources and the wireless APs have abundant communication resources, offloading computation tasks to cloudlets yields lower costs than offloading to the cloud. In the COD algorithm and the random-selection algorithm, part of IoT sensors offload computation tasks to cloudlets, thus the system costs are lower than the cloud-first algorithm. As sensor number increases, the computation resources of cloudlets and the communication resources of wireless APs become scarce. The system costs of the COD algorithm and the random-selection algorithm increase rapidly with increasing sensor number. In the COD algorithm, the IoT sensor with the largest improvement range is endowed with the highest priority to update the computation offloading strategy in each iteration. Thus, the system cost of the COD algorithm increases slower than the random-selection algorithm, and finally approaches the result of the cloud-first algorithm.
To evaluate the scalability of the COD algorithm, simulations are further implemented to record the number of improvement iterations with different sensor numbers. The results are shown in Figure 2b. It is indicated that the number of iterations increases approximately linearly with the number of sensors. As revealed in Algorithm 1, the computation complexity of each improvement iteration is O(NK). Therefore, the computation complexity of the COD algorithm approaches O(N2K), and the COD algorithm scales well with increasing sensor number.

5.2. Influence of Different Parameters

This part evaluates the influence of different parameters on the results of the COD algorithm. Simulations are conducted to record the number of sensors offloading to the cloud (the overall number of sensors n = 100). The results are illustrated as Figure 3a,b.
Figure 3a presents the influence of the size of trasmitted data block during computation offloading. In the random-selection algorithm, the number of sensors offloading to the cloud almost remains unchanged, since computation offloading strategies of sensors are selected randomly. As the communication resources of wireless APs are limited, the costs of sensors increase with growing data block when offloading the computation tasks to cloudlets. Therefore, increasing sensors offload the computation tasks to the cloud in the COD algorithm.
Figure 3b illustrates the influence of weight parameter of energy consumption over processing delay ( λ n ). In this simulation, the transmitted data block is 420 KB, and the sensor number n = 100. According to [29], the energy consumption when transmitting the data block via the base station is higher than transmitting via wireless APs. As λ n increases, energy consumption occupies more in the cost of sensors. Thus, in the COD algorithm, the number of sensors offloading to the cloud (via the base station) decreases with increasing λ n .

6. Conclusions

This work has investigated the computation offloading decision problem of IoT sensors in the cloud-assisted multi-cloudlet framework. Theoretic analysis has been presented and the condition of Nash equilibrium has been derived based on the potential game. By exploiting the finite property of the computation offloading game of IoT sensors, the COD algorithm has been proposed. Simulation results have demonstrated that the COD algorithm can effectively reduce the system cost compared with the random-selection algorithm and the cloud-first algorithm. In addition, the complexity of the COD algorithm is O(N2K), thus this algorithm can scale well with increasing IoT sensors.

Author Contributions

Conceptualization, X.M.; Formal analysis, X.M.; Investigation, X.M., H.Z. and J.L.; Methodology, X.M.; Resources, C.L. and J.L.; Software, X.M. and H.Z.; Supervision, C.L.

Funding

This research was funded by the National Natural Science Foundation of China Grant No. 61472199.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ashton, K. That ‘Internet of Things’ Thing. RFID J. 2009, 22, 97–114. [Google Scholar]
  2. Vilmo, A.; Medaglia, C.; Moroni, A. Vision and Challenges for Realising the Internet of Things. Hot Work. Technol. 2010, 35, 59–60. [Google Scholar]
  3. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  4. Cisco Global Cloud Index: Forecast and Methodology, 2016–2021 White Paper. Available online: https://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/white-paper-c11-738085.html (accessed on 11 June 2018).
  5. Satyanarayanan, M.; Bahl, P.; Caceres, R.; Davies, N. The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 2009, 8, 14–23. [Google Scholar] [CrossRef]
  6. Luan, T.H.; Gao, L.; Li, Z.; Xiang, Y.; Wei, G.; Sun, L. Fog computing: Focusing on mobile users at the edge. arXiv, 2015; arXiv:1502.01815. [Google Scholar]
  7. Osanaiye, O.; Chen, S.; Yan, Z.; Lu, R.; Choo, K.K.R.; Dlodlo, M. From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access 2017, 5, 8284–8300. [Google Scholar] [CrossRef]
  8. ETSI. Mobile Edge Computing (MEC): Framework and Reference Architecture; ETSI: Sophia Antipolis CEDEX, France, 2016. [Google Scholar]
  9. Roman, R.; Lopez, J.; Mambo, M. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar] [CrossRef]
  10. Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. Mobile edge computing: Survey and research outlook. arXiv, 2017; arXiv:1701.01090. [Google Scholar]
  11. Mach, P.; Becvar, Z. Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 2017, 19, 1628–1656. [Google Scholar] [CrossRef]
  12. Li, H.; Ota, K.; Dong, M. Learning IoT in edge: Deep learning for the Internet of Things with edge computing. IEEE Netw. 2018, 32, 96–101. [Google Scholar] [CrossRef]
  13. Xu, J.; Ota, K.; Dong, M. Saving Energy on the Edge: In-Memory Caching for Multi-Tier Heterogeneous Networks. IEEE Commun. Mag. 2018, 56, 102–107. [Google Scholar] [CrossRef]
  14. Zhang, S.; Zhang, N.; Yang, P.; Shen, X. Cost-Effective Cache Deployment in Mobile Heterogeneous Networks. IEEE Trans. Veh. Technol. 2017, 66, 11264–11276. [Google Scholar] [CrossRef] [Green Version]
  15. Zhang, S.; He, P.; Suto, K.; Yang, P.; Zhao, L.; Shen, X.S. Cooperative Edge Caching in User-Centric Clustered Mobile Networks. IEEE Trans. Mob. Comput. 2017. [Google Scholar] [CrossRef]
  16. Wu, J.; Dong, M.; Ota, K.; Li, J.; Guan, Z. FCSS: Fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans. Emerg. Top. Comput. 2017. [Google Scholar] [CrossRef]
  17. Zhang, S.; Zhang, N.; Fang, X.; Yang, P.; Shen, X. Self-Sustaining Caching Stations: Toward Cost-Effective 5G-Enabled Vehicular Networks. IEEE Commun. Mag. 2017, 55, 202–208. [Google Scholar] [CrossRef] [Green Version]
  18. Yang, P.; Zhang, N.; Bi, Y.; Yu, L.; Shen, X. Catalyzing cloud-fog interoperation in 5G wireless networks: An SDN approach. IEEE Netw. 2017, 31, 14–20. [Google Scholar] [CrossRef]
  19. Ma, X.; Zhang, S.; Li, W.; Zhang, P.; Lin, C.; Shen, X. Cost-Efficient Workload Scheduling in Cloud Assisted Mobile Edge Computing. In Proceedings of the IEEE/ACM International Symposium on Quality of Service (IWQoS’17), Vilanova i la Geltru, Spain, 14–16 June 2017; pp. 1–10. [Google Scholar]
  20. Tao, X.; Ota, K.; Dong, M.; Qi, H.; Li, K. Performance guaranteed computation offloading for mobile-edge cloud computing. IEEE Wirel. Commun. Lett. 2017, 6, 774–777. [Google Scholar] [CrossRef]
  21. Ma, X.; Lin, C.; Xiang, X.; Chen, C. Game-theoretic analysis of computation offloading for cloudlet-based mobile cloud computing. In Proceedings of the ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM’15), Cancum, Mexico, 2–6 November 2015; pp. 271–278. [Google Scholar]
  22. Chen, X. Decentralized computation offloading game for mobile cloud computing. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 974–983. [Google Scholar] [CrossRef]
  23. Chen, X.; Jiao, L.; Li, W.; Fu, X. Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans. Netw. 2016, 24, 2795–2808. [Google Scholar] [CrossRef]
  24. Lei, T.; Wang, S.; Li, J.; Yang, F. AOM: Adaptive mobile data traffic offloading for M2M networks. Pers. Ubiquitous Comput. 2016, 20, 863–873. [Google Scholar] [CrossRef]
  25. Wang, S.; Lei, T.; Zhang, L.; Hsu, C.H.; Yang, F. Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems. Future Gener. Comput. Syst. 2016, 61, 118–127. [Google Scholar] [CrossRef]
  26. Wang, S.; Xu, J.; Zhang, N.; Liu, Y. A Survey on Service Migration in Mobile Edge Computing. IEEE Access 2018, 6, 23511–23528. [Google Scholar] [CrossRef]
  27. Osborne, M.J.; Rubinstein, A. A Course in Game Theory; MIT Press: Cambridge, MA, USA, 1994. [Google Scholar]
  28. Standard, F. Telecommunications: Glossary of Telecommunication Terms; General Services Administration: Washington, DC, USA, 1996; Volume 7.
  29. Balasubramanian, N.; Balasubramanian, A.; Venkataramani, A. Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications. In Proceedings of the ACM SIGCOMM Conference on Internet Measurement, Chicago, IL, USA, 4–6 November 2009; pp. 280–293. [Google Scholar]
  30. Monderer, D.; Shapley, L.S. Potential games. Games Econ. Behav. 1996, 14, 124–143. [Google Scholar] [CrossRef]
  31. Soyata, T.; Muraleedharan, R.; Funai, C.; Kwon, M.; Heinzelman, W. Cloud-vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC’12), Cappadocia, Turkey, 1–4 July 2012; pp. 59–66. [Google Scholar]
  32. Amazon. EC2 Instance. Available online: https://amazonaws-china.com/cn/ec2/instance-types/ (accessed on 12 June 2018).
  33. Li, A.; Yang, X.; Kandula, S.; M, Z. CloudCmp: Comparing Public Cloud Providers. In Proceedings of the ACM Internet Measurement Conference (IMC’10), Melbourne, Australia, 1 November 2010; pp. 1–14. [Google Scholar]
  34. Claypool, M.; Claypool, K. Latency and player actions in online games. Commun. ACM 2006, 49, 40–45. [Google Scholar] [CrossRef]
Figure 1. Cloud-assisted cloudlet-based mobile edge computing
Figure 1. Cloud-assisted cloudlet-based mobile edge computing
Sensors 18 01945 g001
Figure 2. Performance of the COD Algorithm.
Figure 2. Performance of the COD Algorithm.
Sensors 18 01945 g002
Figure 3. Influence of different parameters.
Figure 3. Influence of different parameters.
Sensors 18 01945 g003
Table 1. Energy consumption parameters [29].
Table 1. Energy consumption parameters [29].
Wireless APBase Station
Scanning Energy (J)5.93.5
Transmission Power (J/KB)0.0070.025
Maintaining Power (W)0.050.02
Tail Energy (J)07.75

Share and Cite

MDPI and ACS Style

Ma, X.; Lin, C.; Zhang, H.; Liu, J. Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing. Sensors 2018, 18, 1945. https://doi.org/10.3390/s18061945

AMA Style

Ma X, Lin C, Zhang H, Liu J. Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing. Sensors. 2018; 18(6):1945. https://doi.org/10.3390/s18061945

Chicago/Turabian Style

Ma, Xiao, Chuang Lin, Han Zhang, and Jianwei Liu. 2018. "Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing" Sensors 18, no. 6: 1945. https://doi.org/10.3390/s18061945

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop