Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Secured Computation Offloading in Multi-Access Mobile Edge Computing Networks through Deep Reinforcement Learning

View through CrossRef
Mobile edge computing (MEC) has emerged as a pivotal technology to address the computational demands of resource-constrained mobile devices by offloading tasks to nearby edge servers. However, ensuring the security and efficiency of computation offloading in multiaccess MEC networks remains a critical challenge. This paper proposes a novel approach that leverages deep reinforcement learning (DRL) for secure computation offloading in multi-access MEC networks. The proposed framework utilizes DRL agents to dynamically make offloading decisions based on the current network conditions, resource availability, and security requirements. The agents learn optimal offloading policies through interactions with the environment, aiming to maximize task completion efficiency while minimizing security risks. To enhance security, the framework integrates encryption techniques and access control mechanisms to protect sensitive data during offloading. The proposed approach undergoes comprehensive simulations to assess its performance in terms of security, efficiency, and scalability. The results demonstrate that the DRL-based approach effectively balances the tradeoffs between security and efficiency, achieving robust and adaptive computation offloading in multi-access MEC networks. This study contributes to advancing the state-of-the-art in secure and efficient mobile edge computing systems, fostering the development of intelligent and resilient MEC solutions for future mobile networks.
Title: Secured Computation Offloading in Multi-Access Mobile Edge Computing Networks through Deep Reinforcement Learning
Description:
Mobile edge computing (MEC) has emerged as a pivotal technology to address the computational demands of resource-constrained mobile devices by offloading tasks to nearby edge servers.
However, ensuring the security and efficiency of computation offloading in multiaccess MEC networks remains a critical challenge.
This paper proposes a novel approach that leverages deep reinforcement learning (DRL) for secure computation offloading in multi-access MEC networks.
The proposed framework utilizes DRL agents to dynamically make offloading decisions based on the current network conditions, resource availability, and security requirements.
The agents learn optimal offloading policies through interactions with the environment, aiming to maximize task completion efficiency while minimizing security risks.
To enhance security, the framework integrates encryption techniques and access control mechanisms to protect sensitive data during offloading.
The proposed approach undergoes comprehensive simulations to assess its performance in terms of security, efficiency, and scalability.
The results demonstrate that the DRL-based approach effectively balances the tradeoffs between security and efficiency, achieving robust and adaptive computation offloading in multi-access MEC networks.
This study contributes to advancing the state-of-the-art in secure and efficient mobile edge computing systems, fostering the development of intelligent and resilient MEC solutions for future mobile networks.

Related Results

ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
Computational Offloading in Mobile Edge with Comprehensive and Energy Efficient Cost Function: A Deep Learning Approach
Computational Offloading in Mobile Edge with Comprehensive and Energy Efficient Cost Function: A Deep Learning Approach
In mobile edge computing (MEC), partial computational offloading can be intelligently investigated to reduce the energy consumption and service delay of user equipment (UE) by divi...
Towards computational offloading in mobile device clouds
Towards computational offloading in mobile device clouds
With the rise in mobile device adoption, and growth in mobile application market expected to reach $30 billion by the end of 2013, mobile user expectations for pervasive computatio...
Deep reinforcement learning‐based joint optimization of computation offloading and resource allocation in F‐RAN
Deep reinforcement learning‐based joint optimization of computation offloading and resource allocation in F‐RAN
AbstractThe fog radio access network (F‐RAN) has been regarded as a promising wireless access network architecture in the fifth generation (5G) and beyond systems to satisfy the in...
QoE Aware and Cell Capacity Enhanced Computation Offloading for Multi-Server Mobile Edge Computing Systems with Energy Harvesting Devices
QoE Aware and Cell Capacity Enhanced Computation Offloading for Multi-Server Mobile Edge Computing Systems with Energy Harvesting Devices
The increasing complexity of intelligent services requires new paradigm to overcome the problems caused by resource-limited mobile devices. Mobile edge computing systems with energ...
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
PurposeMobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m‐learning ...
Dependency-Aware Task Offloading for Vehicular Edge Computing with End-Edge-Cloud Collaborative Computing
Dependency-Aware Task Offloading for Vehicular Edge Computing with End-Edge-Cloud Collaborative Computing
Abstract Vehicular edge computing (VEC) is emerging as a new computing paradigm to improve the quality of vehicular services and enhance the capabilities of vehicles. It ai...
Meta-heuristic-based offloading task optimization in mobile edge computing
Meta-heuristic-based offloading task optimization in mobile edge computing
With the recent advancements in communication technologies, the realization of computation-intensive applications like virtual/augmented reality, face recognition, and real-time vi...

Back to Top