scholarly journals Joint Optimization for Task Offloading in Edge Computing: An Evolutionary Game Approach

Sensors ◽  
2019 ◽  
Vol 19 (3) ◽  
pp. 740 ◽  
Author(s):  
Chongwu Dong ◽  
Wushao Wen

The mobile edge computing (MEC) paradigm provides a promising solution to solve the resource-insufficiency problem in mobile terminals by offloading computation-intensive and delay-sensitive tasks to nearby edge nodes. However, limited computation resources in edge nodes may not be sufficient to serve excessive offloading tasks exceeding the computation capacities of edge nodes. Therefore, multiple edge clouds with a complementary central cloud coordinated to serve users is the efficient architecture to satisfy users’ Quality-of-Service (QoS) requirements while trying to minimize some network service providers’ cost. We study a dynamic, decentralized resource-allocation strategy based on evolutionary game theory to deal with task offloading to multiple heterogeneous edge nodes and central clouds among multi-users. In our strategy, the resource competition among multi-users is modeled by the process of replicator dynamics. During the process, our strategy can achieve one evolutionary equilibrium, meeting users’ QoS requirements under resource constraints of edge nodes. The stability and fairness of this strategy is also proved by mathematical analysis. Illustrative studies show the effectiveness of our proposed strategy, outperforming other alternative methods.

2018 ◽  
Vol 32 (30) ◽  
pp. 1850334 ◽  
Author(s):  
Ai-Zhong Shen ◽  
Jin-Li Guo ◽  
Jun-Fang Wang ◽  
Qi Suo

Extortion strategies can unilaterally transcend any opponent’s expected payoffs and promote cooperative behaviors in an iterated prisoner’s dilemma game. However, extortion strategies have the evolutionary instability if the players game with uniform structure. In this paper, we study the influence of extortion on the evolution of cooperation in the scale-free network with the player’s game payoffs calculated by average payoffs and the strategy update rule according to the replicator dynamics rule. Firstly, we study the stability of evolutionary game results after introducing the extortion strategy and the influence of evolution extortion on cooperation. In addition, we compare the results of our model with the donation games of the accumulated payoff in the BA networks. Moreover, we study the influence of the model parameters on game results. The results show that extortion can form long-term stable relationships with neighbors and the average payoffs’ inhibiting effect of cooperative behaviors disappear after introducing the extortion strategies in the scale-free network. The smaller value of the extortion actor and the benefit factor have a greater effect on the stability density of the strategies but the initial strategy density does not.


Mathematics ◽  
2021 ◽  
Vol 9 (8) ◽  
pp. 805
Author(s):  
Leyi Shi ◽  
Xiran Wang ◽  
Huiwen Hou

Honeypot has been regarded as an active defense technology that can deceive attackers by simulating real systems. However, honeypot is actually a static network trap with fixed disposition, which is easily identified by anti-honeypot technology. Thus, honeypot is a “passive” active defense technology. Dynamic honeypot makes up for the shortcomings of honeypot, which dynamically adjusts defense strategies with the attack of hackers. Therefore, the confrontation between defenders and attackers is a strategic game. This paper focuses on the non-cooperative evolutionary game mechanism of bounded rationality, aiming to improve the security of the array honeypot system through the evolutionarily stable strategies derived from the evolutionary game model. First, we construct a three-party evolutionary game model of array honeypot, which is composed of defenders, attackers and legitimate users. Secondly, we formally describe the strategies and revenues of players in the game, and build the three-party game payoff matrices. Then the evolutionarily stable strategy is obtained by analyzing the Replicator Dynamics of various parties. In addition, we discuss the equilibrium condition to get the influence of the number of servers N on the stability of strategy evolution. MATLAB and Gambit simulation experiment results show that deduced evolutionarily stable strategies are valid in resisting attackers.


2016 ◽  
Vol 5 (3) ◽  
pp. 39
Author(s):  
Amegovu K. Andrew

Physical and emotional wellness, as well as access to healthcare, are foundations for successful resettlement. Without feeling healthy, it is difficult to work, to go school, or take care of a family. Many factors can affect refugee health, including geographic origin and refugee camp conditions. Refugees may face a wide variety of acute or chronic health issues (Office of Refugee Resettlement, ORR Annual Report to Congress 2014; http://www.acf.hhs.gov). Resettlement of refugees in Uganda is usually supported by concerted efforts of UNHCR, Governments through the Office of the Prime Minister, OPM with support from host communities, local and international Non-Governmental Organizations. Due to resource constraints and local factors, immigrants are often subjected to poor living conditions which coupled with inadequacy inessential medical supplies might significantly affects quality of care and health service delivery and hence, rendering refugees to poor health status. This study was conducted from 2013-2014 to assess the determinants of health status of Congolese refugees living in Nakivale refugee settlement, in Isingiro district- South Western Uganda. A cross-sectional study design was used involving mixed techniques of both qualitative and quantitative KAP survey. The study focussed on Congolese refugee population in Nakivale Refugee settlement. 2401 key informants’ interviews and 8 focus group discussions respectively were conducted targeting service providers and beneficiaries/Congolese refugees in this case. The data was analysed using SPSS ver.20, 2011. Although majority (97%) of respondents sought medical services from established health facilities, findings confirm a high level of ill health prevalence among Congolese refugees in Nakivale camp, however, the difference in health services and perceived health status in camp versus the one in DRcongo is insignificant ( p=0.000) with respondents perceiving their health status as worse than when they were their own Country before the resettlement. Identified key challenges affecting access & uptake of available health services includes: language barrier; inadequate drugs; and the long distances to access health facilities. The health status of refugees could be improved by addressing the challenges related to language, drug supplies in addition to humanising conditions of shelter, providing appropriate waste disposal facilities while proving adequate food rations and clean & safe drinking water.


Author(s):  
Lujie Tang ◽  
Bing Tang ◽  
Li Zhang ◽  
Feiyan Guo ◽  
Haiwu He

AbstractTaking the mobile edge computing paradigm as an effective supplement to the vehicular networks can enable vehicles to obtain network resources and computing capability nearby, and meet the current large-scale increase in vehicular service requirements. However, the congestion of wireless networks and insufficient computing resources of edge servers caused by the strong mobility of vehicles and the offloading of a large number of tasks make it difficult to provide users with good quality of service. In existing work, the influence of network access point selection on task execution latency was often not considered. In this paper, a pre-allocation algorithm for vehicle tasks is proposed to solve the problem of service interruption caused by vehicle movement and the limited edge coverage. Then, a system model is utilized to comprehensively consider the vehicle movement characteristics, access point resource utilization, and edge server workloads, so as to characterize the overall latency of vehicle task offloading execution. Furthermore, an adaptive task offloading strategy for automatic and efficient network selection, task offloading decisions in vehicular edge computing is implemented. Experimental results show that the proposed method significantly improves the overall task execution performance and reduces the time overhead of task offloading.


Sign in / Sign up

Export Citation Format

Share Document