Hybrid Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation Offloading in Internet of Things

Mobile edge computing (MEC) is a technology that transfers resource to the edge of network, which spares more attention to giving users easier access to network and computation resources. Due to the large amount of data computation needed for devices in Internet of Things, MEC technology is applied to improve computing efficiency. Though MEC can be applied to the Internet of Things, it needs further consideration on how to efficiently and reasonably allocate computing resources, and how to minimize the computing time of all users. This paper proposes a computing resources allocation scheme based on hybrid quantum-behaved particle swarm optimization. Simulation experiments with the network environment based on the Internet of Things is carried out. The results show that this algorithm can accelerate the whole computing process and reduce the number of iterations.

[1]  Jie Wu,et al.  Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[2]  Abhishek Chandra,et al.  Decentralized Edge Clouds , 2013, IEEE Internet Computing.

[3]  Salekul Islam,et al.  Giving users an edge: A flexible Cloud model and its application for multimedia , 2012, Future Gener. Comput. Syst..

[4]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[5]  David P. Anderson,et al.  SETI@home-massively distributed computing for SETI , 2001, Comput. Sci. Eng..

[6]  Xiaojiang Du,et al.  A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.

[7]  Mario Nemirovsky,et al.  Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[8]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[9]  Mohsen Guizani,et al.  Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.

[10]  Bang Nguyen,et al.  The integrity challenge of the Internet-of-Things (IoT): on understanding its dark side , 2017 .

[11]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[12]  Xiaojiang Du,et al.  Adaptive cell relay routing protocol for mobile ad hoc networks , 2006, IEEE Transactions on Vehicular Technology.

[13]  Teruo Higashino,et al.  Edge-centric Computing: Vision and Challenges , 2015, CCRV.

[14]  Xiaojiang Du,et al.  Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.

[15]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[16]  Chase Qishi Wu,et al.  Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[17]  Vijay S. Pande,et al.  Folding@home: Lessons from eight years of volunteer distributed computing , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[18]  David Lillethun,et al.  Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.

[19]  Jiang Zhu,et al.  Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.

[20]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[21]  Xiaojiang Du,et al.  Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.

[22]  Antonio Pascual-Iserte,et al.  Optimization of Radio and Computational Resources for Energy Efficiency in Latency-Constrained Application Offloading , 2014, IEEE Transactions on Vehicular Technology.

[23]  Yuguang Fang,et al.  Multiclass routing and medium access control for heterogeneous mobile ad hoc networks , 2006, IEEE Transactions on Vehicular Technology.