4.6 Article

Cost-Effective Edge Server Placement in Wireless Metropolitan Area Networks

Journal

SENSORS
Volume 19, Issue 1, Pages -

Publisher

MDPI
DOI: 10.3390/s19010032

Keywords

edge server placement; mobile edge computing; minimum dominating set; simulated annealing

Funding

  1. National Science Foundation of China [61672540, 61502159]

Ask authors/readers for more resources

Remote clouds are gradually unable to achieve ultra-low latency to meet the requirements of mobile users because of the intolerable long distance between remote clouds and mobile users and the network congestion caused by the tremendous number of users. Mobile edge computing, a new paradigm, has been proposed to mitigate aforementioned effects. Existing studies mostly assume the edge servers have been deployed properly and they just pay attention to how to minimize the delay between edge servers and mobile users. In this paper, considering the practical environment, we investigate how to deploy edge servers effectively and economically in wireless metropolitan area networks. Thus, we address the problem of minimizing the number of edge servers while ensuring some QoS requirements. Aiming at more consistence with a generalized condition, we extend the definition of the dominating set, and transform the addressed problem into the minimum dominating set problem in graph theory. In addition, two conditions are considered for the capacities of edge servers: one is that the capacities of edge servers can be configured on demand, and the other is that all the edge servers have the same capacities. For the on-demand condition, a greedy based algorithm is proposed to find the solution, and the key idea is to iteratively choose nodes that can connect as many other nodes as possible under the delay, degree and cluster size constraints. Furthermore, a simulated annealing based approach is given for global optimization. For the second condition, a greedy based algorithm is also proposed to satisfy the capacity constraint of edge servers and minimize the number of edge servers simultaneously. The simulation results show that the proposed algorithms are feasible.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Intelligent Delay-Aware Partial Computing Task Offloading for Multiuser Industrial Internet of Things Through Edge Computing

Xiaoheng Deng, Jian Yin, Peiyuan Guan, Neal N. Xiong, Lan Zhang, Shahid Mumtaz

Summary: The development of Industrial Internet of Things (IIoT) and Industry 4.0 has transformed the traditional manufacturing industry. With the mobile-edge computing (MEC) system, computation-intensive tasks can be offloaded from resource-constrained IIoT devices to nearby MEC servers, resulting in lower delay and energy consumption for better Quality of Service (QoS).

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Mathematics

Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding

Shenli Zhu, Xiaoheng Deng, Wendong Zhang, Congxu Zhu

Summary: In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed. The new chaotic system has a larger range of chaotic parameters and better chaotic characteristics compared to traditional one-dimensional chaotic systems, making it more suitable for information encryption applications. Additionally, a parallel DNA coding-based image encryption algorithm is proposed, overcoming the shortcomings of common DNA coding-based image encryption algorithms. Simulation experiments and security analysis results demonstrate the good encryption performance, less time overhead, and robustness to attacks, indicating the potential of the proposed image encryption scheme in secure communication applications.

MATHEMATICS (2023)

Article Computer Science, Information Systems

Resource Allocation for Heterogeneous Computing Tasks in Wirelessly Powered MEC-enabled IIOT Systems

Yixiang Hu, Xiaoheng Deng, Congxu Zhu, Xuechen Chen, Laixin Chi

Summary: This article focuses on integrating wireless power transfer with mobile edge computing (MEC) in industrial Internet of Things (IIOT) systems. By using deep reinforcement learning, an online resource allocation and computation offloading approach is proposed to manage energy harvesting and select appropriate computing modes, thus maximizing the computing rate and task execution success rate for heterogeneous tasks.

ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS (2023)

Article Computer Science, Information Systems

Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks

Xiaoheng Deng, Jincai Zhu, Xinjun Pei, Lan Zhang, Zhen Ling, Kaiping Xue

Summary: This paper proposes a Flow Topology based Graph Convolutional Network (FT-GCN) approach for label-limited IoT network intrusion detection. By leveraging flow traffic patterns and flow topological structure, FT-GCN is deployed at edge servers in IoT networks to detect intrusions. It constructs an interval-constrained traffic graph (ICTG) considering the time correlation of traffic flows, and enhances key statistical features of traffic flows using a Node-Level Spatial (NLS) attention mechanism. Intrusion identification in IoT networks is achieved by learning the combined representation of statistical flow features and flow topological structure with the cost-effective Topology Adaptive Graph Convolutional Networks (TAGCN).

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)

Article Automation & Control Systems

Edge-Based IIoT Malware Detection for Mobile Devices With Offloading

Xiaoheng Deng, Xinjun Pei, Shengwei Tian, Lan Zhang

Summary: The advent of 5G has brought new opportunities for Industrial Internet of Things (IoT) to leapfrog beyond current capabilities. However, the growing IoT has also attracted adversaries who develop new malware attacks on IoT applications. Deep-learning-based methods are expected to combat these sophisticated malwares, but they are not feasible for battery-powered end devices like Android smartphones. Edge computing enables near-real-time analysis of IoT data by shifting computation-intensive tasks to nearby edge servers. However, coordinating the task offloading among multiple users is challenging due to varying channel conditions and latency requirements. To address these challenges, we propose a hierarchical security framework for IoT malware detection that leverages the computation capacity and proximity benefits of edge computing. We also provide a delay-aware computational offloading strategy and construct a coordinated representation learning model, called Two-Stream Attention-Caps, to capture evolving malware attack patterns. Experimental results demonstrate superior detection performance compared to state-of-the-art systems on four benchmark datasets.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Engineering, Civil

Microservice-Oriented Service Placement for Mobile Edge Computing in Sustainable Internet of Vehicles

Leilei Wang, Xiaoheng Deng, Jinsong Gui, Xuechen Chen, Shaohua Wan

Summary: The integration of Mobile Edge Computing (MEC) and microservice architecture enables the implementation of sustainable Internet of Vehicles (IoV). With MEC, microservices can be dynamically placed on Edge Service Providers (ESPs) to reduce latency and resource consumption. However, the growth of IoV leads to high computation and resource overheads, calling for judicious service placement. In this paper, we propose a Microservice-oriented Service Placement (MOSP) mechanism to address these issues and achieve improved resource savings, latency reduction, and service speed.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Review Computer Science, Hardware & Architecture

A review of Urban Air Mobility-enabled Intelligent Transportation Systems: Mechanisms, applications and challenges

Leilei Wang, Xiaoheng Deng, Jinsong Gui, Ping Jiang, Feng Zeng, Shaohua Wan

Summary: Ground transportation systems are struggling with the increasing urbanization and vehicular numbers worldwide. The solution lies in pushing urban mobility into the sky with Urban Air Mobility (UAM), which offers faster, safer, cleaner, and more comprehensive transportation. UAM, with its autonomous maneuverability, convenience, mobility and communication capabilities, is an indispensable component of the Intelligent Transportation System (ITS). This work explores the definition, structure, feasibility, and key features of UAM, and provides guidance for its development, while also analyzing the challenges and non-technical issues that may hinder its research and deployment.

JOURNAL OF SYSTEMS ARCHITECTURE (2023)

Article Green & Sustainable Science & Technology

DFA-SAT: Dynamic Feature Abstraction with Self-Attention-Based 3D Object Detection for Autonomous Driving

Husnain Mushtaq, Xiaoheng Deng, Mubashir Ali, Babur Hayat, Hafiz Husnain Raza Sherazi

Summary: Autonomous vehicles are crucial for improving urban mobility in a smarter and more connected urban environment. However, existing 3D LiDAR object detection systems have limitations, leading to subpar performance. In this study, a dynamic feature abstraction with self-attention (DFA-SAT) is proposed to address these limitations and enhance object detection performance.

SUSTAINABILITY (2023)

Article Chemistry, Multidisciplinary

A Visual Fault Detection Algorithm of Substation Equipment Based on Improved YOLOv5

Yuezhong Wu, Falong Xiao, Fumin Liu, Yuxuan Sun, Xiaoheng Deng, Lixin Lin, Congxu Zhu

Summary: This paper proposes an improved YOLOv5-based visual fault detection algorithm for substation equipment. By introducing a deformable convolution module and a simplified BiFPN structure, the algorithm enhances the recognition of small targets in complex substation scenarios, achieving promising experimental results.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

Computation Efficiency Maximization in Multi-UAV-Enabled Mobile Edge Computing Systems Based on 3D Deployment Optimization

Xiaoheng Deng, Jiahao Zhao, Zhufang Kuang, Xuechen Chen, Qi Guo, Fengxiao Tang

Summary: This paper discusses a multi-UAV-enabled MEC system, which optimizes multiple factors to maximize the computation efficiency of the terminal system, and proposes an algorithm for computation efficiency maximization.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2023)

Article Mathematics

Construction of a New 2D Hyperchaotic Map with Application in Efficient Pseudo-Random Number Generator Design and Color Image Encryption

Shenli Zhu, Xiaoheng Deng, Wendong Zhang, Congxu Zhu

Summary: This paper proposes a new two-dimensional discrete hyperchaotic system and uses it to design a pseudo-random number generator and an efficient color image encryption algorithm. The system has very complex dynamic properties and can generate highly random chaotic sequences. The proposed PRNG can generate highly random bit sequences that meet all NIST testing standards. The color image encryption algorithm achieves pixel permutation and diffusion in parallel, improving both encryption speed and security level.

MATHEMATICS (2023)

Article Mathematics

A Location-Based Crowdsensing Incentive Mechanism Based on Ensemble Learning and Prospect Theory

Jiaqi Liu, Hucheng Xu, Xiaoheng Deng, Hui Liu, Deng Li

Summary: This paper proposes an incentive mechanism based on ensemble learning and prospect theory to address the problems with existing incentive mechanisms. It predicts the participants' duration and uses different incentive mechanisms for short-term and long-term participants to improve the coverage of crowdsensing tasks.

MATHEMATICS (2023)

Article Computer Science, Theory & Methods

MDHE: A Malware Detection System Based on Trust Hybrid User-Edge Evaluation in IoT Network

Xiaoheng Deng, Haowen Tang, Xinjun Pei, Deng Li, Kaiping Xue

Summary: In this paper, a trust hybrid user-edge evaluation-based IoT malware detection system (MDHE) is proposed. The system decomposes a complex deep learning model into two parts deployed on edge servers and end devices. Trusted devices are selected using a trust evaluation mechanism for model training. A private feature generation method is developed to extract subgraph features and perturbed using differential privacy technology to protect user privacy. The perturbed features are reconstructed on an edge server, and a Capsule Network is used to identify malware.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Engineering, Civil

Confidence-Enhanced Mutual Knowledge for Uncertain Segmentation

Ping Jiang, Xiaoheng Deng, Shaohua Wan, Huamei Qi, Shichao Zhang

Summary: This paper proposes a mutual learning framework, CE-MGN, to improve the robustness of object recognition in adverse weather conditions through continuous interaction between different tasks. Experimental results show that the framework performs stably under different weather conditions.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

CrossFuser: Multi-Modal Feature Fusion for End-to-End Autonomous Driving Under Unseen Weather Conditions

Weishang Wu, Xiaoheng Deng, Ping Jiang, Shaohua Wan, Yuanxiong Guo

Summary: This paper proposes an end-to-end multi-modal domain-enhanced framework called CrossFuser, which integrates both image and lidar modalities to generate a robust environmental representation and calculates corresponding waypoints and control commands using perception embedding.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

No Data Available