EEDOS: an energy-efficient and delay-aware offlloading scheme based on device to device collaboration in mobile edge computing
Device to device (D2D) communication and mobile edge computing (MEC) are two promising technologies in fifth generation (5G) cellular mobile communication. Besides MEC, a new task offloading technique attracts the attention as D2D collaboration. However, there is lack of integrated D2D and MEC framework to address the energy and delay costs in a joint approach. This work, proposes an energy efficient and delay-aware offloading scheme (EEDOS) based on D2D collaboration in MEC. In EEDOS, mobile devices can offload their task to the MEC or an idle mobile device in their proximity. The task execution and offloading to the MEC or an idle nearby device is formulated, and the optimization problem is defined. The whole process of allocating proper offloading destination is designed in the edge server. EEDOS, classifies offloading requests according to the deadline and energy constraint of requesting device. Then, it finds the proper offloading destination by utilising the maximum matching with minimum cost graph algorithm. Through simulation, we show that EEDOS achieves 95 percent of energy efficiency in comparison of no-offloading task execution and outperforms existing studies in term of energy efficiency with an improved delay in task execution. Moreover, EEDOS is capable of performing more successful task offloading and requires less edge server resources.
KeywordsTask offloading Device to device communication Mobile edge computing Energy efficiency
The study is supported by Project No.: BK067-2015 from University of Malaya, and the Fundamental Research Grant Scheme (FRGS), Project: FP007-2016 from Ministry of Higher Education, Malaysia.
Compliance with ethical standards
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
- 1.Soyata, T., Muraleedharan, R., Funai, C., Kwon, M., & Heinzelman, W. (2012). Cloud-Vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture. In Proceedings—IEEE symposium on computers and communications (pp. 59–66).Google Scholar
- 4.Varma, A., Prabhakar, S., & Jayavel, K. (2017). Gas leakage detection and smart alerting and prediction using IoT. In 2nd international conference on computing and communication technologies (ICCCT) (pp. 327–333).Google Scholar
- 7.Vallati, C., Virdis, A., Mingozzi, E., & Stea, G. (2015). Exploiting LTE D2D communications in M2M Fog platforms: Deployment and practical issues. In IEEE world forum on internet of things, WF-IoT 2015 - proceedings (pp. 585–590).Google Scholar
- 8.Dolui, K., & Datta, S.K. (2017). Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In GIoTS 2017—Global internet of things summit, proceedings.Google Scholar
- 10.Reznik, A., Arora, R., Cannon, M., Cominardi, L., Featherstone, W., Frazao, R., Giust, F., Kekki, S., Li, A., Sabella, D., Turyagyenda, C., & Zheng, Z. (2017) ETSI white paper #20: Developing software for multi-access edge computing. In ETSI (20).Google Scholar
- 11.Jaffry, S., Hasan, S.F., Gui, X., & Kuo, Y.W. (2017). Distributed device discovery in ProSe environments. In IEEE region 10 annual international conference, Proceedings/TENCON 2017-Decem (pp. 614–618).Google Scholar
- 12.Feng, D., Lu, L., Yuan-Wu, Y., Li, G., & Li, S. (2014). Device-to-device communications in cellular networks. In IEEE communications magazine (pp 49–55), (April).Google Scholar
- 14.Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing (pp. 13–16).Google Scholar
- 19.Chen, X., & Zhang, J. (2017). When D2D meets cloud: Hybrid mobile task offloadings in fog computing. In IEEE international conference on communications (pp. 0–5).Google Scholar
- 24.Xing, H., Liu, L., Xu, J., & Nallanathan, A. (2019). Joint task assignment and resource allocation for D2D-enabled mobile-edge computing. IEEE Transactions On Communications, 1–1.Google Scholar
- 28.Kolmogorov, V. (2008). Blossom V : A new implementation of a minimum cost perfect matching algorithm 1 Introduction 2 Background: Edmonds ’ blossom algorithm. Mathematical Programming Computation, 1, 1–14.Google Scholar
- 34.Li, R., Song, T., Mei, B., Li, H., Cheng, X., & Sun, L. (2018). Blockchain for large-scale internet of things data storage and protection. IEEE Transactions on Services Computing. https://doi.org/10.1109/tsc.2018.2853167.
- 35.Buttyan, L., & Hubaux, J.p. (2001). Nuglets: A virtual currency to stimulate cooperation in self-organized mobile Ad Hoc networks. Technical report DSC (pp. 1–15).Google Scholar