A risk-sensitive task offloading strategy for edge computing in industrial Internet of Things

被引:7
作者
Hao, Xiaoyu [1 ]
Zhao, Ruohai [1 ]
Yang, Tao [1 ]
Hu, Yulin [3 ]
Hu, Bo [1 ,2 ]
Qiu, Yuhe [4 ]
机构
[1] Fudan Univ, Dept Elect Engn, Shanghai 200433, Peoples R China
[2] Fudan Univ, Key Lab EMW Informat MoE, Shanghai 200433, Peoples R China
[3] Rhein Westfal TH Aachen, ISEK Res Grp, Aachen, Germany
[4] Informat & Telecommun Technol Co Ltd, China Mobile Chengdu, Chengdu, Peoples R China
基金
美国国家科学基金会;
关键词
Ultra-reliable and low-latency communications; Edge computing; Industrial Internet of Things; Risk management theory; Conditional Value at Risk; RESOURCE-ALLOCATION; LATENCY;
D O I
10.1186/s13638-021-01923-5
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Edge computing has become one of the key enablers for ultra-reliable and low-latency communications in the industrial Internet of Things in the fifth generation communication systems and is also a promising technology in the future sixth generation communication systems. In this work, we consider the application of edge computing to smart factories for mission critical task offloading through wireless links. In such scenarios, although high end-to-end delays from the generation to completion of tasks happen with low probability, they may incur severe casualties and property loss and should be seriously treated. Inspired by the risk management theory widely used in finance, we adopt the Conditional Value at Risk to capture the tail of the delay distribution. An upper bound of the Conditional Value at Risk is derived through analysis of the queues both at the devices and the edge computing servers. We aim to find out the optimal offloading policy taking into consideration both the average and the worst-case delay performance of the system. Given that the formulated optimization problem is a non-convex mixed integer nonlinear programming problem, a decomposition into subproblems is performed and a two-stage heuristic algorithm is proposed. The simulation results validate our analysis and indicate that the proposed algorithm can reduce the risk in both the queueing and end-to-end delay.
引用
收藏
页数:18
相关论文
共 37 条
[1]   On the coherence of expected shortfall [J].
Acerbi, C ;
Tasche, D .
JOURNAL OF BANKING & FINANCE, 2002, 26 (07) :1487-1503
[2]  
[Anonymous], 1992, Data Networks
[3]  
[Anonymous], 2000, VALUE RISK
[4]   Risk-Sensitive Task Fetching and Offloading for Vehicular Edge Computing [J].
Batewela, Sadeep ;
Liu, Chen-Feng ;
Bennis, Mehdi ;
Suraweera, Himal A. ;
Hong, Choong Seon .
IEEE COMMUNICATIONS LETTERS, 2020, 24 (03) :617-621
[5]  
Bertsimas D., 1997, Introduction to linear optimization, V6
[6]  
Bertsimas D.J, 1990, DEPARTURE PROCESS GI
[7]  
Boyd S. P., 2004, Convex Optimization
[8]  
De Haan L., 2007, Extreme Value Theory: An Introduction
[9]  
Den Hertog D., 2012, INTERIOR POINT APPRO
[10]  
DENHERTOG D, 1992, J OPTIMIZ THEORY APP, V73, P1, DOI 10.1007/BF00940075