Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks
Mobile edge computing (MEC) is a new paradigm to alleviate resource limitations of mobile IoT networks through computation offloading with low latency. This article presents an efficient and secure multi-user multi-task computation offloading model with guaranteed performance in latency, energy, and...
Saved in:
Published in | IEEE eTransactions on network and service management Vol. 17; no. 4; pp. 2410 - 2422 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.12.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1932-4537 1932-4537 |
DOI | 10.1109/TNSM.2020.3020249 |
Cover
Abstract | Mobile edge computing (MEC) is a new paradigm to alleviate resource limitations of mobile IoT networks through computation offloading with low latency. This article presents an efficient and secure multi-user multi-task computation offloading model with guaranteed performance in latency, energy, and security for mobile-edge computing. It does not only investigate offloading strategy but also considers resource allocation, compression and security issues. Firstly, to guarantee efficient utilization of the shared resource in multi-user scenarios, radio and computation resources are jointly addressed. In addition, JPEG and MPEG4 compression algorithms are used to reduce the transfer overhead. To fulfill security requirements, a security layer is introduced to protect the transmitted data from cyber-attacks. Furthermore, an integrated model of resource allocation, compression, and security is formulated as an integer nonlinear problem with the objective of minimizing the weighted sum of energy under a latency constraint. As this problem is considered as NP-hard, linearization and relaxation approaches are applied to transform the problem into a convex one. Finally, an efficient offloading algorithm is designed with detailed processes to make the computation offloading decision for computation tasks of mobile users. Simulation results show that our model not only saves about 46% of system overhead consumption in comparison with local execution but also scale well for large-scale IoT networks. |
---|---|
AbstractList | Mobile edge computing (MEC) is a new paradigm to alleviate resource limitations of mobile IoT networks through computation offloading with low latency. This article presents an efficient and secure multi-user multi-task computation offloading model with guaranteed performance in latency, energy, and security for mobile-edge computing. It does not only investigate offloading strategy but also considers resource allocation, compression and security issues. Firstly, to guarantee efficient utilization of the shared resource in multi-user scenarios, radio and computation resources are jointly addressed. In addition, JPEG and MPEG4 compression algorithms are used to reduce the transfer overhead. To fulfill security requirements, a security layer is introduced to protect the transmitted data from cyber-attacks. Furthermore, an integrated model of resource allocation, compression, and security is formulated as an integer nonlinear problem with the objective of minimizing the weighted sum of energy under a latency constraint. As this problem is considered as NP-hard, linearization and relaxation approaches are applied to transform the problem into a convex one. Finally, an efficient offloading algorithm is designed with detailed processes to make the computation offloading decision for computation tasks of mobile users. Simulation results show that our model not only saves about 46% of system overhead consumption in comparison with local execution but also scale well for large-scale IoT networks. |
Author | Elgendy, Ibrahim A. Yang, Yuanyuan Zeng, Yiming Tian, Yu-Chu He, Hui Zhang, Wei-Zhe |
Author_xml | – sequence: 1 givenname: Ibrahim A. orcidid: 0000-0001-7154-2307 surname: Elgendy fullname: Elgendy, Ibrahim A. email: ibrahim.elgendy@hit.edu.cn organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China – sequence: 2 givenname: Wei-Zhe orcidid: 0000-0003-4783-876X surname: Zhang fullname: Zhang, Wei-Zhe email: wzzhang@hit.edu.cn organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China – sequence: 3 givenname: Yiming surname: Zeng fullname: Zeng, Yiming email: yiming.zeng@stonybrook.edu organization: Department of Electrical and Computer Engineering, Stony Brook University, Stony Brook, NY, USA – sequence: 4 givenname: Hui surname: He fullname: He, Hui email: hehui@hit.edu.cn organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China – sequence: 5 givenname: Yu-Chu orcidid: 0000-0002-8709-5625 surname: Tian fullname: Tian, Yu-Chu email: y.tian@qut.edu.au organization: School of Computer Science, QUT, Brisbane, QLD, Australia – sequence: 6 givenname: Yuanyuan orcidid: 0000-0001-7296-9222 surname: Yang fullname: Yang, Yuanyuan email: yuanyuan.yang@stonybrook.edu organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China |
BookMark | eNp9kE1Lw0AQhhepYFv9AeIl4Dl1P5Js9yilasG2h6bnsNnMlm3TbN1NEP-9CQkiHrzMB_O8M8w7QaPKVoDQPcEzQrB4Sje79YxiimesDTQSV2hMBKNhFDM--lXfoIn3R4zjORF0jNxSa6MMVHUgqyLYgWocBOumrE249-CGMpX-FCzs-dLUsja2CrZal1YWpjoE2raUzU0J4bI4wIB1E1MNg2Bl02AD9ad1J3-LrrUsPdwNeYr2L8t08Ra-b19Xi-f3ULFY1CGliuM41ooSoHme6znnRfsBZozCnCnMEx3lVBSYFElcJIAjkIrotiNKxjmbosd-78XZjwZ8nR1t46r2ZEajpN1GuSAtxXtKOeu9A50p0_9YO2nKjOCsMzjrDM46g7PB4FZJ_igvzpyl-_pX89BrDAD88IJwwTlj3weUiO0 |
CODEN | ITNSC4 |
CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3514881 crossref_primary_10_1007_s12652_021_03152_6 crossref_primary_10_1016_j_future_2024_07_026 crossref_primary_10_1016_j_procs_2025_02_080 crossref_primary_10_1007_s11227_022_04550_z crossref_primary_10_1109_TSIPN_2022_3171336 crossref_primary_10_1109_ACCESS_2024_3405487 crossref_primary_10_1016_j_comnet_2023_109769 crossref_primary_10_1109_ACCESS_2024_3483656 crossref_primary_10_1109_TNSE_2022_3153172 crossref_primary_10_1155_2021_1718099 crossref_primary_10_1109_TGCN_2021_3111731 crossref_primary_10_1007_s10586_024_04986_3 crossref_primary_10_1109_JSEN_2021_3096245 crossref_primary_10_1109_TITS_2024_3393529 crossref_primary_10_1016_j_comcom_2022_06_007 crossref_primary_10_1186_s13677_022_00342_1 crossref_primary_10_1016_j_simpat_2021_102402 crossref_primary_10_3390_electronics13132462 crossref_primary_10_1007_s00607_021_00931_z crossref_primary_10_3390_s21082628 crossref_primary_10_1155_2022_2117883 crossref_primary_10_1007_s43926_024_00080_7 crossref_primary_10_1109_OJVT_2022_3226565 crossref_primary_10_1016_j_sysarc_2024_103306 crossref_primary_10_1016_j_suscom_2021_100563 crossref_primary_10_1089_big_2020_0284 crossref_primary_10_1109_TWC_2024_3404811 crossref_primary_10_3390_info13070348 crossref_primary_10_1007_s12652_020_02782_6 crossref_primary_10_26599_TST_2021_9010050 crossref_primary_10_1109_TVT_2024_3378919 crossref_primary_10_1109_TCOMM_2023_3306581 crossref_primary_10_1109_TNSM_2021_3135389 crossref_primary_10_1109_TCSS_2023_3308563 crossref_primary_10_1016_j_future_2023_09_016 crossref_primary_10_1109_JIOT_2023_3306375 crossref_primary_10_1109_TNSM_2021_3087258 crossref_primary_10_1109_TNSM_2024_3426076 crossref_primary_10_1155_2022_5230594 crossref_primary_10_1016_j_future_2021_01_021 crossref_primary_10_1109_TNSE_2022_3163193 crossref_primary_10_1155_2021_6638730 crossref_primary_10_1109_JIOT_2023_3264498 crossref_primary_10_1109_JIOT_2024_3410546 crossref_primary_10_3390_jsan11040057 crossref_primary_10_1109_TNSM_2024_3383218 crossref_primary_10_1109_TCOMM_2022_3151767 crossref_primary_10_1002_cpe_6423 crossref_primary_10_1109_JIOT_2020_3042433 crossref_primary_10_1109_TVT_2024_3368019 crossref_primary_10_1007_s11227_023_05387_w crossref_primary_10_1007_s10586_024_04552_x crossref_primary_10_3390_s25072039 crossref_primary_10_1109_TWC_2023_3261338 crossref_primary_10_1007_s12652_021_03429_w crossref_primary_10_1186_s13677_021_00243_9 crossref_primary_10_1109_COMST_2021_3106401 crossref_primary_10_1109_TSC_2022_3176576 crossref_primary_10_1109_JIOT_2022_3224671 crossref_primary_10_3390_s22020660 crossref_primary_10_1007_s11277_021_08723_6 crossref_primary_10_1007_s41870_023_01508_z crossref_primary_10_1109_TNSM_2021_3092940 crossref_primary_10_3390_s22187004 crossref_primary_10_1109_JIOT_2023_3287996 crossref_primary_10_1109_ACCESS_2022_3174127 crossref_primary_10_2514_1_I011120 crossref_primary_10_1109_ACCESS_2022_3224032 crossref_primary_10_1142_S0218126623501864 crossref_primary_10_1109_TSC_2023_3332140 crossref_primary_10_15622_ia_23_1_10 crossref_primary_10_1109_TNSM_2021_3107718 crossref_primary_10_1109_JSEN_2021_3058976 crossref_primary_10_1109_TMC_2024_3367459 crossref_primary_10_1007_s11276_021_02554_w crossref_primary_10_1109_JIOT_2021_3085777 crossref_primary_10_32604_cmc_2024_051944 crossref_primary_10_1109_TIV_2022_3225147 crossref_primary_10_1109_TNSM_2024_3358414 crossref_primary_10_32604_csse_2023_030984 crossref_primary_10_1109_TNSM_2022_3190493 crossref_primary_10_1007_s12083_023_01574_x crossref_primary_10_1016_j_dcan_2022_03_001 crossref_primary_10_3390_fi14010013 crossref_primary_10_32604_cmc_2021_019059 crossref_primary_10_1109_TNSM_2022_3187251 crossref_primary_10_1109_TNSM_2024_3360850 crossref_primary_10_1109_TVT_2023_3234336 crossref_primary_10_1109_JIOT_2022_3161670 crossref_primary_10_1016_j_iot_2023_100996 crossref_primary_10_3390_jsan11030047 crossref_primary_10_3390_electronics11193032 crossref_primary_10_1109_ACCESS_2023_3256522 crossref_primary_10_1016_j_adhoc_2022_102862 crossref_primary_10_1016_j_jnca_2022_103366 crossref_primary_10_23919_cje_2023_00_111 crossref_primary_10_3390_app12136566 crossref_primary_10_3390_fi13050118 crossref_primary_10_1109_TNSE_2022_3200057 |
Cites_doi | 10.1109/FMEC.2018.8364045 10.1109/TCC.2018.2847347 10.1109/MPRV.2009.82 10.1109/TNSM.2018.2816263 10.1016/j.future.2019.05.037 10.1109/COMST.2017.2682318 10.1109/SURV.2013.070813.00285 10.1109/GLOCOM.2016.7842016 10.1109/ICT.2015.7124703 10.1007/s10107-016-1032-4 10.1109/TNSM.2020.2985080 10.1109/ACCESS.2019.2893118 10.1109/TSC.2014.2381227 10.1109/TWC.2016.2633522 10.1109/TWC.2018.2845360 10.1109/LWC.2017.2740927 10.1109/JIOT.2016.2579198 10.1109/INFCOM.2012.6195685 10.1109/TNSM.2019.2894955 10.1109/TIP.2009.2022438 10.1109/TWC.2018.2864559 10.3390/s19061446 10.1016/j.future.2016.11.009 10.1109/TPDS.2018.2822683 10.1007/s00521-011-0799-8 10.1109/JIOT.2017.2780236 10.1109/WCNC.2017.7925615 10.1109/TC.2014.2366735 10.1109/TSC.2018.2826544 10.1109/JSAC.2016.2611964 10.1109/TNSM.2019.2929576 10.1109/TPDS.2014.2316834 10.1016/j.jnca.2018.04.018 10.1109/TCOMM.2019.2903088 10.1109/ISIT.2016.7541539 10.1109/TNET.2015.2487344 10.1109/ACCESS.2016.2597169 10.1109/TCOMM.2016.2599530 10.1109/TNSM.2019.2937342 10.1109/ACCESS.2018.2872750 10.1109/TNSM.2018.2852643 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
DBID | 97E RIA RIE AAYXX CITATION |
DOI | 10.1109/TNSM.2020.3020249 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Xplore CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1932-4537 |
EndPage | 2422 |
ExternalDocumentID | 10_1109_TNSM_2020_3020249 9179773 |
Genre | orig-research |
GrantInformation_xml | – fundername: Key Research and Development Program for Guangdong Province grantid: 2019B010136001 – fundername: Shenzhen Science and Technology Research and Development Fundation grantid: JCYJ20190806143418198 – fundername: National Natural Science Foundation of China (NSFC) grantid: 61672186; 61872110 funderid: 10.13039/501100001809 – fundername: National Key Research and Development Plan grantid: 2017YFB0801801 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 EBS EJD HZ~ IES IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE AAYXX CITATION RIG |
ID | FETCH-LOGICAL-c359t-22c7055fc21e2bbbf877d4530332e83c076f4b29d01d65d6e04eac1f1d61ca5b3 |
IEDL.DBID | RIE |
ISSN | 1932-4537 |
IngestDate | Sun Jun 29 15:54:09 EDT 2025 Tue Jul 01 01:55:18 EDT 2025 Thu Apr 24 23:09:53 EDT 2025 Wed Aug 27 02:33:50 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c359t-22c7055fc21e2bbbf877d4530332e83c076f4b29d01d65d6e04eac1f1d61ca5b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-4783-876X 0000-0002-8709-5625 0000-0001-7154-2307 0000-0001-7296-9222 |
PQID | 2468772791 |
PQPubID | 85504 |
PageCount | 13 |
ParticipantIDs | crossref_citationtrail_10_1109_TNSM_2020_3020249 proquest_journals_2468772791 crossref_primary_10_1109_TNSM_2020_3020249 ieee_primary_9179773 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2020-Dec. 2020-12-00 20201201 |
PublicationDateYYYYMMDD | 2020-12-01 |
PublicationDate_xml | – month: 12 year: 2020 text: 2020-Dec. |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE eTransactions on network and service management |
PublicationTitleAbbrev | T-NSM |
PublicationYear | 2020 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref11 ref10 ref17 ref16 ref19 ref18 ref51 ref47 rappaport (ref35) 2002 ref42 ref41 ref49 pham (ref28) 2018 ref8 ref7 ref9 ref4 ref3 ref5 ref34 ref37 ref36 nocedal (ref46) 2006 ref31 ref30 ref33 ref32 ref2 ferris (ref50) 2005 ref1 ref38 mallach (ref48) 2017 darwiche (ref39) 2015 ref24 ref23 ref26 ref25 ref20 paar (ref45) 2009 daemen (ref43) 2002 ref22 ref21 sokouti (ref44) 2014; 22 ref27 ref29 elgendy (ref6) 2015; 9 fogg (ref40) 2007 |
References_xml | – ident: ref32 doi: 10.1109/FMEC.2018.8364045 – ident: ref5 doi: 10.1109/TCC.2018.2847347 – ident: ref7 doi: 10.1109/MPRV.2009.82 – ident: ref10 doi: 10.1109/TNSM.2018.2816263 – ident: ref33 doi: 10.1016/j.future.2019.05.037 – year: 2009 ident: ref45 publication-title: Understanding Cryptography A Textbook for Students and Practitioners – ident: ref11 doi: 10.1109/COMST.2017.2682318 – ident: ref1 doi: 10.1109/SURV.2013.070813.00285 – ident: ref24 doi: 10.1109/GLOCOM.2016.7842016 – year: 2005 ident: ref50 article-title: MATLAB and GAMS: Interfacing optimization and visualization software – ident: ref16 doi: 10.1109/ICT.2015.7124703 – ident: ref49 doi: 10.1007/s10107-016-1032-4 – year: 2002 ident: ref43 publication-title: The Design of Rijndael AES-The Advanced Encryption Standard – ident: ref14 doi: 10.1109/TNSM.2020.2985080 – ident: ref23 doi: 10.1109/ACCESS.2019.2893118 – ident: ref37 doi: 10.1109/TSC.2014.2381227 – ident: ref25 doi: 10.1109/TWC.2016.2633522 – ident: ref42 doi: 10.1109/TWC.2018.2845360 – ident: ref26 doi: 10.1109/LWC.2017.2740927 – ident: ref8 doi: 10.1109/JIOT.2016.2579198 – volume: 9 start-page: 43 year: 2015 ident: ref6 article-title: An efficient framework to improve the performance of mobile applications publication-title: Int J Digit Content Technol Appl – ident: ref38 doi: 10.1109/INFCOM.2012.6195685 – ident: ref31 doi: 10.1109/TNSM.2019.2894955 – year: 2018 ident: ref28 article-title: Decentralized computation offloading and resource allocation in heterogeneous networks with mobile edge computing – ident: ref41 doi: 10.1109/TIP.2009.2022438 – ident: ref30 doi: 10.1109/TWC.2018.2864559 – ident: ref51 doi: 10.3390/s19061446 – ident: ref12 doi: 10.1016/j.future.2016.11.009 – ident: ref3 doi: 10.1109/TPDS.2018.2822683 – volume: 22 start-page: 1667 year: 2014 ident: ref44 article-title: Genetic-based random key generator (GRKG): A new method for generating more-random keys for one-time pad cryptosystem publication-title: Neural Comput Appl doi: 10.1007/s00521-011-0799-8 – ident: ref27 doi: 10.1109/JIOT.2017.2780236 – ident: ref19 doi: 10.1109/WCNC.2017.7925615 – year: 2006 ident: ref46 publication-title: Numerical Optimization – ident: ref36 doi: 10.1109/TC.2014.2366735 – year: 2002 ident: ref35 publication-title: Wireless Communications Principles and Practice – ident: ref29 doi: 10.1109/TSC.2018.2826544 – year: 2017 ident: ref48 article-title: Compact linearization for binary quadratic problems subject to linear equations – ident: ref20 doi: 10.1109/JSAC.2016.2611964 – ident: ref9 doi: 10.1109/TNSM.2019.2929576 – ident: ref34 doi: 10.1109/TPDS.2014.2316834 – ident: ref4 doi: 10.1016/j.jnca.2018.04.018 – ident: ref47 doi: 10.1109/TCOMM.2019.2903088 – ident: ref18 doi: 10.1109/ISIT.2016.7541539 – ident: ref21 doi: 10.1109/TNET.2015.2487344 – ident: ref22 doi: 10.1109/ACCESS.2016.2597169 – start-page: 487 year: 2015 ident: ref39 article-title: Comparison of JPEG's competitors for document images publication-title: Proc Int Conf Image Process Theory Tools Appl (IPTA) – ident: ref17 doi: 10.1109/TCOMM.2016.2599530 – ident: ref15 doi: 10.1109/TNSM.2019.2937342 – year: 2007 ident: ref40 publication-title: MPEG Video Compression Standard – ident: ref2 doi: 10.1109/ACCESS.2018.2872750 – ident: ref13 doi: 10.1109/TNSM.2018.2852643 |
SSID | ssj0058192 |
Score | 2.542005 |
Snippet | Mobile edge computing (MEC) is a new paradigm to alleviate resource limitations of mobile IoT networks through computation offloading with low latency. This... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2410 |
SubjectTerms | Algorithms Cloud computing compression Computation offloading Computational efficiency Computational modeling Cybersecurity Edge computing Energy consumption Image compression Internet of Things (IoT) Mobile computing Mobile handsets mobile-edge computing optimization Resource allocation Resource management Security Task analysis Wireless networks |
Title | Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks |
URI | https://ieeexplore.ieee.org/document/9179773 https://www.proquest.com/docview/2468772791 |
Volume | 17 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1BT9swFH4CTnBgGwxRxpAPO01ziR07bo7TVMQmtRxoJW5R7DwjBEoQbS_8-j07boXGhLhETmxHjr4X-z37ve8BfBPCuEKOHBfWGK6ozEuXaa4V-lrkRmsbYocn0-Jyrv7c6Jst-LGJhUHE6HyGw1CMZ_lN51Zhq-ycTAtSV_Jt2CYx62O11rOuDsRe6dRSZOX5bHo9IetPklFKFxmoMl-sOzGRyqvZNy4pFx9gsh5M70lyP1wt7dA9_8PT-N7RfoT9pFuyn70wfIItbA9g7wXj4CE8jSNlBHVkdduwuNuOLEbh8jlJYyrO6sU96xM-ROTYlfcPXXS3Z6TlsklnaTbh4-YWU7NQc9emCva7m7Fp72C--Azzi_Hs1yVPaRe4y3W55FK6QLHjnRQorbV-ZEyjNK11ucRR7jJTeGVl2WSiKXRTYKZo9hae7oSrtc2PYKftWjwG5qzXLre1QnSqwdKSQuFKIdFLemLMALI1KJVLnOQhNcZDFW2TrKwCjlXAsUo4DuD7pstjT8jxVuPDgMumYYJkAKdr5Kv0yy4qqQr6UGlKcfL_Xl9gN7y792U5hZ3l0wq_kkaytGdRFP8CJgXftQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB2VcgAOfBXEQgEfOCG8jR073hwR2moLzXIgK_UWxc64Qq0S1N298OsZO95VBQhxiZzYVhw9Zzxjz7wBeCeEcYWcOS6sMVxRmZcu01wr9K3IjdY2xA5Xy2KxUp8v9MUBfNjHwiBidD7DaSjGs_xucNuwVXZCpgWpK_kduEvrvkrRWju5qwO1Vzq3FFl5Ui-_VWT_STJL6SIDWeatlSemUvlD_sZF5fQRVLvhjL4kV9Ptxk7dz9-YGv93vI_hYdIu2cdxOjyBA-yfwoNbnINHcDOPpBHUkbV9x-J-O7IYh8tXNB9TsW7XV2xM-RCxY1-9vx6iwz0jPZdVgyV5wufdJaZmoeZ7nyrY2VCz5ehivn4Gq9N5_WnBU-IF7nJdbriULpDseCcFSmutnxnTKU2rXS5xlrvMFF5ZWXaZ6ArdFZgpkt_C051wrbb5czjshx5fAHPWa5fbViE61WFpSaVwpZDoJT0xZgLZDpTGJVbykBzjuonWSVY2Accm4NgkHCfwft_lx0jJ8a_GRwGXfcMEyQSOd8g36addN1IV9KHSlOLl33u9hXuLujpvzs-WX17B_fCe0bPlGA43N1t8TfrJxr6J0_IX-ubjAA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+and+Secure+Multi-User+Multi-Task+Computation+Offloading+for+Mobile-Edge+Computing+in+Mobile+IoT+Networks&rft.jtitle=IEEE+eTransactions+on+network+and+service+management&rft.au=Elgendy%2C+Ibrahim+A&rft.au=Wei-Zhe%2C+Zhang&rft.au=Zeng%2C+Yiming&rft.au=He%2C+Hui&rft.date=2020-12-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=1932-4537&rft.volume=17&rft.issue=4&rft.spage=2410&rft_id=info:doi/10.1109%2FTNSM.2020.3020249&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-4537&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-4537&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-4537&client=summon |