New Game-Theoretic Approach to Decentralized Path Selection and Sleep Scheduling for Mobile Edge Computing

Binwei Wu, Jie Zeng*, Shihai Shao*, Wei Ni, Youxi Tang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

9 Citations (Scopus)

Abstract

Network function virtualization (NFV) implements mobile edge computing (MEC) services as software appliances, and allows resources to be adaptively allocated to accommodate demand variations. Scalability and network cost (including operational cost and response latency) are key challenges. This paper presents a new game-theoretic approach to minimizing the network cost, where access points (APs) select MEC servers and routes in a decentralized manner, and unloaded routers and links are deactivated for cost saving. The key idea is that we interpret the minimization of network cost as a mixed game with a non-monotonic cost function capturing both the operational cost and response latency. We prove that the game is conditionally an ordinary potential game and converges to α-approximate equilibriums. A closed-form expression is derived for the convergence delay. Another important aspect is that we integrate Stackelberg routing into the proposed mixed game to avoid inefficient equilibriums (with high cost or latency). We prove that the mixed game can converge faster to better equilibriums under linear response latency models. Extensive simulations corroborate the new game-theoretic approach can significantly outperform existing techniques in terms of efficiency, convergence, and scalability.

Original languageEnglish
Pages (from-to)6125-6140
Number of pages16
JournalIEEE Transactions on Wireless Communications
Volume21
Issue number8
DOIs
Publication statusPublished - 1 Aug 2022
Externally publishedYes

Keywords

  • Mobile edge computing (MEC)
  • Stackelberg routing
  • game theory
  • network function virtualization (NFV)
  • resource management

Fingerprint

Dive into the research topics of 'New Game-Theoretic Approach to Decentralized Path Selection and Sleep Scheduling for Mobile Edge Computing'. Together they form a unique fingerprint.

Cite this