Optimizing MEC Networks for Healthcare Applications in 5G Communications With the Authenticity of Users’ Priorities
Mobile edge computing (MEC) is pervasive to support high-speed end-to-end data transmission and computation for 5th generation (5G) mobile communications by offloading computation tasks to the cloud at the edge of a cellular base station. In a cellular network for healthcare applications, we must co...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8736012/ |
id |
doaj-e333f46c1d834861b403ec4f1b730b9d |
---|---|
record_format |
Article |
spelling |
doaj-e333f46c1d834861b403ec4f1b730b9d2021-03-29T23:33:12ZengIEEEIEEE Access2169-35362019-01-017885928860010.1109/ACCESS.2019.29224428736012Optimizing MEC Networks for Healthcare Applications in 5G Communications With the Authenticity of Users’ PrioritiesDi Lin0https://orcid.org/0000-0002-6904-3370Su Hu1https://orcid.org/0000-0002-7736-3753Yuan Gao2https://orcid.org/0000-0001-8567-4888Yu Tang3School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaNational Key Laboratory of Science and Technology of Communications, University of Electronic Science and Technology of China, Chengdu, ChinaDepartment of Electronic Engineering, Tsinghua University, Beijing, ChinaSchool of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, ChinaMobile edge computing (MEC) is pervasive to support high-speed end-to-end data transmission and computation for 5th generation (5G) mobile communications by offloading computation tasks to the cloud at the edge of a cellular base station. In a cellular network for healthcare applications, we must consider the different priorities of data transmission and computation by referring to the emergency levels of patients. A critical issue of determining the allocation of wireless resources among users is the authenticity of their priorities (i.e., emergency levels). Without authenticating the users' priorities, a user who advocates a higher emergency level can allocate more wireless resources, leading to the insufficient wireless resources to the users who are actually in high priorities. In this paper, we investigate the optimization of end-to-end delay of wireless users in a cellular network with the authenticity of their priorities by blockchain consensus and propose an algorithm of allocating communication and computation resources to minimize the delay of data transmission and computation. The numerical results illustrate that our proposed algorithm is capable of dramatically reducing the end-to-end delay under the various scenarios of healthcare applications.https://ieeexplore.ieee.org/document/8736012/Mobile edge computinghealthcare applications5G mobile communicationsblockchaintransmission delaycomputation delay |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Di Lin Su Hu Yuan Gao Yu Tang |
spellingShingle |
Di Lin Su Hu Yuan Gao Yu Tang Optimizing MEC Networks for Healthcare Applications in 5G Communications With the Authenticity of Users’ Priorities IEEE Access Mobile edge computing healthcare applications 5G mobile communications blockchain transmission delay computation delay |
author_facet |
Di Lin Su Hu Yuan Gao Yu Tang |
author_sort |
Di Lin |
title |
Optimizing MEC Networks for Healthcare Applications in 5G Communications With the Authenticity of Users’ Priorities |
title_short |
Optimizing MEC Networks for Healthcare Applications in 5G Communications With the Authenticity of Users’ Priorities |
title_full |
Optimizing MEC Networks for Healthcare Applications in 5G Communications With the Authenticity of Users’ Priorities |
title_fullStr |
Optimizing MEC Networks for Healthcare Applications in 5G Communications With the Authenticity of Users’ Priorities |
title_full_unstemmed |
Optimizing MEC Networks for Healthcare Applications in 5G Communications With the Authenticity of Users’ Priorities |
title_sort |
optimizing mec networks for healthcare applications in 5g communications with the authenticity of users’ priorities |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Mobile edge computing (MEC) is pervasive to support high-speed end-to-end data transmission and computation for 5th generation (5G) mobile communications by offloading computation tasks to the cloud at the edge of a cellular base station. In a cellular network for healthcare applications, we must consider the different priorities of data transmission and computation by referring to the emergency levels of patients. A critical issue of determining the allocation of wireless resources among users is the authenticity of their priorities (i.e., emergency levels). Without authenticating the users' priorities, a user who advocates a higher emergency level can allocate more wireless resources, leading to the insufficient wireless resources to the users who are actually in high priorities. In this paper, we investigate the optimization of end-to-end delay of wireless users in a cellular network with the authenticity of their priorities by blockchain consensus and propose an algorithm of allocating communication and computation resources to minimize the delay of data transmission and computation. The numerical results illustrate that our proposed algorithm is capable of dramatically reducing the end-to-end delay under the various scenarios of healthcare applications. |
topic |
Mobile edge computing healthcare applications 5G mobile communications blockchain transmission delay computation delay |
url |
https://ieeexplore.ieee.org/document/8736012/ |
work_keys_str_mv |
AT dilin optimizingmecnetworksforhealthcareapplicationsin5gcommunicationswiththeauthenticityofusersx2019priorities AT suhu optimizingmecnetworksforhealthcareapplicationsin5gcommunicationswiththeauthenticityofusersx2019priorities AT yuangao optimizingmecnetworksforhealthcareapplicationsin5gcommunicationswiththeauthenticityofusersx2019priorities AT yutang optimizingmecnetworksforhealthcareapplicationsin5gcommunicationswiththeauthenticityofusersx2019priorities |
_version_ |
1724189368003854336 |