UAV-Aided Computation Offloading in Mobile-Edge Computing Networks: A Stackelberg Game Approach

Huan Zhou, Zhenning Wang, Geyong Min, Haijun Zhang

Research output: Contribution to journalArticlepeer-review

68 Scopus citations

Abstract

Unmanned aerial vehicles (UAVs) are considered as a promising method to provide additional computation capability and wide coverage for mobile users (MUs), especially when MUs are not within the communication range of the infrastructure. In this article, a UAV-aided mobile-edge computing (MEC) network, including one UAV-MEC server, one BS-MEC server, and several MUs, is investigated for computation offloading, in which the edge service provider (ESP) manages two kinds of servers. It is considered that MUs have a large number of computation tasks to conduct, while the ESP has idle computational resources. MUs can choose to offload their tasks to the ESP to reduce their pressure and cost, and the ESP can make a profit by selling computational resources. The interaction among the ESP and MUs is modeled as a Stackelberg game, and both the ESP and MUs want to maximize their utility. The proposed game is analyzed by using the backward induction method, and it is proved that a unique Nash equilibrium can be achieved in the game. Then, a gradient-based dynamic iterative search algorithm (GDISA) is proposed to get the approximate optimal solution. Finally, the effectiveness of GDISA is verified by extensive simulations, and the results show that GDISA performs better than other benchmark methods under different scenarios.

Original languageEnglish
Pages (from-to)6622-6633
Number of pages12
JournalIEEE Internet of Things Journal
Volume10
Issue number8
DOIs
StatePublished - 15 Apr 2023
Externally publishedYes

Keywords

  • Mobile-edge computing (MEC)
  • Nash equilibrium
  • Stackelberg game
  • unmanned aerial vehicle (UAV)-aided computation offloading

Fingerprint

Dive into the research topics of 'UAV-Aided Computation Offloading in Mobile-Edge Computing Networks: A Stackelberg Game Approach'. Together they form a unique fingerprint.

Cite this