Next Article in Journal
FPGA-Based Antipodal Chaotic Shift Keying Communication System
Previous Article in Journal
A Reverse Order Hierarchical Integrated Scheduling Algorithm Considering Dynamic Time Urgency Degree of the Process Sequences
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resource Allocation on Blockchain Enabled Mobile Edge Computing System

1
School of Information and Telecommunication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Key Laboratory of Universal Wireless Communications, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(12), 1869; https://doi.org/10.3390/electronics11121869
Submission received: 17 May 2022 / Revised: 3 June 2022 / Accepted: 7 June 2022 / Published: 13 June 2022
(This article belongs to the Section Computer Science & Engineering)

Abstract

:
Currently, the concept of Mobile Edge Computing (MEC) has been applied as a solution against the plethora of demands for high-quality computing services. It comprises several essential processes, such as resource allocation, data transmission, and task processing. Furthermore, researchers applied blockchain technology, aiming to enhance the robustness of the MEC system. At present, resource allocation in the MEC system is a very hot field, but there are still some problems in the resource allocation process under the traditional MEC architecture, such as privacy disclosure and so on. Moreover, the resource allocation problem in a blockchain-enabled MEC system will be more complicated, while the mining process may have an impact on resource allocation policy. To address this issue, this paper investigates the resource allocation problem with blockchain-based MEC system architecture. A brand new consensus mechanism: proof of learning (PoL), is applied to the system, which does not waste the computing resources of edge computing servers. Based on this, we modeled the system mathematically, focusing on server processing latency, mining latency, rewards under the new consensus, and total cost. The asynchronous advantage Actor-Critic (A3C) algorithm is used to optimize resource allocation policy. To better capture the long-time trend of the system, the temporal convolutional network (TCN) is implemented to represent the policy function and state-value function in the reinforcement learning model. The results show that the A3C algorithm based on TCN not only converges faster but also is more stable.

1. Introduction

With the development of intelligent science and technology, more and more mobile devices have access to the mobile network wirelessly. According to Cisco’s report in 2019 [1]: there will be 29.3 billion mobile devices by 2023, up from 18.4 billion in 2018. The burst of mobile devices would lead to a rapid increase in data service. Faced with the burden of growing network traffic and the requirements of high-quality service, the traditional wireless communication network is under great pressure. The European Telecommunications Standards Institute (ETSI) proposed the concept of Mobile Edge Computing (MEC) [2] to cater the demands of massive connections and low latency services, which provides computational processing and data storage capabilities for these mobile devices at the edge of the network [3,4]. MEC mitigates the end-to-end latency of service delivery by moving the cloud computing platform to the edge of the network. Furthermore, it can hold various business scenarios such as smart device applications, health monitoring, connected vehicles, 5G network data migration service [5,6,7], and even a satellite-terrestrial network [8]. Therefore, the MEC has attracted extensive attention from the industry since its birth. This new mode can not only bring changes to traditional service providers, but also affect the interaction modes of many industries and networks. However, considering that MEC is a distributed architecture, it will be very different from cloud computing in processing uploading tasks. Hence, it is necessary to comprehensively consider the delay of various tasks and whether the processing mode of tasks are economical enough. The design of a reasonable resource allocation policy in MEC system has become the focus of research in the industry.
At present, the research on resource allocation of MEC has made great progress. Allocation policies can be categorized into many different types based on different classification criteria. The policies can be classified into static and dynamic ones according to whether they are adjusted according to the current system status. According to whether the task is completely allocated to MEC system for processing, it can be divided into full allocation and partial allocation. The complexity of different allocation policies are also different. For example, partial allocation needs to consider processing the task locally, and the local processing time needs to be compared with the processing time of uploading to the MEC server (the delay of wireless transmission needs to be taken into account) when making decisions. This allocation policy is more complicated and needs more consideration and [9]. Researchers have proposed many solutions to the resource allocation problem. Some algorithms are mentioned in the survey of optimization algorithms conducted by Faiza Cul et al. [10], such as numerical methods including the Bisection method, Newton–Raphson, and bio-inspired algorithms, which are often widely used to solve resource allocation problems. Huang Dong et al. [11] applied Lyapunov Optimization for resource allocation, which is also a traditional one. Some work applies reinforcement learning, a state-of-the-art methodology. A deep Q-learning method [12] is used to optimize the real-time adaptive policy of computing resource allocation for multi-user unloading tasks. To solve the problem of joint subchannel allocation and power allocation in uplink, Wang X.M. et al. [13] proposed three frameworks based on discrete DRL, continuous DRL and joint DRL to solve the above non-convex optimization problem. Furthermore, Agostino Forestiero et al. [14] proposed NLP-based multiagent algorithm for a distributed information system, which allows the built of dynamic and organized overlay network. These policies can balance the delay of task processing and the cost of server well, and thus provide theoretical support for the application of MEC system.
Moreover, security is a problem that cannot be ignored in the MEC system [15]. The possible security risks of MEC are as follows: the distributed architecture tells that the whole system will not be controlled by one single owner, such as the network infrastructure, service infrastructure, and user devices. This can result to a situation that every aspect is under potential attack [16]. Moreover, the deployed edge computing servers often call some application programming interfaces (APIs) about physical and logical environments. If those APIs are not well-protected, there might be a loss of privacy for clients [16]. These issues are critical for the reliability of MEC system. According to the problems mentioned above, the researchers presented blockchain technology to enhance the security level of MEC systems. Blockchain technology is a general combination of distributed data storage, peer-to-peer transmission, consensus mechanism, encryption algorithms, and other computer technologies [17]. Through consensus mechanism, the cost of being malicious greatly aggrandizes, making the system more robust; through asymmetric encryption algorithm and zero-knowledge proof, the blockchain efficiently protects clients’ privacy [18]. Besides security, the blockchain implements managing and deploying edge computing nodes autonomously through the smart contract. Its programmability also enhances the scalability of MEC [19]. At present, many solutions of blockchain-enabled MEC framework have been proposed [19,20,21]. Researchers have validated some of the architectures in real-world environments [22].
Nonetheless, when blockchain and MEC are integrated, the resource allocation problem should be revised. The resource allocation policy in traditional MEC mainly focuses on the latency of communication and data processing. However, when blockchain and MEC systems are combined, the time of mining and reward from mining can affect resource allocation policy: the former can affect total time delay, which is sensitive for clients, the latter is associated with the allocated computing resource. Therefore, further research on the resource allocation policy of blockchain enabled MEC is required. Meanwhile, some researchers have carried out works related to the resource allocation problems within blockchain-based MEC systems. Alia Asheralieva et al. [23] utilized Bayesian reinforcement learning and deep learning to deal with mining tasks based on MEC. However, they did not consider the resource allocation tasks raised by mobile devices. He Y. et al. [24] proposed a comprehensive blockchain-based MEC system, using the reinforcement learning method to optimize resource allocation policy. Nonetheless, the policy did not mention the time of mining and the reward from mining. Qiu X.Y. et al. [25] took reward from mining into consideration, but all the indicators in the reward function have the same weight coefficient, which means the reward function is just added by all the indicators, and the proof of work (PoW) consensus algorithm applied in the system would lower the computation resource usage. To sum up, the previous works remain the following questions. First, the impact of blockchain on edge computing resource allocation is not fully considered. Second, the consensus mechanism in blockchain system needs to be improved to save computing resources of edge computing server. Third, the impact of these indicators on resource allocation policies is not explored. In this case, our research proposed corresponding solutions, which are also one of the main contributions of this paper. The main contributions of our work are listed below:
(1)
As the blockchain system has something to do with the resource allocation policy in MEC systems, the blockchain mining process is taken into account in resource allocation model. There into, mining delay and mining reward are considered.
(2)
To improve the utilization of edge computing resources, the new consensus algorithm: proof of learning (PoL), is applied in the system based on previous studies [26,27]. PoL replaces the meaningless hash puzzle with the task of training neural networks, which are common in MEC application scenarios. Furthermore, the mining delay and mining reward are calculated according to this consensus.
(3)
To learn the impact of these indicators on resource allocation policies, we set different combinations of weight coefficients to adjust the resource allocation policies to different tendencies. Furthermore, we explored the effect of varying task arrival rates on policies with different preferences.
(4)
To learn the long-term pattern of impending tasks, the structure of temporal convolutional network (TCN) [28] is referred to as the policy function and state-value function in asynchronous advantage Actor-Critic (A3C) algorithm. The convergence speed of TCN enabled A3C algorithm and traditional A3C algorithm, which choose action only depends on current state, is compared, and it is found that using TCN as the policy and state-value functions can converge faster and more stable.
In keeping with the purpose of our research orientation, the rest of the article is generalized as follows: In Section 2, the design of a blockchain-based MEC system is proposed, illustrating its step-by-step procedure. In Section 3, we model the resource allocation problem in the system above firstly, presenting the exact problems needed to optimize. Then the combination of TCN and A3C algorithm is introduced. In Section 4, we simulate, analyze the model, and investigate the results. In Section 5, a detailed discussion is given, which consists of four parts: research results, comparison with other studies, significance of research, and unanswered questions. In Section 6, a conclusion is presented, figuring out the deficiencies and indicating the future work.

2. Overview of the System

In this part, a comprehensive MEC system based on blockchain is proposed. We will give a fundamental description of the whole system and introduce the working procedure of the system.

2.1. Framework of the System

In this part, the detailed blockchain-based MEC system architecture is proposed. As shown in Figure 1, the proposed model mainly consists of two parts: service layer and client layer, and the service layer can be further separated into blockchain layer and edge computing layer.
The client layer consists of many mobile devices, such as temperature and humidity sensors, smart watches, and monitors, which are common in normal life and industry application scenario currently. Each device connects to a blockchain wallet, as the wallet contains a certain amount of crypto token which is a basic instrument in the blockchain system. The connection between mobile devices and edge computing servers is achieved wirelessly, for both the connection between wallet and blockchain system and data uploading. The service layer consists of two parts, which are blockchain layer and edge computing layer. Many edge computing service nodes, which provide the computing resources to take charge of processing the clients’ data, make up the edge computing layer. Meanwhile, each service node also plays the role of the miner in the blockchain system to maintain the ongoing of the whole system, which means they generate blocks after finishing a neural network training task released by the PoL consensus mechanism. Service node needs to upload the results of the training task, for example: accuracy, neural network parameters, so that other service nodes (miners) can verify the correctness and make sure it will not do malicious things. To ensure that the computing resources will be allocated efficiently, the smart contract, which consists of several functions that control the working flow, needs to make optimal decisions on such limited computing resources.
The specific framework is designed for three reasons.
(1)
While using the blockchain technology, the MEC system that could previously run only on a trusted intermediary, can now operate safely without the need for a central authority [29]. Furthermore, the heavy use of cryptography brings authoritativeness and security [29]. For example, the zero-knowledge proof can protect the information with anonymity [18], the consensus algorithms can avoid malicious attacks [30], and the script validation used in transactions, namely Pay-to-Public-Key-Hash transaction (en.bitcoinwiki.org/wiki/Pay-to-Pubkey_Hash, accessed on 4 February 2020) and multi-signature transaction (en.bitcoin.it/wiki/Multi-signature, accessed on 20 July 2021), can improve the security [31].
(2)
As the MEC system is in a quite decentralized environment, using just an online platform may suffer from “a central point of failure” [32]. The decentralized trait of blockchain technology can build mutual trust among participants by implement specific consensus: PoW, proof of stake (PoS), and thus enhance the robustness of the system [31]. The model proposed by Xu J.L. et al. [31] have proved its correctness.
(3)
Smart contracts, which are scripts that reside on the blockchain that allow for the automation of multi-step processes, translate contractual clauses into code and embed them into property that can self-enforce them. They operate as autonomous actors, whose behavior is based on the embedded logic [30]. When combined with MEC system, the smart contract can provide flexible and scalable computing capability to address the tradeoff between limited computing capacity and high latency [33]. The work performed by Ye X.Y. et al. [34] has proved that the combination of blockchain and MEC can have an improvement on optimal allocation policy compared with other existing schemes.

2.2. Working Flow of the System

This section will go over the entire working flow, which is the procedure by which mobile devices in daily and industrial application situations complete transactions based on this system.
Taking air quality sensors as a vivid example, they collect air quality indicators, such as the concentrations of carbon dioxide, the concentrations of PM 2.5 [35], etc. Then they analyze the collected data above to estimate the situation of surroundings. However, the sensors, cannot process the data themselves. They need to send it to edge computing servers so that servers would help conduct it.
As shown in Figure 2, the complete procedure can be included as following:
(1)
The air quality sensor, which is a mobile device, connects to the wallet to make sure the device itself links to the blockchain-based mobile edge computing system.
(2)
The wallet is used to send a request to the service node, along with a certain amount of crypto token for the cost of edge computing services.
(3)
The smart contract will detect this transaction and allocate computing resources to the data, which is uploaded by the air quality sensor, based on the current state of the system and the size of the uploaded data, and it is called the “edge task”.
(4)
The allocated computing resources then start dealing with the “edge task”, and the processed result is finally obtained. After that, the service node, or the miner, needs to finish the training of a specific neural network under the PoL consensus, which is the “mining task”, for the preparation of block generation.
(5)
Once the “mining task” is finished, the service node is required to upload the training results, such as the accuracy of the training model and the neural network parameters. Furthermore, other miners can thus verify its correctness and make sure the service node is not doing malicious things. After everything is completed, a block is generated and stored in the blockchain system.
(6)
Finally, the result of “edge task” will be sent back to the air quality sensor.
As the purpose of this article is to deal with the resource allocation problems, the implementation of this system will not be discussed. In the next part, the inner mechanism of allocating computing resources will be discussed in detail, which is also the main focus of this study.

3. Resource Allocation Problem

Typically, the purpose of resource allocation is to allocate computing resources, which are used on data processing. A good allocation policy can optimize latency, for both transmission and processing. However, when the blockchain technology is combined, its impact on resource allocation policy can not be ignored. Based on the MEC system model mentioned in Section 2, despite the processing latency and cost of servers, which are the two main indicators in the traditional model, the mining process also needs to be considered, as the mining reward is associated with the allocation of computing resource and the mining delay is part of the latency for clients.
In this part, firstly, edge computing systems are taken into consideration, which includes two indicators: latency and cost. Then, we introduce the details of mining process. After that, the TCN enabled A3C is proposed, a state-of-the-art methodology used to solve resource allocation problems.

3.1. Edge Computing System Model

Assuming that one service node (SN) has m servers, they are in charge of n mobile devices (MD). In the model, two sets are used to present service node and mobile devices, respectively: SN = { E 1 , E 2 , , E m } , MD = { I 1 , I 2 , , I n } .
Each mobile device will send different tasks to the service node, as for the latency of a specific task, two parameters are taken into consideration:
t p r o c e s s = t q + t p
where t p r o c e s s denotes the latency of data processing, t q denotes the queuing latency, and t p denotes the time for a server to process the data.
Assume that the CPU cycles required by the edge computing servers to process 1 bit of data is M, the CPU dominant frequency is f GHz, and d represents the data size of the task so Equation (1) can be changed as:
t p r o c e s s = t q + d M f
The service model is actually a queuing model [36], based on the queuing theory [37], here M /G/s model is chosen to simplify the service model. M shows that the arrival rate of tasks is subject to Poisson distribution. G shows that the processing time is subject to general distribution with certain mean and variance, s denotes that there are s servers.
When the system is in steady state, according to the time approximation formula raised by Boxma [38]:
E [ W q ( M / G / s ) ] 1 + σ 2 2 J G ( s ) E [ W q ( M / M / s ) ] + 1 J G ( s ) E [ W q ( M / D / s ) ]
J G ( s ) = 1 , s = 1 s + 1 s 1 1 + σ 2 ( s + 1 ) μ I G ( s ) , s 2
I G ( s ) = 0 + { 1 G e ( t ) } s d t , t 0
G e ( s ) = μ 0 t { 1 G ( u ) } d u , s 1
where G e is the stationary-excess cdf associated with the service-time cdf G.
Because the reward would be determined using the latency of task in the resource allocation algorithm later, the average latency of the queuing model in its steady state is not chosen when calculating the waiting time of one single task. Specifically, the service time of all the tasks in the target’s queue is mentioned, regarding it as the latency of the target task. Relying on that, Equation (2) can be improved as:
t p r o c e s s = i d i · M i f + d M f = b f + d M f
where i d i · M i denotes the total amount of tasks in the buffer. b is used to represent how much task has left in the buffer in the rest part of the paper.
Assuming the data size d obeys general distribution with certain mean and variance: d N ( μ , σ 2 ) , and the arrival rate follows the Poisson distribution with parameter λ in order to fit M /G/s model.
In real-world scenarios, the latency should also include the delay in wireless transportation. However, considering that all the servers are deployed in a service node in one certain place, which means that the delay in each server would be the same. Thus, it is left out in the model.
Based on the kW·h concept in the electricity field, we propose a fresh new unit: GHz.h. The cost of data processing is calculated in GHz.h that the server consumes. So the cost can be presented as:
c o s t = h · u , h = f · d M f = d · M
where c o s t denotes the fee that the client needs to pay; u denotes the cost in GHz.h.

3.2. Blockchain Model

In this part, the mining process of PoL is introduced, along with the calculation of mining delay and the mining reward.
Mining is the process by which blockchain transactions are validated digitally on the blockchain network and added to the blockchain ledger. For example, the mining process in Bitcoin system is the process of solving a hash problem, which means using hashing operations to obtain a specified answer. However, the meaningless hash puzzle will waste a lot of computing resources, which is quite insupportable in edge computing systems. In order to fit the edge computing system, Qiu C. et al. [26] proposed a new consensus algorithm: PoL. By just replacing the hash puzzles with the training task of neural networks, each service node trains the model locally in a fixed time, and when a training task is finished, the service node is required to encapsulate the learning results into the transaction so that other nodes can check if the training result is correct based on neural network parameters, output sets and loss functions. In this way, PoL can deter abuse attacks and save computing resources at the same time.
However, the previous PoL consensus mentioned above is not that perfect, because by setting a fixed training time, the rate of block generation cannot adujust according to congestion level of blockchain network. To tackle this issue, we improved the PoL that the service node only needs to complete the given number of training sessions based on the given data sets, where the given number represents the training difficulty level. The system can adjust the difficulty level to change the rate of block generation.
Assume that the neural network architecture in the training task is multilayer perceptron (MLP). First, the floating point operations (FLOPs) [39] of the Forward propagation and backward propagation is given.
(1)
Forward Propagation
Let us consider the propagation process from layer i to layer j. The output matrix S j of layer j can be written in:
S j = W j i * Z i
where W j i represents the weight coefficient matrix between layer j and layer i, and Z i represents the output matrix of layer i after the calculation of activation function, such as sigmoid or Relu functions. So, Z i can be given as:
Z i = f ( S i )
where f represents the activation function mentioned above.
Thus, the floating point operations of the forward propagation is ( j × i + j ) FLOPs . Furthermore, if the MLP obtains N layers, and this process will run N 1 times.
(2)
Backward Propagation
The backward propagation proceeds as follows. The error matrix of layer j is first calculated. If the layer j is the output layer of MLP, then it can be written as:
E j = f ( S j ) ( Z j O j )
where ⊙ represents the element-wise multiplication. If layer j is the hidden layer, and suppose layer k is the next layer of j, then Equation (11) can be transferred to:
E j = f ( S j ) ( W k j T * E k )
To update the weight coefficient matrix between layer i and layer j, the “delta” weight matrix is calculated.
D j i = E j * Z i T
where Z i T is the transpose of Z i .
Finally, the weight coefficient matrix is adjusted:
W j i = W j i D j i
The floating point operations of backward propagation is ( j + j + j × i + j × i ) FLOPs for Equation (11), and ( j × k + j + j × i + j × i ) FLOPs for Equation (12).
Based on all the equations mentioned above, the total FLOPs of the forward and backward propagation can be calculated by given a specific MLP model. Here, we use ω to represent the FLOPs of one training session, and if the number of training example is N, and the number of training sessions is D, which means the mining difficulty in the improved PoL consensus, the FLOPs Ω of finishing the mining task can be shown as:
Ω = ω × N × D
Furthermore, the mining time is obtained:
t m i n i n g = Ω f
As for the mining reward (bonus), if the mining time of a service node is shorter than the average mining time of the system, it will receive corresponding reward. Furthermore, if it is longer than the average mining time, the service node will receive negative reward. The formula of mining reward can be given as:
b o n u s = t a v e r a g e t m i n i n g t a v e r a g e

3.3. Reinforcement Learning Model

In real-world cases, each service node runs in a specific situation. The A3C algorithm is employed, aiming to enable the nodes adapting complex situations. The core of the distributed algorithm is to increase the convergence rate towards the best policy. To obtain that, the system manages to extend the receptive field of the global network through multiple workers renewing parameters asynchronously. In the model, each worker corresponds to one service node.
There are two important functions in the A3C algorithm, one is the policy function, which is used to select the corresponding optimal action according to the current state, and the other is the state-value function, which is used to calculate the expected reward after taking a certain action. However, if the policy is only made by the current state, the chosen action may not be the best one, since the algorithm just observed one single time point and don’t make decision upon the past varying trends. Inspired by some state-of-the-art time series forecasting model, TCN, which is the combination of causal convolution and residual blocks, is applied as the policy function and state-value function in this paper, while the causal convolution can extract features over time, and residual model can prevent A3C from falling into gradient vanishing during parameter update [28].
In the next of this part, firstly, the four aspects of reinforcement learning model will be described: state, action, the transition of state, and reward function. Secondly, the architecture of TCN enabled A3C algorithm is introduced.

3.3.1. State

The simulation includes the whole process in the system: from queuing to processing, the server’s state needs to be recorded. In the model, S is used to represent the state of the server:
S = { I 1 , I 2 , , I n ; b 1 , b 2 , , b m ; D }
In Equation (18), b i indicates the remaining tasks in server i and D represent the difficulty level of mining. Furthermore, I j indicates some task-related information of device No. j, including the data size d and the required M GPU cycles per bit, thus, we can use another way to represent set S :
S = { d 1 , M 1 ; d 2 , M 2 ; ; d n , M n ; b 1 , b 2 , , b m ; D }
In the model, we assume that the buffer size is infinity, but that does not mean that there could be infinite devices obtaining access to one server in the meantime. Assuming the maximum number of simultaneously accessed to one server is n, in this way, both the access and exit processes can be simulated.
As for the mining difficulty, service nodes choose appropriate policies according to the difficulty level and balance the reward of mining and the consumption of computing resources.

3.3.2. Action

The action is the response of a particular state, so actions are determined by arriving tasks and buffer size in the server. Dividing the arriving data into m pieces is the first step because there are m servers in one service node. Meanwhile, several servers are chosen to deal with the mining task. Due to the limitation of simulation, only two of them are chosen to do the mining task. The action can be defined as:
A = { a 1 , a 2 , , a n ; e 1 , e 2 , , e m } , a i = { c i 1 , c i 2 , c i m } , j = 1 m c i j = d i , k = 1 m e k = 2 { e k = 0 o r 1 }
where a i denotes the action of splitting the task towards device i, e k can only be 0 or 1. If e k = 0 , it means that server k is not chosen to mine. On the contrary, if e k = 1 , server k is chosen to mine. Specifically, data in each device is diversified by servers. For the task of device i, c i j denotes the part of which being distributed in sever j.

3.3.3. Transition of State

In the previous discussion, the arrival rate of each task is subject to Poisson distribution with parameter λ , and the data size obeys general distribution: d N ( μ , σ 2 ) . Knowing that the Poisson stream is additive so that Poisson distribution can also fit the arrival of tasks assigned by many other devices.
We assume the arrival rate of device I j as λ j so the total arrival rate for a service node is λ = j = 1 n λ j . When the task arrives, the state S is updated. The interval between the new state and old state is Δ t , and it is subject to a negative exponential distribution with parameter λ because the arrival rate obeys Poisson distribution. The cumulative distribution function is: F ( Δ t ) = 1 e λ Δ t .
Then a function that integrates the system state with time is proposed. Firstly, to simplify the transition of state, we assume that all the tasks arrives at the same time, the current system state at time t is:
S ( t ) = { d 1 ( t ) , M 1 ( t ) ; ; d n ( t ) , M n ( t ) ; b 1 ( t ) , b 2 ( t ) , , b m ( t ) ; D }
After a time slot Δ t , another group of tasks arrive, the system state changes to:
S ( t + Δ t ) = { d 1 ( t + Δ t ) , M 1 ( t + Δ t ) ; ; d n ( t + Δ t ) , M n ( t + Δ t ) ; b 1 ( t + Δ t ) , , b m ( t + Δ t ) ; D }
b i ( t + Δ t ) = b i + j = 1 n c j i M j f i Δ t , b i + j = 1 n c j i M j f i Δ t > 0 0 , b i + j = 1 n c j i M j f i Δ t 0
In this way, system states will change through the arrival and action of the task. It is noted that the system state still belongs to Discrete Markov Model though it depends on both t and Δ t .

3.3.4. Reward Function

Reinforcement learning is a type of unsupervised learning, in which the reward function is used to back-propagate to update the parameters of the policy function and the state-value function, guaranteeing its policies would converge towards expectation.
As mentioned before, action A is chosen according to the current system state S . Corresponding to each s S and a A , we obtain policy Π:
Π = { π : s a ; s S , a A }
Then the reward is measured in four aspects: process delay of the task, mining delay, cost, and the mining reward. Generally, it is a comprehensive measurement of the reward, aiming to lower the latency, contain the cost, and guarantee the mining reward as expected.
The process delay is regarded as a combination of two components: t q , t p . Considering that each task has been split into several servers, parameter t p k i is introduced to indicate processing delay of the task k in server i. Thus, t p r o c e s s can be described as:
t p r o c e s s = max i [ t q + k = 1 n t p k i ] = max i [ b i f i + k = 1 n c k i M k f i ]
The formula of mining delay is given in Equation (16).
Then the cost of task k is measured:
c o s t = i h i · u i + t m i n i n g · i = 1 m ( e i f i u i ) , h i = k = 1 n c k i · M k
where h i denotes the resource consumed in server i, u i denotes the unit price of server i.
Lastly, the mining reward is measured according to Equation (17).
From the analysis above, if time becomes longer, the cost could decrease, the mining reward would decrease. We want to reduce latency, reduce cost, and obtain more mining rewards, but these three targets cannot be obtained at the same time. Hence the reward function is given as follows:
R = α t p r o c e s s ζ t m i n i n g β c o s t + γ b o n u s
where α , ζ , β , γ are weight coefficients of process delay, mining delay, cost, and mining reward, respectively. We expect to find a reasonable set of those coefficients through which the better policies could be obtained after training.

3.3.5. TCN Enabled A3C Model

A3C, short for Asynchronous Advanced Actor-Critic, is an improvement on the traditional Actor-Critic algorithm. A3C algorithm converges faster, contains more stable policies [40,41]. As its name shows, the A3C algorithm consists of two parts, the Actor-Critic algorithm and asynchronous algorithm. The policy function and state-value function in Actor-Critic are crucial, as they determine the available action to obtain higher reward. As mentioned above, TCN is applied to these two functions to extract long-time trend and void gradient-vanish. In the following article, firstly, the implementation of TCN in Actor-Critic is introduced. Secondly, the asynchronous algorithm, that is how A3C updates the parameters, is described.
(1) TCN and Actor-Critic
The Actor-Critic algorithm contains two neural networks, one is the Critic, the other is called Actor. The former one, or the Critic, judges the state-value function, which is the estimation of the expectation of future rewards based on current state and the corresponding policy. The latter one, or the Actor, estimates the probability of a set of output actions according to the input state. Combining two models, Actor-Critic is obtained. Furthermore, the advantage function is introduced to the model when updating parameters, it can tell whether the output of the model is good or not.
As shown in Figure 3a, here, the combination of temporal convolutional network and fully-connected network is deployed to approximate the state-value function V ( s ) and the policy function π ( s ) . Different from previous architecture that only relies on current state s, the prediction of action a depends on both current state and previous states. Furthermore, with the current and previous states and the taken action a, the neural network can thus tell the state-action value. The state-value function and the policy function are given below, the left side of Equation (28) is the initial definition of the state-value function, and the right side of Equation (28) is the state-value function based on neural network. The same as the policy function shown in Equation (29):
V ( s , a ) V ( s n l + 1 , , s n 1 , s n | a ; w )
π ( s , a ) π ( a | s n l + 1 , , s n 1 , s n ; θ )
where w is the weight coefficient of the value network, θ is the weight coefficient of the policy network, s is the state of the agent, a is the action of the agent, and l is the history size.
Let us further analyze the process and structure of the neural network. To calculate the state-value function or the policy function, a state matrix needs to be put into the network, that the column of the matrix is state vector given by Equation (21). Then, the matrix is processed by TCN. As shown in Figure 3b, the TCN has two main characteristics, one is that the output size is the same as input size, and the other is that there cannot be any backsliding from the future to the present. To obtain the first characteristic, TCN uses a one dimensional fully-convolutional network, where remain the size of hidden layer and input layer the same. Furthermore, zero padding is added to keep the front and back layers equal in length. Furthermore, to achieve the second characteristic, TCN applies causal convolutions, the calculation of an output is only with elements from previous and now. The implementation of dilated convolution enables a wider range of receptive field. As you can see, if the dilatation factor d is set as 1, 2, and 4, the output layer can obtain nine units of history size from the second hidden layer, and fifteen units of history size from the input layer. Along with the dilated causal convolution, an 1 × 1 convolution is added to avoid gradient-vanishing when the neural network is quite deep.
After the process of TCN, we use a one-dimension convolution to reduce the length in the time dimension. This is followed by the operation of flatten and finally the selection of available action and calculation of state-action value using the fully-connected neural network.
With the state-action value, we can calculate the target value, or target reward, after n steps. Here Target V is used to represent the final reward after n steps:
Target V = r t + γ r t + 1 + + γ n 1 r t + n 1 + max a γ n V s t + n , a
where γ is the discount factor.
In this way, a certain reward can interfere with n states before that, enabling the model to imitate the experience better and improving the validity of the model.
Then we introduce the advantage function. When updating policy-gradient, discount reward R t can inform the agent what actions are good, what are bad. We subtract the reward function and state-value function to obtain the advantage function A ( s t a t ) . For example, based on the same state, if A ( s t a t ) > 0 , then the chosen action is good, and vise versa.
A ( s t , a t ) = R ( s t , a t ) V ( s t )
To calculate the advantage function, we have:
A ( s t , a t ; θ , w ) = i = 0 k 1 γ i r t + i + γ k V ( s t + k ; w ) V ( s t , w )
To avoid the algorithm trapped into local optimum, Mnih [40] added entropy β θ H π ( s t ; θ ) in policy π . The gradient updating function is:
θ E [ R t ] = θ log π ( a t | s t ; θ ) A ( s t , a t ; θ , w ) + β θ H π ( s t ; θ )
Equation (33) means that the higher expectation of the reward, the more likely the action will be chosen. π ( a t | s t ; θ ) denotes the possibility to choose action at state s t .
(2) Asynchronous algorithm
How does A3C exactly work? Simply, it is a process in which many Actor-Critic workers work asynchronously and update the parameters of the one policy function, or global network. To make the Actor-Critic workers work asynchronously, the asynchronous algorithm is introduced. The asynchronous framework of the A3C algorithm is given in Figure 4, and it mainly consists of environment, worker, and global network. Each worker performs as an independent agent to interact with an independent environment, using the result of interaction to update the parameters of the global network.
With each worker interacting with a certain environment, the model can obtain through more situations, which speeds up the convergence and lessen the possibility of being trapped in the local optimum.
The asynchronous algorithm works as following:
  • Global network parameter initialization.
  • Workers duplicate global network.
  • Workers interact with their environments.
  • Workers calculate the loss of value and policy.
  • Workers calculate gradient through loss function.
  • Workers update the parameters of global network.

4. Simulation and Analysis

In this part, the reinforcement learning approach is simulated. Assuming a service node has four different servers, each has a computing capability f i , respectively. Those servers simultaneously serve five mobile devices. Each device has an arrival rate λ i , its data size obeys general distribution d N ( μ , σ 2 ) . The rest parameters are given in Table 1:
In Table 1, λ = λ i is the total arrival rate of all the tasks. In order to simplify the simulation, λ i is set equally, which means λ i = λ / 5 . The dominant frequencies of the servers are 15, 16, 17, 18 GHz, respectively. The fee of each server is 1, 1.1, 1.2, and 1.3.
For ease of calculation, the task size is limited in set {5, 6, 7, 8, 9} (Mb). Furthermore, we set E [ d ] = 7 , V a r [ d ] = 2 .
A series of parameters are tested to find better policies in simulation. After training the model, its robustness is tested by changing the arrival rate of tasks.

4.1. Impacts of Weight Coefficients

Specifically, the impact to the reinforcement learning model by changing the ratio of α , ζ , β , and γ is measured. In the experiment, eight groups of parameters are tested to determine the exact impact of the ratio mentioned above on the convergence, latency, cost and bonus of the model. Other parameters remain the same. We set the training epoch as 2000. There are 100 steps of interaction in each epoch. We set learning rate as 10 4 , discount factor as 0.99 and the arrival rate 14   s 1 .
Especially, data presented in Figure 5 and Figure 6 has been through the Gaussian Smoothing process to appear the trend better. Meanwhile, to compare the variation trend of rewards more precisely, the reward values are normalized.
Obviously, the drift is related with the ratio of weight coefficients. In all eight groups, two distinct trends emerged. One of the trends is group 1, 2, 3, 4, 5, and 8 and the other is group 6 and 7.
Considering that the b o n u s , t p r o c e s s and t m i n i n g are correlative, firstly, the coefficients of these three indicators are set in equal proportions, and we change the ratio of α and β . Initially there are five groups tested, that are group 1, 2, 3, 6, and 7. Two distinct convergence trends emerge as the ratio changes. The process delay of group 1, 2, and 3 eventually converge at around 0.028 s. However, the process delay of group 6 and 7 only converge at 0.11 s and 0.12 s, respectively. The convergence results of mining delay and process delay are similar. As for the cost, group 6 and 7 lower than group 1, 2, and 3. It is not hard to find that the situation is closely related to the ratio of α and β . When α / β > b a s e l i n e , the policy tends to lower the latency, when α / β < b a s e l i n e , it tends to lower the cost. Furthermore, from the comparison of group 6 and 7, it can tell that if α / β is becoming smaller and smaller, it can help the algorithm to converge faster. This is because when the agent is observing the environment, it gonna has a certain random magnitude, if the increase in reward brought by choosing a different policy is small compared to the change brought by random search, then the algorithm will not continue to converge.
Then some possible impacts that γ may have toward the policy of reinforcement learning model are measured. γ controls b o n u s , when b o n u s increases, the t m i n i n g decreases. That means as long as the policy tends to lower t m i n i n g a bit more than c o s t , when γ × ζ > 0 , the change of γ would not have a great impact on the policy. For example, in group 1: [ α , ζ , β , γ ] = [ 100 , 2 , 1 , 20 ] , the policy is more inclined to reduce t m i n i n g . In this case, no matter how the value of γ changes, there will be no difference to the policy. In order to testify that assumption, a comparative experiment is made: group 1, 4, and 5. In these three groups, the rewards have the same growth pattern. Moreover, relying on the c o s t and t m i n i n g , we can figure out that the changing of γ has a little impact on the policy of the reinforcement learning model. Their c o s t and t m i n i n g converge at the same results. That presents group 1, 4, and 5, which choose nearly the same policy. In group 1, especially, we set γ as 20, the result remains almost unaffected.
Here a further analysis is given towards the experiment results above.
The emergence of b a s e l i n e is within the prediction. It is obvious that t p r o c e s s , t m i n i n g and c o s t is correlative, we set the correlation f ( t p r o c e s s , t m i n i n g , c o s t ) = 0 . It can extend to f ( t p r o c e s s Δ t 1 , t m i n i n g Δ t 2 , c o s t + Δ c o s t ) = 0 (Servers with lower computing capabilities are usually cheaper. Servers with higher computing capabilities can lower the latency. That is to say the cost usually increases when the latency is lower). Thus, in a minimum neighborhood, Δ t 1 , Δ t 2 and Δ c o s t have a positive correlation as Δ c o s t k Δ t 1 + p Δ t 2 , k, p is positive. Hence, the change of reward can be described in this neighborhood as: Δ R = α · ( Δ t 1 ) ζ · ( Δ t 2 ) β · ( Δ c o s t ) = ( α β k ) Δ t 1 + ( ζ β p ) Δ t 2 . When β is relatively large, Δ R < 0 is minus, which means the policy would lower the c o s t . When α is relatively larger, Δ R > 0 is positive, which means the policy would tend to lower the latency.
Moreover, from Figure 6a,b, we can tell that the order of magnitude of process delay and mining delay is different. As mentioned above, if the increase in reward from choosing a different policy is small in comparison to the change introduced by random search, the algorithm will not converge. To avoid this phenomenon, the ratio of α and ζ remain the same from group 1 to 7. However, in group 8, the order of magnitude of process delay is much smaller than that of mining delay in reward function, which means that the reduction in the process can be smoothed out by the variance of mining, thus preventing the algorithm from continuing to converge. The process delay only converges at 0.04 s in the end.

4.2. Impacts of Arrival Rate

The pattern of latency is measured by changing the arrival rate with the ratio of weight coefficients stable.
As shown in Figure 7, it can be seen that the increase of λ affects group 6 and 7 greatly. When it reaches 24 s 1 , the t p r o c e s s of group 6 and group 7 reaches 0.18 s and 0.26 s, respectively. However, other groups manage to resist the increase, maintaining the amplification within 70%. Furthermore, it can be concluded that the results obey the latency rule of M/G/s model raised by Boxma [38]. Within the results, we fit the equivalent removing rate of edge computing service system under this circumstance as μ 40 s 1 . In the experiment, the average data size is 7 × 5 Mb. If the policy is to lower the latency, the average data size distributed to each server is 35/4 Mb. Each bit needs a CPU Cycle of ( 2 + 5 + 7 ) / 3 4.7 Hz. The average capability of each server is 16.5 GHz . Thus, the average processing rate of each server can be worked out: μ = 16.5 × 10 9 8.75 × 1024 2 × 8 × 4.7 = 47.83 s 1 . The estimation result and fitting result have the same order of magnitude.

4.3. Appropriate Choice of Weight Coefficients

General conclusions about the impact of changing weight coefficients have been made before. Based on that, different policies can be applied to different circumstances.
For example, when the client has no strict requirement for the latency, and its arrival rate is stable and relatively small, a parameter set [5, 0.1, 100, 1] can be applied to lower the cost. If the arrival rate fluctuates greatly, parameter sets with a larger ratio of α to β such as [100, 2, 1, 20] can be applied instead in order to guarantee the steady performance of the system steady.

4.4. Comparison between TCN Enabled A3C and Fully-Connected A3C

When using TCN to enable A3C algorithm, the policy depends on both current and previous states. In order to prove that the new architecture has a better convergence performance and stability than traditional A3C, which make decision only by current state. In the experiment, fully-connected neural network is used to approximate the policy function and state-value function.
As shown in Figure 8, the convergence of TCN enabled A3C is faster and more stable. By learning previous states, TCN is able to capture the changing trend of task arrivals and make better policy choices. TCN enabled A3C is more like a global optimization, and the A3C algorithm based on a fully-connected neural network is a manifestation of greedy decision-making.

5. Discussion

In this paper, we studied the resource allocation problem of a blockchain-based MEC system. It is considered that the mining process combined with blockchain had an impact on resource allocation policies. Meanwhile, to explore the influence of different indicators on the final decision, we set up different weight parameter combinations and conducted several experiments. This is the difference between what have conducted in this paper and previous studies, or other words, we made further on the ideas of previous studies. Because of this, we can finally obtain almost optimal results under a certain decision tendency.
As suspected, delay and cost are opposite, and the allocation policy would only favor one of them. During the simulation, we applied a new A3C algorithm which uses TCN to learn the history trend, and it is proved that the new algorithm can converge faster and more stably. We also simulated the change of packet arrival rate, and the results showed that different resource allocation policies have different abilities against data congestion. When the policy is inclined to reduce the cost, the system is very likely to be congested when the arrival rate of packets is relatively large.
Of course, this is not to say that the policy of favoritism towards lower cost is undesirable. Different policies can be applied in different daily or industrial scenarios. When the data traffic is not very high, such as for some sensors that only collect parameters, the policy can be slightly biased to reduce the cost, to reduce the cost of users, and reduce the pressure on the server.
However, there are still many shortcomings and room for improvement in our work. We only studied the feasibility of using a reinforcement learning algorithm to deal with the resource unloading problem of a blockchain-based MEC system and did not build a real system for verification. In addition, due to the limitation of simulation equipment, there is a certain gap between the simulation scale and the real scene, so the feasibility of policy transplantation to large-scale scenes cannot be verified at present. Further, the ability to adjust the allocation policy is not enough. The environment of the real world may always change, which is shown in the model as the change of arrival rate and the change of mean packet size. However, currently, our model cannot adaptively adjust the weight parameters of indicators, and its policy can only be applied to a specific application scenario.

6. Conclusions

In this article, we thoroughly analyzed the resource allocation policy in blockchain-based MEC system. A new consensus mechanism: PoL, is applied in the system to maintain the stability of blockchain and improve the efficiency of edge computing servers. The optimization target of resource allocation consists of four parts, that is the process delay and cost of servers, which are common in traditional MEC models, and the mining delay and mining reward based on aforementioned PoL consensus. Different weight coefficients are set for these indicators in the reward function to explore what the impact of each indicator on the policy. Furthermore, to better capture the long-time trend of incoming tasks, TCN enabled A3C algorithm is used to solve the resource allocation policy, which can make the policy convergence faster and more stable. However, our work also has some deficiencies. The policy can not adjust according to the arrival rate of tasks. Furthermore, due to the limitation of computing resources, the simulation environment is quite different from real-world environment, which contains more servers and clients. Furthermore, it is only a theoretical research, but the actual software system will be more complicated. In the future, we first hope to improve the algorithm so that it can adjust the allocation policy more flexibly. Secondly, we hope to extend the algorithm in large-scale application scenarios to verify its generality. Furthermore, finally, we hope to complete the implementation of blockchain-based mobile edge computing system in the laboratory and continuously optimize and adjust it.

Author Contributions

Conceptualization, X.Z.; Formal analysis, X.Z., F.Y. and Y.Z.; Investigation, X.Z., F.Y. and Y.Z.; Methodology, X.Z.; Supervision, F.X.; Validation, X.Z. and Y.Z.; Visualization, X.Z.; Writing—original draft, X.Z. and Y.Z.; Writing—review and editing, X.Z., Y.Z. and F.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Research Innovation Fund for College Students of Beijing University of Posts and Telecommunications and Beijing Natural Science Foundation-Haidian Frontier Project “Research on Key Technologies of wireless edge intelligent collaboration for industrial internet scenarios (L202017)”.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
MECMobile edge computing
A3CAsynchronous advantage Actor-Critic
TCNTemporal Convolutional Network
FLOPsFloating Point Operations

References

  1. Cisco. Cisco Annual Internet Report (2018–2023) White Paper. 2020. Available online: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html (accessed on 14 July 2021).
  2. Patel, M.; Naughton, B.; Chan, C.; Sprecher, N.; Abeta, S.; Neal, A. Mobile-edge computing introductory technical white paper. Mob.-Edge Comput. (MEC) Ind. Initiat. 2014. [Google Scholar]
  3. Gai, K.; Fang, Z.; Wang, R.; Zhu, L.; Jiang, P.; Choo, K.K.R. Edge Computing and Lightning Network Empowered Secure Food Supply Management. IEEE Internet Things J. 2020. [Google Scholar] [CrossRef]
  4. Pal, A.; Kant, K. IoT-Based Sensing and Communications Infrastructure for the Fresh Food Supply Chain. Computer 2018, 51, 76–80. [Google Scholar] [CrossRef]
  5. Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. A survey on mobile edge computing: The communication perspective. IEEE Commun. Surv. Tutor. 2017, 19, 2322–2358. [Google Scholar] [CrossRef] [Green Version]
  6. Garcia Lopez, P.; Montresor, A.; Epema, D.; Datta, A.; Higashino, T.; Iamnitchi, A.; Barcellos, M.; Felber, P.; Riviere, E. Edge-centric computing: Vision and challenges. ACM SIGCOMM Comput. Commun. Rev. 2015, 45, 37–42. [Google Scholar] [CrossRef]
  7. Li, F.; Wang, D. 5G Network Data Migration Service Based on Edge Computing. Symmetry 2021, 13, 2134. [Google Scholar] [CrossRef]
  8. Tong, M.; Wang, X.; Li, S.; Peng, L. Joint Offloading Decision and Resource Allocation in Mobile Edge Computing-Enabled Satellite-Terrestrial Network. Symmetry 2022, 14, 564. [Google Scholar] [CrossRef]
  9. Liu, Y.; Xie, R.; Huang, T.; Yang, F. Edge Computing Principles and Practice; Posts and Telecommunications Press: Beijing, China, 2019. [Google Scholar]
  10. Gul, F.; Mir, I.; Abualigah, L.; Sumari, P.; Forestiero, A. A Consolidated Review of Path Planning and Optimization Techniques: Technical Perspectives and Future Directions. Electronics 2021, 10, 2250. [Google Scholar] [CrossRef]
  11. Huang, D.; Wang, P.; Niyato, D. A dynamic offloading algorithm for mobile computing. IEEE Trans. Wirel. Commun. 2012, 11, 1991–1995. [Google Scholar] [CrossRef]
  12. Yang, T.; Hu, Y.; Gursoy, M.C.; Schmeink, A.; Mathar, R. Deep reinforcement learning based resource allocation in low latency edge computing networks. In Proceedings of the 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 28–31 August 2018; pp. 1–5. [Google Scholar]
  13. Wang, X.; Zhang, Y.; Shen, R.; Xu, Y.; Zheng, F.C. DRL-based energy-efficient resource allocation frameworks for uplink NOMA systems. IEEE Internet Things J. 2020, 7, 7279–7294. [Google Scholar] [CrossRef]
  14. Forestiero, A.; Papuzzo, G. Agents-based algorithm for a distributed information system in Internet of Things. IEEE Internet Things J. 2021, 8, 16548–16558. [Google Scholar] [CrossRef]
  15. Xu, S.; Ratazzi, E.P.; Du, W. Security architecture for federated mobile cloud computing. In Mobile Cloud Security; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
  16. Roman, R.; Lopez, J.; Mambo, M. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar] [CrossRef] [Green Version]
  17. Hafid, A.; Hafid, A.S.; Samih, M. Scaling blockchains: A comprehensive survey. IEEE Access 2020, 8, 125244–125262. [Google Scholar] [CrossRef]
  18. Cao, L.; Wan, Z. Anonymous scheme for blockchain atomic swap based on zero-knowledge proof. In Proceedings of the IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, China, 27–29 June 2020; pp. 371–374. [Google Scholar] [CrossRef]
  19. Gai, K.; Guo, J.; Zhu, L.; Yu, S. Blockchain meets cloud computing: A survey. IEEE Commun. Surv. Tutor. 2020, 22, 2009–2030. [Google Scholar] [CrossRef]
  20. Damianou, A.; Angelopoulos, C.M.; Katos, V. An architecture for blockchain over edge-enabled IoT for smart circular cities. In Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Thera, Greece, 29–31 May 2019; pp. 465–472. [Google Scholar]
  21. Luo, C.; Xu, L.; Li, D.; Wu, W. Edge computing integrated with blockchain technologies. In Complexity and Approximation; Springer: Cham, Switzerland, 2020. [Google Scholar]
  22. Pan, J.; Wang, J.; Hester, A.; Alqerm, I.; Liu, Y.; Zhao, Y. EdgeChain: An edge-IoT framework and prototype based on blockchain and smart contracts. IEEE Internet Things J. 2018, 6, 4719–4732. [Google Scholar] [CrossRef] [Green Version]
  23. Asheralieva, A.; Niyato, D. Bayesian reinforcement learning and bayesian deep learning for blockchains with mobile edge computing. IEEE Trans. Cogn. Commun. Netw. 2020, 7, 319–335. [Google Scholar] [CrossRef]
  24. He, Y.; Wang, Y.; Qiu, C.; Lin, Q.; Li, J.; Ming, Z. Blockchain-based edge computing resource allocation in IoT: A deep reinforcement learning approach. IEEE Internet Things J. 2020, 8, 2226–2237. [Google Scholar] [CrossRef]
  25. Qiu, X.; Liu, L.; Chen, W.; Hong, Z.; Zheng, Z. Online deep reinforcement learning for computation offloading in blockchain-empowered mobile edge computing. IEEE Trans. Veh. Technol. 2019, 68, 8050–8062. [Google Scholar] [CrossRef]
  26. Qiu, C.; Wang, X.; Yao, H.; Du, J.; Yu, F.R.; Guo, S. Networking Integrated Cloud–Edge–End in IoT: A Blockchain-Assisted Collective Q-Learning Approach. IEEE Internet Things J. 2020, 8, 12694–12704. [Google Scholar] [CrossRef]
  27. Qiu, C.; Yao, H.; Wang, X.; Zhang, N.; Yu, F.R.; Niyato, D. AI-Chain: Blockchain energized edge intelligence for beyond 5G networks. IEEE Netw. 2020, 34, 62–69. [Google Scholar] [CrossRef]
  28. Bai, S.; Kolter, J.Z.; Koltun, V. An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. arXiv 2018, arXiv:1803.01271. [Google Scholar]
  29. Zyskind, G.; Nathan, O.; Pentland, A.S. Decentralizing Privacy: Using Blockchain to Protect Personal Data. In Proceedings of the IEEE Security and Privacy Workshops, San Jose, CA, USA, 18–20 May 2015; pp. 180–184. [Google Scholar] [CrossRef]
  30. Christidis, K.; Devetsikiotis, M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
  31. Xu, J.; Wang, S.; Zhou, A.; Yang, F. Edgence: A blockchain-enabled edge-computing platform for intelligent IoT-based dApps. China Commun. 2020, 17, 78–87. [Google Scholar] [CrossRef]
  32. Huang, Y.; Zhang, J.; Duan, J.; Xiao, B.; Ye, F.; Yang, Y. Resource Allocation and Consensus of Blockchains in Pervasive Edge Computing Environments. IEEE Trans. Mob. Comput. 2021, 8, 829–843. [Google Scholar] [CrossRef]
  33. Wu, H.; Wolter, K.; Jiao, P.; Deng, Y.; Zhao, Y.; Xu, M. EEDTO: An Energy-Efficient Dynamic Task Offloading Algorithm for Blockchain-Enabled IoT-Edge-Cloud Orchestrated Computing. IEEE Internet Things J. 2021, 8, 2163–2176. [Google Scholar] [CrossRef]
  34. Ye, X.; Li, M.; Si, P.; Yang, R.; Sun, E.; Zhang, Y. Blockchain and MEC-assisted reliable billing data transmission over electric vehicular network: An actor—Critic RL approach. China Commun. 2021, 18, 279–296. [Google Scholar] [CrossRef]
  35. Marques, G.; Pitarma, R. Air quality through automated mobile sensing and wireless sensor networks for enhanced living environments. In Proceedings of the 14th Iberian Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal, 19–22 June 2019; pp. 1–7. [Google Scholar] [CrossRef]
  36. Xue, J.; Wang, Z.; Zhang, Y.; Wang, L. Task allocation optimization scheme based on queuing theory for mobile edge computing in 5G heterogeneous networks. Mob. Inf. Syst. 2020, 2020, 1501403. [Google Scholar] [CrossRef]
  37. Zhou, J.P. Communication Networks Theory; The People’s Posts and Telecommunications Press: Beijing, China, 2009. [Google Scholar]
  38. Kimura, T. Approximations for the delay probability in the M/G/s queue. Math. Comput. Model. 1995, 22, 157–165. [Google Scholar] [CrossRef]
  39. Hunger, R. Floating Point Operations in Matrix-Vector Calculus; Munich University of Technology, Institute Circuit Theory and Signal Processing: Munich, Germany, 2005. [Google Scholar]
  40. Mnih, V.; Badia, A.P.; Mirza, M.; Graves, A.; Lillicrap, T.; Harley, T.; Silver, D.; Kavukcuoglu, K. Asynchronous methods for deep reinforcement learning. In Proceedings of the International Conference on Machine Learning (PMLR), New York, NY, USA, 19–24 June 2016; pp. 1928–1937. [Google Scholar]
  41. Ajay Rao, P.; Navaneesh Kumar, B.; Cadabam, S.; Praveena, T. Distributed deep reinforcement learning using TensorFlow. In Proceedings of the International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), Mysore, India, 8–9 September 2017; pp. 171–174. [Google Scholar] [CrossRef]
Figure 1. Blockchain-based MEC system architecture.
Figure 1. Blockchain-based MEC system architecture.
Electronics 11 01869 g001
Figure 2. System procedure.
Figure 2. System procedure.
Electronics 11 01869 g002
Figure 3. Network architecture: (a) TCN enabled A3C; (b) temporal convolutional network.
Figure 3. Network architecture: (a) TCN enabled A3C; (b) temporal convolutional network.
Electronics 11 01869 g003
Figure 4. Update principle of A3C algorithm.
Figure 4. Update principle of A3C algorithm.
Electronics 11 01869 g004
Figure 5. Average reward per epoch.
Figure 5. Average reward per epoch.
Electronics 11 01869 g005
Figure 6. The convergence of reinforcement learning; (a) Average process delay per epoch; (b) average mining delay per epoch; (c) average cost per epoch; (d) average bonus per epoch.
Figure 6. The convergence of reinforcement learning; (a) Average process delay per epoch; (b) average mining delay per epoch; (c) average cost per epoch; (d) average bonus per epoch.
Electronics 11 01869 g006
Figure 7. The relationship between t p r o c e s s and arrival rate λ .
Figure 7. The relationship between t p r o c e s s and arrival rate λ .
Electronics 11 01869 g007
Figure 8. The comparison between TCN enabled A3C and fully-connected A3C.
Figure 8. The comparison between TCN enabled A3C and fully-connected A3C.
Electronics 11 01869 g008
Table 1. Parameter values in simulation.
Table 1. Parameter values in simulation.
ParametersExplanationValue
μ the mean of data size7 (Mb)
σ 2 the variance of data size2
cminimum data size split1 (Mb)
ω floating point operations 10 6
MCPU cycles required for 1 bit[2, 5, 7] (bit/Hz)
Nnumber of training task 10 4
fdomain frequency of server[15, 16, 17, 18] (GHz)
λ arrival rate[14, 16, 18, 20, 22, 24]
userver cost[1, 1.1, 1.2, 1.3]
Dmining difficulty[5, 6]
α coefficient of process delay[100, 25, 50, 100, 100, 5, 5, 1]
ζ coefficient of mining delay[2, 0.5, 1, 2, 2, 0.1, 0.1, 1]
β coefficient of cost[1, 1, 1, 1, 1, 100, 200, 1]
γ coefficient of bonus[20, 5, 10, 5, 1, 1, 1, 10]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zheng, X.; Zhang, Y.; Yang, F.; Xu, F. Resource Allocation on Blockchain Enabled Mobile Edge Computing System. Electronics 2022, 11, 1869. https://doi.org/10.3390/electronics11121869

AMA Style

Zheng X, Zhang Y, Yang F, Xu F. Resource Allocation on Blockchain Enabled Mobile Edge Computing System. Electronics. 2022; 11(12):1869. https://doi.org/10.3390/electronics11121869

Chicago/Turabian Style

Zheng, Xinzhe, Yijie Zhang, Fan Yang, and Fangmin Xu. 2022. "Resource Allocation on Blockchain Enabled Mobile Edge Computing System" Electronics 11, no. 12: 1869. https://doi.org/10.3390/electronics11121869

APA Style

Zheng, X., Zhang, Y., Yang, F., & Xu, F. (2022). Resource Allocation on Blockchain Enabled Mobile Edge Computing System. Electronics, 11(12), 1869. https://doi.org/10.3390/electronics11121869

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop