Next Article in Journal
A Developed Jerk Sensor for Seismic Vibration Measurements: Modeling, Simulation and Experimental Verification
Previous Article in Journal
An Innovative Clustering Hierarchical Protocol for Data Collection from Remote Wireless Sensor Networks Based Internet of Things Applications
Previous Article in Special Issue
A Novel IoT-Enabled Healthcare Monitoring Framework and Improved Grey Wolf Optimization Algorithm-Based Deep Convolution Neural Network Model for Early Diagnosis of Lung Cancer
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Risk-Aware Distributionally Robust Optimization for Mobile Edge Computation Task Offloading in the Space–Air–Ground Integrated Network

1
School of Computer Science and Telecommunication Engineering, Jiangsu University, Zhenjiang 212013, China
2
Jiangsu Provincial Key Laboratory of Industrial Network Security Technology, Zhenjiang 212013, China
3
Jiangsu Ubiquitous Data Intelligent Perception and Analysis Application Engineering Research Center, Zhenjiang 212013, China
*
Author to whom correspondence should be addressed.
Current address: Jiangsu University, Zhenjiang 212013, China.
Sensors 2023, 23(12), 5729; https://doi.org/10.3390/s23125729
Submission received: 21 May 2023 / Revised: 7 June 2023 / Accepted: 12 June 2023 / Published: 20 June 2023

Abstract

:
As an emerging network paradigm, the space–air–ground integrated network (SAGIN) has garnered attention from academia and industry. That is because SAGIN can implement seamless global coverage and connections among electronic devices in space, air, and ground spaces. Additionally, the shortage of computing and storage resources in mobile devices greatly impacts the quality of experiences for intelligent applications. Hence, we plan to integrate SAGIN as an abundant resource pool into mobile edge computing environments (MECs). To facilitate efficient processing, we need to solve the optimal task offloading decisions. In contrast to existing MEC task offloading solutions, we have to face some new challenges, such as the fluctuation of processing capabilities for edge computing nodes, the uncertainty of transmission latency caused by heterogeneous network protocols, the uncertain amount of uploaded tasks during a period, and so on. In this paper, we first describe the task offloading decision problem in environments characterized by these new challenges. However, we cannot use standard robust optimization and stochastic optimization methods to obtain optimal results under uncertain network environments. In this paper, we propose the ‘condition value at risk-aware distributionally robust optimization’ algorithm for task offloading, denoted as RADROO, to solve the task offloading decision problem. RADROO combines the distributionally robust optimization and the condition value at risk model to achieve optimal results. We evaluated our approach in simulated SAGIN environments, considering confidence intervals, the number of mobile task offloading instances, and various parameters. We compare our proposed RADROO algorithm with state-of-the-art algorithms, such as the standard robust optimization algorithm, the stochastic optimization algorithm, the DRO algorithm, and the Brute algorithm. The experimental results show that RADROO can achieve a sub-optimal mobile task offloading decision. Overall, RADROO is more robust than others to the new challenges mentioned above in SAGIN.

1. Introduction

With the booming development of the Internet of Things (IoT) ecosystem, users have higher expectations for quality experiences (QoE) across various IoT applications. Following the official deployment and operation of the fifth-generation (5G) mobile system, the sixth-generation (6G) mobile system has gradually come into the limelight. High-speed communication technologies can provide a higher quality of service (QoS) for IoT applications, such as intelligent transportation, intelligent agriculture, maritime surveillance, smart cities, natural disaster relief, and so on. However, existing terrestrial communication networks cannot effectively provide QoS and QoE guarantees for intelligent and low-latency IoT applications.
On the other hand, computing capacity and energy resources in edge nodes are often insufficient to meet the demands of all edge tasks [1]. Task offloading decisions are largely influenced by these factors. Some researchers have addressed these issues from the perspective of an edge–cloud collaboration [2]. Researchers have also turned their attention to the space–air–ground integrated network (SAGIN) to allocate more resources. SAGIN is an integration of the space layer, aerial layer, and ground layer. As a multidimensional network, SAGIN adopts different communication protocols in each segment or integrates different segments to achieve high throughput and reliable data delivery [3].
However, we have to face some new challenges in SAGIN, such as computationally intensive task offloading at the mobile edge and resource allocation in uncertain and heterogeneous network environments. The uncertain network parameters [4], such as uncertain latency, the uncertain amount of arrival tasks [5], and uncertain computation resources, may seriously impact the efficiency of edge task execution. The heterogeneous environment necessitates considering additional factors, such as selecting suitable frequency bands for task propagation and choosing different types of computing nodes. At the same time, the fluctuating processing capabilities make it challenging to allocate appropriate computing resources based on uncertain data when there is a surge of computational tasks. Nowadays, stochastic optimization (SO) [6] and robust optimization (RO) [7,8,9] methods are proposed to solve uncertainty problems. The SO method can use the probability distribution of measuring parameters to predict the potential uncertainty and obtain the mathematical expectation of the objective function. The RO method can directly solve the target value under the worst-case conditions, and it does not need to obtain the probability distributions of measuring parameters. Nonetheless, the results obtained from the SO algorithm may not accurately reflect realistic worst-case scenarios, while the RO algorithm sacrifices a significant amount of performance to obtain computation offloading decisions for worst-case situations. Distributionally robust optimization (DRO) can be viewed as a unifying framework for the SO and RO methods.
The DRO method can replace the probability distribution of uncertain measuring parameters with a fuzzy set. [10]. Then it can choose the worst case in the fuzzy set to obtain better robustness. Additionally, the authors of [11] proposed the conditional value at risk (CVaR) aware DRO method, which can reflect the potential risks and improve stability. In SAGIN environments, the number of tasks requiring offloading may vary, and the availability of computational resources can fluctuate in real time. These uncertainties pose challenges in making efficient task offloading decisions. The risk-aware distributionally robust optimization task offloading (RaDROO) algorithm addresses these challenges by incorporating robust optimization techniques and considering the uncertainties in both the number of tasks and real-time computational resource availability. The two-stage offloading decision process of the RaDROO algorithm enables it to dynamically determine the most suitable task offloading targets. This process considers various factors, such as task characteristics, resource availability, performance requirements, and uncertainties associated with the number of tasks and computational resource availability.
There are two main technical challenges in solving the risk-aware two-stage DRO problem. Firstly, it is difficult to solve the DRO problem due to the fuzzy sets. Secondly, the first-stage offloading decision involves zero-one integer programming. The second stage involves a resource allocation procedure for latency-insensitive and computation-intensive tasks. However, in this paper, we have to solve the risk-aware two-stage DRO problem, which brings new challenges. If we can solve the risk-aware two-stage DRO problem, we can achieve improved revenue while considering uncertainties and ensuring QoS in the SAGIN network architecture.
Our contributions are summarized as follows:
We investigate the task offloading decision model in the SAGIN environment. The task offloading model consists of two stages: the first stage involves the task offloading decision, while the second stage focuses on edge–cloud collaboration and cloud resource allocation.
A fuzzy set of computational resources for edge computing nodes was constructed, considering CVaR. Then, based on the theory of Lagrange duality, the model is transformed into a semidefinite programming form, and the RaDROO algorithm is proposed to solve the task offloading problem with distributional robustness under risk awareness.
We conducted simulation experiments from two aspects. On one hand, we adjusted certain parameters of the proposed model to obtain the optimal values for those parameters. On the other hand, we fixed the parameters and compared them with the state-of-the-art algorithms in different computation and network environments. The experimental results demonstrate that our proposed model and algorithm have better results than the state-of-the-art methods in terms of usability, robustness, and risk.
Table 1 shows the superiority of our algorithm compared with relevant literatures.
The remainder of this paper is organized as follows. Section 2 provides a brief introduction to SAGIN and computational task offloading. Section 3 describes the network architecture and proposes a computation task offloading model under uncertain computation environments. Section 4 presents the RaDROO algorithm for obtaining optimal task offloading decisions and resource allocation strategies. Section 5 provides the performance evaluation and analysis. Finally, Section 6 concludes the work and presents future directions for research.

2. Related Work

In this section, we first introduce the SAGIN architecture. We then review the traditional computation task offloading, computation task offloading under uncertain network and computation environments, and risk-aware computation offloading, respectively.

2.1. SAGIN Architecture

SAGIN refers to the integration and synergy of systems from multiple domains—space, air, and ground—to form a wide coverage area and a high-speed network that enables more efficient communication and data exchange. It is a proposed solution to address the growing demand for enhanced communication and information-sharing capabilities. SAGIN requires the use of various technical means, such as satellite communications, unmanned aerial vehicles, and ground sensors, to enable collaborative operations and data sharing between different platforms. By sharing data and information in real time, situational awareness can be improved, decision-making can be optimized, and mission effectiveness can be enhanced.
Over time, the SAGIN architecture has rapidly evolved, and various projects, such as the global information grid (GIG), have been proposed and widely deployed [16]. Liu et al. [3] described the communication network design and resource allocation algorithm of SAGIN in a high-dimensional network environment. Likewise, SAGIN can be invoked in MEC environments and exhibits excellent performance in unique environments, including deserts and disaster scenarios. Yu et al. [17] considered the fine-grained offloading problem and caching problem and proposed the SAGIN framework, which supports edge computing.
The impact of SAGIN on computing task offloading is multifaceted and can be summarized as follows:
Cross-platform efficiency: Through the integration and collaborative operations achieved by SAGIN, different tasks can be offloaded and migrated between different platforms, thereby improving the efficiency of task execution.
Increased flexibility through edge–cloud collaboration: In the SAGIN network, tasks can be dynamically allocated and scheduled, allowing them to be offloaded to the most suitable platforms based on their computational requirements. This improves resource utilization.
Overall, SAGIN has a positive impact on the field of task offloading, as it can improve task execution efficiency, safety, flexibility, and coverage. An ECN built on the SAGIN framework will be more able to fully exploit its capabilities by consolidating available resources to provide computing resources for tasks within this network environment.

2.2. Traditional Computation Offloading

First of all, a class of existing task offloading optimization algorithms in practical applications focuses on task dependency. Yuan et al. [18] focused on a dependent task assignment problem over multiple mobile terminal devices (MTDs). In [19], an efficient partitioned search method was implemented to obtain optimal solutions for task offloading policies and resource allocation under task-dependent models. Moreover, without considering task dependency, determining whether to offload tasks to edge computing nodes (ECNs) and how to allocate computing resources in ECNs based on the performance requirements for computing offloads are hot topics among current researchers. The three mainstream research directions under this scope are as follows. The first one is to explore task offloading decision schemes that minimize task execution delay [20,21]. Xiao et al. [22] designed a heat prediction method to analyze the dynamics of urban heat zones, aided by the design of a non-cooperative game-theoretic strategy selection based on regret-matching to achieve the minimum time delay. Dai, Y. et al. [23] proposed a JSCO algorithm to search for the solution to the optimization problem in a distributed manner with less overhead, using the integrated task processing delay as the performance metric. In [13], Farhangi, E.et al. proposed a novel offload approach, OAMC, which takes into account the dynamic changes of mobile applications. This approach aims to reduce the migration number and overall data movement while minimizing the turnaround time of mobile applications. Secondly, plenty of studies [24,25,26,27] focus on obtaining task offloading decisions in edge computing networks that minimize energy consumption, which is affected by the amount of offloading computations, the MTD-MEC distance, channel conditions, application type, compression efficiency, etc. Hmimz et al. [26] jointly considered the priority of certain MTDs and aimed to minimize overall power consumption. Third, the authors of [28,29] assumed that the system can gain a certain amount of revenue by completing the task, and the goal is to find the offloading decision that maximizes the revenue. Samanta et al. [30] synthetically explored delay-sensitive and delay-tolerant edge services while ensuring the maximization of quality of experience (QoE) over an extended period using the Lyapunov method.
In addition to the challenges commonly addressed by traditional optimization methods, some researchers [31] have chosen to apply intelligent optimization algorithms to determine the optimal unloading decision. In [27], the authors developed a new adaptive inertia weight-based particle swarm optimization (NAIWPSO) algorithm to minimize the energy consumption of MTDs while considering the channel constraint conditions during task offloading. Li et al. [32] proposed an algorithm, named EIPSO, which is based on a particle swarm optimization-based algorithm. Tout et al. [33] designed a multi-objective intelligent optimization algorithm based on the genetic algorithm.
Machine learning and deep learning algorithms are now extraordinarily prevalent in the research field. Maleki, E. F. et al. [13] applied a machine learning (ML) algorithm called matrix complementation to develop two novel offloading methods, S-OAMC and G-OAMC, which enhance scalability and identify offloading decisions with low turnaround times. In [34], various machine learning techniques for communication, network, and security components of future 6G environments in vehicular networks were profiled, and methods and directions for implementing artificial intelligence in future 6G vehicular networks were envisioned. However, machine learning algorithms typically require significant amounts of training data and cannot be directly computed. They rely on training with large datasets to learn patterns and make predictions. Additionally, machine learning algorithms are sensitive to changes in the environment and may require retraining or adaptation to maintain their performance.

2.3. Uncertain-Aware Computation Offloading

The above research scenarios assume that controllers have access to accurate computing resources and channel information, either statically or dynamically. Nevertheless, in application environments, MECNs are transient, which can considerably impact resource utilization and user QoE. In [4,7], the authors investigated robust task offloading that is tolerant to failures in offloading scenarios and can effectively overcome this. In [8], the offloading of robust tasks that can tolerate server failures was considered to achieve improved application responsiveness. To counter the inaccuracy of channel measurements, the authors of [9] designed a robust offloading strategy for channel information estimation errors. Facing the connection instability between MTDs and small clouds, the authors of [7] proposed a robust computation offloading strategy with failure recovery.
In contrast to the mentioned robust optimization approach, which trades off significant device performance to ensure robustness, stochastic optimization (SO) is employed. SO studies in mobile edge computing (MEC) take into account the probability distributions of channel resources and the random variations of computational resources in edge computing nodes (ECNs). The authors of [6] proposed a two-stage SO to tackle the challenge of uncertain dynamic environments.

2.4. Risk-Aware Computation Offloading

Unlike the uncertain or undefined parameter scenarios described above, risk considerations refer to unexpected conditions that occur during system operation. Bai et al. [12] solved the risk-aware computation offloading (RCO) problem by considering the use of the Bayesian Stackelberg game to rationally disperse the nodes for task offloading when the server was attacked by outside miscreants. Apostolopoulos et al. [35] considered the uncertainty in MEC server computational resources as well as storage space under heterogeneous networks. Schultz, R.et al. [15] explained the risk consideration in stochastic programming, i.e., the mean risk, and also gave the expression formula for CVaR. With CVaR, Pan et al. [36] considered the availability of the MEC system in the case of a possible link failure. Mean-CVaR is commonly deployed in finance. Zhang et al. [14] studied portfolio selections under return fuzzy set conditions, considering a downside risk measure to reduce investment risk.

3. Network Architecture and System Model

In this section, we elaborate on the SAGIN architecture and channel models. Based on the compute, caching, and communication (3C) requirements, we developed an optimization model for making computing offload decisions with the objective of minimizing costs.

3.1. SAGIN Architecture and Channel Models

SAGIN is a novel network structure that integrates multiple dimensions. It adopts different protocols and occupies different frequency bands for establishing communications between different dimensions [3]. We selected the rational frequency band for communications by taking into account the distance between ECNs, the influence of current environmental factors on the link, the free-space path loss, tropospheric attenuation, and other factors.
In the study, tasks were uploaded to the nearest BSs from MTDs by default. As shown in Figure 1, the SAGIN architecture consists of five components: the MTD segment, ground segment, satellite segment, aerial segment, and cloud data center (CDC) segment. Let B = { 1 , 2 , , B } be used as the set of BSs. Furthermore, UAVs are deployed as an extension of the ground BS process, serving as representatives of the aerial segments. The set of UAVs is denoted by U = { 1 , 2 , , U } . The satellite segment consists of LEO satellites. Due to the utilization of higher communication frequency bands, satellites possess lower propagation delay and free-space attenuation [37]. We consider the displacement of satellites relative to the ground during the task processing time slots to be negligible.
The SAGIN system provides three task offload strategies based on the task information uploaded by MTDs: Firstly, selecting a BS that possesses sufficient computing resources to calculate the task; secondly, applying for a UAV offload and computing the task; thirdly, selecting a UAV as an intermediary and applying an LEO satellite to offload and compute the task. As a multi-dimensional 6G network, SAGIN integrates several network segments and uses communication protocols to achieve high reliability and high-throughput data transmission [38].
The maximum achievable transmission rate K [bits/s] for the tasks in the channel can be expressed as follows:
K = B log 2 ( 1 + P × 10 [ L P / 10 ] N o i s e ) , L p = 32.45 + 20 lg d ( k m ) + 20 lg f ( M H z ) .
Within the above equation, B H Z , P, and N o i s e represent the channel bandwidth, average signal power, and noise power; L p , d, and f represent the propagation loss in free space, the distance between ECNs, and the signal frequency, respectively.

3.2. Computation Task Offloading Model

We assume that there are n latency-sensitivity and computation-intensive tasks offloaded to nearby BSs, where the set of tasks is denoted as N = { 1 , 2 , , N } . Moreover, each task is characterized by certain parameters, denoted as n i u p , n i c o m p , n i d o w n , i N , where n u p denotes the size of the input and uploaded data; n c o m p denotes the number of CPU cycles required to process the data; n d o w n denotes the size of the processed and downloaded data. In this research, the objective was to study the 3C and total costs of tasks while maintaining the atomicity of the tasks, i.e., each task could only be served by one processing ECN.
In our proposed SAGIN system, there are four offload destinations: BSs, UAVs, LEO satellites, and CDC. We assume that x B S , x U A V , and x L E O are three binary parameters, where x i b B S denotes whether task i selects BS b as the offload target, x i u U A V denotes whether task i selects UAV u as the offload target, and x i s L E O denotes whether task i selects the LEO satellite s as the offload target.
b = 1 B x i b B S + u = 1 U x i u U A V + s = 1 S x i s L E O = 1 , i N
x i b B S , x i u U A V , x i s L E O { 0 , 1 } , b B , u U , s S
The above equation indicates that each task would be offloaded to one ECN in the SAGIN architecture. x i b B S = 1 if task n i is offloaded to BS b and x i b B S = 0 otherwise; x i u U A V = 1 if task n i is offloaded to UAV u and x i u U A V = 0 otherwise; moreover, x i s L E O = 1 if task n i is offloaded to LEO satellite s and x i s L E O = 0 otherwise. These three different computing units own different computing power and storage resources. f i b B S , f i u U A V , and f i s S A T denote the number of computing resources requested by task i per second from BSs, UAVs, and LEO satellites, respectively.
We assume that tasks are uploaded to the nearest base station first and then propagate them from the base station to the target computing nodes. Since the propagation delay of tasks directly to edge computing nodes is much greater than the upload delay of tasks to the nearest base station, we will ignore the upload delay of tasks.
The time taken by a task to be uploaded and downloaded between ECNs and the latency taken to calculate the task can be expressed as follows:
T u p = n u p k u p = n u p B log 2 ( 1 + P × 10 [ L P / 10 ] N )
T d o w n = n d o w n k d o w n = n d o w n B log 2 ( 1 + P × 10 [ L P / 10 ] N )
T c o m p = L t i m e T u p T d o w n
where T c o m p is the time to execute the task, T u p and T d o w n represent the time of uploading and downloading the task message.
The overall latency of the tasks offloaded to the BSs comprises the transfer delay to the target BS, the computation delay of the BS, and the transfer delay of the result download.
T i b B S = T i b u p + T i b c o m p + T i b d o w n , i N
One option is to upload tasks to the UAVs when the computing resources on the ground are insufficient to handle the high influx of tasks.
T i u U A V = T i u u p + T i u c o m p + T i u d o w n , i N
The task process changes with the calculations involved in offloading tasks to LEO satellites. Task information must be uploaded to the nearest UAV before spreading to satellites. After the task processing is completed, the data are returned to the original path. The total latency taken to offload the tasks to an LEO satellite can be expressed as follows:
T i s L E O = T i u u p + T i s u p + T s c o m p + T i u d o w n + T i b d o w n
where T i b u u p , T i u s u p , T i s u d o w n , T i u b d o w n and T i s c o m p represent the uploading latency of task i from BSs to UAVs, from UAVs to LEO satellites, the downloading latency from LEO satellites to UAVs, from UAVs to BSs, and the computation delay of task i, respectively.
For this paper, we ensured that the task was completed within the time delay constraints. Therefore, to allocate computing resources rationally, the node only provides the lowest possible computational resources, f i = n i c o m p L i T T t r a n s , where T i t r a n s represents the time taken for task i to be transmitted over the link.
There is an upper bound on the total amount of computing resources an ECN can have. As a result, the combined computational resources required for the tasks assigned to a node should not exceed the upper limit.
i = 1 n f i x i b B S L b B c o m p , b B ,
i = 1 n f i x i u U A V L u U c o m p , u U ,
i = 1 n f i x i s L E O L s L c o m p , s S ,
We consider caching in 3C, where each ECN has its individual storage limit.
i = 1 N x i b B S n i u p L b B c a c h e , b B
i = 1 N x i u U A V n i u p L u U c a c h e , u U
i = 1 N x i s L E O n i u p L s L c a c h e , s S
L b B c a c h e , L b U c a c h e , and L b L c a c h e represent the cache upper bound of the BS b, UAV u, and LEO satellite s, separately.
The cost for task offloading is closely tied to the server type and the number of required computing resources. In this paper, we focus on solving computationally intensive and time-delay-sensitive tasks. Therefore, minimizing the offload cost by selecting an appropriate offloading target is crucial. Hence,
C i = b = 1 B δ b B S × n i c o m p × x i b B S + u = 1 U δ u U A V × n i c o m p × x i u U A V + s = 1 S δ s L E O × n i c o m p × x i s L E O , i N
C a l l = n = 1 N C n
In the above equation, C i denotes the final cost of task i; C A L L denotes the cost for accomplishing whole tasks; δ b B S , δ b U A V , and δ b L E O represent the ratio between the fees and the data size that will be processed by BSs, UAVs, and LEO satellites, respectively
min x i b B S , x i u U A V , x i s L E O C a l l s . t . ( 2 ) ,   ( 3 ) ,   ( 10 ) ,   ( 11 ) ,   ( 12 ) ,   ( 13 ) ,   ( 14 ) ,   ( 15 )

3.3. Computing Resources Using a Fussy Set Model

Realistically, the computational resources of each node can be greatly influenced by external factors. Qu et al. [4] considered the resource uncertainty of MECN in a traditional environment. In this paper, to account for the computing resource uncertainty of ECNs, we propose a realistic scenario-based set with a definite probability distribution to represent the possible range of uncertain resources.
Based on a fuzzy set of random parameters ξ , we will make the one-stage offloading decision and the two-stage cloud resource request.
Delage, E. et al. [39] considered a set of uncertainties with specific boundaries and moments, derived from real-world data, i.e.,
D ξ , , μ 0 , γ 1 , γ 2 = P F : P ξ M = 1 E ξ μ 0 T 1 E ξ μ 0 γ 1 E ξ μ 0 ξ μ 0 T γ 2
where parameters γ 1 and γ 2 , based on historical data, are utilized to control the size of the ambiguity set and the conservatism of optimal solutions. M is the closed convex set representing the support of the currently known random variable ξ , and ∑ and μ 0 are, respectively, its corresponding first-order and second-order moments. In contrast, F is the set of all probability measures on the measurable space ( R m , B ), where B represents the Borel β -algebra on R m .
The first constraint indicates that the probability density sum of ξ is 1 over M ξ ; the second constraint assumes that the mean of ξ lies on an ellipsoid of size γ 1 centered at μ 0 ; the third constraint assumes that the covariance matrix lies in a positive semi-positive definite cone bounded by matrix inequalities.

4. Risk-Aware Distributionally Robust Optimization Task Offloading Algorithm Design

In this section, we consider fuzzy sets and CVaR to address the uncertainty of computational resources in edge computing nodes. In the first stage, we consider the computational resources required for performing computations on the currently available computing nodes. In the second stage, we take into account the cost associated with additional computational resources that may need to be requested from the cloud due to the uncertainty of node computational resources. As the computational resources are presented in the form of fuzzy sets, the second stage is represented by taking the mean value in the RaDROO algorithm. Additionally, to consider CVaR, we use lambda as a weight and select the mean value of the poorer part in the fuzzy set to obtain a more robust offloading solution.

4.1. Network Architecture and System Model

In this section, we consider the transformation of the original problem into a two-stage DRO programming model with a mean-CVaR recourse function, namely a risk-aware DRO model.
Above all, we express (18) in terms of matrix form variables and parameters. We consider the set D = B U S and M = B + U + S . The formulated problem is written as follows:
min X N c o m p T × X × δ
s . t . X × O m = O n ,
        X T × N u p L c a c h e ,
                                                                              X T × F L c o m p ,                                                                               X R N × M , δ R N , N c o m p R M , N u p R N ,
                                                f R N , L c a c h e R M , L c o m p R M
where the offloading strategy matrix variable X : = x n m n N , m D , the upper bound of the computing resource vector parameter L c o m p : = L m c o m p m D , the upper bound of the cache ceiling vector parameter L c a c h e : = L m c a c h e m D , the computing resource vector parameter F : = f i i N , the ratio between the cost and the data size vector parameter δ : = δ i i N , and the all-ones vector parameter is O.
Thus, given the uncertainty of the parameter L c o m p , a two-stage offloading strategy model is created using the distribution set proposed above. We constructed a fuzzy set based on the historical data of the computing resources of the offload nodes, expressed as follows: ξ = L ˜ c o m p .
min X N c o m p T × X × δ + E ξ ϑ X , ξ , s . t . (20a ) (20d ) ,
P F ξ : P ξ M ξ = 1 E ξ μ 0 T 1 E ξ μ 0 γ 1 E ξ μ 0 ξ μ 0 T γ 2
w i t h ϑ X , ξ = min Y φ T × Y , X F r e q T × O n ξ + Y , 0 Y ,
ϑ X , ξ represent the additional cost of uploading tasks to the cloud when the real-time computing resources change in a phase of decision task offloading and are insufficient to meet demand. Vector φ indicates the ratio of additional costs to required computational power.
Instead, we further consider the mean-CVaR (conditional value at risk) criterion in the model, which can be expressed in the following form:
(22a) V a R α ( ζ ) = inf v R : F v α C V a R α ( ζ ) = E { ζ | ζ V a R α ( ζ ) } (22b) = min v R { v + 1 1 α E [ ( ζ v ) + ] }
where F is the cumulative distribution function of the function used to solve the random variable ζ , and a is the given confidence level. a + means max a , 0 .
This model gives the set of possible distributions M ξ for the unknown stochastic parameter ξ , while ensuring its robustness through a mean-CVaR approach with a two-stage minimization of fees. The following formulation is made using the min–max theory:
min X h ( x ) + sup ξ 1 λ E ϑ ( x , ξ ) + λ C V a R ( ϑ ( x , ξ ) ) w i t h h ( x ) = N c o m p T × X × δ , s . t . ( 20 a ) ,   ( 20 b ) ,   ( 20 c ) ,   ( 20 d ) ,   ( 21 a ) ,   ( 21 b ) ,
where λ indicates the trade-off coefficient of conditional risk considered in the objective function, with 1 λ 0 .

4.2. Transform from DRO to SDP

We reconstruct the original problem by considering the uncertainty of computational resources and acknowledging the challenge of directly addressing the DRO problem. To solve this, we employ the Lagrangian dual to transform it into a semi-definite programming (SDP) problem.
Problem (23) presents a DRO problem. Below, we further analyze the target formula and convert it into a more explicit form.
sup ξ 1 λ E [ ϑ ( x , ξ ) ] + λ C V a R ( ϑ ( x , ξ ) ) = sup ξ { min v R { λ v + ( 1 λ ) E [ ϑ ( x , ξ ) ] + λ 1 α E [ ( ϑ ( x , ξ ) v ) + ] } } = min v R { λ v + sup ξ { E [ ( 1 λ ) ϑ ( x , ξ ) + λ 1 α ( ϑ ( x , ξ ) v ) + ] } }
The ambiguous distribution set of the random parameter cannot be used directly for the solution, and we need to convert it into the common inequality form. Consider only the latter half, which involves finding the optimal value in relation to the random parameter ξ . Instead of the original distribution set form, we transform it into the following semi-infinite conic linear problem form, expressed as:
sup ξ M [ ( 1 λ ) ϑ ( x , ξ ) + λ 1 α ( ϑ ( x , ξ ) v ) + ] d f ξ
s . t . M d f ξ = 1 ,
                                                              M ( ξ μ 0 ) ( ξ μ 0 ) T d f ξ γ 2 ,
                                                              M ξ μ 0 ( ξ μ 0 ) T γ 1 d f ξ 0 ,
ξ M ξ ,
Secondly, we utilize the duality theory to convert it into an SDP problem. Consider the dual of problem (25):
D u a l :
inf r , H , Z z z T z ^ r + H , γ 2 μ 0 μ 0 T + Z , + z ^ γ 1 2 z T μ 0
s . t . u x , ξ r ξ H ξ T + 2 ξ T H μ 0 + 2 z T ξ 0 , ξ M ξ ,
r R ,
H 0 ,
    Z z z T z ^ 0 , w i t h u x , ξ = ( 1 λ ) ϑ ( x , ξ ) + λ 1 α ( ϑ ( x , ξ ) v ) +
where r, H, and Z z z T z ^ are, correspondingly, the dual variables of constraints (25a), (25b), and (25c). a , b represents T r a c e ( A B ) .
Due to the inclusion of ( ) + , the inequality constraint (26a) has to be processed as follows:
r + ξ H ξ T 2 ξ T H μ 0 2 z T ξ ( 1 λ ) ϑ ( x , ξ ) + λ 1 α ( ϑ ( x , ξ ) v ) +
When the random parameter ξ appears in the constraint, it cannot be directly substituted into constraint (26a). Therefore, it is necessary to consider the dual of problem ϑ ( x , ξ ) , where the random parameters are transferred into the objective function. Another problem arises, which is the coupling of variables between the dual variable q and variable Y. The constraint on the dual variable q confines it to a boxed region, as indicated by the constraint.
D u a l :
ϑ ( x , ξ ) = max q , p q T X F r e q T O N ξ ,
s . t . φ p q 0 ,
p 0 ,
Responding to constraint (26a), taking its extreme value points, each point corresponds to two corresponding semi-definite matrix constraints. We transformed (26a) into a clearer and more concise form.
r + ξ H ξ T 2 ξ T H μ 0 2 z T ξ ( 1 λ ) ϑ ( x , ξ ) + λ 1 α ( ϑ ( x , ξ ) v ) = 1 + λ α 1 α ϑ ( x , ξ ) λ v 1 α r + ξ H ξ T 2 ξ T H μ 0 2 z T ξ ( 1 λ ) ϑ ( x , ξ )
In the above constraints, we denote 1 + λ α 1 α as ϕ and transform them into the following two semi-definite matrix constraints.
H 1 2 ϕ q T H μ 0 z 1 2 ϕ q H μ 0 z T r ϕ q T X F r e q T O N + λ v 1 α 0 H 1 λ 2 q H μ 0 z 1 λ 2 q H μ 0 z T r 1 λ q T X F r e q T O N 0
The dual problem (26) can then be rewritten as follows:
min X , v , r , H , Z z z T z ^ h ( x ) + λ v + r + H , γ 2 μ 0 μ 0 T + Z , + z ^ γ 1 2 z T μ 0
s . t . X × O M = O N ,
X T × N u p L c a c h e ,
H 1 2 ϕ q T H μ 0 z 1 2 ϕ q H μ 0 z T r ϕ q T X F r e q T O N + λ v 1 α 0
H 1 λ 2 q H μ 0 z 1 λ 2 q H μ 0 z T r 1 λ q T X F r e q T O N 0
Z z z T z ^ 0 , H 0 , r R ,
x i j = { 0 , 1 } , v R ,

4.3. RADROO-MILP Algorithm

In this paper, the task offloading decision is an integer programming problem, and the additional computational resources requested from CDC follow linear programming, which makes our problem 19 a MILP problem. Hence, we used the branching implicit enumeration method to obtain the optimal offloading decision based on the uncertainty of computational resources and the minimum average cost.
In the above SDP problem, the X-matrix variables, 0-1 integer variables, the Y-vector variables, and continuous variables, are included. This makes the original problem a mixed-integer linear formulation, which poses a challenge in terms of direct solvability. To simplify the problem, we relax it by treating the discrete variable X as a continuous variable ranging from 0 to 1, i.e., 0 x i j 1 , x i j X .
In fact, the above SDP problem can be solved by using the SDPT3 solver through the CVX package in MATLAB. The original MILP problem then needs to be solved; here, we use the branching implicit enumeration method to solve it. This method is a specialized branch and bound technique for 0-1 integer problems, leveraging the fact that the variables can only take values of 0 or 1, allowing for branching for the purpose of hidden enumeration. Each task is divided into m sub-nodes, i.e., each task can only be offloaded to and completely offloaded on a single node.
Algorithm 1 presents the procedure for calculating the minimum cost of computation offloading. First of all, tasks should be sorted according to the number of CPU cycles they require, which determines the cost spent to a large degree. The solution to the relaxed LP problem is then obtained. Based on this solution, the implicit enumeration method is applied to solve the branching subproblem. During the branch and bound process, the two nodes with the highest values in the X i vector, representing the most probable nodes for offloading the current task, are selected at each iteration. The process involves constant branching, resulting in a gradually increasing lower bound, and constant delimitation, resulting in a gradually decreasing upper bound.
Algorithm 1 Cost-based MILP algorithms for the DRO task offloading problem.
  • Input: the convex probability distributional set M ξ , stochastic sample space F ξ , trade-off coefficient λ , confidence level α , ambiguous set parameters γ 1 and γ 2 ;
  • Output: offload decision X, optimal cost value to satisfy distribution robustness;
  • Solve the MILP formulation SDP problem with a confidence level of α , to obtain the optimal values of the continuous variables X and the optimal cost value;
  • for i from 0 to N 1  do
  •    Sort( N )
  •     [ o p t , X ] = max ( X i )
  •     [ x 1 i j , x 2 i j ] = m a x 2 ( X )
  •    if  S D P ( X , x i , j 1 = 1 ) S D P ( X , x i , j 2 = 1 )  then
  •       x i , j 1 = 1
  •       m i n _ c o s t [ i ] = S D P ( X , X i , j 1 = 1 )
  •    else
  •       x i , j 2 = 1
  •       m i n _ c o s t [ i ] = S D P ( X , X i , j 2 = 1 )
  •    end if
  • end for
  • if  m i n _ c o s t [ N 1 ] ! = N a N  then
  •     r e t u r n X , m i n _ c o s t [ N 1 ]
  • end if

4.4. Complexity Analysis

In Algorithm 1, a solver is used to solve the optimization problem. Here, the time complexity for solving the optimization problem is set to T, the number of unloading tasks is set to N, and the branch and bound method is used to traverse all unloading tasks. In the unloading target section, the process is simplified to selecting only the optimal two node locations using a cycle number. The time complexity of the proposed algorithm is O ( T N ) .

5. Performance Evaluation

In this section, we evaluate the performance and effectiveness under different parameters, analyze the results of the above-proposed algorithm under different risk confidence conditions, and compare them with the traditional algorithm to highlight its superiority.

5.1. Simulation Setup

We accomplished the simulation on a laptop with an AMD Ryzen 7 4800H with Radeon Graphics running at 2.90 GHz. The laptop had 16GB of RAM and was running on the Windows 10 operating system. We envision a SAGIN-Cloud system where the coverage of the space layer includes both the air layer and the entire MECN. The following parameters are randomly generated within a certain range, with mean values generated according to a normal distribution.
(1) 
Channel State Information (CSI)
For information transportation within ECNs, different frequency bands were borrowed between the different layers, resulting in different bandwidths and transmission speeds. Currently, the C-band is one of the most commonly used frequency bands for satellite operations, with the Ka-band being a latecomer. This paper assumes that the data transmission between BSs and UAVs occupies the C-band, while the Ka-band is occupied between UAVs and LEO satellites. The bandwidth of the C-band is 20 MHz, while the available bandwidth of the Ka-band can reach up to 3500 MHz. As for the signal frequency range, the C-band and Ka-band are 3.4–8 GHz and 26.5–36 GHz, respectively.
(2) 
ECNs Information
The horizontal and vertical coordinates of the BSs on the ground and the UAVs in the air are within 1 , 1 km, respectively, while vertically, they are all 0. In contrast, the UAVs are located at altitudes of (0.075, 0.15) km. LEO satellites are located in space and they are at distances of (780, 800) km from the Earth’s surface. LEO satellites are located in space and they are (780, 800) km away from the surface. They are not too space-constrained, so they are deployed in a square area with four points as vertices: (−200, −200), (−200, 200), (200, −200), and (200, 200).
BSs, UAVs, and LEO satellites possess CPU process speeds of 2 10 9 cycles/s, 3 10 8 cycles/s, and 5 10 9 cycles/s, respectively.
(3) 
Comparison Algorithm
First, we propose using the most basic comparison algorithm, namely the Brute-Force algorithm.
The Brute-Force algorithm does not take into account any uncertainty or potential computational overflow of tasks to the extent that it may eventually result in the inability to obtain an optimal solution.
Second, we compare two traditional algorithms that take parameter uncertainty into account: the RO algorithm and SO algorithm.
In RO, only the uncertainty of computational resources of ECNs is considered and their possible worst-case scenarios are experimentally selected to ensure their robustness.
In SO, the fuzzy set is constructed based on the historical data of the computational resources of the given ECNs; thus, we obtain their means and variances.
Third, there is another algorithm closest to our proposed one, which is the DRO algorithm; this is for obtaining the optimal solution.
In DRO [5], the mean value in the range of the uncertainty set is obtained, and its optimal robust result is obtained by the min–max theory, which guarantees both robustness and practicality. However, there is also a drawback, namely that it is an uncertainty set constructed from historical data, which does not guarantee the stability of the uncertainty set and does not consider its risk.
Finally, we propose the RaDROO algorithm, on the basis of the traditional DRO algorithm.
In RaDROO, in addition to what the DRO considers, it complements certain deficiencies that it possesses. It considers CVaR, choosing only the α t a i l part as the benchmark, while using λ as a weight with the original part. That is to say, it selectively aggravates the proportion of the worse part of the results within the final result in order to guarantee its risk resistance.

5.2. Experiments

5.2.1. RaDROO Algorithm

First, we observe the practical results of our proposed RaDROO algorithm in the context of addressing the optimization of offloading costs for edge network tasks. The optimal values of lambda in the range of (0, 1) are given as α of 0.5, 0.7, and 0.9, respectively. As illustrated in Figure 2, when lambda is 0, it means that CVaR is not considered, is weakened to a classical distribution robust problem, and the obtained results converge to a point. However, as λ increases, the risk consideration is reinforced step by step, further constraining the range of values provided within the uncertainty set. This results in a progressive increase in the amount to be spent, but at the same time, a more superior and stable optimal choice is obtained. At the same time, the larger the lambda, i.e., the larger the weight considering the CVaR value, the worse the optimal value of the required spend.
Second, observing the value of V gives a more intuitive view of the degree of consideration of risk in CVaR. As shown in Figure 3 and Figure 4, it is obvious that the value of V is larger when a higher alpha value is taken, i.e., when the worse part of the fuzzy set is used as a criterion; at the same time, this value is almost unaffected by the value of λ taken. However, with a fixed value of α , as the simultaneous uploading of tasks increases, the value of V for each experiment also increases gradually and steadily, which means that the value of CVaR also increases; that is, the risk is further considered as a way to ensure the authenticity and practicality of the whole system.

5.2.2. Comparison with Other Algorithms

For a comparison with other algorithms, some of the parameters of RaDROO are λ = 0.5 , α = 0.5 , γ 1 = 0 , γ 2 = 1 .
The comparison between algorithms takes the obtained target value as the evaluation criterion. Figure 5 shows the optimal cost results obtained by different algorithms at the same time as the number of tasks received increases. Figure 6 and Figure 7 present a comparison of the results obtained from the four algorithms at task volumes of 150 and 170. When the number of tasks is small, and only known allocatable resources are considered, all algorithms provide better results. As the total number of tasks that may be uploaded simultaneously rises, the Brute-Force algorithm fails to obtain an optimal solution because it does not take into account the lack of computational resources. In contrast, RO, SO, DRO, and RaDROO can obtain their optimal solutions, and the optimal cost obtained increases with the increasing number of tasks.
In the two observations with 150 and 170 tasks, we can clearly see from Figure 6 and Figure 7 that the cost results obtained by the RaDROO algorithm are slightly higher than those of the traditional DRO algorithm. Obviously, as the number of tasks gradually increases, the Brute-Force algorithm that fails to consider offloading the second-stage tasks to the cloud for computations can no longer produce solutions. At the same time, the results obtained by the RaDROO algorithm and the DRO algorithm are close to those of the SO algorithm, while significantly lower than those of the RO algorithm. The SO algorithm, as it calculates the average of the fuzzy sets, is capable of obtaining excellent results, but it may not align closely with real-world scenarios. On the other hand, the RaDROO algorithm considers various factors and still manages to achieve results that are close to those of the SO algorithm, demonstrating its superiority. This indicates that the RaDROO algorithm is still capable of achieving favorable results. By incorporating CVaR to enhance risk resistance, it generates superior outcomes even under uncertain computational resource conditions.
The RaDROO algorithm, although yielding better results, comes with a trade-off in terms of computational time, as shown in Figure 8. The time required to solve the RO, SO, and Brute-Force algorithms is relatively close and generally lower. The DRO algorithm derives the optimal two-stage mean using fuzzy sets within the framework of the min-max theory of robust algorithms. The RaDROO algorithm considers CVaR on top of this, which further increases the complexity of the algorithm and takes more time to solve the problem.
The results obtained clearly indicate that RaDROO yields superior outcomes compared to other algorithms. It is worth noting that there is a drawback in terms of the time delay associated with obtaining the offloading decisions. However, this issue can be effectively mitigated by enhancing the performance of the managed physical devices.
Overall, although RaDROO incurs a certain time cost, it strikes a balance between computational time and risk consideration by incorporating CVaR into the decision-making process. It achieves improved robustness compared to traditional methods, while maintaining competitive performance. By considering CVaR, RaDROO effectively manages the risks associated with uncertain factors and makes informed task offloading decisions within the SAGIN environment.

6. Conclusions

This paper focuses on the task offloading decision problem within the SAGIN framework, considering the instability of computational resources at each node, as well as the limited channel and storage resources of ECNs. Based on this problem, we propose the RaDROO algorithm, which enhances its risk resistance by incorporating CVaR while building upon the traditional DRO algorithm. In addition, we conducted simulation experiments in a simulated environment. The algorithm demonstrated better results compared to the traditional robust algorithm, achieved comparable results to the traditional DRO algorithm, and proved the effectiveness of the algorithm.
There are several directions in which we can extend this work in the future. First, the execution time of the RaDROO algorithm is a major problem that needs to be solved; it may be solved by optimizing the algorithm architecture and using a better model-solving method. Second, the task uploads are transient, and it is possible to consider the real-time task offloading decision problem within the SAGIN framework. Third, the value of lambda is freely variable, posing a challenge in selecting a rational value. Finally, this experiment only considers the uncertainty of computational resources. In real-world environments, the storage spaces of ECNs and CSI also have uncertainties, and the impacts of these uncertainties on the offloading decision are also worth considering.

Author Contributions

Model development, Z.L.; Paper writing, Z.L.; Proofreading, Z.L.; Model validation, P.C.; Simulation experiment validation, P.C.; Paper writing, P.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Natural Science Foundation of Jiangsu Province grant number BK20201415.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, Y.; Zhao, F.; Lu, Y.; Chen, X. Dynamic Task Offloading for Mobile Edge Computing with Hybrid Energy Supply. Tsinghua Sci. Technol. 2023, 28, 421–432. [Google Scholar] [CrossRef]
  2. Xu, Q.; Zhang, G.; Wang, J. Research on Cloud-Edge-End Collaborative Computing Offloading Strategy in the Internet of Vehicles Based on the M-TSA Algorithm. Sensors 2023, 23, 4682. [Google Scholar] [CrossRef]
  3. Liu, J.; Shi, Y.; Fadlullah, Z.M.; Kato, N. Space-air-ground integrated network: A survey. IEEE Commun. Surv. Tutorials 2018, 20, 2714–2741. [Google Scholar] [CrossRef]
  4. Qu, Y.; Dai, H.; Wu, F.; Lu, D.; Dong, C.; Tang, S.; Chen, G. Robust offloading scheduling for mobile edge computing. IEEE Trans. Mob. Comput. 2020, I, 2581–2595. [Google Scholar] [CrossRef]
  5. Chen, Y.; Ai, B.; Niu, Y.; Zhang, H.; Han, Z. Energy-constrained computation offloading in space-air-ground integrated networks using distributionally robust optimization. IEEE Trans. Veh. Technol. 2021, 70, 12113–12125. [Google Scholar] [CrossRef]
  6. Ma, W.; Mashayekhy, L. Quality-aware video offloading in mobile edge computing: A data-driven two-stage stochastic optimization. In Proceedings of the 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), Chicago, IL, USA, 5–10 September 2021; pp. 594–599. [Google Scholar]
  7. Chen, M.; Guo, S.; Liu, K.; Liao, X.; Xiao, B. Robust computation offloading and resource scheduling in cloudlet-based mobile cloud computing. IEEE Trans. Mob. Comput. 2020, 20, 2025–2040. [Google Scholar] [CrossRef]
  8. Wang, H.; Xu, H.; Huang, H.; Chen, M.; Chen, S. Robust task offloading in dynamic edge computing. IEEE Trans. Mob. Comput. 2021, 22, 500–514. [Google Scholar] [CrossRef]
  9. Wu, Z.; Li, B.; Fei, Z.; Zheng, Z.; Han, Z. Energy-efficient robust computation offloading for fog-iot systems. IEEE Trans. Veh. Technol. 2020, 69, 4417–4425. [Google Scholar] [CrossRef]
  10. Rahimian, H.; Mehrotra, S. Distributionally robust optimization: A review. arXiv 2019, arXiv:1908.05659. [Google Scholar]
  11. Ling, A.; Sun, J.; Xiu, N.; Yang, X. Robust two-stage stochastic linear optimization with risk aversion. Eur. J. Oper. Res. 2017, 256, 215–229. [Google Scholar] [CrossRef] [Green Version]
  12. Bai, Y.; Chen, L.; Song, L.; Xu, J. Risk-aware edge computation offloading using bayesian stackelberg game. IEEE Trans. Netw. Serv. Manag. 2020, 17, 1000–1012. [Google Scholar] [CrossRef]
  13. Maleki, E.F.; Mashayekhy, L.; Nabavinejad, S.M. Mobility-aware computation offloading in edge computing using machine learning. IEEE Trans. Mob. Comput. 2021, 22, 328–340. [Google Scholar] [CrossRef]
  14. Zhang, X.; Sun, W. Mean-cvar models for fuzzy portfolio selection. In Proceedings of the 2010 International Conference on Intelligent System Design and Engineering Application, Changsha, China, 13–14 October 2010; pp. 928–930. [Google Scholar]
  15. Schultz, R.; Neise, F. Algorithms for mean-risk stochastic integer programs in energy. In Proceedings of the 2006 IEEE Power Engineering Society General Meeting, Montreal, QC, Canada, 18–22 June 2006. [Google Scholar]
  16. Albuquerque, M.; Ayyagari, A.; Dorsett, M.A.; Foster, M.S. Global information grid (gig) edge network interface architecture. In Proceedings of the MILCOM 2007—IEEE Military Communications Conference, Orlando, FL, USA, 29–31 October 2007; pp. 1–7. [Google Scholar]
  17. Yu, S.; Gong, X.; Shi, Q.; Wang, X.; Chen, X. Ec-sagins: Edge-computing-enhanced space–air–ground-integrated networks for internet of vehicles. IEEE Internet Things J. 2021, 9, 5742–5754. [Google Scholar] [CrossRef]
  18. Yuan, Y.; Xu, X.; Sun, M.; Zhang, P. Terminal cooperative interdependent computing task offloading for 6g. IEEE Trans. Netw. Sci. Eng. 2022, 9, 2846–2856. [Google Scholar] [CrossRef]
  19. Yan, J.; Bi, S.; Zhang, Y.J.; Tao, M. Optimal task offloading and resource allocation in mobile-edge computing with inter-user task dependency. IEEE Trans. Wirel. Commun. 2019, 19, 235–250. [Google Scholar] [CrossRef] [Green Version]
  20. Yang, Y.; Chang, X.; Jia, Z.; Han, Z.; Han, Z. Towards 6g joint haps-mec-cloud 3c resource allocation for delay-aware computation offloading. In Proceedings of the 2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), Exeter, UK, 17–19 December 2020; pp. 175–182. [Google Scholar]
  21. Li, Z.; Peng, E. Software-defined optimal computation task scheduling in vehicular edge networking. Sensors 2021, 21, 955. [Google Scholar] [CrossRef] [PubMed]
  22. Xiao, Z.; Dai, X.; Jiang, H.; Wang, D.; Chen, H.; Yang, L.; Zeng, F. Vehicular task offloading via heat-aware mec cooperation using game-theoretic method. IEEE Internet Things J. 2019, 7, 2038–2052. [Google Scholar] [CrossRef]
  23. Dai, Y.; Xu, D.; Maharjan, S.; Zhang, Y. Joint load balancing and offloading in vehicular edge computing and networks. IEEE Internet Things J. 2018, 6, 4377–4387. [Google Scholar] [CrossRef]
  24. Chouhan, S. Energy optimal partial computation offloading framework for mobile devices in multi-access edge computing. In Proceedings of the 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 19–21 September 2019; pp. 1–6. [Google Scholar]
  25. Wang, F.; Xu, J.; Cui, S. Optimal energy allocation and task offloading policy for wireless powered mobile edge computing systems. IEEE Trans. Wirel. Commun. 2020, 19, 2443–2459. [Google Scholar] [CrossRef] [Green Version]
  26. Hmimz, Y.; Chanyour, T.; El Ghmary, M.; Malik, M.O.C. Energy efficient and devices priority aware computation offloading to a mobile edge computing server. In Proceedings of the 2019 5th International Conference on Optimization and Applications (ICOA), Kenitra, Morocco, 25–26 April 2019; pp. 1–6. [Google Scholar]
  27. Wang, Y.; Wu, L.; Yuan, X.; Liu, X.; Li, X. An energy-efficient and deadline-aware task offloading strategy based on channel constraint for mobile cloud workflows. IEEE Access 2019, 7, 69858–69872. [Google Scholar] [CrossRef]
  28. Ma, Z.; Zhang, S.; Chen, Z.; Han, T.; Qian, Z.; Xiao, M.; Chen, N.; Wu, J.; Lu, S. Towards revenue-driven multi-user online task offloading in edge computing. IEEE Trans. Parallel Distrib. Syst. 2021, 33, 1185–1198. [Google Scholar] [CrossRef]
  29. Wang, D.; Tian, X.; Cui, H.; Liu, Z. Reinforcement learning-based joint task offloading and migration schemes optimization in mobility-aware mec network. China Commun. 2020, 17, 31–44. [Google Scholar] [CrossRef]
  30. Samanta, A.; Chang, Z. Adaptive service offloading for revenue maximization in mobile edge computing with delay-constraint. IEEE Internet Things J. 2019, 6, 3864–3872. [Google Scholar] [CrossRef] [Green Version]
  31. Bi, J.; Zhang, K.; Yuan, H.; Hu, Q. Energy-aware task offloading with genetic particle swarm optimization in hybrid edge computing. In Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Melbourne, Australia, 17–20 October 2021; pp. 3194–3199. [Google Scholar]
  32. Li, S.; Ge, H.; Chen, X.; Liu, L.; Gong, H.; Tang, R. Computation offloading strategy for improved particle swarm optimization in mobile edge computing. In Proceedings of the 2021 IEEE 6th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA), Chengdu, China, 24–26 April 2021; pp. 375–381. [Google Scholar]
  33. Tout, H.; Mourad, A.; Kara, N.; Talhi, C. Multi-persona mobility: Joint cost-effective and resource-aware mobile-edge computation offloading. IEEE/ACM Trans. Netw. 2021, 29, 1408–1421. [Google Scholar] [CrossRef]
  34. Tang, F.; Kawamoto, Y.; Kato, N.; Liu, J. Future intelligent and secure vehicular network toward 6g: Machine-learning approaches. Proc. IEEE 2019, 108, 292–307. [Google Scholar] [CrossRef]
  35. Apostolopoulos, P.A.; Tsiropoulou, E.E.; Papavassiliou, S. Risk-aware data offloading in multi-server multi-access edge computing environment. IEEE/ACM Trans. Netw. 2020, 28, 1405–1418. [Google Scholar] [CrossRef]
  36. Pan, S.; Zhang, Z.; Xue, T.; Hu, G. Enhancing availability for the mec service: Cvar-based computation offloading. In Proceedings of the 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS), Hong Kong, China, 2–4 December 2020; pp. 342–347. [Google Scholar]
  37. Vatalaro, F.; Corazza, G.E.; Caini, C.; Ferrarelli, C. Analysis of leo, meo, and geo global mobile satellite systems in the presence of interference and fading. IEEE J. Sel. Areas Commun. 1995, 13, 291–300. [Google Scholar] [CrossRef]
  38. Qi, F.; Mang, G.; Zhang, S.; Liu, L. A multi-layer architecture for space-air-ground network and iot services. In Proceedings of the 2021 International Wireless Communications and Mobile Computing (IWCMC), 2021 International Wireless Communications and Mobile Computing (IWCMC), Harbin City, China, 28 June–2 July 2021; pp. 1809–1813. [Google Scholar]
  39. Delage, E.; Ye, Y. Distributionally robust optimization under moment uncertainty with application to data-driven problems. Oper. Res. 2010, 58, 595–612. [Google Scholar] [CrossRef] [Green Version]
Figure 1. SAGIN model.
Figure 1. SAGIN model.
Sensors 23 05729 g001
Figure 2. Expected costs under different α .
Figure 2. Expected costs under different α .
Sensors 23 05729 g002
Figure 3. V values under different α .
Figure 3. V values under different α .
Sensors 23 05729 g003
Figure 4. V values between 110 and 200 tasks.
Figure 4. V values between 110 and 200 tasks.
Sensors 23 05729 g004
Figure 5. Optimal costs of the compared algorithms between 110 tasks and 200 tasks.
Figure 5. Optimal costs of the compared algorithms between 110 tasks and 200 tasks.
Sensors 23 05729 g005
Figure 6. Optimal costs under 150 tasks.
Figure 6. Optimal costs under 150 tasks.
Sensors 23 05729 g006
Figure 7. Optimal costs under 170 tasks.
Figure 7. Optimal costs under 170 tasks.
Sensors 23 05729 g007
Figure 8. Execution time of each algorithm.
Figure 8. Execution time of each algorithm.
Sensors 23 05729 g008
Table 1. Technical methods comparison in the relevant literatures.
Table 1. Technical methods comparison in the relevant literatures.
LiteraturesGameMLROSODROMean Risk-AwareSAGIN
[12]
[4,7]
[13]
[11]
[6]
[14,15]
[5]
RaDROO
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, Z.; Chen, P. Risk-Aware Distributionally Robust Optimization for Mobile Edge Computation Task Offloading in the Space–Air–Ground Integrated Network. Sensors 2023, 23, 5729. https://doi.org/10.3390/s23125729

AMA Style

Li Z, Chen P. Risk-Aware Distributionally Robust Optimization for Mobile Edge Computation Task Offloading in the Space–Air–Ground Integrated Network. Sensors. 2023; 23(12):5729. https://doi.org/10.3390/s23125729

Chicago/Turabian Style

Li, Zhiyuan, and Pinrun Chen. 2023. "Risk-Aware Distributionally Robust Optimization for Mobile Edge Computation Task Offloading in the Space–Air–Ground Integrated Network" Sensors 23, no. 12: 5729. https://doi.org/10.3390/s23125729

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop