13
0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 1 Energy-Efficient Edge Computing Service Provisioning for Vehicular Networks: A Consensus ADMM Approach Zhenyu Zhou, Senior Member, IEEE, Junhao Feng, Zheng Chang, Senior Member, IEEE, Xuemin (Sherman) Shen, Fellow, IEEE, Abstract—In vehicular networks, in-vehicle user equipment (UE) with limited battery capacity can achieve opportunistic energy saving by offloading energy-hungry workloads to vehic- ular edge computing (VEC) nodes via vehicle-to-infrastructure (V2I) links. However, how to determine the optimal portion of workload to be offloaded based on the dynamic states of energy consumption and latency in local computing, data transmission, workload execution and handover, is still an open issue. In this paper, we study the energy-efficient workload offloading problem and propose a low-complexity distributed solution based on consensus alternating direction method of multipliers (ADMM). By incorporating a set of local variables for each UE, the original problem, in which the optimization variables of UEs are coupled together, is transformed into an equivalent general consensus problem with separable objectives and constraints. The consensus problem can be further decomposed into a bunch of subproblems, which are distributed across UEs and solved in parallel simultaneously. Finally, the proposed solution is validated based on a realistic road topology of Beijing, China. Simulation results have demonstrated that significant energy saving gain can be achieved by the proposed algorithm. Index Terms—vehicular edge computing, energy efficiency, workload offloading, consensus ADMM, vehicular networks. I. I NTRODUCTION A. Background and Motivation T HE rapid development of vehicular networks will spur an array of applications in the domains of travel assis- tance, self-driving, video streaming, and online gaming [1]– [4], which require enormous computation resources to process a large volume of workload data and have strict timeliness Manuscript received December 8, 2018; revised January 2, 2019; accepted February 21, 2019. Date of publication XXX XX, 2019; date of current version March 11, 2019. This work was partially supported by the National Natural Science Foundation of China (NSFC) under Grant Number 61601181; Funda- mental Research Funds for the Central Universities under Grant 2017MS001. (Corresponding author: Junhao Feng) Copyright c 2015 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to [email protected]. Z. Zhou and J. Feng are with the State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, China. (E-mail: zhenyu [email protected], junhao [email protected]). Z. Chang is with the Faculty of Information Technology, University of Jyv¨ askyl¨ a, FI-40014 Jyv¨ askyl¨ a, Finland. (E-mail: zheng.chang@jyu.fi). X. (S.) Shen is with the Department of Electrical and Com- puter Engineering, University of Waterloo, Ontario, Canada (e-mail: [email protected]). Part of this work was presented in the 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) at Barcelona, Spain. TABLE I NOMENCLATURE Valuables Definitions M Number of RSUs (VEC nodes) K Number of vehicles (in-vehicle UEs) θ k Workload data size of UE U k δ Required computation resource per workload η Required computation resource for result τ k The latency constraint of workload execution for UE U k p o k Workload offloading portion of UE U k λ k Average workload arrival rate of UE U k τ o k Dwell time of vehicle V k inside the coverage of RSU Rm d k Distance between the location of V k and the coverage edge of RSU Rm in the vehicle heading direction ¯ v k Average velocity of V k dm The coverage diameter of RSU Rm u l k Local computing capability of UE U k S l k Occupancy rate of CPU resources for UE U k T l k Local computing latency of UE U k β k Power consumption of local workload processing for U k E l k Energy consumption of local workload processing for U k λ e m Sum workload arrival rate of all UEs at VEC node Im E t k Energy consumption of in-vehicle UE U k T t k Workload transmission latency of UE U k T e m Average waiting latency of each workload T t m Average waiting latency of each computation result T h k Handover latency of UE U k E total k Total energy consumption of UE U k κ Time required to deliver the TPBU message T L2 Time required to deliver the L2 report T 0 k,P T Time required for the sMAG (nMAG) to send the data (T k,P T ) packets to the nMAG (RSU) ϕ Time required to deliver the HI message $ k Time for confirming the received profile and creating a new cache entry requirements [5], [6]. To support the delay-sensitive and multimedia-rich services in vehicular networks, vehicular edge computing (VEC), in which workloads are processed at the network edges to eliminate excessive network hops, has been proposed [7]. VEC not only reduces the computation response time, but also alleviates the traffic congestion problem in capacity-constrained backhaul links [8], [9]. Furthermore, VEC allows opportunistic energy saving for in-vehicle user equipments (UEs) with limited battery capacity such as smart phones and wearable devices. Traditionally, all

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 1

Energy-Efficient Edge Computing ServiceProvisioning for Vehicular Networks: A Consensus

ADMM ApproachZhenyu Zhou, Senior Member, IEEE, Junhao Feng, Zheng Chang, Senior Member, IEEE,

Xuemin (Sherman) Shen, Fellow, IEEE,

Abstract—In vehicular networks, in-vehicle user equipment(UE) with limited battery capacity can achieve opportunisticenergy saving by offloading energy-hungry workloads to vehic-ular edge computing (VEC) nodes via vehicle-to-infrastructure(V2I) links. However, how to determine the optimal portion ofworkload to be offloaded based on the dynamic states of energyconsumption and latency in local computing, data transmission,workload execution and handover, is still an open issue. In thispaper, we study the energy-efficient workload offloading problemand propose a low-complexity distributed solution based onconsensus alternating direction method of multipliers (ADMM).By incorporating a set of local variables for each UE, theoriginal problem, in which the optimization variables of UEsare coupled together, is transformed into an equivalent generalconsensus problem with separable objectives and constraints. Theconsensus problem can be further decomposed into a bunch ofsubproblems, which are distributed across UEs and solved inparallel simultaneously. Finally, the proposed solution is validatedbased on a realistic road topology of Beijing, China. Simulationresults have demonstrated that significant energy saving gain canbe achieved by the proposed algorithm.

Index Terms—vehicular edge computing, energy efficiency,workload offloading, consensus ADMM, vehicular networks.

I. INTRODUCTION

A. Background and Motivation

THE rapid development of vehicular networks will spuran array of applications in the domains of travel assis-

tance, self-driving, video streaming, and online gaming [1]–[4], which require enormous computation resources to processa large volume of workload data and have strict timeliness

Manuscript received December 8, 2018; revised January 2, 2019; acceptedFebruary 21, 2019. Date of publication XXX XX, 2019; date of current versionMarch 11, 2019. This work was partially supported by the National NaturalScience Foundation of China (NSFC) under Grant Number 61601181; Funda-mental Research Funds for the Central Universities under Grant 2017MS001.(Corresponding author: Junhao Feng)

Copyright c© 2015 IEEE. Personal use of this material is permitted.However, permission to use this material for any other purposes must beobtained from the IEEE by sending a request to [email protected].

Z. Zhou and J. Feng are with the State Key Laboratory of AlternateElectrical Power System with Renewable Energy Sources, School of Electricaland Electronic Engineering, North China Electric Power University, Beijing,China. (E-mail: zhenyu [email protected], junhao [email protected]).

Z. Chang is with the Faculty of Information Technology, University ofJyvaskyla, FI-40014 Jyvaskyla, Finland. (E-mail: [email protected]).

X. (S.) Shen is with the Department of Electrical and Com-puter Engineering, University of Waterloo, Ontario, Canada (e-mail:[email protected]).

Part of this work was presented in the 2018 IEEE Wireless Communicationsand Networking Conference Workshops (WCNCW) at Barcelona, Spain.

TABLE INOMENCLATURE

Valuables DefinitionsM Number of RSUs (VEC nodes)K Number of vehicles (in-vehicle UEs)θk Workload data size of UE Uk

δ Required computation resource per workloadη Required computation resource for resultτk The latency constraint of workload execution for UE Uk

pok Workload offloading portion of UE Uk

λk Average workload arrival rate of UE Uk

τok Dwell time of vehicle Vk inside the coverage of RSURm

dk Distance between the location of Vk and the coverageedge of RSU Rm in the vehicle heading direction

vk Average velocity of Vkdm The coverage diameter of RSU Rm

ulk Local computing capability of UE Uk

Slk Occupancy rate of CPU resources for UE Uk

T lk Local computing latency of UE Uk

βk Power consumption of local workload processing for Uk

Elk Energy consumption of local workload processing for Uk

λem Sum workload arrival rate of all UEs at VEC node ImEt

k Energy consumption of in-vehicle UE Uk

T tk Workload transmission latency of UE Uk

T em Average waiting latency of each workloadT tm Average waiting latency of each computation resultThk Handover latency of UE Uk

Etotalk Total energy consumption of UE Uk

κ Time required to deliver the TPBU messageTL2 Time required to deliver the L2 reportT

′k,PT Time required for the sMAG (nMAG) to send the data

(Tk,PT ) packets to the nMAG (RSU)ϕ Time required to deliver the HI message$k Time for confirming the received profile and creating

a new cache entry

requirements [5], [6]. To support the delay-sensitive andmultimedia-rich services in vehicular networks, vehicular edgecomputing (VEC), in which workloads are processed at thenetwork edges to eliminate excessive network hops, has beenproposed [7]. VEC not only reduces the computation responsetime, but also alleviates the traffic congestion problem incapacity-constrained backhaul links [8], [9].

Furthermore, VEC allows opportunistic energy saving forin-vehicle user equipments (UEs) with limited battery capacitysuch as smart phones and wearable devices. Traditionally, all

Page 2: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 2

of the workloads have to be processed locally on the UE,which dramatically reduces the battery endurance time andimpedes the service delivery reliability. With the assistanceof VEC, the energy-hungry workloads can be offloaded fromthe UE to nearby VEC nodes with higher computing capabilityand abundant energy supply via vehicle-to-infrastructure (V2I)links [10]. As a result, the energy expenditure of local com-puting is saved at the costs of increased latency caused byworkload offloading and the additional energy consumptionfor transmitting the computation workload [11].

There exist some works that have tried to improve energyefficiency of UEs via workload offloading [12]–[15]. You etal. studied resource allocation problems under the computationlatency constraint for MEC offloading systems in order tominimize the weighted sum energy consumption for mobileUEs [14]. In [15], Li et al. introduced MEC into virtualizedcellular networks with machine-to-machine communications,where each UE chooses to access virtual networks so asto minimize the energy consumption and execution time.However, some critical challenges have been neglected inprevious studies, which are summarized as follows.

First, workload offloading may not always lower energyconsumption due to communication costs. To minimize theenergy consumption, the tradeoff between energy saving ofworkload offloading and energy consumption of communi-cation should be optimized dynamically based on a numberof factors including channel conditions, workload attributes,vehicle velocity, computing capability, etc., which has not beenthoroughly analyzed from the perspective of energy efficiency[12]. Second, the offloading decisions of adjacent UEs areoften intertwined with each other via the constraint term ofVEC node’s computing capability, and the size of the jointoptimization problem grows rapidly with the number of UEs.Centralized optimization approaches proposed in [13] facessevere complexity and scalability problems. Last but not least,the intermittent connectivity between vehicles and road sideunits (RSUs) poses another critical challenge. A vehicle thathave moved out of the RSU coverage during workload datatransmission will result in frequent offloading failures, whichis not considered in previous works [12]–[15].

B. Contributions

In this paper, we investigate how to address the above chal-lenges by exploring consensus alternating direction methodof multipliers (ADMM), which is a powerful tool for solv-ing distributed convex optimization problems. It takes adecomposition-coordination procedure, in which the joint op-timization problem is firstly decomposed into several tractablesubproblems that can be solved in parallel, and then thesolutions of all the subproblems are coordinated to obtainthe global solution of the original problem [16]. The maincontributions of this work are summarized as follows.• We introduce queuing theory to derive the stochastic

traffic models at both UEs and VEC nodes with theconsideration of queue heterogeneity. By assuming thatthe generated workload follows a Poisson process andthe service time follows an exponential distribution, the

workload traffic models of the UE and the VEC nodecan be regarded as a M/M/1 queue and a M/M/cqueue, respectively. Then, the closed-form expressionsof computation latency and waiting latency are derivedbased on Little’s law and Erlang’s formula.

• An energy-efficient workload offloading problem is for-mulated to minimize the total energy consumption of allthe UEs, with the explicit considerations of the overallenergy consumption and latency, including local comput-ing latency and energy consumption, data transmissionlatency and energy consumption, waiting latency, andhandover latency. The formulated problem is NP-hard dueto the fractional form of the objective function and thatthe constraint term of VEC node computing capabilitycouples all the optimization variables.

• We propose a consensus ADMM-based distributed solu-tion, which has less signalling overhead, higher scalabilityand better flexibility compared to the conventional cen-tralized approach. First, the coupling among optimizationvariables is decoupled properly by incorporating a setof local variables, which represent the local copies ofthe same global variables at each UE. Then, the originalproblem with coupled variables is transformed into anequivalent general consensus problem with separable ob-jectives. Next, the transformed problem is further decom-posed into a bunch of subproblems, which are distributedacross UEs and solved in parallel.

• A real-world topology based simulation is conducted tovalidate the proposed algorithm. The relationships be-tween energy consumption and other key parameters, in-cluding workload offloading portion, transmission power,RSU coverage radius, and number of UEs are illustratedthrough numerical results.

The remaining parts of this paper are organized as follows.A review of related works is presented in Section II. SectionIII describes the system model. The problem formulation ispresented in Section IV. The consensus ADMM-based dis-tributed algorithm is proposed in Section V. Simulation resultsand related analysis are elaborated in Section VI. Conclusionsand future directions are summarized in Section VII.

II. RELATED WORKS

Mobile edge computing (MEC) is regarded as a promisingsolution to achieve the performance gain of proximate dataprocessing, short-range transmission, and location awareness[17]. There have been many works investigating MEC invehicular networks. Feng et al. proposed a VEC frameworknamed autonomous vehicular edge (AVE) to increase the com-putational capabilities of vehicles in a decentralized manner[7]. In [10], Zhang et al. designed an offloading scheme toimprove the transmission efficiency with considerations of thetask execution time and the vehicle mobility. In [18], Taleb etal. developed a cloud-based MEC offloading framework andproposed a predictive computation mode transfer scheme toimprove task transmission efficiency in vehicular networks.These works mainly focus on low-latency and high-reliabilitysystem design, and have not considered the energy savingproblems for in-vehicle UEs with limited battery capacity.

Page 3: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 3

There are many studies that investigate the energy efficiencyissue in edge computing through workload offloading andsystem resource allocation. In [12], the workload allocationbetween fog and cloud is optimized to minimize the systemenergy consumption under different service delay constraints.In [13], Mao et al. proposed an effective computation offload-ing strategy to construct a green MEC system with energyharvesting devices.

Nevertheless, the above-mentioned works mainly target onstatic cellular networks, and thus cannot be applied directlyfor vehicular networks with highly dynamic and unreliableconnections. Without considering the fast mobility of vehi-cles, conventional static decision-making schemes will re-sult in frequent offloading failures when the connectivitybetween vehicles and the RSU becomes unavailable beforethe workload data has been fully uploaded. Although thereexist some works which have applied MEC for vehicularnetworks [7], [10], [18], they mainly address the workloadoffloading problem from a delay minimization perspective, andhave not considered the energy efficiency issues of in-vehicleUEs with limited battery capacity. Their results cannot bedirectly utilized to solve the energy-efficient workload offload-ing problem investigated in this work. Moreover, most of theprevious solutions rely on a centralized optimization approach,the computing complexity of which increases significantlywith the number of UEs. It is better to address the problemfrom a distributed perspective considering the complexity andscalability issues. Therefore, there lacks a unified distributedsolution to address the energy saving problems for in-vehicleUEs with the considerations of vehicle mobility.

We next review the related studies about ADMM, whichis used to solve the formulation of the joint optimization inthis work. ADMM, which is known as a powerful tool forsolving distributed convex optimization problems [16], hasbeen widely applied in many aspects. Yin et al. considereda fog-assisted data streaming scenario [19], and proposeda hybrid ADMM (H-ADMM) method to solve the socialwelfare optimization problem and reduce the communicationoverhead. In [20], Vu et al. investigated the energy efficiencyoptimization problem of small-cell networks with multi-antenna transceivers and base stations. By using Charnes-Cooper’s transformation, the original optimization problemwas transformed into an equivalent convex program, and anADMM-based decentralized algorithm was presented to solvethe problem and achieve a fast convergence.

This work is an extension of our previous work [1]. Dif-ferent from the previous studies, we employ the consensusADMM approach to address the energy saving problem. Thedifferences between ADMM and the consensus ADMM aresummarized as follows. In ADMM, the primal variables areupdated in an alternating or sequential fashion, which can beregarded as a modified version of the conventional methodof multipliers based on the Gauss-Seidel approach [16]. Onthe other hand, the consensus ADMM employs a series oflocal variables, based on which the primal variables no longerneed to be updated sequentially. Instead, the coupled objectivesand constraints of the joint optimization problem can beseparated and distributed across UEs, where each UE only

Fig. 1. The three-layer hierarchical architecture of VEC.

has to deal with its own objective and constraint term. Inother words, the consensus ADMM is actually the extensionof ADMM for solving the consensus problems, which aimsto achieve a consensus between the local variables and theglobal variables in a dynamically changing environment [21].Hence, the consensus ADMM approach not only reduces theamount of information that needs to be exchanged, but alsoenables parallel decision making [22]. This is of significantimportance for vehicular networks with fast mobility, capacity-constrained communication links, and strict timeliness require-ments. Convergence to the global solution is guaranteed aslong as the convergence requirements can be satisfied [23].Furthermore, a more realistic handover model based on theIFP-NEMO is utilized, which takes into account both thelink reestablishment and the data forwarding latency. Last butnot least, we provide a comprehensive analysis regarding theconvergence and complexity properties. We also validate theproposed scheme by using a real-world road topology.

III. SYSTEM MODEL

In this section, we elaborate the overall system modelof VEC, the data transmission model, and the computationworkload offloading model in details.

A. The Overall System Model

The hierarchical computing framework for vehicular net-works is shown in Fig. 1, which is composed of three layers,i.e., the control layer, the VEC server layer, and the vehicularnetwork layer. In the control layer, a centralized controller isresponsible for the inter-cell resource coordination and han-dover management [24]. To maintain Internet connectivity formoving vehicles, the improved fast proxy mobile IPv6 basednetwork mobility basic support (IFP-NEMO) mechanism isadopted [25]. In IFP-NEMO, the mobility management ofvehicles is performed by a mobile access gateway (MAG),which acts as a proxy mobility agent. In the distributedVEC server layer, M RSUs are deployed uniformly along anunidirectional lane and connected to the MAGs via Ethernet

Page 4: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 4

connections. For each RSU, there exists a co-located VECnode with c homogeneous servers. The m-th RSU and the co-located VEC node are denoted as Rm and Im, respectively.

In the vehicular network layer, we can divide the road intocorresponding M segments based on the coverage areas ofM RSUs, e.g., segment m corresponds to the coverage ofRSU Rm. We assume that there exist K vehicles in the m-th segment traveling towards the same direction, which isshown in Fig. 1. The k-th vehicle is denoted as Vk. Thecommunication device mounted on each vehicle has two-folded functions. On the one hand, it allows the vehicle totransmit data to the RSU and offload workloads to the VECnode via dedicated V2I links. On the other hand, it acts asan access point and provides free connections for in-vehicleUEs via short-range communication technologies such as Wi-Fi [26]. The UE inside vehicle Vk is denoted as Uk. The setof in-vehicle UEs is defined as U = {U1, · · · , Uk, · · · , UK}.

For any UE Uk ∈ U , an array of applications are executed,which accordingly generate a series of computation workloads.Without loss of generality, the workload generated at UE Ukis assumed to follow a Poisson process with an average arrivalrate λk [27]–[29], which can be either processed locally bythe UE itself or offloaded to VEC node Im. The key attributesof the workloads generated by UE Uk can be described bya triplet {θk, δk, τk}, where θk represents the data size ofworkloads, δk is the required computation resource for pro-cessing the workloads, and τk represents the delay constraint.We assume that each workload has the same computationcomplexity, which is defined as δ. This assumption is validsince a higher complexity workload is equivalent to severalseveral basic workloads with the same computation complex-ity. Thus, we have δk = δλk. By further assuming that theservice time follows an exponential distribution, the workloadtraffic models of UE Uk and VEC node Im can be regardedas a M/M/1 queue and a M/M/c queue, respectively.

The workload offloading and execution are implemented asthe following three steps: (i.) each UE Uk ∈ U determines theportion of workload offloaded to VEC node Im, i.e., 0 ≤ pok ≤1, and transmits the workload related data to RSU Rm; (ii.)the offloaded workload is processed at the VEC node; (iii.)the obtained computation results are fed back to UE Uk.

Remark 1. In this work, we only consider the simplifiedsingle-segment case in order to derive a tractable solution.The more complicated multi-segment case is beyond thescope of this paper and will be investigated in future works.Nevertheless, the proposed solution can be easily extendedto the multi-segment scenario by adopting a time-slot model.That is, the number of vehicles in each segment remainsconstant within a slot and varies across different slots. Hence,the proposed solution can be applied for the optimizationof workload offloading within each segment in a slot-by-slotfashion.

Remark 2. A justification for the M/M/1 and M/M/cqueuing models is that the same traffic and service time modelshave been adopted in a number of previous works such as[27]–[29]. Moreover, the solution structure does not dependon the specific traffic models. The proposed solution can beextended to other traffic models.

B. The Transmission Model

We assume that each vehicle is allocated with an orthogonalspectrum resource block so that the co-channel interferenceamong vehicles can be ignored. In the offloading mode, dataare actually transmitted from UE Uk to RSU Rm in a two-hopfashion, i.e., data are firstly sent from UE Uk to vehicle Vkin the first hop, and then are forwarded from vehicle Vk toRSU Rm in the second hop. The signal to noise ratio (SNR)expressions of the first-hop link and the second-hop link arecalculated as

γUk =PUk g

Uk

N0, (1)

γVk =PVk g

Vk

N0, (2)

where PUk and PVk are the transmission power of UE Ukand vehicle Vk, respectively. gUk and gVk are the channel gainbetween Uk and Vk, and the channel gain between Vk andRSU Rm, respectively. N0 is the additive white Gaussian noise(AWGN).

The effective SNR of the two-hop link, i.e., (Uk → Vk →RSU Rm) [30], is expressed as

γk =γUk γ

Vk

γUk + γVk + 1. (3)

Hence, the transmission time required by UE Uk for upload-ing workload data with size pokθk, i.e., T tk, can be obtained as

T tk(pok) =pokθk

Bk log2 (1 + γk), (4)

where Bk refers to the channel bandwidth.Due to the fast vehicle mobility, vehicle Vk might move

out of the communication range of RSU Rm during datatransmission, which results in an offloading failure. Denotethe dwell time of Vk inside the coverage of RSU Rm as τok .An offloading failure occurs if τok < T tk. Therefore, τok alsorepresents the delay constraint of data transmission becauseVk can only transmit data to RSU Rm when it remains withinsegment m. That is, an offloading request is admissible if andonly if T tk ≤ τok . τok can be calculated as

τok = dk/vk, (5)

where dk denotes the distance between the location of Vk andthe coverage edge of RSU Rm in the vehicle heading direction,and vk denotes the average velocity of Vk within segment m.

Remark 3. Both dk and vk can be estimated from the GPSdata [31], which are generally available for latest vehicles. Forexample, if Vk moves in the centrifugal direction to leave thecoverage area of RSU Rm with radius dm, dk is calculated asdk = dm − dk,m, where dk,m is the distance between Vk andRSU Rm. Otherwise, if Vk moves in the centripetal direction,we have dk = dm + dk,m.

The energy consumed for transmitting the workload data tothe in-vehicle access point is calculated as

Etk(pok) = PUk Ttk(pok) =

PUk pokθk

Bk log2 (1 + γk). (6)

Page 5: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 5

C. The Computation-Offloading Model

Based on the Poisson splitting property [32], if the workloadof UE Uk follows a Poisson process with an average rate λk,then the workload that is processed locally on UE Uk follows aPoisson process with an average rate (1−pok)λk. Furthermore,the workload offloaded from UE Uk to VEC node Im alsofollows a Poisson process with an average rate pokλk. Next,by using Little’s law, the local computing latency T lk of UEUk is calculated as

T lk(pok) =1

ulk

δ (1− Slk)− λk(1− pok), (7)

where ulk is the local computing capability of UE Uk. Slkdenotes the normalized workload of other on-going applica-tions, which reflects the occupancy rate of CPU resources, i.e.,0 ≤ Slk ≤ 1. For example, Slk = 1 represents that the CPU iscompletely occupied by other applications.

The energy consumption of local workload execution isgiven by

Elk(pok) = βkTlk(pok) =

βkulk

δ (1− Slk)− λk(1− pok), (8)

where βk represents the local power consumption per unitworkload execution.

The energy consumption of UE Uk, which contains theenergy consumed for local workload execution and workloaddata uploading, is expressed as

Etotalk (pok) = Elk(pok) + Etk(pok). (9)

Taking (6) and (8) into (9), the expression of Etotalk (pok) iswritten as (10).

Remark 4. ulk, βk and Slk depend on the intrinsic nature ofCPU, workload complexity, and other ongoing applications.To simplify the problem, the values of ulk, βk and Slk areassumed as constants during the decision making process, andmay vary across different decision making processes. It isnoted that the values of ulk, βk and Slk are privacy informationof UE Uk, which are generally unknown for VEC nodeIm. Hence, conventional centralized optimization algorithmswhich require perfect knowledge of UE’s private informationcannot be directly applied.

Due to the limited computation resources, the VEC nodecannot execute a massive number of workloads simultane-ously. In VEC node Im, the workloads offloaded from dif-ferent UEs are pooled together and wait to be processed byVEC servers. Since the combination of independent Poissonprocesses is also Poisson [32], the sum rate λem is calculatedas

λem =∑Uk∈U

pokλk. (11)

Considering the c homogeneous servers deployed in VECnode Im, the computing capability of each server is definedas uem. Based on the M/M/c queuing model and Erlang’s

formula [33], the average waiting latency of each workload atVEC node Im can be calculated as

T em(pok) =ϕ(c, ρem)cue

m

δ − λem+

δ

uem, (12)

where ρem is the server occupancy, and ϕ(c, ρem) is the ErlangC formula which represents the waiting probability. ρem andϕ(c, ρem) are calculated as

ρem =λemδ

cuem, (13)

ϕ(c, ρem) =

(cρem)c

c!(1−ρem)∑c−1l=0

(cρem)l

l! +(cρem)c

c!(1−ρem)

. (14)

In RSU Rm, the computation results also have to wait in aqueue before they can be processed and delivered back to UEUk. Hence, the average waiting latency of each computationresult at RSU Rm, i. e. , T tm(pok), can be expressed as

T tm(pok) =1

utm

η − λem, (15)

where utm denotes the transmission processing rate of RSURm, and η denotes the computation resouce required toprocess each result. The transmission latency from RSU Rmto Uk is ignored, due to the fact that the size of computationresults is usually negligible compared to that of the input data.

If vehicle Vk has already moved out of the coverage ofRSU Rm when the results are ready for transmission, i.e., ahandover occurs when T tk + T em + T tm > τok , then the resultshave to be forwarded firstly from the serving MAG (sMAG) tothe centralized controller, and then sent from the centralizedcontroller to the next MAG (nMAG) with which Vk will beattached. The handover process of the IFP-NEMO is carriedout from two perspectives in parallel: link reestablishment anddata forwarding [25]. The procedure of link reestablishmentis illustrated as follows.• Step 1: The previous wireless layer 2 (L2) link betweenRm and VK is disconnected, which requires a time ofToff .

• Step 2: A new L2 link between RSU Rm′ (Rm′ 6= Rm),with which Vk is reconnected, and Vk is established,which takes a time of Ton.

Hence, the total latency of link reestablishment is calculatedas

Tk,link = Toff + Ton. (16)

The procedure of data forwarding is illustrated as follows:• Step 1: The predictive mode of IFP-NEMO is activated

when Vk sends a L2 report to the sMAG. The timerequired to deliver the L2 report is denoted as tL2.

• Step 2: Upon receiving the L2 report, the sMAG sendsa handover initiate (HI) message to the nMAG, whichcontains a number of key information including vehicleID, home network prefix, mobile network prefix, and cen-tralized controller address. The time required to deliverthe HI message is denoted as ϕ.

Page 6: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 6

Etotalk (pok) =βk

ulk

δ

(1− Slk

)− λk

(1− pok

) + PUk Ttk(pok) =

Fk,1(pok)︷ ︸︸ ︷

βkBk log2(1 + γk) + PUk pokθk

[ulkδ

(1− Slk

)− λk

(1− pok

)][ulkδ

(1− Slk

)− λk

(1− pok

)]Bk log2(1 + γk)︸ ︷︷ ︸

Fk,2(pok)

. (10)

• Step 3: Upon receiving the HI message, the nMAGconfirms the received profile of Vk and creates a newcache entry, which takes a time of $k.

• Step 4: The nMAG sends a tentative proxy bindingupdate (TPBU) message to the centralized controller. Thetime required to deliver the TPBU message is denoted asκ.

• Step 5: The centralized controller confirms the receivedprofile of Vk and creates a new cache entry, which takesa time of $k.

• Step 6: The sMAG sends the data packets to the nMAGvia the centralized controller, which takes a time ofT

k,PT .The total time required for data forwarding is calculated as

Tk,data = TL2 + ϕ+ 2$k + κ+ T′

k,PT . (17)

Once both the link reestablishment and the data forwardingprocesses are completed, the nMAG sends the data packet toRSU Rm′ (Rm′ 6= Rm), which takes a time of Tk,PT . Thehandover latency Thk is defined as the total duration duringwhich Vk cannot send or receive any data packet due to eitherlink reestablishment latency or data forwarding latency. Tocalculate the handover latency, the following four cases areconsidered, which are shown in Fig. 2.• Case A (TL2 + ϕ + 2$k + κ > Toff and Tk,data >Tk,link): If Tk,data > Tk,link, the link reestablishmentprocess is finished earlier than the data forwarding pro-cess. Therefore, the data can be directly sent to Vkfrom the nMAG without buffering. Furthermore, sinceTL2 +ϕ+ 2$k +κ > Toff , the handover latency shouldbe calculated from the moment that the previous L2 linkhas been disconnected, which is given by

Thk,A = TL2 + ϕ+ 2$k + κ− Toff + T′

k,PT + Tk,PT .(18)

• Case B (TL2 + ϕ + 2$k + κ < Toff and Tk,data >Tk,link): In this case, the sMAG starts to transfer datato the nMAG even though the L2 link has not been dis-connected. Therefore, the handover latency is calculatedfrom the moment when the sMAG starts to transfer datapackets to the nMAG. Thk is calculated as

Thk,B = T′

k,PT + Tk,PT . (19)

• Case C (TL2 + ϕ + 2$k + κ > Toff and Tk,data <Tk,link): Since Tk,data < Tk,link, Vk has not reconnectedwith the nMAG when the data forwarding process is

completed, and the delivered data have to be bufferedin nMAG. Thk is calculated as

Thk,C = Ton + Tk,PT . (20)

• Case D (TL2 + ϕ + 2$k + κ < Toff and Tk,data <Tk,link): This case is similar to case B. The only differ-ence is that the data forwarding process is finished earlier,and the nMAG has to wait for the link reestablishmentprocess to be finished. Therefore, Thk is calculated as

Thk,D = Toff − (TL2 + ϕ+ 2$k + κ) + Ton + Tk,PT .(21)

A robust approach is to consider the worst-case scenario,i.e., Thk = max{Thk,A, Thk,B , Thk,C , Thk,D}. Hence, the latencycaused by workload offloading is the sum of the workloadtransmission latency, the waiting latency at VEC node Im, theremote workload execution latency, the waiting latency at RSURm, and the handover latency, which is given by

T ok (pok) = T tk(pok) + T em(pok) + T tm(pok) + Thk (pok). (22)

IV. PROBLEM FORMULATION

The objective is to minimize the total energy consumptionof K UEs within the coverage of RSU Rm. The formulatedenergy-efficient workload offloading problem is given as fol-lows:

P1 : min{pok}

∑Uk∈U

Etotalk (pok)

s.t. C1 : λk(1− pok) ≤ ulkδ

(1− Slk),∀Uk ∈ U ,

C2 :∑Uk∈U

pokλk ≤cuemδ,

C3 : T tk ≤ τok ,∀Uk ∈ U ,C4 : T lk ≤ τk,∀Uk ∈ U ,C5 : T ok ≤ τk,∀Uk ∈ U ,C6 : pok ∈ [0, 1],∀Uk ∈ U . (23)

Here, C1 and C2 represent the computing capability con-straints, i.e., the workload arrival rates λk(1 − pok) and∑Uk∈U pok should not exceed the processing rate at UE Uk

and VEC node Im, respectively. C3 denotes latency constraintof data transmission. C4 and C5 denote the latency constraintsof local and remote workload executions, respectively. C6 isthe boundary constraint of pok.

It is infeasible to find a polynomial-time solution for P1due to the following two reasons. First, the objective function

Page 7: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 7

Fig. 2. Illustration of four handover cases.

is not convex. Second, the optimization variables of K UEsare coupled through the term C2. Furthermore, it is notedthat the problem size of P1 grows enormously fast withthe number of UEs. Therefore, it is difficult to solve P1via centralized solutions because the VEC node or the RSUhas to collect every detailed piece of information from all ofUEs. This might be infeasible for practical implementationconsidering the communication overhead constraint and thethreat of privacy leakage. Hence, we aim at addressing P1 ina distributed manner.

V. CONSENSUS ADMM-BASED ENERGY-EFFICIENTWORKLOAD OFFLOADING

In this section, we introduce an energy-efficient distributedsolution based on consensus ADMM. First, we provide abrief introduction to consensus ADMM for the readers’ betterunderstanding. Then, we introduce the problem transformationwhich is a prerequisite for applying consensus ADMM. Next,the implementation procedures of the proposed distributedsolution are elaborated. Finally, we analyze the convergenceand complexity properties.

A. Introduction to Consensus ADMM

Generally, ADMM is suitable to solve the problems withthe following forms [23]:

P1 : minx,y

f(x) + g(y)

s.t. Ax + By = c, (24)

where x ∈ Rq1×1, y ∈ Rq2×1, A ∈ Rq3×q1 , B ∈ Rq3×q2 , andc ∈ Rq3×1. The augmented Lagrangian of (24) is given by

Lρ(x, y,µ)

= f(x) + g(y) + µT (Ax + By− c) +ρ

2‖ Ax + By− c ‖22,

(25)

where ρ ∈ R++ denotes the penalty parameter in the aug-mented Lagrangian, which is used to increase the speed ofconvergence in ADMM [27]. ρ can be adjusted by using theself-adaptive approach [16]. µ denotes the vector of Lagrangemultipliers.

The problem (24) can be solved via the following iterations:

x[t+ 1] = arg minxLρ(x, y[t],µ[t]), (26)

y[t+ 1] = arg minyLρ(x[t+ 1], y,µ[t]), (27)

µ[t+ 1] = µ[t] + ρ(Ax[t+ 1] + By[t+ 1]− c), (28)

where t is the index of iteration.Next, we consider a global consensus problem with a global

variable vector z, i.e., z ∈ Rq1×1, and several local variablevectors xi, i.e., xi ∈ Rq1×1, i = 1, · · · , N , which is formulatedas [22]:

minxi

N∑i=1

fi(xi)

s.t. xi − z = 0, i = 1, . . . , N. (29)

The consensus constraint guarantees that all of the local vari-ables should be equal to the global variable. The augmentedLagrangian corresponding to (29) is given by

Lρ(x1, . . . , xN ,µ, z)

=N∑i

fi(xi) + (µi)T (xi − z) +

ρ

2‖ xi − z ‖22 (30)

The resulting iterations are given given by

xi[t+ 1] = arg minxi

{fi(xi) + (µi[t])

T (xi − z[t])

2‖ xi − z[t] ‖22

}(31)

Page 8: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 8

z[t+ 1] = arg minz

I∑i

{(µi[t])

T (−z)

2‖ xi[t+ 1]− z ‖22

}(32)

µi[t+ 1] = µi[t] + ρ(xi[t+ 1]− z[t+ 1]). (33)

Remark 5. It is noted that the x-minimization and y-minimization steps in (26) and (27) are carried out in asequential fashion, while the xi-minimization in (31) is carriedout in parallel for each i = 1, · · · , N .

B. Problem Transformation

To apply ADMM, we have to transform problem P1 into atractable form. First, the original problem with a fractional-form is transformed to a new problem with a subtractive-form objective function. Second, the problem with coupledvariables is further transformed to a decomposable problemwith separable objectives and decoupled variables. The detailsare illustrated as follows.

1) Nonlinear Fractional Programming: It can be observedfrom (10) that Etotalk (pok) is a fractional-form function. Hence,we can employ nonlinear fractional programming to transformthe original problem in the fractional form into an equivalentproblem in the subtractive form.

Let us define the numerator and denominator of (10) asFk,1(pok) and Fk,2(pok), respectively. Denote ψ∗k as the maxi-mum value of Etotalk (pok), which is expressed as

ψ∗k = min{pok}

Etotalk (pok) (34)

= min{pok}

Fk,1(pok)

Fk,2(pok)=Fk,1(po∗k )

Fk,2(po∗k ),

where po∗k denotes the global optimal solution for UE Uk.Based on nonlinear fractional programming [34], we have thefollowing property:

Theorem 1: ψ∗k is achieved if and only if

min{pok}

(Fk,1(pok)− ψ∗kFk,2(pok)

)=Fk,1(po∗k )− ψ∗kFk,2(po∗k ) = 0. (35)

Proof: The detailed proof is omitted due to space limita-tion. A similar proof can be found in our previous work [35].

Theorem 1 indicates the necessary and sufficient conditionsto obtain ψ∗k. Accordingly, po∗k can be obtained by solving thefollowing transformed problem:

P2 : min{pok}

∑Uk∈U

(Fk,1(pok)− ψ∗kFk,2(pok)

)s.t. C1 ∼ C6. (36)

Remark 6. It can be easily proved that the objective of P2is convex with regards to pok by calculating the correspondingsecond derivative.

However, the specific value of ψ∗k required to solve P2 isstill unavailable. To obtain ψ∗k, the iterative Dinkelbach methodcan be used [34]. Denote the iteration index as n and the initial

value of ψk as a small positive number. At the n-th iteration,pok[n] is derived by using ψk[n] obtained from the (n− 1)-thiteration, which is given by

P3 : min{pok[n]}∑Uk∈U

(Fk,1(pok[n])− ψk[n]Fk,2(pok[n])

)s.t. C1 ∼ C6. (37)

How to solve P3 is provided in Subsection V-C. Then, uponobtaining pok[n], ψk[n+ 1] is updated as

ψk[n+ 1] =Fk,1(pok[n])

Fk,2(pok[n]). (38)

The iteration process will stop if

Fk,1(pok[n])− ψk[n]Fk,2(pok[n]) < ε, (39)

where ε represents the stopping criteria. The above imple-mentation procedures are summarized as the outer loop ofAlgorithm 1.

2) Consensus Problem Formulation: At each iteration n,problem P3 has to be solved with a given ψk[n]. However,the objectives in P3 are not separable because the work-load offloading variables of K UEs are coupled through theconstraint term C2. To provide a distributed solution, localcopies of the global optimization variables are introduced totransform P3 into a general consensus problem. Specifically,defining the vector of global optimization variables as po ={po1, · · · , pok, · · · , poK}, the local copy of the global vector po

at UE Uk is denoted as pok = {po,k1 , · · · , po,kk , · · · , po,kK }. Forinstance, the local copy of the global variable pok−1 (i.e., theoffloading strategy of UE Uk−1) at UE Uk is po,kk−1.

Furthermore, we define the feasibility set of the localoptimization variables for UE Uk as ωk, which is given by

ωk = {pok|C1 ∼ C6} . (40)

We define the local objective function associated with thefeasibility set ωk as χk. If po,kk ∈ ωk, i.e., the solution isfeasible, then χk is equivalent to its global counterpart, i.e.,

χk(po,kk ) = Fk,1(pok)− ψkFk,2(pok). (41)

Otherwise, if the constraints cannot be satisfied, χk(po,kk ) =∞.

Therefore, the general consensus problem corresponding toP3 is given by

P4 : min{po

k}

∑Uk∈U

χk(po,kk )

s.t. C7 : pok = po,∀Uk ∈ U , (42)

where C7 denotes the consensus constraint, i.e., the localvariables duplicated at different UEs should be equal to theglobal variables.

Remark 7. C7 guarantees that P3 and P4 are equivalent.

Page 9: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 9

C. Consensus ADMM-based Distributed Solution

In this subsection, the proposed consensus ADMM-basedsolution is elaborated in details. Let Λ be the K×K matrix ofthe Lagrange multipliers corresponding to the consensus con-straint C7 in P4. Λ is given by Λ = [µ1, · · · ,µk, · · · ,µK ],where µk is a K × 1 vector.

The augmented Lagrangian for P4 is expressed as

L({pok},Λ) (43)

=∑Uk∈U

χk(po,kk ) +∑Uk∈U

µTk (pok − po)

2

∑Uk∈U

‖ pok − po ‖22 .

The resulting iterations of updating local variables, globalvariables, and Lagrange multipliers are given in (44), (45),and (46), respectively.

Remark 8. From (44), it is clear that the optimization ofpok is carried out independently for each UE. As a result, P4can be decomposed into a set of subproblems, which are dis-tributed across UEs and solved in parallel. The correspondingoptimization objective for Uk is exactly χk.

Based on the above analysis, the energy-efficient workloadoffloading algorithm based on consensus ADMM is summa-rized as Algorithm 1. It consists of two loops. The outerloop represents the iterations to solve the nonlinear fractionalprogramming problem, and the corresponding iteration indexis n. The inner loop represents the iterations for updatingthe primal and dual variables, and the corresponding iterationindex is defined as t. In iteration n of the outer loop, givenψk[n], the primal and dual variables are updated sequentiallyto find the optimal workload offloading strategy, which areelaborated as follows:

1) {pok} update : In iteration t of the inner loop, theoptimization of pok[t+1] is carried out by using (44). It isnoted that (44) is actually a quadratic programming (QP)problem [16], which can be easily solved by existing QPsolvers.

2) {po,µk} update : Compared with {pok} update, theoptimization of po[t+1] and µk[t+1] can be carried outmore easily due to the nature of un-constrained quadraticoptimization. The specific updating processes of pok[t+1]and µk[t+ 1] are shown in (45) and (46), respectively.

3) Termination criteria of the inner iteration: The inneriteration stops

‖ rk[t+ 1] ‖22 =‖ pok[t+ 1]− Po[t+ 1] ‖22≤ εpri,∀Uk ∈ U , (47)

‖ s[t+ 1] ‖22 = ρ ‖ Po[t+ 1]−Po[t] ‖22≤ εdual.(48)

where rk and s denote the primal residual and the dualresidual, respectively. εpri and εdual denote the thresh-olds for rk and s, respectively. Moreover, as proved inSubsection V-D, the primal and dual update iterationsin consensus ADMM satisfy objective convergence,residual convergence and dual variable convergence ast→∞.

Algorithm 1 Consensus ADMM-based Workload OffloadingOptimization Algorithm

1: for k = 1, 2, · · · ,K do2: Initialize: n, t, pok, ψk, εpri, εdual, and ε.3: Convergence = False;4: while Convergence = False do5: while ‖ rk[t] ‖22> εpri and ‖ s[t] ‖22> εdual do6: Update pok[t + 1], k = 1, . . . ,K, concurrently via

(44);7: Update po[t+ 1] via (45);8: Update µk[t+ 1] via (46);9: Calculate

10: ‖ rk[t+ 1] ‖22=‖ pok[t+ 1]− Po[t+ 1] ‖22;11: ‖ s[t+ 1] ‖22= ρ ‖ Po[t+ 1]−Po[t] ‖22;12: Update t→ t+ 1;13: end while14: Update pok[t]→ pok[n];15: if Fk,1

(pok[n]

)− ψk[n]Fk,2

(pok[n]

)> ε then

16: ψk[n+ 1] = Fk,1(pok[n]

)/Fk,2

(pok[n]

)17: Convergence = False18: else19: Convergence = True20: end if21: Update n→ n+ 1;22: end while23: Set {po∗k } = {pok[n]};24: Calculate ψ∗k by (34);25: output: po∗k , and ψ∗k.26: end for

4) Termination criteria of the outer iteration: When iter-ation n terminates, pok[n] is used to update ψk[n + 1]for the [n+ 1]-th iteration as (38). The stopping criteriaof the outer loop is given in (39). In the final iterationof outer loop, the obtained workload offloading strategyconverges to the optimal strategies, i.e., po∗k . ψ∗k iscalculated by using po∗k as (34).

D. Property Analysis

In this subsection, we analyze the convergence and com-plexity of the proposed algorithm.

1) Convergence of the Inner Iteration: The objective func-tion of P4 is closed, proper, and convex, and the correspond-ing epigraph is a closed nonempty convex set. Furthermore,the Lagrangian L({pok},Λ) has a saddle point. Thus, basedon [16], the inner iteration satisfies residual convergence,objective convergence and dual variable convergence, whichis shown as below.• Residual convergence:∑

Uk∈U(pok[t]− po[t])→ 0, t→∞, (49)

which indicates that the iterations approach feasibility.• Objective convergence:∑

Uk∈Uχk(po,kk [t, n])→

∑Uk∈U

ψ∗k[n], t→∞, (50)

Page 10: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 10

{pok[t+ 1]} = arg minpo

k

{χk(po,kk ) + µTk (pok − po[t]) +

ρ

2‖ pok − po[t] ‖2

}, (44)

{po[t+ 1]} = arg minpo

{ ∑Uk∈U

µTk (−po) +ρ

2

∑Uk∈U

‖ pok[t+ 1]− po ‖2}, (45)

{µk[t+ 1]} = {µk}[t] + ρ(pok[t+ 1]− po[t+ 1]). (46)

TABLE IIPARAMETERS.

Parameter ValueNumber of UEs K 10 ∼ 20Number of RSUs M 4Number of servers in the RSU c 4Diameter of RSU coverage dm 400 m ∼ 650 mWorkload data size θk 40 ∼ 150 MbAverage vehicle velocity vk 40 ∼ 80 km/hDelay constraint τk 2 ∼ 50 sLocal computing power βk 0.5 WTransmission power of vehicle PV

k 23 dBmBandwidth Bk 2 MHzAverage workload arrival rate λk 2 ∼ 5 workload/sLocal computing capability ulk 1.4 ∼ 2.2 GHzWorkload computation complexity δ 0.5 GHz/workloadEdge computing capability uem 12 GHzNoise power N0 -97 dBmTime required to deliver the TPBU 20 msmessage κTime required to deliver the L2 report TL2 15 msTime required for the sMAG (nMAG) to 10 ∼ 30 mssend the data packets to the nMAG(RSU) T

′k,PT (Tk,PT )

Time required to deliver the HI message ϕ 10 msTime for confirming the received profile 10 msand creating a new cache entry $k

which indicates that the objective function eventuallyconverges to the optimal value.

• Dual variable convergence: µk[t] → µ∗k as t → ∞,where µ∗k is a dual optimal vector.

2) Convergence of the Outer Iteration: It can be proved thatpok[n] converges to po∗k in a super-linear speed as n increases.A similar proof can be found in [35].

3) Complexity: In each iteration of the outer loop, P4 issolved to produce a decreasing sequence of ψk. Here, wedefine nloop as the required number of iterations by the outerloop to reach convergence. Similarly, in each iteration ofthe inner loop, (44), (45) and (46) are updated sequentiallyto obtain po∗k [n] for a given ψk[n]. We define tloop as thenumber of iterations required by the inner loop to reachconvergence. Hence, the computation complexity for solvingeach decomposed subproblem is O(nlooptloop).

VI. SIMULATION RESULTS AND DISCUSSIONS

In this section, we validate the proposed algorithm based onthe real-world topology of the Xidan area in Beijing, China.This area is featured with the Chang’an avenue, which is

Fig. 3. Evaluation scenario based on the real-world topology of Xidan area,Beijing,China.

0.4 0.5 0.6 0.7 0.8 0.9 1

Workload offloading portion

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

No

rma

lize

d e

ne

rgy

con

sum

ptio

n o

f U

E U

k

Average vehicle velocity vk=80 km/hAverage vehicle velocity vk=60 km/hAverage vehicle velocity vk=40 km/h

Fig. 4. The relationship between pok and the energy consumption of UE Uk .(K = 1, dm = 400m, θk = 120Mb, λk = 4)

the road to several scenic spots such as Tian’an men Squareand the Forbidden City as well as the headquarters of manycompanies and government agencies are located in this area.An aerial snapshot obtained from the Baidu map is shownin Fig. 3. First, The data of the digital map downloadedfrom OpenStreetMap is imported to SUMO. Then, vehicletraffics are generated based on the realistic road topologies,which are marked as small yellow triangles in Fig. 3. Thecritical attributes of each vehicle such as location and velocityare obtained during simulation, based on which the averagevelocity of each vehicle is estimated by using a simple rollingwindow regression approach [36]. The RSUs are also deployed

Page 11: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 11

40 50 60 70 80 90

Velocity (km/h)

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1N

orm

aliz

ied

en

erg

y co

nsu

mp

tion

of

Uk

Static offloading pok = 0.85

Static offloading pok = 0.60

Static offloading pok = 0.35

The proposed algorithm

Fig. 5. The energy consumption of UE Uk versus average vehicle velocityvk . (K = 1, dm = 400m, θk = 120Mb, λk = 4)

400 450 500 550 600 650

RSU coverage diameter (m)

0.5

0.55

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

1

No

rma

lizie

d a

vera

ge

en

erg

y co

nsu

mp

tion

Number of UEs K = 20

Number of UEs K = 15

Number of UEs K = 10

Fig. 6. Average energy consumption per UE versus RSU coverage diameterwith different numbers of UEs. (vk = 80km/h)

along the Chang’an avenue.The simulation parameters are summarized in Table II [37]–

[39]. The proposed algorithm is compared with two heuristicalgorithms including the brute-force searching algorithm, andthe static offloading algorithm algorithm [11]. In the staticoffloading algorithm, the portion of offloaded workload is fixedand the same for any UE.

Fig. 4 shows the relationship between pok and the energyconsumption of UE Uk under different average vehicle veloc-ities. It is clear that the energy consumption decreases firstlyand then increases with pok. When pok is small, the energyconsumption of transmission is less than that of the localcomputing. Hence, more energy can be saved by increasingpok. However, when pok > 0.5, the energy consumed for datatransmission starts to dominate the total energy consumption.In other words, the energy saving brought by workload of-floading cannot compensate the energy consumed for datatransmission. As a result, the energy consumption increasesmonotonically with pok. Furthermore, we found that the energyconsumption also increases with the average vehicle velocitywhen pok > 0.5. The reason is that higher velocity will cause

0 1 2 3 4 5 6 7

Outer loop iterations

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

No

rma

lizie

d t

ota

l en

erg

y co

nsu

mp

tion

The proposed algorithm, K=10

Brute force, K=10

The proposed algorithm, K=15

Brute force, K=15

Fig. 7. The convergence performance of the proposed algorithm. (K =10, 15, and dm = 400m)

0.5 0.6 0.7 0.8 0.9 1

Workloadd offloading protion

0

0.25

0.5

0.75

1

No

rma

lize

d t

ota

l en

erg

y co

nsu

mp

tion

Number of UEs K = 20

Number of UEs K = 15

Number of UEs K = 10

Fig. 8. The total energy consumption versus workload offloading portion withdifferent numbers of UEs. (dm = 400m, vk = 40km/h)

more offloading failures when pok is large. This not onlyincreases transmission energy consumption, but also results inhigher energy consumption of local computing because moreworkloads have to be processed locally.

Fig. 5 shows the energy consumption versus vehicle ve-locity. The proposed algorithm is compared with the staticoffloading algorithm under different workload offloading por-tions. When pok is large, i.e., pok = 0.85 and pok = 0.6,the energy consumption of the static offloading algorithmincreases dramatically with the vehicle velocity. The reasonbehind is that higher velocity leads to frequent offloadingfailures. In comparison, the energy consumption of the pro-posed algorithm remains constant when the vehicle veloc-ity is increased from 40 to 70 km/h. Simulation resultsdemonstrate that the proposed algorithm is more robust tothe negative impact caused by high vehicle mobility. Evenwhen the velocity exceeds 70 km/h, the proposed algorithmstill outperforms the static offloading algorithm. The reasonis that the proposed algorithm is able to reduce the energyconsumption by dynamically adjusting the offloading portion.For example, the optimal offloading portions for the velocities

Page 12: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 12

of 70, 80, and 90km/h are 0.4576, 0.3918, and 0.3407,respectively. That is, as velocity increases, the portion ofworkload to be offloaded is also reduced accordingly to avoidoffloading failure.

Fig. 6 shows the average energy consumption per UE versusthe RSU coverage diameter with different numbers of UEs.Enhancing the RSU coverage has positive impacts on theenergy consumption. It not only reduces the handover latencybut also relaxes the latency requirement of data transmission.Hence, the average energy consumption per UE decreasesmonotonically with the RSU coverage diameter. However,when the coverage diameter reaches a certain value, the per-formance improvement becomes saturated because the optimalenergy consumption have already been achieved. Furthermore,when the number of UEs is doubled, the average energyconsumption per UE only increases slightly. The reason is thatthe offloading portion is dynamically adjusted in accordancewith the number of UEs.

The convergence performance of the proposed algorithm isshown in Fig. 7. The brute-force searching algorithm whichexamines all possible of combinations to find the optimal solu-tion is utilized as a performance benchmark. It is observed thatthe proposed algorithm can converge rapidly to the optimalresult only within 2 ∼ 3 iterations.

Fig. 8 shows the total energy consumption versus differentworkload offloading portions. The offloading portion of anyUE is kept as the same, i.e., pok = pok′ ,∀k′ 6= k. The numericalresults are consistent with Fig. 4, i.e., the energy consumptiondecreases firstly and then increases with pok. Moreover, itis observed that the maximally allowed offloading portiondecreases monotonically as the number of UEs increases. Thisis due to the constraint C2 of problem P1 that the sum arrivalrate of all UEs’ workload cannot exceed the processing nodeof the VEC node.

VII. CONCLUSION

In this paper, we have investigated the energy-efficientworkload offloading for in-vehicle UEs with limited batterycapacity, and proposed the consensus ADMM-based energy-efficient resource allocation algorithm. First, by taking thehigh mobility of vehicles into account, we have proposed aqueuing model to derive the closed-form expressions of thecomputation latency and the waiting latency. Then, we haveformulated a workload offloading optimization problem withthe explicit considerations of the overall energy consumptionand latency. Next, we have proposed a consensus ADMM-based distributed solution. The formulated joint problem wasdecomposed into a set of subproblems and solved in par-allel. Finally, a real-world topology based simulation hasbeen conducted. For the future work, we will investigate thedelay minimization problem in VEC by employing machinelearning based workload prediction and computation resourceprediction.

REFERENCES

[1] Z. Zhou, P. Liu, Z. Chang, C. Xu, and Y. Zhang, “Energy-efficientworkload offloading and power control in vehicular edge computing,”in Proc. IEEE Wireless Commun. Netw. Conf. Workshops, Barcelona,Spain, Apr. 2018, pp. 191–196.

[2] Z. Zhou, H. Yu, C. Xu, Y. Zhang, S. Mumtaz, and J. Rodriguez,“Dependable content distribution in D2D-based cooperative vehicularnetworks: A big data-integrated coalition game approach,” IEEE Trans.Intell. Transport. Syst., vol. 19, no. 3, pp. 953–964, Mar. 2018.

[3] C. Huang, R. Lu, X. Lin, and X. Shen, “Secure automated valet parking:A privacy-preserving reservation scheme for autonomous vehicles,”IEEE Trans. Trans. Veh. Technol., vol. 67, no. 11, pp. 11 169–11 180,Nov. 2018.

[4] H. Peng, D. Li, Q. Ye, K. Abboud, H. Zhao, W. Zhuang, and X. Shen,“Resource allocation for cellular-based inter-vehicle communications inautonomous multiplatoons,” IEEE Trans. Trans. Veh. Technol., vol. 66,no. 12, pp. 11 249–11 263, Dec. 2017.

[5] F. Tang, B. Mao, Z. M. Fadlullah, N. Kato, O. Akashi, T. Inoue,and K. Mizutani, “On removing routing protocol from future wirelessnetworks: A real-time deep learning approach for intelligent trafficcontrol,” IEEE Wireless Commun., vol. 25, no. 1, pp. 154–160, Feb.2018.

[6] H. Wu, N. Zhang, X. Tao, Z. Wei, and X. Shen, “Capacity- and trust-aware BS cooperation in non-uniform HetNets: Spectral efficiency andoptimal BS density,” IEEE Trans. Trans. Veh. Technol., vol. 66, no. 12,pp. 11 317–11 329, Dec. 2017.

[7] J. Feng, Z. Liu, C. Wu, and Y. Ji, “AVE: Autonomous vehicular edgecomputing framework with ACO-based scheduling,” IEEE Trans. Veh.Technol., vol. 66, no. 12, pp. 10 660–10 675, Dec. 2017.

[8] Z. Zhou, J. Feng, C. Zhang, Z. Chang, Y. Zhang, and K. M. S.Huq, “SAGECELL: Software-defined space-air-ground integrated mov-ing cells,” IEEE Commun. Mag., vol. 56, no. 8, pp. 92–99, Aug. 2018.

[9] Z. Zhou, J. Feng, B. Gu, B. Ai, S. Mumtaz, J. Rodriguez, andM. Guizani, “When mobile crowd sensing meets UAV: Energy-efficienttask assignment and route planning,” IEEE Trans. Commun., vol. 66,no. 11, pp. 5526–5538, Nov. 2018.

[10] K. Zhang, Y. Mao, S. Leng, Y. He, and Y. Zhang, “Mobile-edgecomputing for vehicular networks: A promising network paradigm withpredictive off-loading,” IEEE Veh. Technol. Mag., vol. 12, no. 2, pp.36–44, Apr. 2017.

[11] Z. Chang, Z. Zhou, T. Ristaniemi, and Z. Niu, “Energy efficientoptimization for computation offloading in fog computing system,” inProc. IEEE Global Commun. Conf., Singapore, Dec. 2017, pp. 1–6.

[12] R. Deng, R. Lu, C. Lai, T. Luan, and H. Liang, “Optimal workloadallocation in fog-cloud computing toward balanced delay and powerconsumption,” IEEE Internet of Things J., vol. 3, no. 6, pp. 1171–1181,May 2016.

[13] Y. Mao, J. Zhang, and K. B. Letaief, “Dynamic computation offloadingfor mobile-edge computing with energy harvesting devices,” IEEE J.Select. Areas Commun., vol. 34, no. 12, pp. 3590–3605, Sept. 2016.

[14] C. You, K. Huang, H. Chae, and B. Kim, “Energy-efficient resource al-location for mobile-edge computation offloading,” IEEE Trans. WirelessCommun., vol. 16, no. 3, pp. 1397–1411, Dec. 2017.

[15] M. Li, F. R. Yu, P. Si, H. Yao, E. Sun, and Y. Zhang, “Energy-efficientM2M communications with mobile edge computing in virtualized cel-lular networks,” in Proc. IEEE Int. Conf. Commun., Paris, France, July2017, pp. 1–6.

[16] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, “Distributedoptimization and statistical learning via the alternating direction methodof multipliers,” Foundations and Trends in Machine Learning, vol. 3,no. 1, pp. 1–122, Jan. 2011.

[17] Z. Zhou, H. Liao, B. Gu, K. M. S. Huq, S. Mumtaz, and J. Rodriguez,“Robust mobile crowd sensing: When deep learning meets edge com-puting,” IEEE Network, vol. 32, no. 4, pp. 54–60, July 2018.

[18] T. Taleb, S. Dutta, A. Ksentini, M. Iqbal, and H. Flinck, “Mobile edgecomputing potential in making cities smarter,” IEEE Commun. Mag,vol. 55, no. 3, pp. 38–43, Mar. 2017.

[19] B. Yin, W. Shen, Y. Cheng, L. X. Cai, and Q. Li, “Distributed resourcesharing in fog-assisted big data streaming,” in Proc. IEEE Int. Conf.Commun., Paris, France, July 2017, pp. 1–6.

[20] Q. Vu, L. Tran, R. Farrell, and E. Hong, “Energy-efficient zero-forcingprecoding design for small-cell networks,” IEEE Trans. Commun.,vol. 64, no. 2, pp. 790–804, Nov. 2016.

[21] W. Yu, G. Chen, and M. Cao, “Consensus in directed networks of agentswith nonlinear dynamics,” IEEE Trans. Automat. Contr., vol. 56, no. 6,pp. 38–43, June 2011.

[22] C. Liang, F. R. Yu, H. Yao, and Z. Han, “Virtual resource allocation ininformation-centric wireless networks with virtualization,” IEEE Trans.Veh. Technol., vol. 65, no. 12, pp. 9902–9914, Feb. 2016.

[23] Y. Wang, L. Wu, and S. Wang, “A fully-decentralized consensus-basedADMM approach for DC-OPF with demand response,” IEEE Trans.Smart Grid, vol. 8, no. 6, pp. 2637–2647, Nov. 2017.

Page 13: IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY ......Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEE Transactions on Vehicular Technology

0018-9545 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TVT.2019.2905432, IEEETransactions on Vehicular Technology

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX 2019 13

[24] N. Zhang, S. Zhang, P. Yang, O. Alhussein, W. Zhuang, and X. Shen,“Software defined space-air-ground integrated vehicular networks: Chal-lenges and solutions,” IEEE Commun. Mag., vol. 55, no. 7, pp. 101–109,July 2017.

[25] M. Kim and S. Lee, “Enhanced network mobility management forvehicular networks,” IEEE Trans. Intell. Transport. Syst., vol. 17, no. 5,pp. 1329–1340, May 2016.

[26] W. Na, N. Dao, and S. Cho, “Mitigating WiFi interference to improvethroughput for in-vehicle infotainment networks,” IEEE Wireless Com-mun., vol. 23, no. 1, pp. 22–28, Mar. 2016.

[27] Y. Zhang, D. Niyato, and P. Wang, “Offloading in mobile cloudletsystems with intermittent connectivity,” IEEE Trans. Mobile Comput.,vol. 14, no. 12, pp. 2516–2529, Dec. 2015.

[28] M. Patra, R. Thakur, and C. Murthy, “Improving delay and energyefficiency of vehicular networks using mobile femto access points,”IEEE Trans. Veh. Technol., vol. 66, no. 2, pp. 1496–1505, Feb. 2017.

[29] M. Jia, J. Cao, and W. Liang, “Optimal cloudlet placement and user tocloudlet allocation in wireless metropolitan area networks,” IEEE Trans.Cloud Comput., vol. 5, no. 4, pp. 725–737, Oct./Dec. 2017.

[30] T. Kim and M. Dong, “An iterative hungarian method to joint relayselection and resource allocation for D2D communications,” IEEE Trans.Wireless Commun. Lett., vol. 3, no. 6, pp. 625–628, Dec. 2014.

[31] S. Zhao, Y. Chen, and J. Farrell, “High-precision vehicle navigationin urban environments using an MEM’s IMU and single-frequency GPSreceiver,” IEEE Wireless Commun., vol. 17, no. 10, pp. 2854–2867, Apr.2016.

[32] J. Kingman, Poisson Processes. Oxford University Press, New York,2005.

[33] L. Kleinrock, Queueing Systems.Volume I:Theory. John Wiley & Sons,New York, 1972.

[34] W. Dinkelbach, “On nonlinear fractional programming,” Manag. Sci.,vol. 13, no. 7, pp. 492–498, Mar. 1967.

[35] Z. Zhou, K. Ota, M. Dong, and C. Xu, “Energy-efficient matching forresource allocation in D2D enabled cellular networks,” IEEE Trans. Veh.Technol., vol. 66, no. 6, pp. 5256–5268, June 2017.

[36] S. Hadjiantoni and E. J. Kontoghiorghes, “A numerical method forthe estimation of time-varying parameter models in large dimensions,”stat.ME, pp. 1–20, Mar. 2017.

[37] Y. Wang, X. Lin, and M. Pedram, “A nested two stage game-basedoptimization framework in mobile cloud computing system,” in Proc.IEEE Int. Symp. Service-Oriented Syst. Eng., Redwood City, USA, Mar.2013, pp. 494–502.

[38] Y. Sun, S. Zhou, and J. Xu, “EMM energy-aware mobility managementfor mobile edge computing in ultra dense networks,” IEEE J. Select.Areas Commun., vol. 35, no. 11, pp. 2637–2646, Oct. 2017.

[39] X. Chen, L. Jiao, W. Li, and X. Fu, “Efficient multi-user computationoffloading for mobile-edge cloud computing,” IEEE/ACM Trans. Net-working, vol. 24, no. 5, pp. 2795–2808, Oct. 2016.

Zhenyu Zhou (M’11-SM’17) received his M.E. andPh.D degree from Waseda University, Tokyo, Japanin 2008 and 2011 respectively. From April 2012 toMarch 2013, he was the chief researcher at Depart-ment of Technology, KDDI, Tokyo, Japan. FromMarch 2013 to now, he is an Associate Professorat School of Electrical and Electronic Engineering,North China Electric Power University, China. Heserved as an Associate Editor for IEEE Access,EURASIP Journal on Wireless Communications andNetworking and a Guest Editor for IEEE Com-

munications Magazine and Transactions on Emerging TelecommunicationsTechnologies. He also served as workshop co-chair for IEEE Globecom 2018,IEEE ISADS 2015, and TPC member for IEEE Globecom, IEEE CCNC, IEEEICC, IEEE APCC, IEEE VTC, IEEE Africon, etc. He is a voting member ofIEEE Standard Association P1932.1 Working Group. He was the recipient ofthe IEEE Vehicular Technology Society ”Young Researcher EncouragementAward” in 2009, the Beijing Outstanding Young Talent Award in 2016, theIET Premium Award in 2017, the IEEE ComSoc Green Communications andComputing Technical Committee 2017 Best Paper Award, the IEEE Globecom2018 Best Paper Award, and the IEEE ComSoc Green Communicationsand Computing Technical Committee 2018 Best Paper Award. His researchinterests include green communications, vehicular communications, and smartgrid communications. He is a senior member of IEEE.

Junhao Feng is currently working toward the M.S.degree with North China Electric Power Univer-sity, Beijing, China. His research interests includeresource allocation, interference management, andenergy management in D2D communications. Hewas the recipient of the IEEE Globecom 2018 BestPaper Award and the IEEE ComSoc Green Commu-nications and Computing Technical Committee 2018Best Paper Award.

Zheng Chang received the B.Eng. degree fromJilin University, Changchun, China, in 2007, theM.Sc. (Tech.) degree from the Helsinki Universityof Technology, Espoo, Finland, in 2009, and thePh.D. degree from the University of Jyvaskyla,Jyvaskyla, Finland, in 2013. Since 2008, he has heldvarious research positions at the Helsinki Universityof Technology, the University of Jyvaskyla, andMagister Solutions Ltd., Finland. He was also a Vis-iting Researcher with Tsinghua University, China, in2013, and the University of Houston, TX, USA, in

2015. He has been awarded by the Ulla Tuominen Foundation, the NokiaFoundation, and the Riitta and Jorma J. Takanen Foundation for his researchwork. He is currently with the University of Jyvaskyla. His research interestsinclude cloud computing, radio resource allocation, IoT, vehicular networks,security and privacy, and green communications.

Xuemin (Sherman) Shen (M’97-SM’02-F’09) re-ceived the Ph.D. degree in electrical engineeringfrom Rutgers University, New Brunswick, NJ, USA,in 1990. He is currently a University Professorwith the Department of Electrical and ComputerEngineering, University of Waterloo, Waterloo, ON,Canada. His research focuses on resource man-agement in interconnected wireless/wired networks,wireless network security, social networks, smartgrid, and vehicular ad hoc and sensor networks.He is a registered Professional Engineer of Ontario,

Canada, an Engineering Institute of Canada Fellow, a Canadian Academy ofEngineering Fellow, a Royal Society of Canada Fellow, and a DistinguishedLecturer of the IEEE Vehicular Technology Society and CommunicationsSociety.

Dr. Shen received the R.A. Fessenden Award in 2019 from IEEE, Canada,the James Evans Avant Garde Award in 2018 from the IEEE VehicularTechnology Society, the Joseph LoCicero Award in 2015 and the EducationAward in 2017 from the IEEE Communications Society. He has also receivedthe Excellent Graduate Supervision Award in 2006 and the OutstandingPerformance Award 5 times from the University of Waterloo and the Premier’sResearch Excellence Award (PREA) in 2003 from the Province of Ontario,Canada. He served as the Technical Program Committee Chair/Co-Chair forthe IEEE Globecom’16, the IEEE Infocom’14, the IEEE VTC’10 Fall, theIEEE Globecom’07, the Symposia Chair for the IEEE ICC’10, the TutorialChair for the IEEE VTC’11 Spring, the Chair for the IEEE CommunicationsSociety Technical Committee on Wireless Communications, and P2P Commu-nications and Networking. He is the Editor-in-Chief of the IEEE INTERNETOF THINGS JOURNAL and the Vice President on Publications of the IEEECommunications Society.