{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:22:30Z","timestamp":1763202150445,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2018,6,15]],"date-time":"2018-06-15T00:00:00Z","timestamp":1529020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Mobile edge computing is proposed as a promising computing paradigm to relieve the excessive burden of data centers and mobile networks, which is induced by the rapid growth of Internet of Things (IoT). This work introduces the cloud-assisted multi-cloudlet framework to provision scalable services in cloudlet-based mobile edge computing. Due to the constrained computation resources of cloudlets and limited communication resources of wireless access points (APs), IoT sensors with identical computation offloading decisions interact with each other. To optimize the processing delay and energy consumption of computation tasks, theoretic analysis of the computation offloading decision problem of IoT sensors is presented in this paper. In more detail, the computation offloading decision problem of IoT sensors is formulated as a computation offloading game and the condition of Nash equilibrium is derived by introducing the tool of a potential game. By exploiting the finite improvement property of the game, the Computation Offloading Decision (COD) algorithm is designed to provide decentralized computation offloading strategies for IoT sensors. Simulation results demonstrate that the COD algorithm can significantly reduce the system cost compared with the random-selection algorithm and the cloud-first algorithm. Furthermore, the COD algorithm can scale well with increasing IoT sensors.<\/jats:p>","DOI":"10.3390\/s18061945","type":"journal-article","created":{"date-parts":[[2018,6,15]],"date-time":"2018-06-15T11:21:20Z","timestamp":1529061680000},"page":"1945","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing"],"prefix":"10.3390","volume":"18","author":[{"given":"Xiao","family":"Ma","sequence":"first","affiliation":[{"name":"Tsinghua National Laboratory for Information Science and Technology, Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China"}]},{"given":"Chuang","family":"Lin","sequence":"additional","affiliation":[{"name":"Tsinghua National Laboratory for Information Science and Technology, Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China"}]},{"given":"Han","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing 100191, China"}]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing 100191, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,6,15]]},"reference":[{"key":"ref_1","first-page":"97","article-title":"That \u2018Internet of Things\u2019 Thing","volume":"22","author":"Ashton","year":"2009","journal-title":"RFID J."},{"key":"ref_2","first-page":"59","article-title":"Vision and Challenges for Realising the Internet of Things","volume":"35","author":"Vilmo","year":"2010","journal-title":"Hot Work. Technol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_4","unstructured":"(2018, June 11). Cisco Global Cloud Index: Forecast and Methodology, 2016\u20132021 White Paper. Available online: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/global-cloud-index-gci\/white-paper-c11-738085.html."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MPRV.2009.82","article-title":"The case for VM-based cloudlets in mobile computing","volume":"8","author":"Satyanarayanan","year":"2009","journal-title":"IEEE Pervasive Comput."},{"key":"ref_6","unstructured":"Luan, T.H., Gao, L., Li, Z., Xiang, Y., Wei, G., and Sun, L. (arXiv, 2015). Fog computing: Focusing on mobile users at the edge, arXiv."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"8284","DOI":"10.1109\/ACCESS.2017.2692960","article-title":"From cloud to fog computing: A review and a conceptual live VM migration framework","volume":"5","author":"Osanaiye","year":"2017","journal-title":"IEEE Access"},{"key":"ref_8","unstructured":"ETSI (2016). Mobile Edge Computing (MEC): Framework and Reference Architecture, ETSI."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","article-title":"Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges","volume":"78","author":"Roman","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_10","unstructured":"Mao, Y., You, C., Zhang, J., Huang, K., and Letaief, K.B. (arXiv, 2017). Mobile edge computing: Survey and research outlook, arXiv."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","article-title":"Mobile edge computing: A survey on architecture and computation offloading","volume":"19","author":"Mach","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MNET.2018.1700202","article-title":"Learning IoT in edge: Deep learning for the Internet of Things with edge computing","volume":"32","author":"Li","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MCOM.2018.1700909","article-title":"Saving Energy on the Edge: In-Memory Caching for Multi-Tier Heterogeneous Networks","volume":"56","author":"Xu","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"11264","DOI":"10.1109\/TVT.2017.2724547","article-title":"Cost-Effective Cache Deployment in Mobile Heterogeneous Networks","volume":"66","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhang, S., He, P., Suto, K., Yang, P., Zhao, L., and Shen, X.S. (2017). Cooperative Edge Caching in User-Centric Clustered Mobile Networks. IEEE Trans. Mob. Comput.","DOI":"10.1109\/TMC.2017.2780834"},{"key":"ref_16","unstructured":"Wu, J., Dong, M., Ota, K., Li, J., and Guan, Z. (2017). FCSS: Fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans. Emerg. Top. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/MCOM.2017.1700129","article-title":"Self-Sustaining Caching Stations: Toward Cost-Effective 5G-Enabled Vehicular Networks","volume":"55","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MNET.2017.1600078","article-title":"Catalyzing cloud-fog interoperation in 5G wireless networks: An SDN approach","volume":"31","author":"Yang","year":"2017","journal-title":"IEEE Netw."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ma, X., Zhang, S., Li, W., Zhang, P., Lin, C., and Shen, X. (2017, January 14\u201316). Cost-Efficient Workload Scheduling in Cloud Assisted Mobile Edge Computing. Proceedings of the IEEE\/ACM International Symposium on Quality of Service (IWQoS\u201917), Vilanova i la Geltru, Spain.","DOI":"10.1109\/IWQoS.2017.7969148"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1109\/LWC.2017.2740927","article-title":"Performance guaranteed computation offloading for mobile-edge cloud computing","volume":"6","author":"Tao","year":"2017","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Ma, X., Lin, C., Xiang, X., and Chen, C. (2015, January 2\u20136). Game-theoretic analysis of computation offloading for cloudlet-based mobile cloud computing. Proceedings of the ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM\u201915), Cancum, Mexico.","DOI":"10.1145\/2811587.2811598"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1109\/TPDS.2014.2316834","article-title":"Decentralized computation offloading game for mobile cloud computing","volume":"26","author":"Chen","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","article-title":"Efficient multi-user computation offloading for mobile-edge cloud computing","volume":"24","author":"Chen","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1007\/s00779-016-0962-4","article-title":"AOM: Adaptive mobile data traffic offloading for M2M networks","volume":"20","author":"Lei","year":"2016","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.future.2015.10.004","article-title":"Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems","volume":"61","author":"Wang","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"23511","DOI":"10.1109\/ACCESS.2018.2828102","article-title":"A Survey on Service Migration in Mobile Edge Computing","volume":"6","author":"Wang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_27","unstructured":"Osborne, M.J., and Rubinstein, A. (1994). A Course in Game Theory, MIT Press."},{"key":"ref_28","unstructured":"Standard, F. (1996). Telecommunications: Glossary of Telecommunication Terms."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Balasubramanian, N., Balasubramanian, A., and Venkataramani, A. (2009, January 4\u20136). Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications. Proceedings of the ACM SIGCOMM Conference on Internet Measurement, Chicago, IL, USA.","DOI":"10.1145\/1644893.1644927"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1006\/game.1996.0044","article-title":"Potential games","volume":"14","author":"Monderer","year":"1996","journal-title":"Games Econ. Behav."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Soyata, T., Muraleedharan, R., Funai, C., Kwon, M., and Heinzelman, W. (2012, January 1\u20134). Cloud-vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture. Proceedings of the IEEE Symposium on Computers and Communications (ISCC\u201912), Cappadocia, Turkey.","DOI":"10.1109\/ISCC.2012.6249269"},{"key":"ref_32","unstructured":"Amazon (2018, June 12). EC2 Instance. Available online: https:\/\/amazonaws-china.com\/cn\/ec2\/instance-types\/."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Li, A., Yang, X., Kandula, S., and M, Z. (2010, January 1). CloudCmp: Comparing Public Cloud Providers. Proceedings of the ACM Internet Measurement Conference (IMC\u201910), Melbourne, Australia.","DOI":"10.1145\/1879141.1879143"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/1167838.1167860","article-title":"Latency and player actions in online games","volume":"49","author":"Claypool","year":"2006","journal-title":"Commun. ACM"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/6\/1945\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:08:54Z","timestamp":1760195334000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/6\/1945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,15]]},"references-count":34,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2018,6]]}},"alternative-id":["s18061945"],"URL":"https:\/\/doi.org\/10.3390\/s18061945","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,6,15]]}}}