Adaptive iot service configuration optimization in edge networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The collaboration of Internet of Things (IoT) devices promotes the computation at the network edge to satisfy latency-sensitive requests. The functionalities provided by IoT devices are encapsulated as IoT services, and the satisfaction of requests is reduced to the composition of services. Due to the hard-to-prediction of forthcoming requests, an adaptive service configuration is essential, when latency constraints are satisfied by composed services. This problem is formulated as a continuous time Markov decision process model constructed with updating system states, taking actions and assessing rewards constantly. A temporal-difference learning approach is developed to optimize the configuration, while taking long-term service latency and energy efficiency into consideration. Experimental results show that our approach outperforms the state-of-art's techniques for achieving close-to-optimal service configurations.

Original languageEnglish
Title of host publicationIEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665404433
DOIs
Publication statusPublished - 10 May 2021
Event2021 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2021 - Virtual, Online
Duration: 9 May 202112 May 2021

Publication series

NameIEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2021

Conference

Conference2021 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2021
CityVirtual, Online
Period9/05/2112/05/21

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 7 - Affordable and Clean Energy
    SDG 7 Affordable and Clean Energy

Fingerprint

Dive into the research topics of 'Adaptive iot service configuration optimization in edge networks'. Together they form a unique fingerprint.

Cite this