4.7 Article

Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends

期刊

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
卷 21, 期 1, 页码 260-288

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2018.2863030

关键词

Wireless networks; resource management; model games; fog environment; multi-access edge computing

资金

  1. Instituto de Telecomunicacoes (IT) - Instituto Universitario de Lisboa (IUL) [UID/EEA/50008/2019]
  2. EPSRC [EP/L020009/1, EP/R00692X/1] Funding Source: UKRI
  3. Fundação para a Ciência e a Tecnologia [UID/EEA/50008/2013] Funding Source: FCT

向作者/读者索取更多资源

Game theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming multiaccess edge computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as quality of experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game's usefulness, namely, rational versus evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game's model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse tradeoffs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据