{"title":"Deep reinforcement learning with dual-Q and Kolmogorov–Arnold Networks for computation offloading in Industrial IoT","authors":"Jinru Wu, Ruizhong Du, Ziyuan Wang","doi":"10.1016/j.comnet.2024.110987","DOIUrl":null,"url":null,"abstract":"<div><div>In the industrial internet of things, the rapid development of smart mobile devices and 5G network technology has driven the application of mobile edge computing, reducing the delay in task computation offloading to some extent. However, the increasing complexity of the IIoT environment presents challenges for communication management and offloading performance. To achieve efficient computation offloading communication, we designed a cloud–edge-device IIoT system model, utilizing Voronoi diagrams to partition the service areas of edge servers, thereby adapting to the complex IIoT environment and improving communication efficiency. Additionally, considering that different offloading strategies may result in varying levels of offloading security risks, we developed a principal component analysis-based offloading security evaluation model (PCA-OSEM) to analyze potential security risks during the offloading process and identify key factors. Finally, to optimize offloading strategies to reduce offloading delay and security risks, we proposed a dual-Q with Kolmogorov–Arnold networks in deep reinforcement learning computation offloading (D2KCO). This method enhances the neural network’s approximation capability and training stability. Experimental results show that the proposed PCA-OSEM is effective, and the D2KCO method can reduce offloading delay by 13% and 23.52% compared to the D3PG and DDPG algorithms, respectively, while also reducing security risks.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"257 ","pages":"Article 110987"},"PeriodicalIF":4.4000,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128624008193","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
In the industrial internet of things, the rapid development of smart mobile devices and 5G network technology has driven the application of mobile edge computing, reducing the delay in task computation offloading to some extent. However, the increasing complexity of the IIoT environment presents challenges for communication management and offloading performance. To achieve efficient computation offloading communication, we designed a cloud–edge-device IIoT system model, utilizing Voronoi diagrams to partition the service areas of edge servers, thereby adapting to the complex IIoT environment and improving communication efficiency. Additionally, considering that different offloading strategies may result in varying levels of offloading security risks, we developed a principal component analysis-based offloading security evaluation model (PCA-OSEM) to analyze potential security risks during the offloading process and identify key factors. Finally, to optimize offloading strategies to reduce offloading delay and security risks, we proposed a dual-Q with Kolmogorov–Arnold networks in deep reinforcement learning computation offloading (D2KCO). This method enhances the neural network’s approximation capability and training stability. Experimental results show that the proposed PCA-OSEM is effective, and the D2KCO method can reduce offloading delay by 13% and 23.52% compared to the D3PG and DDPG algorithms, respectively, while also reducing security risks.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.