You are on page 1of 17

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/339874488

Mobile Edge Computing Enabled 5G Health Monitoring for Internet of Medical


Things: A Decentralized Game Theoretic Approach, IEEE Journal on Selected
Areas in Communications, 2020

Article  in  IEEE Journal on Selected Areas in Communications · February 2021


DOI: 10.1109/JSAC.2020.3020645

CITATIONS READS

63 3,808

9 authors, including:

Zhaolong Ning Xiaojie Wang


Dalian University of Technology Chongqing University of Posts and Telecommunications
16 PUBLICATIONS   252 CITATIONS    65 PUBLICATIONS   1,934 CITATIONS   

SEE PROFILE SEE PROFILE

Bin Hu Tie Qiu


Lanzhou University Tianjin University
440 PUBLICATIONS   7,328 CITATIONS    229 PUBLICATIONS   4,413 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Research on Robustness for Large-Scale Heterogeneous Sensor Networks in Interent of Things View project

Reseach on alarming theory of potential depression risk and key technology of bio-sensing based on biological and psychological multimodal information View project

All content following this page was uploaded by Zhaolong Ning on 21 May 2020.

The user has requested enhancement of the downloaded file.


1

Mobile Edge Computing Enabled 5G Health


Monitoring for Internet of Medical Things: A
Decentralized Game Theoretic Approach
Zhaolong Ning, Peiran Dong, Xiaojie Wang, Xiping Hu, Lei Guo, Bin Hu, Yi Guo,
Tie Qiu, Ricky Y. K. Kwok Fellow, IEEE

Abstract—The prompt evolution of Internet of Medical Things known as Internet of Medical Things (IoMT) [2]. Enduring
(IoMT) promotes pervasive in-home health monitoring networks. tremendous pressure on life in modern society, individuals are
However, excessive requirements of patients result in insufficient hard to get medical examinations on time and seek medical
spectrum resources and communication overload. Mobile Edge
Computing (MEC) enabled 5G health monitoring is conceived advice in time, promoting the escalation of chronic diseases
as a favorable paradigm to tackle such an obstacle. In this (e.g., heart or lung diseases) [3]. In addition, the scarcity of
paper, we construct a cost-efficient in-home health monitoring spectrum resources and excessive healthcare data restrict the
system for IoMT by dividing it into two sub-networks, i.e., intra- further development of IoMT, since real-time performance is
Wireless Body Area Networks (WBANs) and beyond-WBANs. required. In order to release the loads of healthcare infrastruc-
Highlighting the characteristics of IoMT, the cost of patients
depends on medical criticality, Age of Information (AoI) and ture and avoid disease progression, in-home health monitoring
energy consumption. For intra-WBANs, a cooperative game is for IoMT has raised extensive concerns.
formulated to allocate the wireless channel resources. While IoMT combines traditional medical equipment with IoT, and
for beyond-WBANs, considering the individual rationality and extends its sensing and processing capabilities. By deploying
potential selfishness, a decentralized non-cooperative game is various body sensors on numerous patients, IoMT is able to
proposed to minimize the system-wide cost in IoMT. We prove
that the proposed algorithm can reach a Nash equilibrium. In realize in-home monitoring remotely. Heterogeneous sensors
addition, the upper bound of the algorithm time complexity and are generic enough to satisfy a variety of healthcare require-
the number of patients benefiting from MEC is theoretically ments. In addition, pervasive health monitoring networks allow
derived. Performance evaluations demonstrate the effectiveness patients to move freely indoors without being restrained.
of our proposed algorithm with respect to the system-wide cost Despite IoMT can provide ubiquitous health monitoring
and the number of patients benefiting from MEC.
services, the rapid increase in the number of patients still
Index Terms—Internet of medical things, health monitoring, overloads the medical center, and limits the development of
edge computing, game theory, 5G. IoMT. Local devices, such as mobile phones and laptops,
cannot satisfy the delay constraint of the time-sensitive tasks
I. I NTRODUCTION for medical information analysis. The proliferation of Mobile
Edge Computing (MEC) is conceived as a favorable paradigm
T HE rapid evolution of Internet of Things (IoT) connects
numerous devices and human beings [1]. One essential
branch of IoT is for ubiquitous in-home healthcare, also
to tackle such an obstacle. By offloading the medical analysis
task to the edge server in proximity, the burden of local devices
can be released. MEC augments the capability of IoMT by
Z. Ning is with the School of Software, Dalian University of Technology, providing sufficient computation resources.
Dalian, China, School of Information Science and Engineering, Lanzhou
University, Lanzhou, China, and Chongqing Key Laboratory of Mobile For the environment of urban in-home health monitoring,
Communications Technology, Chongqing University of Posts and Telecom- spectrum resources are scarce when there are numerous pa-
munications, Chongqing, China. Email: z.ning@ieee.org. tients, and the spectrum utilization efficiency of traditional
P. Dong is with the School of Software, Dalian University of Technology,
Dalian, China. Email: peiran dong@outlook.com. transmission schemes (e.g., Orthogonal Frequency Division
X. Wang (Co-Corresponding author) is with the Department of Computing, Multiple Access (OFDMA)) is low. The emerging of 5G
The Hong Kong Polytechnic University, Hong Kong, China. Email: xiao- technology is promising to solve this challenge by channel
jie.wang@polyu.edu.hk.
X. Hu (Co-Corresponding author) and B. Hu (Co-Corresponding author) are multiplexing, e.g., Non-Orthogonal Multiple-Access (NOMA),
with the School of Information Science and Engineering, Lanzhou University, which enables patients to share a common channel to upload
Lanzhou, China. Email: huxp@lzu.edu.cn and bh@lzu.edu.cn. their monitored packets [4]. For traditional cellular commu-
L. Guo (Co-Corresponding author) is with the Chongqing Key Laboratory
of Computational Intelligence, Chongqing University of Posts and Telecom- nications, the power of the macro-cell base station is large
munications, Chongqing, China. Email: guolei@cqupt.edu.cn. and the signal frequency is relatively low. Different from
Y. Guo (Co-Corresponding author) is with the Second Clinical Medical that, millimeter wave is leveraged for 5G communications.
College of Jinan University, Shenzhen People’s Hospital, Shenzhen, China.
Email: xuanyi guo@163.com. Correspondingly, the signal frequency is high (e.g., 3.5GHz),
T. Qiu (Co-Corresponding author) is with the School of Computer Science and the power of RSUs is relatively low. Excessive patients
and Technology, College of Intelligence and Computing, Tianjin University, can be divided according to their geographical areas. Each
Tianjin, China. Email: qiutie@ieee.org.
R. Kwok is with the Department of Electrical and Electronic Engineering, MEC server provides services for several patients, which not
University of Hong Kong, Hong Kong, China. Email: Ricky.Kwok@hku.hk. only relieves the burden on the macro-cell station, but also
2

alleviates the shortage of channel resources. Although the utilization of 5G communications can improve
channel efficiency, there is a trade-off between the interference
incurred by channel multiplexing and limited computation
A. Motivation
resources of edge servers. Considering individual rationality
In general, patients concern their health status, and the and potential selfishness, a non-cooperative game is proposed
medical center intends to monitor each patient throughout to solve the problem. The main contributions are summarized
the day. Therefore, in-home health monitoring is required to as follows:
satisfy the following conditions: • We construct a MEC-enabled 5G health monitoring sys-
• Serious diseases (e.g., heart disease) should be assigned tem for IoMT, with the target of minimizing the system-
with higher priorities than general diseases. wide cost. Highlighting the characteristics of IoMT, the
• All monitored medical information is required to update cost of patients depends on medical criticality, AoI and
in time. Even for general diseases, long-term neglection energy consumption.
causes great hidden dangers. • The considered IoMT is divided into two sub-networks,
• Since equipment in IoMT, including body sensors, local i.e., intra-WBANs and beyond-WBANs. For intra-
devices and edge severs, may not have stable and con- WBANs, a cooperative game is constructed to minimize
tinuous power supplies, the energy consumption of the the cost of each patient.
whole monitoring system needs to be considered. • For beyond-WBANs, considering individual rationality
We aim to minimize the system-wide cost in IoMT by and potential selfishness, a potential game based decen-
scheduling transmission and computation resources. Most ex- tralized approach is proposed to obtain the strategy profile
isting researches on transmission and computation resource that can reach the Nash equilibrium.
scheduling focus on latency and energy consumption mini- • We theoretically derive the upper bound of the time com-
mization [5]-[6]. Highlighting the characteristics of IoMT, the plexity and the number of patients benefiting from MEC.
cost of patients depends on medical criticality, Age of Infor- Performance evaluations demonstrate the effectiveness of
mation (AoI) and energy consumption. The medical criticality our proposed algorithm with respect to the system-wide
is an essential attribute of the packet that the corresponding cost and the number of patients benefiting from MEC.
sensor monitors, reflecting the health severity index of the The rest of paper is organized as follows. We review the
monitored data from the perspective of medicine. AoI is related work in Section II. Section III illustrates the system
a performance metric that measures data freshness of the model, and the optimization problem is formulated in Section
monitored information [7], by recording the elapsed time of IV. The intra-WBAN and beyond-WBAN games are proposed
the packet from it is generated to it is delivered. In addition, in Section V and VI, respectively. Performance evaluations
energy consumption originates from packet transmission and are illustrated in Section VII, followed by the conclusion in
computation. Section VIII.
The considered IoMT is constructed to provide patients with
pervasive health monitoring. In order to send the analyzed II. R ELATED W ORK
information to the medical center, body sensors need to Many previous researches have investigated health monitor-
transmit the raw monitored data to the gateway. Many kinds ing. Three categories are reviewed in the section, including
of equipment can play the role of the gateway in IoMT. In this cloud computing enabled health monitoring, edge computing
paper, the local device is selected since it is not only able to enabled health monitoring and 5G enabled health monitoring.
route packets, but also with the capability of local computing
that can analyze the monitored medical data. In addition, local
A. Cloud Computing enabled Health Monitoring
devices (e.g., mobile phones or laptops) are highly popular
in modern society, promoting the deployment of the in-home Recent advances in cloud computing reduce the exponen-
health monitoring system. tially increasing cost of health monitoring by enabling a
remote monitoring system. Abawajy et al. in [8] propose a
pervasive patient health monitoring architecture to facilitate the
B. Contribution mobility of patients and improve the autonomy of the moni-
In this paper, we design a MEC-enabled 5G health mon- toring architecture. The integrated cloud computing makes the
itoring system for IoMT. The objective of the formulated framework flexible and energy-efficient. Forkan et al. in [9]
optimization problem is to minimize the system-wide cost, present a personalized health monitoring framework, which
which depends on the medical criticality, AoI and energy con- can distinguish emergencies from normal circumstances with
sumption of health monitoring packets. The considered IoMT the assistance of cloud computing and big data. Muhammad et
can be divided into two sub-networks, i.e., intra-WBANs and al. in [10] integrate IoT and cloud computing to enable voice
beyond-WBANs. For intra-WBANs, gateways regulate the pathology monitoring, which utilize a local binary pattern to
transmission rates of body sensors by bandwidth allocation to represent the voice signal. The authors propose a machine
minimize the cost. A cooperative game is proposed to obtain learning based classifier to detect the voice pathology. Pagán
the optimal allocation. While for beyond-WBANs, patients can et al. in [11] construct a mobile cloud computing based remote
make choices between analyzing the medical information from health monitoring system, aiming at recognizing activities
monitored packets by local devices and that by edge servers. of patients. An adaptive sensing technique is proposed to
3

minimize the transmission cost. Wang et al. in [12] propose


a cloud-based health monitoring infrastructure to decrease the
loads of data analysis at the central base station. Offline data
analysis is conducted with the assistance of local IoT devices.

B. Edge Computing enabled Health Monitoring


Edge computing can satisfy various requirements of health
monitoring by providing pervasive low-latency computation
services for patients. Liu et al. in [13] identify a privacy
issue in MEC-based intelligent health monitoring. A privacy
preservation algorithm is developed for body sensors in the
health monitoring system. Pace et al. in [14] propose an edge-
based healthcare framework to reduce the communication
latency and data traffic. The privacy level is also enhanced by Fig. 1: An illustration of MEC-enabled 5G health monitoring
exploiting hybrid cloud computing. Gu et al. in [15] integrate system.
edge computing and healthcare to construct a cost-efficient
health monitoring system. Jointly considering the association
of central station, message distribution and virtual equipment packets from living tissue, and transmit them to the associated
deployment, the formulated optimization problem is solved edge server for medical analysis. The MEC-enabled 5G health
by a linear programming based heuristic algorithm. Shu et al. monitoring system is illustrated in Fig. 1. It contains five
in [16] investigate edge computing based data dissemination major components, i.e., patients, local devices, body sensors,
for healthcare. A data propagation protocol is designed to MEC servers and the medical center. The considered IoMT
guarantee data integrity and avoid communication conflicts. is divided into intra-WBANs and beyond-WBANs. In intra-
Verma et al. in [17] propose a smart in-home health monitoring WBANs, heterogeneous body sensors equipped by patients
system, which provides services of data mining and distributed monitor raw healthcare data, and transmit them to the corre-
storage based on the concept of edge computing. sponding gateway (i.e., local devices). Then, the local device
decides whether to perform the medical analysis task by local
C. 5G enabled Health Monitoring computing or offload it to edge servers. Finally, the analyzed
As an essential technique of future smart healthcare, 5G medical report is sent to the medical center.
enables an ultra high-speed transmission by greatly improving Consider a set of patients in WBANs generate health
the spectrum efficiency. Chen et al. in [18] combine the monitoring packets and share resources of MEC servers in
machine learning and big data to develop a 5G-Smart Diabetes proximity, denoted by N = {1, 2, · · · , N }. Each WBAN
system. By comprehensively sensing and analyzing medical is composed of M heterogeneous body sensors, denoted by
cases of diabetes, the authors propose a sustainable and M = {1, 2, · · · , M }. In order to process the monitored
cost-efficient diabetes diagnosis mechanism with personalized packets, service functions are deployed on geographically
treatment. Feng et al. in [19] construct a haptic communication dispersed edge servers (e.g., IoMT equipment), denoted by
architecture for healthcare. The radio resources are allocated K = {1, 2, · · · , K}. The health monitoring packet collect-
with the constraints of stability, energy consumption, and ed by sensor m on patient i is characterized by τi,m =
network delay, which can be realized by a developed time- {di,m , ci,m , si,m }, where di,m and ci,m denote the packet size
varying swarm algorithm. Yi et al. in [20] investigate the and the required number of CPU cycles to analyze the medical
transmission management for beyond-WBANs. Considering information, respectively. Variable si,m represents the medical
the random generations of health monitoring messages, a criticality class of the packet, which is further formulated in
queueing game is proposed to minimize the communication Section III-A.
latency. Sigwele et al. in [21] propose a 5G cost-efficient There are two scheduling periods for health monitoring
healthcare architecture. The energy consumption is minimized in WBANs: Intra-WBANs Scheduling (IWS) and Beyond-
under the constraints of transmission power and quality of WBANs Scheduling (BWS). For IWS, body sensors collect
service. health monitoring packets in an OFDMA manner. The data
Different from the above researches, our work jointly con- sizes of health monitoring packets that each body sensor
siders health monitoring of both intra-WBANs and beyond- collects are relatively small, and the bandwidth requirements
WBANs. OFDMA and NOMA techniques are leveraged for are low. As a result, OFDMA technique is utilized to allo-
adaptive transmissions. In addition, a cooperative game and a cate the bandwidth resources to sensors. In addition, since
non-cooperative game are proposed to schedule resources of information in IoMT is delay-sensitive, packets transmitted to
transmission and computation for IoMT, respectively, with the the medical center should not be out of date. Thus, wireless
objective of minimizing the system-wide cost. channels are allocated under the constraint of AoI of all
body sensors. The motivation of IWS is to guarantee the
III. S YSTEM M ODEL freshness of all monitored medical information. For BWS, all
We consider MEC-enabled in-home health monitoring W- health monitoring packets (i.e., raw data) need to be processed
BANs, where body sensors collect various types of healthcare either by local devices (local computing) or edge servers
4

before delivering to the medical center. NOMA and OFDMA Actually, the class-dependent criticality is an essential fea-
technologies are leveraged for the transmission of 5G WBANs. ture for health monitoring. Similar to most existing researches
The computation resources of edge servers and local resources [24] [25], we mainly consider a linear form of medical
are utilized to process the health monitoring packets generated criticality in this paper, which is defined as follows:
by patients, aiming at minimizing the system-wide cost of
Definition 2. (Medical criticality). For health monitoring
IoMT.
packet τi categorized in class s, ∀s ∈ S, its medical criticality
Next, three factors determining the system-wide cost are
Ci,m can be computed by:
mathematically illustrated: medical criticality, AoI and energy
consumption. Main notations are summarized in Table I. S
X
Ci,m = βi,m,s xi,m,s , (1)
TABLE I: Main Notations s=1

Notations Description where βi,m,s ∈ [0, ∞) denotes the criticality coefficient. For
N The set of patients any two classes s and s0 , ∀s, s0 ∈ S, if the health monitoring
M The set of body sensors
K The set of edge servers packets in class s are more critical than those in class s0 ,
S The set of discrete medical criticality class βi,m,s > βi,m,s0 holds.
di The data size of the health monitoring packet of patient i
ci The required number of CPU cycles of patient i According to the above definition, the medical criticality is
si The medical criticality class of the packet of patient i formulated as a linear function with respect to the medical
Ci,m The medical criticality of body sensor m
δi,m (t) The AoI of body sensor m equipped by patient i at time criticality class that the packet belongs to. It can be easily
slot t proved that the defined function satisfies the class-dependent
Ri (a) The transmission rate of patient i criticality. In general, the definition of medical criticality
Ei (ω, a) The total energy consumption of patient i
Ci (ω, a) The total cost of patient i can be modified mathematically with the restriction of class-
Ciint The cost of patient i for intra-WBANs dependent priority.
Cibey The cost of patient i for beyond-WBANs

B. Age of Information
Medical information monitored by body sensors is time-
A. Medical Criticality sensitive, and AoI measures the freshness of health mon-
The first factor that we consider is the medical criticality itoring packets. Ideally, body sensors are able to monitor
of health monitoring packets. It reflects the health severity instant information about health status. They can continuously
index of the monitored data from the perspective of medicine. transmit the latest information to MEC servers. However, due
WBANs can assist ubiquitous healthcare systems to mon- to the constraints of wireless communication channels and
itor remote patients in real time. Multiple heterogeneous computation capabilities, it is impractical to update the health
body sensors collect various health signals for physiological information in real time. Therefore, wireless channel resources
condition assessment. In order to comprehensively monitor need to be scheduled to keep the monitored health information
health status, there are various kinds of body sensors. For updated and avoid information starvation1 . To approve AoI
example, ElectroCardioGram (ECG) sensor is responsible for performance, the scarce channel resources need to be allocated
the heart rate, blood pressure, and post-operative monitoring, on-demand.
while gyroscope insulin actuator monitors the blood glucose In this paper, we assume that body sensors can collect infor-
[22]. Intuitively, the medical criticality of the above two mation when wireless channels are allocated to the accessed
kinds of healthcare data is different, i.e., health monitoring gateways for packets transmission. In such cases, body sensors
packets need to be categorized into several classes based on and individual gateways are not required to cache health
their medical criticality, which has been provided in IEEE monitoring packets. In order to calculate AoI, all packets are
802.15.6 standard [23]. All health monitoring packets can be time-stamped when they are generated2 . Let µ− i,m denote the
classified into discrete medical criticality classes, denoted by most recent time-stamp of body sensor m on patient i, i.e.,
S = {1, 2, · · · , S}. For health monitoring packet collected by the last time that sensor m collects packets for transmission is
sensor m on patient i, let binary variable xi,m,s denote the µ−i,m . At time slot t, the AoI of packet τi,m can be computed
medical criticality class, where xi,m,s = 1 indicates that the by:
health monitoring packet is categorized in medical criticality δi,m (t) = t − µ−
i,m . (2)
class s, ∀s ∈ S; otherwise xi,m,s = 0. Let Ci denote the
If body sensor m is not allocated to wireless channels, the
medical criticality of health monitoring packets generated by
AoI of sensor m increases linearly with time, representing the
patient i. Before formulating the medical criticality, we first
healthcare information that sensor m monitors is becoming
present the definition of class-dependent criticality.
outdated. As soon as sensor m is scheduled to transmit the
Definition 1. (Class-dependent criticality). Under the premise latest health monitoring packet, the associated time-stamp is
of experiencing the same other factors (i.e., AoI and energy
1 Information that has not been updated for a long time is called information
consumption), the health monitoring packet categorized in a
starvation.
class with higher medical criticality should always take prece- 2 The generation time of the packet is also the time when it starts to be
dence over the ones with lower criticality for transmission. delivered.
5

immediately updated from µ− i,m to µi,m , reducing its AoI by I(aj = ai ) = 0. From equation (5), we can observe that if
µi,m − µ−i,m . Note that the AoI of delivered health monitoring
excessive patients share the same channel, they may suffer
packets is numerically equal to the experienced transmission from severe interference, incurring low transmission rates. In
latency, indicating the freshness of these packets from their addition, scarce channel resources and low spectrum efficiency
generation to the reception by MEC servers. The evolution of result in slow transmission rates, dramatically increasing the
AoI δi,m (t) can be formulated by: transmission cost. Thus, we adopt the adaptive NOMA in BWS
 by avoiding any explicit access rules3 .
t + 1 − µi,m , if the time-stamp is updated; The energy consumption in beyond-WBANs consists of the
δi,m (t+1) =
δi,m (t) + 1, otherwise. consumed energy by transmission and computation. Similar
(3)
to most existing researches [27] [28], we mainly focus on
the communication between patients and edge servers, where
C. Energy Consumption the competition on channel and computing resources is much
Since wearable devices, such as body sensors and local more fierce than that in the communication between edge
devices, do not have stable power supply, excessive energy servers and the medical center4 . Based on the transmission rate
consumption limits the evolution of WBANs for a long time. obtained by Equation (5), the transmission delay and energy
The energy consumptions of both intra-WBANs and beyond- consumption of patient i can be respectively calculated by
WBANs are essential factors that influence the lifespan of the Tibey (a) = Rid(a)
i
and Eibey (a) = Rpii(a)
di
.
whole monitoring system. Both local devices and edge servers can process the moni-
In intra-WBANs, body sensors consume energy to collect tored packets. Let fil and fie , ∀i ∈ N denote the computation
health monitoring packets and transmit them to the gateway. capabilities of local computing and MEC, respectively. We do
When the wireless channel is allocated to sensor m deployed not consider the priority of patients when they invoke MEC.
on patient i, sensor m can fulfill the collection immediately The total computing resource of the edge server is denoted as
and generate health monitoring packet τi,m . The transmission F e . All patients that upload their health monitoring packets
delay and energy consumption of sensor m can be calculated are assumed to share computing resources equally, i.e.,
int di,m int di
by Ti,m = ri,m and Ei,m = pi,m ri,m , respectively. Variables Fe
pi,m and ri,m denote the transmission power and rate of fie (a) = , (6)
nei (a)
sensor m equipped by patient i, respectively. Since body
sensors are very close to the accessed gateway (within few where nei (a) denotes the number of patients that choose the
meters), they transmit packets based on OFDMA to avoid the same MEC server with patient i, given strategy profile a.
signal interference. The allocated bandwidth to sensor m is There are K MEC servers deployed in the proximity of
represented by ωi,m , and the allocation profile is defined as patients. Each patient can invoke MEC by choosing one of
ω = {ω1 , ω2 , · · · , ωN }, where ωi = {ωi,1 , ωi,2 , · · · , ωi,M }. the MEC servers to analyze its health monitoring packets.
Given a determined bandwidth allocation profile ω, the trans- The computation resources of the MEC server are shared
mission rate ri,m can be computed by: equally by all patients that choose it. The computing energy
consumption of local computing Eic,l and MEC Eic,e for
 pi,m hi,m  patient i can be calculated by:
ri,m (ω) = ωi,m log2 1 + . (4)
σ2 ci ci
Eic,l = pi l , Eic,e (a) = pe e , (7)
After receiving packets from body sensors, the gateway fi fi (a)
can choose to process these packets through either local
where pe represents the power of edge servers.
computing or MEC. Denote available strategy set of patient
In intra-WBANs, health monitoring packets are delivered to
i as ai ∈ {0, 1, 2, · · · , K}. The strategy profile of all patients
the gateway via OFDMA, while the communication between
can be represented as a = {a1 , a2 , · · · , aN }. Since medical
the gateway and edge servers is based on the adaptive NOMA
information is usually holistic, partial offloading is not consid-
in beyond-WBANs. The cooperation of NOMA and OFDMA
ered in this framework. Given the strategy profile, the upload
saves spectrum resources while guaranteeing the throughput
rate of patient i can be computed by:
of IoMT. The total energy consumption of patient i5 can be
K
X  computed by:
Ri (a) = I(k = ai )B log2 1+ M
X
k=1 (5) Ei (ω, a) = int
Ei,m (ω) + I(ai = 0)Eic,l
pi hi,k 
(8)
P 2
, m=1
j∈N \{i}:aj =ai pj hj,k + σ + I(ai ∈ K)(Eibey + Eic,e (a)).
where B denotes the wireless channel bandwidth. Variables 3 Most existing researches, such as [26], pre-define the applicable rules or
pi and hi,k are the transmission power and channel gain of conditions of NOMA, and distinguish it from the OFDMA explicitly.
patient i, respectively. Symbol σ 2 is the noise power. The 4 Since edge servers communicate with the medical center through the

binary variable I(·) indicates whether the selected strategies high-speed fiber link, compared with the congested wireless communications
of two patients are the same, where I(aj = ai ) = 1 among excessive users, both the communication delay and consumption can
be neglected [29].
denotes that patients j and i choose the same server (or local 5 For ease of presentation, the computation energy consumption of edge
device) to process the health monitoring packets, otherwise servers is incorporated into the corresponding energy consumption of patients.
6

It can be observed that in the case of local computing, the the out of date of the monitored medical information, gateways
energy consumption of a packet is an affine function of its also need to organize the transmission priority of all equipped
required CPU cycles. However, the energy consumption of body sensors within intra-WBANs.
invoking MEC depends on not only the attributes of the packet, There are two decision variables in the formulated opti-
but also the strategy of other patients. mization problem, i.e., one for bandwidth allocation in intra-
WBANs and the other for task scheduling in beyond-WBANs.
IV. P ROBLEM F ORMULATION The constraints and decision variables are inter-dependent. In
order to decouple the decision variables, the optimization prob-
In order to represent the cost function of patient i, γiM ,
lem is divided into two subproblems, i.e., IWS problem and
γiA , and γiE are defined as coefficients of the medical crit-
BWS problem. For IWS problem, all body sensors serve the
icality, AoI and energy consumption, respectively, and 0 ≤
patient cooperatively. The data on any sensors becoming out
γiM , γiA , γiE ≤ 1 holds. The cost of patient i can be modeled
of date (i.e., exceeding the threshold of AoI) can increase the
as a linear combination of the above three parameters, i.e.,
risk of deterioration. Thus, sensors are motivated to cooperate
M
X with each other to guarantee the global utility, which can be
Ci (ω, a) = γiM Ci + γiA δi,m + γiE Ei (ω, a). (9) formulated as a cooperative game. For BWS problem, patients
m=1
compete for MEC resources. Considering the incentive com-
We aim to minimize the system-wide cost in IoMT. The patibility and rationality, patients intend to maximize their
optimization problem is formulated as follows: own utilities (non-negative). In such cases, patients do not
N cooperate and the subproblem can be formulated as a non-
X
arg min C = Ci (ω, a), (10) cooperative game.
ω,a
i=1 In intra-WBANs, the main issue is the attributes of body
s.t. sensors (i.e., medical criticality and AoI), and the correspond-
δi,m 6 Hmax , ∀i ∈ N , m ∈ M, (10a) ing transmission cost. The IWS problem can be formulated as
follows:
N
X N X
M
I(ai ∈ N )fie = F e , (10b) X
arg min C int = γiM Ci + γiA δi,m + γiE Ei,m
int
(ω), (11)
i=1 ω
i=1 m=1
M
X s.t.
ωi,m 6 ω max , ∀i ∈ N , (10c)
δi,m 6 Hmax , ∀i ∈ N , m ∈ M, (11a)
m=1
M
ai ∈ {0} ∪ K, ∀i ∈ N , (10d) X
ωi,m 6 ω max , ∀i ∈ N , (11b)
I(ai = aj ) ∈ {0, 1} , ∀i, j ∈ N , (10e) m=1

xi,m,s , ∈ {0, 1} , ∀i ∈ N , s ∈ S, (10f) xi,m,s , ∈ {0, 1} , ∀i ∈ N , s ∈ S. (11c)

where constraint (10a) indicates that the AoI of all body While in beyond-WBANs, the cost minimization is equiva-
sensors cannot exceed threshold Hmax , guaranteeing timely lent to minimizing the energy consumption of local computing
updates of the collected medical information. The AoI mainly and MEC. The BWS problem is formulated as follows:
depends on bandwidth allocation. The constraint of the compu- N
X
tation capability of edge servers is shown in (10b). It limits that arg min C bey = I(ai = 0)Eic,l
excessive medical analysis tasks cannot be scheduled to MEC a
i=1
(12)
servers, preventing those MEC servers from overload. Since + I(ai ∈ K)(Eibey (a) + Eic,e (a)),
the spectrum resources are limited, constraint (10c) guarantees
that the allocated bandwidth to body sensors cannot exceed s.t.
N
threshold ω max . Constraints (10d), (10e) and (10f) present the
X
I(ai ∈ N )fie = F e , (12a)
value range of several variables. In summary, constraints (10a) i=1
(10c) and (10f) are correlated to bandwidth allocation ω, while
constraints (10b) (10d) and (10e) rely on task scheduling a. ai ∈ {0} ∪ K, ∀i ∈ N , (12b)
Based on the cost function, we can observe that when health I(ai = aj ) ∈ {0, 1} , ∀i, j ∈ N . (12c)
monitoring packets are uploaded to edge servers, each patient’s
cost relies not only on his own decision, but also on the Generally, IWS is conducted before BWS, and the decision
strategies of others. Specifically, as shown in the transmission of the strategy profile a is independent of the scheduling
rate function (5) and the first part of energy consumption on of body sensors. In the following, the IWS problem is first
the right of equation (8), if excessive patients choose to invoke formulated into a cooperative game, and the Nash bargaining
MEC, they may suffer from the decline of both transmission solution and convex optimization are leveraged for the optimal
and computation rates, and incur terrible costs on packet scheduling. Then, a decentralized non-cooperative game is
uploading and processing. In this case, local computing would constructed to decide the strategy profile and minimize the
be beneficial for these patients. In addition, in order to prevent system-wide cost of patients.
7

Algorithm 1 Procedure of DIGTAL equal to the transmission time of its collected packets. Based
1: for each patient i ∈ N do on constraint (11a), the minimum allocated bandwidth ω ei,m
2: Allocated channel resources based on Algorithm 2; (i.e., the disagreement point) for sensor m ∈ M can be
3: end for computed by:
4: Patients broadcast the information of their health monitor- di,m
int
ing packets; Ti,m = 6 Hmax ,
ri,m
5: Edge servers broadcast the information of computing  pi,m hi,m  di,m
resources; ⇒ri,m = ωi,m log2 1 + > max , (14)
σ 2 H
6: All patients execute the decentralized Algorithm 3 in
di,m
parallel; ⇒ωi,m >   =ωei,m .
p h
Hmax log2 1 + i,mσ2 i,m

To facilitate analysis, we take the opposite of the cost as


In the following, a DecentralIzed Game Theoretic Approach int
the utility of each body sensor, i.e., Ui,m = −Ci,m , ∀m ∈
for heaLth monitoring (DIGTAL) algorithm is proposed to
M. The feasible utility set can be represented by U =
minimize the system-wide cost. The procedure is shown in
{Ui,1 , Ui,2 , · · · , Ui,M }. Then, the minimum utility of sensor
Algorithm 1. It mainly consists of two steps. First, for IWS
m, denoted as U ei,m , can be obtained when ωi,m is equal to
problem, each gateway allocates wireless channel resources
the disagreement point:
based on a cooperative game. The Nash bargaining solution is
leveraged for the optimal allocation. Second, a non-cooperative ei,m = − γiM Ci + γiA δi,m + γiE Ei,m int

U (e
ωi,m )
game is utilized to solve the BWS problem. We prove that (15)
= − γiM Ci + γiA Hmax + γiE pi,m Hmax .

it is a weighted potential game, and propose a decentralized
approach to admit the Nash Equilibrium (NE). Details are Theorem 1. The feasible utility set of the Nash bargaining
illustrated in Sections V and VI. game is convex.
Proof. Based on equation (15), the utility set can be formu-
V. I NTRA -WBAN G AME lated as:
Since body sensors operate together to server patients, the
n o
U = Ui,m |Ui,m > U ei,m , ∀m ∈ M . (16)
IWS problem can be formulated as a cooperative bargain-
ing game, where sensors cooperate to minimize the cost in The set U is convex if and only if αUi,m + (1 − α)Ui,m0 ∈
intra-WBANs. Specifically, body sensors contend for channel U, ∀α ∈ [0, 1], m, m0 ∈ M, m 6= m0 holds, where
resources by adjusting their allocated bandwidths. Through
bargaining, sensors attempt to reach an equilibrium. Differ- αUi,m + (1 − α)Ui,m0 = −α(γiM Ci,m + γiA δi,m + γiE Ei,m
int
)
ent from non-cooperative game where participants aim at −(1 − α)(γiM Ci,m0 + γiA δi,m0 + γiE Ei,m
int
0 ).
maximizing their own profits and behave selfishly, sensors (17)
in the cooperative game attempt to maximize the system- Since Ui,m and Ui,m0 ∈ U, we have
wide profit (i.e., minimize the cost of the patient) while
guaranteeing their own utilities. This scenario can be resorted Ui,m > U
ei,m , Ui,m0 > U
ei,m0 . (18)
to the Nash bargaining game. For each patient, there are M Let function f (α) = αUi,m +(1−α)Ui,m0 , it is easy to observe
sensors participating in the game, represented by: that:
n o
G IWS , M, {ωi,m }m∈M , Ci,m
 int
(ωi,m , ωi,−m ) m∈M , f (0) = Ui,m0 > U
ei,m0 , and f (1) = Ui,m > U
ei,m . (19)
(13)
Therefore, αUi,m + (1 − α)Ui,m0 ∈ U, ∀α ∈ [0, 1] means that
 int
where Ci,m (ωi,m , ωi,−m ) m∈M denotes the feasible cost
set. function f (α) is convex on the domain [0,1]. Specifically, the
Although body sensors aim at minimizing the system- second-derivative of f (α) equals to 0, i.e.,
wide cost (i.e., reaching the Pareto optimal), there are still d2 f (α) d
disagreement points, beyond which participants do not agree to = (Ui,m − Ui,m0 ) = 0. (20)
dα2 dα
cooperate in the bargaining game. For the bandwidth allocation
problem in intra-WBANs, the disagreement point denotes the Thus, function f (α) is proved to be convex, and the feasible
acceptable minimum allocated bandwidth for body sensors, be- utility set U is also convex.
yond which the transmission latency can exceed the constraint Definition 3. (Pareto Optimal Solution): The solution
of the AoI shown in equation (11a), and the monitored data can (ωi,m , ωi,−m ) of the bargaining game is a pareto optimal
be out of date. Therefore, the disagreement point can also be 0
solution if and only if there is no other solution (ωi,m 0
, ωi,−m )
viewed as the lower bound of the feasible set of bandwidth, that satisfies the following conditions:
where the utility of the corresponding patient is minimized.
0 0

It is aforementioned that body sensors start to collect health Ui,m ωi,m , ωi,−m > Ui,m (ωi,m , ωi,−m )
0 0

monitoring packets and transmit them when they are allocated Ui,n ωi,n , ωi,−n > Ui,n (ωi,n , ωi,−m ) , ∀n ∈ M\{m}.
wireless channels. Thus, the AoI of sensor m is numerically (21)
8

When there are more than two participants in the bargaining Definition 4. (Nash Equilibrium). A strategy profile a is a
game, the number of Pareto optimal points can be infinite. In NE of game G0BWS , if and only if it satisfies:
order to solve this problem, the generalized Nash bargaining
Cibey a∗i , a∗−i > Cibey ai , a∗−i , ∀ai ∈ {0}∪K, i ∈ N . (25)
 
solution [30] is utilized to compute a unique Pareto optimal
solution, i.e., In particular, it can be observed that the strategy selected
m   by patients mainly depends on their suffered interferences,
Y
∗ ∗ i.e., the number of patients P
that choose the same edge server.

ωi,m , ωi,−m ∈ arg max Ui,m − Uei,m . (22)
(ωi,m ,ωi,−m ) i=1 We utilize Ii (ai , a−i ) = j∈N \{i}:aj =ai pj hj,k to denote
the interference suffered by patient i. Inspired by [31], the
The solution satisfies four axioms: Pareto efficiency, symme-
following lemma can be achieved:
try, invariance of linear transformation and independence of
irrelevant alternatives. Similar proofs can be found in [24]. Lemma 1. Given the strategies of other patients a−i , the
The Lagrange multiplier approach is leveraged to obtain the strategy of patient i can be represented by:
unique solution
PM for the optimization problem in (22), which

K, if Ii (ai , a−i ) 6 Ψi ,
subjects to m=1 ωi,m 6 ω max . The procedure of bargaining ai ∈ (26)
{0} , otherwise,
game based IWS algorithm is illustrated in Algorithm 2.
where
pi hi,k
Algorithm 2 Bargaining Game based IWS Algorithm Ψi = pi di f l f e
− σ2 .
i i
B(ci (pi f e −pe f l ))
Initialization: 2 −1
i i

1: The upper bound of AoI Hmax ; Proof. Based on principle (24), patient i always selects the
2: The upper bound of bandwidth ω max ; strategy that can minimize the cost. Thus, the condition that
3: Bandwidth allocation decision: ω; patient i chooses to invoke MEC corresponds to:
4: for each sensor m ∈ M do ci ci di
5: Compute disagreement point ω ei,m based on (14); pi l > pe e + pi ,
int
fi fi Ri (a)
6: Define utility function Ui,m = −Ci,m ;
which is mathematically equivalent to the following inequality:
7: Compute minimum utility Ui,m based on (15);
e
8: end for pi di fil fie
Ri (a) > .
9: Obtain the feasible utility set: ci (pi fie − pe fil )
By substituting equation (5) into the above inequality, it can
n o
U = Ui,m |Ui,m 6 U ei,m , ∀m ∈ M ;
be manipulated as:
10: Construct the unique Pareto optimal point by Nash bar- X pi hi,k
gaining solution: pj hj,k 6 p d flfe
− σ2 ,
i i i i
j∈N \{i}:aj =ai e l
m 
Y  2 B(ci (pi fi −pe fi )) − 1
∗ ∗

ωi,m , ωi,−m ∈ arg max Ui,m − Uei,m ; which proves Lemma 1.
(ωi,m ,ωi,−m ) i=1
Based on Lemma 1, the game G0BWS can be transformed
11: Utilize Lagrange multiplier approach to solve the above into another equivalent form G1BWS , illustrated as follows:
convex optimization problem.
G1BWS , N , {ai }i∈N , {Ii (ai , a−i )}i∈N ,

(27)
where the cost of patients is estimated by their suffered in-
VI. B EYOND -WBAN G AME terferences. Specifically, given strategies of all patients except
patient i (i.e., a−i ), the equivalent cost of patient i is defined
In beyond-WBANs, patients compete for channel and com- as:
putation resources to process the health monitoring packets. 
0 Ψi , if ai = 0;
Based on the formulation of the BWS problem, the non- Cibey (ai , a−i ) = (28)
Ii (ai , a−i ) , if ai ∈ K.
cooperative game can be modeled as:
  Given a strategy profile a = {ai , a−i }, a0i is an improved
strategy for patient i if Cibey (a0i , a−i ) < Cibey (ai , a−i ). The
n o
G0BWS , N , {ai }i∈N , Cibey (ai , a−i ) , (23)
i∈N sequential improved strategy, where one patient changes the
where ai ∈ {0} ∪ K. With the target of minimizing the strategy at one time, is called an improvement path. If the
energy consumption in beyond-WBANs, the optimal strategy improvement path is finite, then it admits an NE. To facilitate
of patient i can be represented by: analysis, the potential function is constructed as follows:
N K
a∗i ∈ arg min Cibey (ai , a−i ) . (24) 1X X X
ai ∈K Φ(a) = pi hi,k pj hj,k I(aj = ai )I(ai = k)
2 i=1
j∈N \{i} k=1
We consider that all patients are rational and selfish. Given N
strategies of all patients except patient i, denoted by a−i ,
X
+ pi hi,k Ψi I(ai = 0).
patient i selects the best response for a−i . The NE of game i=1
G0BWS is defined as follows: (29)
9

Next, the NE of game G1BWS is derived to exist by proving of patient n’s strategy can be represented by:
that it is a weighted potential game.
Φ(a0n , a−n ) − Φ(an , a−n )
K
Theorem 2. The transformed game G1BWS is a weighted X X
potential game, and there exists at least one pure strategy = pn hn,k pj hj,k I(aj = a0n )I(a0n = k)
j∈N \{n} k=1
NE.
X K
X
Proof. Based on the defined potential function (29), G1BWS
is − pn hn,k pj hj,k I(aj = an )I(an = k) (33)
a weighted potential game, if and only if the change of the j∈N \{n} k=1
potential function is proportional to the change of the cost. N
X N
X
+ pi hi,k Ψi I(a0i = 0) − pi hi,k Ψi I(ai = 0)
Suppose that patient n, ∀n ∈ N updates the previous
i=1 i=1
strategy ai to the next strategy a0n . This implies that a0n is an  0 0

improved strategy, and the update leads to the decline of the = pn hn,k Cnbey (a0n , a−n ) − Cnbey (an , a−n ) .
cost, i.e., Cnbey (a0n , a−n ) < Cnbey (an , a−n ). In the following,
Since pn , hn,k > 0 always holds, the change of the potential
we prove the corresponding potential function decreases pro-
function is proved to be proportional to the change of the cost.
portionally, which can be transformed equivalently as follows:
According to the definition in [32], G1BWS is proved to be a
weighted potential game, and there always exists at least one
pure strategy NE for any potential games.

K Transformed game G1BWS is proved to have a pure strategy


1 X X
NE. Note that mixed strategy NE is not taken into consider-
Φ(a) = pn hn,k pj hj,k I(aj = an )I(an = k)
2 ation in this paper. Despite it is a finite game, and the mixed
j∈N \{n} k=1
K strategy NE can be guaranteed to exist, it is abandoned for
X X
+ pi hi,k pn hn,k I(an = ai )I(ai = k) three reasons:
i∈N \{n} k=1 • First, it is much more complicated to obtain a mixed

X X K
X  strategy NE than a pure one. The increase in overall
+ pi hi,k pj hj,k I(aj = ai )I(ai = k) performance does not compensate for the increased time
i∈N \{n} j∈N \{i,n} k=1 and computational resource overheads.
N • Second, the health monitoring packet is more time-
X
+ pi hi,k Ψi I(ai = 0), sensitive and less computation-intensive than general of-
i=1 floading applications (e.g., face recognition and natural
(30) language processing). Therefore, it is not appropriate for
where the following equation always holds for ∀i, j, n ∈ N : partial offloading.
• Third, medical information is privacy-sensitive and holis-
tic. To facilitate analysis and protect privacy, each mon-
K
X X itored packet is assigned to one dedicated server for
pn hn,k pj hj,k I(aj = an )I(an = k) = processing.
j∈N \{n} k=1
(31) In the following, the relationship between G0BWS and G1BWS
K
X X is investigated.
pi hi,k pn hn,k I(an = ai )I(ai = k).
i∈N \{n} k=1 Lemma 2. G0BWS is equivalent to G1BWS , i.e., for arbitrary
patient i ∈ N , as well as strategies ai and a0i :
Cibey (a0i , a−i ) 6 Cibey (ai , a−i ) ⇔
Then, the potential function can be simplified as: 0 0 (34)
Cibey (a0i , a−i ) 6 Cibey (ai , a−i ) .
Proof. There are three specific conditions to update the strat-
N
X egy:
Φ(a) = pi hi,k Ψi I(ai = 0) 0
• Condition 1: ai = 0 and ai ∈ K : The update of strategy
i=1 0
K
from a i to a i implies that the cost of invoking MEC is less
than that of local computing, denoted as Ci (a0i , a−i ) <
X X
+ pn hn,k pj hj,k I(aj = an )I(an = k)
j∈N \{n} k=1
C i (a ,
i −i a ). From the derivation in Lemma 1, it can be
0

K concluded that I (ai , a−i ) < Ψi , i.e., Cibey (a0i , a−i ) <
0
1  X X X  0
Cibey (ai , a−i ).
+ pi hi,k pj hj,k I(aj = ai )I(ai = k) ,
2 0
• Condition 2: ai ∈ K and ai = 0 : The update of strategy
i∈N \{n} j∈N \{i,n} k=1
0
(32) from ai to ai implies that the cost of local computing is
where the last item is independent from patient n’s strategy an . less than that of invoking MEC, denoted as Ci (a0i , a−i ) <
The change of the potential function incurred by the update Ci (ai , a−i ). From the derivation in Lemma 1, it can be
10

0
concluded that I (a0i , a−i ) > Ψi , i.e., Cibey (a0i , a−i ) < The time slot does not record the clock time, but the
0
Cibey (ai , a−i ). decision cycle. The strategy profile a is initialized to a zero
0 set, indicating that all patients choose local computing. The
• Condition 3: ai ∈ K and ai ∈ K : The update of strategy
from ai to ai implies that the cost of edge server a0 is
0 update proposal set Ω records the strategy update request
less than that of edge server ai . proposed by patients. First, all patients compute their suffered
The proof can be completed by summarizing the three interference when the health monitoring packets are uploaded
conditions. to edge server k ∈ K. In particular, there is no interference
during the first time slot since no one invokes MEC. Based
Theorem 3. The NE sets of game G0BWS and G1BWS are the on Lemma 1, patients compare the interference and threshold
same. Ψi . For patients that are supposed to update their strategies,
Proof. Let a∗0 and a∗1 denote the NE set of G0BWS and G1BWS , the best response for the given strategies of other patients a−i
respectively. For any (a∗i , a∗−i ) ∈ a∗1 , the following conclusion is selected to minimize the cost, as described in (24). The
holds: proposal is recorded in Ω, where patient j ∈ Ω contends for
0 0
the update opportunity. In the update phase, patient j ∈ Ω is
Cibey a∗i , a∗−i 6 Cibey ai , a∗−i , ∀ai ∈ K, i ∈ N .
 
selected randomly to update the strategy, and other patients
keep the strategy unchanged. After finite improvement paths,
Based on Lemma 2, we have:
all patients admit a pure strategy NE, which has been proved
Cibey a∗i , a∗−i 6 Cibey ai , a∗−i , ∀ai ∈ K, i ∈ N ,
 
in Theorem 2. For each slot, the dominating time complexity
comes from the derivation of the best response in Algorithm
which indicates that (a∗i , a∗−i ) ∈ a∗1 is also an NE of game 3 line 8, where the time complexity of the sorting operation
G0BWS . Furthermore, it can be derived that ∀a∗ ∈ a∗1 ⇒ a∗ ∈ is O(K log K). Denote λ as the number of time slots for
a∗0 . Thus, we can conclude that the NE sets of game G0BWS convergence (i.e., reach an NE). The time complexity of our
and G1BWS are the same. proposed decentralized algorithm is O(λK log K).
Then, the worst case of the time complexity is illustrated.
Algorithm 3 Potential Game based BWS Algorithm Define Ψmax , maxi∈N {Ψi }, Ψmin , mini∈N {Ψi }, Gi ,
Initialization: pi hi,k , Gmax , maxi∈N {Gi } and Gmin , mini∈N {Gi }, we
1: Time slot t = 0; can obtain the following theorem:
2: The strategy profile a : ai = 0; Theorem 4. Assume that both Ψi and Gi are integers, our
3: Update proposal set: Ω = ∅; G2
algorithm can admit an NE within at most ( 2Gmax N2 +
Judge: Gmax Ψmax
min

Gmin N ) time slots, i.e.,


4: for each time slot t do
5: Patients compute the suffered interference G2max Gmax Ψmax
{I(ai , a−i )}i∈N and the threshold {Ψi }i∈N ; λ 6 N 2K +N . (35)
2Gmin Gmin
6: for each patient i, i ∈ N do
7: if I(ai , a−i ) < Ψi then Proof. The upper bound of the potential function in (29) can
8: Patient i computes the best response for a−i (t): be represented by:
0
a0i ∈ arg min Cibey (a0i , a−i ) N
1 XXX
N K X N
ai ∈K Φ(a) 6 Gi Gj + Gi Ψi
2 i=1 j=1 i=1
9: Send update proposal, Ω ∪ {i}; k=1
N N K N
10: else 1 XXX X (36)
11: ai (t + 1) = ai (t); 6 G2max + Gmax Ψmax
2 i=1 j=1 k=1 i=1
12: end if
end for 1
13: = N 2 KG2max + N GΨmax .
Update: 2
14: while update proposal set Ω 6= ∅ do Similar to Lemma 2, we consider three update conditions:
15: Select a patient j ∈ Ω: 0
• Condition 1: ai = 0 and ai ∈ K : According to Theorem
aj (t + 1) = a0j (t), 2, the potential function decreases with the update of
ai (t + 1) = ai (t), ∀i ∈ Ω, i 6= j. strategies from ai to a0i , i.e.,

16: end while Φ (ai , a−i ) − Φ (a0i , a−i )


17: Until no update proposals for all patients. X K
X
18: end for =Gi Ψi − Gi Gj I(aj = a0i )I(aj = k)
j∈N \{i} k=1
As proved in Theorem 3, the NE of game G0BWS can be
 
K
achieved by solving the transformed game G1BWS . We propose
X X
=Gi Ψi − Gj I(aj = a0i )I(aj = k) > 0.
a potential game based on BWS to admit an NE of game j∈N \{i} k=1
G1BWS , the details of which are illustrated in Algorithm 3. (37)
11

PN PK PN
Then, the following inequality holds: Proof. Since i=1 k=1 i=1 Ii (ai = k) < N , at least one
Φ(ai , a−i ) − Φ(a0i , a−i ) > Gi > Gmin , (38) patient n processes the health monitoring packets by local
computing, i.e., an = 0. Based on Lemma 1, the interference
which implies that the potential function can be reduced that patient n suffered satisfies:
by at least Gmin for each update. X
• Condition 2: ai ∈ K and a0i = 0 : This condition is similar pi hi,k I(ai = k) > Ψn , ∀k ∈ K, (44)
to condition 1. Thus, we omit the derivation process. i∈N \{n}
• Condition 3: ai ∈ K and a0i ∈ K : According to Theorem which implies that patient n cannot reduce the cost by chang-
2, the potential function decreases with the update of ing its strategy from local computing to MEC. It follows:
strategies from ai to a0i , i.e., X
nk (a∗ )Gmax > pi hi,k I(ai = k) > Ψn > Ψmin ,
Φ (ai , a−i ) − Φ (a0i , a−i )
i∈N \{n}
K
X X Ψmin
= Gi Gj I(aj = ak )I(aj = k) ⇒ nk (a∗ ) > ,
j∈N \{i} k=1
Gmax
K
K X Ψmin
X X ⇒ n(a∗ ) = nk (a∗ ) > K .
− Gi Gj I(aj = a0k )I(aj = k) Gmax
k=1
j∈N \{i} k=1 (39) (45)
K
PN
X X Since i=1 I(ai = 0) > 0, there is at least one patient
=Gi ( Gj I(aj = ai )I(aj = k) j that invokes MEC, supposing aj = z, z ∈ K. Based on
j∈N \{i} k=1 Lemma 1, we can obtain that:
X K
X X
− Gj I(aj = a0i )I(aj = k)) > 0. pi hi,k I(ai = z) 6 Ψj , (46)
j∈N \{i} k=1 i∈N \{j}

According to the transformed cost function (28), selecting which leads to:
strategy a0i suffers less interference than selecting strategy X
(nz (a∗ ) − 1)Gmin 6 pi hi,k I(ai = z) 6 Ψj 6 Ψmax ,
ai . Assume the current time slot is t, and the next slot is
i∈N \{j}
t + 1, the following equation can be concluded:
Ψmax
N N ⇒ (nz (a∗ ) − 1) 6 ,
X X Gmin
I(aj = ai )(t) = I(aj = ai )(t + 1) + 1,
Ψmax
j=1 j=1 ⇒ nz (a∗ ) 6 + 1,
N N
(40) Gmin
K
X X
I(aj = a0i )(t) + 1 = I(aj = a0i )(t + 1). X Ψ
max

⇒ n(a∗ ) = nz (a∗ ) 6 K +1 .
j=1 j=1
z=1
Gmin
Then, given Gi , ∀i ∈ N are integers, we have (47)
N
X N
X By summarizing (45) and (47), the proof can be completed.
I(aj = ai )(t) > I(aj = a0i )(t + 1)
j=1 j=1
N
(41)
X VII. P ERFORMANCE E VALUATION
= I(aj = a0i )(t) + 1,
In this section, the proposed DIGTAL algorithm is evaluated
j=1
by extensive simulations.
and the same conclusion with (38) can be obtained:
K
X X A. Simulation Setup
Gj I(aj = ai )I(aj = k)
j∈N \{i} k=1 Consider an in-home IoMT scenario, where N = 30
K
(42) patients generate health monitoring packets through equipped
X X
− Gj I(aj = a0i )I(aj = k) > 1. body sensors. Both local devices and K = 5 edge servers can
j∈N \{i} k=1 provide services to analyze the generated medical information.
The data size and required CPU cycles of each monitored
By summarizing the above three conditions, it is proved
packet are randomly generated between [1000, 3000] KB and
that the potential function can be minimized within at most
G2 [100, 1000] Megacycles, respectively [33]. The bandwidth of
N 2 K 2Gmax +N Gmax Ψmax
update procedures, so that the game
min Gmin wireless channel is 5 MHz. The transmission power and the
also admits an NE.
noise are 100 mW and -100 dBm, respectively. Edge servers
Theorem 5. Let n(a∗ ) denote the number PKof Ppatients that are randomly distributed, with a radio coverage range of 50
N
invokes MEC at any NE a∗ , i.e., n(a∗ ) = k=1 i=1 I(ai = meters. Based on the wireless communication interference
k). The following inequality holds: model [34], the channel gain of patient i ∈ N is set as
−η
Ψmin Ψ
max
 hi,k = li,k , where li,k denotes the distance between the
K 6 n(a∗ ) 6 K +1 . (43) gateway and its accessed edge server. The path loss factor is
Gmax Gmin
12

Fig. 2: Dynamics of patients’ strategy. Fig. 3: Dynamics of the number of patients benefiting from
MEC.

η = 3. The computation capabilities of edge servers and local


devices are 30 GHz and 2 GHz, respectively. Performance
indicators are as follows:
• System-wide cost: The optimization target of the DIG-
TAL algorithm is to minimize the system-wide cost in
IoMT, depending on the medical criticality, AoI and
energy consumption.
• Number of patients benefiting from MEC: It demonstrates
the number of patients, whose cost can be minimized with
the assistant of 5G-enabled MEC.
Then, the following schemes are leveraged for comparison
to demonstrate the effectiveness of the DIATAL algorithm.
• Local Computing by all patients (LC): It is a baseline
scheme, where patients are risk averse and choose to
process health monitoring packets by local devices.
• MEC by all patients: Patients are myopic and do not
consider the interference from others. They randomly
select an edge server to process packets. Fig. 4: System-wide cost with different number of patients.
• Source destination pair Matching Algorithm (SMA)[26]:
It is a centralized two-sided many-to-many matching
algorithm, where patients contend for MEC resources more patients induce more transmission and computation
in a NOMA-based wireless network. Its performance is costs, the system-wide cost increases with the rise of the
demonstrated to be close to the optimal exhaustive search. number of patients. DIGTAL algorithm can achieve average
36% and 38% cost reductions compared with the methods
B. Numerical Results of LC and MEC by all patients, respectively. In addition,
Dynamics of patients’ strategy is illustrated in Fig. 2. The compared with the centralized matching algorithm SMA, the
initial strategy of all patients is local computing. We can performance loss of our proposed decentralized algorithm is at
observe that DIGTAL algorithm converges to a stable point most 13%. This is because SMA requires the global complete
within a few time slots, indicating that the NE can be reached. information during the whole matching procedure. It incurs
Fig. 3 shows the dynamics of the number of patients benefiting massive transmission overhead due to information collection.
from MEC. With the convergence of DIGTAL algorithm, the Moreover, the privacy issue also needs to be considered
number of patients benefiting from MEC increases steadily. It carefully. Patients tend to avoid privacy leaks and may not
demonstrates that 5G-enabled MEC can effectively decrease follow the centralized solution. Note that the cost of MEC is
the system-wide cost of patients. In addition, it can be ob- lower than that of LC when the number of patients in IoMT
served that one channel is occupied by at most 3 patients, is relatively small (e.g., N 6 30). It is because computing
which is in line with reality. resources on edge servers are sufficient, and can provide low
Fig. 4 demonstrates the effectiveness of our proposed DIG- latency services to guarantee the AoI of health monitoring
TAL algorithm with respect to the system-wide cost. Since packets. However, the cost of MEC increases faster than
13

Fig. 5: System-wide cost with different data sizes. Fig. 7: Average number of patients benefiting from MEC with
different data sizes.

Fig. 6: Average number of patients benefiting from MEC with


different number of patients. Fig. 8: Average number of time slots with different number of
patients.

that of LC, and exceeds it after N > 35. This is because


excessive patients result in severe interference and overloads the transmission energy consumption. Since the data size of
on edge servers. In summary, our proposed DIGTAL algorithm health monitoring packets is relatively small in practice, our
performs better than the baseline schemes, and can approach proposed DIGTAL algorithm performs well in IoMT.
the performance gained by the centralized SMA algorithm. Figs. 6 and 7 illustrate the trend of the number of patients
The impact of packet sizes on the number of patients benefiting from MEC varying from the data size and the
benefiting from MEC is shown in Fig. 5. It takes a long number of patients, respectively. For DIGTAL and SMA,
time to transmit packets with large data sizes, resulting in it can be observed that the number of patients benefiting
large transmission energy consumption and AoI. Thus, the from MEC increases with the rise of the number of patients,
system-wide cost in IoMT grows with the rise of the data and decreases with the decline of the data size of health
size. When the data size of monitored packets is relatively monitoring packets. This is because computing resources on
small (e.g., 1 MB), DIGTAL algorithm and MEC scheme can edge servers are sufficient for a relatively small number of
reduce 56% and 29% costs, respectively, compared with that of patients (i.e., N 6 50). In addition, the increasing data size
local computing scheme. However, these two ratios decrease can lead to the rise of system-wide costs as shown in Fig. 5.
to 32% and 10% when the data size increases to 3 MB. This Thus, the number of patients benefiting from MEC decreases.
shows that with the increase of data size, the cost reduction However, when all patients are forced to invoke MEC, the
caused by the assistant of MEC becomes small. It is because number of patients benefiting from MEC decreases with the
that local computing avoids raw data transmissions, and saves increasing number of patients. Although MEC can provide
14

system-wide cost, and can reduce 78% convergence time with


12% performance loss compared with the centralized optimal
solution.

VIII. C ONCLUSION
In this paper, we have investigated the MEC-enabled 5G
in-home health monitoring for IoMT, which is divided into
intra-WBANs and beyond-WBANs. For intra-WBANs, the
bandwidth scheduling problem is formulated as a bargain-
ing game, and the Nash bargaining solution is utilized to
compute the optimal allocation decision. For beyond-WBANs,
a weighted potential game based decentralized approach is
developed to resolve the non-cooperative game, and the NE
can be reached. The upper bound of the corresponding time
complexity and the number of patients benefiting from MEC
are derived theoretically, respectively. Performance evaluations
Fig. 9: System-wide costs with different types of IoMT. demonstrate the effectiveness of our solution with respect to
the system-wide cost and the number of patients benefiting
from MEC.
pervasive computation services for patients, it is still resource
IX. ACKNOWLEDGMENTS
constraint compared with the central macro-cell station. If
all patients choose to invoke MEC, the MEC servers may This work is partially supported by National Nature
be overloaded. Each patient can only be assigned with few Science Foundation of China under Grants 61971084 and
computation resources, resulting in severe interference and 61771120, China Postdoctoral Science Foundation under
large task execution latency. Correspondingly, the number of Grant 2018T110210, Fundamental Research Funds for the
patients benefiting from MEC is lower than those of the Central Universities under Grant DUT19JC18, and Nation-
DIGTAL and SMA algorithms. al Natural Science Foundation of Chongqing under Grant
The time complexities of our proposed DIGTAL and the cstc2019jcyj-msxmX0208.
centralize SMA algorithms are compared in Fig. 8. Since
DIGTAL can be implemented by all patients in parallel, it R EFERENCES
reduces 78% time averagely compared with that of the SMA [1] H. Li, K. Ota, and M. Dong, “Learning IoT in edge: Deep learning for
the Internet of things with edge computing,” IEEE Network, vol. 32,
algorithm. In addition, with the increasing number of patients, no. 1, pp. 96–101, 2018.
the number of time slots that SMA consumes to converge [2] A. Gatouillat, Y. Badr, B. Massot, and E. Sejdić, “Internet of medical
increases faster than that of the DIGTAL algorithm. It shows things: A review of recent contributions dealing with cyber-physical
systems in medicine,” IEEE Internet of Things Journal, vol. 5, no. 5,
that DIATAL performs well with the expansion of participants. pp. 3810–3822, 2018.
Fig. 9 illustrates the comparison of system-wide cost in [3] Y. Chen, L. Yu, K. Ota, and M. Dong, “Robust activity recognition
different types of IoMT. In normal IoMT, the same weight for aging society,” IEEE Journal of Biomedical and Health Informatics,
vol. 22, no. 6, pp. 1754–1764, 2018.
is assigned to three parameters, i.e., γiM = γiA = γiE = 0.33. [4] H. Li, K. Ota, and M. Dong, “Eccn: Orchestration of edge-centric com-
DIGTAL algorithm achieves 32% and 24% cost reduction puting and content-centric networking in the 5g radio access network,”
compared with LC and MEC schemes, respectively. In time- IEEE Wireless Communications, vol. 25, no. 3, pp. 88–93, 2018.
[5] Z. Zhou, Q. Wu, and X. Chen, “Online orchestration of cross-edge
sensitive IoMT, the monitored medical information is required service function chaining for cost-efficient edge computing,” IEEE
to update more frequently, and the performance of AoI is Journal on Selected Areas in Communications, vol. 37, no. 8, pp. 1866–
more significant than that in the normal one. The coefficients 1880, 2019.
[6] L. Pu, L. Jiao, X. Chen, L. Wang, Q. Xie, and J. Xu, “Online resource
are set as γiM = γiA = 0.5, and γiE = 0. In this situation, allocation, content placement and request routing for cost-efficient edge
energy consumption can be ignored. Since the computation caching in cloud radio access networks,” IEEE Journal on Selected Areas
capability of edge servers is greater than that of local devices, in Communications, vol. 36, no. 8, pp. 1751–1767, 2018.
[7] I. Kadota, A. Sinha, and E. Modiano, “Scheduling algorithms for
the system-wide cost of LC increases, and the corresponding optimizing age of information in wireless networks with throughput
cost reduction increases to 58%. In energy-deficiency IoMT, constraints,” IEEE/ACM Transactions on Networking, vol. 27, no. 4,
the monitoring system concerns about energy consumption due pp. 1359–1372, 2019.
[8] J. H. Abawajy and M. M. Hassan, “Federated Internet of things and
to insufficient energy supplies. In order to minimize the energy cloud computing pervasive patient health monitoring system,” IEEE
consumption to extend the lifespan of the monitoring system, Communications Magazine, vol. 55, no. 1, pp. 48–53, 2017.
the coefficients are set as γiM = γiE = 0.5, and γiA = 0. [9] A. R. M. Forkan, I. Khalil, A. Ibaida, and Z. Tari, “Bdcam: Big data for
context-aware monitoring - a personalized knowledge discovery frame-
The cost of MEC scheme increases due to the increase of work for assisted healthcare,” IEEE Transactions on Cloud Computing,
transmission energy consumption. In addition, the average vol. 5, no. 4, pp. 628–641, 2015.
performance loss of DIATAL algorithm in three situations is [10] G. Muhammad, S. M. M. Rahman, A. Alelaiwi, and A. Alamri,
“Smart health solution integrating IoT and cloud: A case study of
12% compared with the centralized SMA algorithm. It can be voice pathology monitoring,” IEEE Communications Magazine, vol. 55,
concluded that DIGTAL algorithm is efficient in terms of the pp. 69–73, January 2017.
15

[11] J. Pagán, R. Fallahzadeh, M. Pedram, J. L. Risco-Martı́n, J. M. Moya, [32] D. Monderer and L. S. Shapley, “Potential games,” Games and economic
J. L. Ayala, and H. Ghasemzadeh, “Toward ultra-low-power remote behavior, vol. 14, no. 1, pp. 124–143, 1996.
health monitoring: An optimal and adaptive compressed sensing frame- [33] X. Lyu, W. Ni, H. Tian, R. P. Liu, X. Wang, G. B. Giannakis, and
work for activity recognition,” IEEE Transactions on Mobile Computing, A. Paulraj, “Optimal schedule of mobile edge computing for internet
vol. 18, no. 3, pp. 658–673, 2018. of things using partial information,” IEEE Journal on Selected Areas in
[12] T. Wang, M. Z. A. Bhuiyan, G. Wang, M. A. Rahman, J. Wu, and Communications, vol. 35, no. 11, pp. 2606–2615, 2017.
J. Cao, “Big data reduction for a smart city’s critical infrastructural [34] T. S. Rappaport et al., Wireless communications: principles and practice,
health monitoring,” IEEE Communications Magazine, vol. 56, no. 3, vol. 2. New Jersey: prentice hall PTR New Jersey, 1996.
pp. 128–133, 2018.
[13] H. Liu, X. Yao, T. Yang, and H. Ning, “Cooperative privacy preservation
for wearable devices in hybrid computing-based smart health,” IEEE
Internet of Things Journal, vol. 6, no. 2, pp. 1352–1362, 2018.
[14] P. Pace, G. Aloi, R. Gravina, G. Caliciuri, G. Fortino, and A. Liotta, “An
edge-based architecture to support efficient applications for healthcare
Zhaolong Ning (M’14-SM’18) received the M.S.
industry 4.0,” IEEE Transactions on Industrial Informatics, vol. 15,
and PhD degrees from Northeastern University,
no. 1, pp. 481–489, 2018.
Shenyang, China. He was a Research Fellow at
[15] L. Gu, D. Zeng, S. Guo, A. Barnawi, and Y. Xiang, “Cost efficient re-
Kyushu University, Japan. He is an Associate Profes-
source management in fog computing supported medical cyber-physical
sor in the School of Software, Dalian University of
system,” IEEE Transactions on Emerging Topics in Computing, vol. 5,
Technology, China, and an Adjunct Professor with
no. 1, pp. 108–119, 2015.
Lanzhou University, China. He has published over
[16] C. Shu, Z. Zhao, G. Min, and S. Chen, “Mobile edge aided data
100 scientific papers in international journals and
dissemination for wireless healthcare systems,” IEEE Transactions on
conferences. His research interests include Internet
Computational Social Systems, vol. 6, no. 5, pp. 898–906, 2019.
of things, edge computing, and artificial intelligence.
[17] P. Verma and S. K. Sood, “Fog assisted-IoT enabled patient health
monitoring in smart homes,” IEEE Internet of Things Journal, vol. 5,
no. 3, pp. 1789–1796, 2018.
[18] M. Chen, J. Yang, J. Zhou, Y. Hao, J. Zhang, and C. Youn, “5G-smart
diabetes: Toward personalized diabetes diagnosis with healthcare big
data clouds,” IEEE Communications Magazine, vol. 56, pp. 16–23, April
2018.
[19] L. Feng, A. Ali, M. Iqbal, A. K. Bashir, S. A. Hussain, and S. Pack, “Op- Peiran Dong received B.S. degree from Dalian
timal haptic communications over nanonetworks for e-health systems,” University of Technology, Dalian, China, in 2018.
IEEE Transactions on Industrial Informatics, vol. 15, no. 5, pp. 3016– He is currently working toward the M.S. degree in
3027, 2019. the same university. His research interests include
[20] C. Yi and J. Cai, “Transmission management of delay-sensitive medical mobile edge computing, artificial intelligence and
packets in beyond wireless body area networks: A queueing game resource management.
approach,” IEEE Transactions on Mobile Computing, vol. 17, no. 9,
pp. 2209–2222, 2018.
[21] T. Sigwele, Y. F. Hu, M. Ali, J. Hou, M. Susanto, and H. Fitriawan,
“Intelligent and energy efficient mobile smartphone gateway for health-
care smart devices based on 5G,” in IEEE Global Communications
Conference (GLOBECOM), pp. 1–7, 2018.
[22] S. Misra and S. Sarkar, “Priority-based time-slot allocation in wireless
body area networks during medical emergency situations: An evolution-
ary game-theoretic perspective,” IEEE Journal of Biomedical and Health
Informatics, vol. 19, no. 2, pp. 541–548, 2014. Xiaojie Wang received the M.S. degree from North-
[23] A. Astrin, “IEEE standard for local and metropolitan area networks part eastern University, China, in 2011, and received the
15.6: Wireless body area networks,” IEEE Std 802.15. 6, 2012. Ph.D. degree from Dalian University of Technology,
[24] S. Misra, S. Moulik, and H.-C. Chao, “A cooperative bargaining solution China, in 2019. From 2011 to 2015, she was a
for priority-based data-rate tuning in a wireless body area network,” software engineer in NeuSoft Corporation, China.
IEEE Transactions on Wireless Communications, vol. 14, no. 5, p- Currently, she is a post-doctoral research fellow in
p. 2769–2777, 2015. The Hong Kong Polytechnic University, China. Her
[25] S. Moulik, S. Misra, and A. Gaurav, “Cost-effective mapping between research interests are vehicular networks, edge com-
wireless body area networks and cloud service providers based on multi- puting and resource management. She has published
stage bargaining,” IEEE Transactions on Mobile Computing, vol. 16, over 30 scientific papers in the above areas.
no. 6, pp. 1573–1586, 2016.
[26] B. Di, L. Song, and Y. Li, “Sub-channel assignment, power allocation,
and user scheduling for non-orthogonal multiple access networks,” IEEE
Transactions on Wireless Communications, vol. 15, no. 11, pp. 7686–
7698, 2016.
[27] J. Zheng, Y. Cai, Y. Wu, and X. Shen, “Dynamic computation offloading
for mobile cloud computing: A stochastic game-theoretic approach,”
Xiping Hu received the Ph.D. degree from the
IEEE Transactions on Mobile Computing, vol. 18, no. 4, pp. 771–786,
University of British Columbia, Vancouver, BC,
2018.
Canada. He is currently a professor with Lanzhou
[28] S. Jošilo and G. Dán, “Selfish decentralized computation offloading for
University, China. He was the Co-Founder and CTO
mobile cloud computing in dense wireless networks,” IEEE Transactions
of Bravolol Ltd., Hong Kong, a leading language
on Mobile Computing, vol. 18, no. 1, pp. 207–220, 2018.
learning mobile application company with over 100
[29] M. Tang, L. Gao, and J. Huang, “Enabling edge cooperation in tactile million users, and listed as the top 2 language
internet via 3C resource sharing,” IEEE Journal on Selected Areas in education platform globally. He has over 70 papers
Communications, vol. 36, no. 11, pp. 2444–2454, 2018. published and presented in prestigious conferences
[30] Z. Han, D. Niyato, W. Saad, T. Başar, and A. Hjørungnes, Game and journals. He has been serving as the lead guest
theory in wireless and communication networks: Theory, models, and editors of IEEE Transactions on Automation Science
applications. Cambridge university press, 2012. and Engineering, WCMC and etc. His research areas consist of mobile cyber-
[31] X. Chen, L. Jiao, W. Li, and X. Fu, “Efficient multi-user computation physical systems, crowdsensing and social networks.
offloading for mobile-edge cloud computing,” IEEE/ACM Transactions
on Networking, vol. 24, no. 5, pp. 2795–2808, 2015.
16

Lei Guo received the Ph.D. degree from the U- Ricky Y. K. Kwok (F’14) is a professor at The
niversity of Electronic Science and Technology of University of Hong Kong, Hong Kong. He has
China, Chengdu, China, in 2006. He is currently a been serving as an Associate Editor for the IEEE
Full Professor with Chongqing University of Posts Transactions on Parallel and Distributed Systems.
and Telecommunications, Chongqing, China. He has He also serves as a member of the Editorial Board
authored or coauthored more than 200 technical for the International Journal of Sensor Networks,
papers in international journals and conferences. Journal of Parallel and Distributed Computing, and
He is an editor for several international journals. Peer-to-Peer (P2P) Computing. He is a Fellow of
His current research interests include communica- HKIE, IEEE, and IET. His recent research endeavors
tion networks, optical communications, and wireless are mainly related to incentive, dependability, and
communications. security issues in wireless systems and P2P appli-
cations. He is also spending much time on task scheduling and mapping
in contemporary parallel processing platforms, such as chip multiprocessors,
dynamically reconfigurable systems, and clouds. He received his B.Sc. degree
in computer engineering from HKU in 1991, the M.Phil. and Ph.D. degrees in
computer science from the Hong Kong University of Science and Technology
Bin Hu (M’10-SM’15) is currently a professor (HKUST) in 1994 and 1997, respectively.
in Lanzhou University, adjunct professor in Ts-
inghua University, China, and guest professor in
ETH Zurich, Switzerland.
He is an IET Fellow, co-chairs of IEEE SMC TC
on Cognitive Computing, and Member at Large of
ACM China, Vice President of International Society
for Social Neuroscience (China committee) etc. His
work has been funded as a PI by the Ministry of Sci-
ence and Technology, National Science Foundation
China, European Framework Programme 7, EPSRC,
and HEFCE UK, etc, also, published more than 100 papers in peer re-
viewed journals, conferences, and book chapters including Science, Journal of
Alzheimer’s Disease, PLoS Computational Biology, IEEE Trans., IEEE Intel-
ligent Systems, AAAI, BIBM, EMBS, CIKM, ACM SIGIR, etc. He has served
as Chairs/Co-Chairs in many IEEE international conferences/workshops, and
associate editors in peer reviewed journals on Cognitive Science and Pervasive
Computing, such as IEEE Trans. Affective Computing, Brain Informatics,
IET Communications, Cluster Computing, Wireless Communications and
Mobile Computing, The Journal of Internet Technology, Wiley’s Security and
Communication Networks, etc.

Yi Guo received the medical degree and M.Med. de-


gree from the Tongji Medical College of Huazhong
university of Science and Technology, Wuhan, Chi-
na, in 1985 and 1991, respectively, and the Ph.D.
degree from the University of Greifswald, Greif-
swald, Germany, in 1997. He is currently the chief
of Neurology in the second clinical medical college
of Jinan university, a member of the cerebrovascu-
lar disease group of Chinese Medical Association
 
neurology branch, the chairman of the Shenzhen
Medical Association of neurology and the Shenzhen
Medical Association of psychosomatic medicine. His major research areas
are cerebrovascular diseases, dementia, movement disorder diseases, sleep
disorder, depression and anxiety.

Tie Qiu (M’14-SM’18) received Ph.D degree in


computer science from Dalian University of Tech-
nology in 2012. He is currently a Full Professor at
School of Computer Science and Technology, Tian-
jin University, China. Prior to this position, he held
assistant professor in 2008 and associate professor
in 2013 at School of Software, Dalian University of
Technology. He was a visiting professor at electrical
and computer engineering at Iowa State University
in U.S. (2014-2015). He has authored/co-authored
9 books, over 150 scientific papers in international
journals and conference proceedings, such as IEEE/ACM Transactions on
Networking, IEEE Transactions on Mobile Computing, IEEE Transactions on
Knowledge and Data Engineering, INFOCOM etc.

View publication stats

You might also like