Next Article in Journal
MultivariateSystem Identification of Differential Drive Robot: Comparison Between State-Space and LSTM-Based Models
Previous Article in Journal
Long-Term Stability Improvements of the Miniature Atomic Clock Through Enhanced Thermal Environmental Control
Previous Article in Special Issue
Hybrid CNN-GRU Model for Real-Time Blood Glucose Forecasting: Enhancing IoT-Based Diabetes Management with AI
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

UAV-Enabled Maritime IoT D2D Task Offloading: A Potential Game-Accelerated Framework

1
Navigation College, Dalian Maritime University, Dalian 116026, China
2
Department of Network Intelligence, Peng Cheng Laboratory, Shenzhen 518000, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(18), 5820; https://doi.org/10.3390/s25185820
Submission received: 21 August 2025 / Revised: 9 September 2025 / Accepted: 16 September 2025 / Published: 18 September 2025
(This article belongs to the Special Issue Artificial Intelligence and Edge Computing in IoT-Based Applications)

Abstract

Maritime Internet of Things (IoT) with unmanned surface vessels (USVs) faces tight onboard computing and sparse wireless links. Compute-intensive vision and sensing workloads often exceed latency budgets, which undermines timely decisions. In this paper, we propose a novel distributed computation offloading framework for maritime IoT scenarios. By leveraging the limited computational resources of USVs within a device-to-device (D2D)-assisted edge network and the mobility advantages of UAV-assisted edge computing, we design a breadth-first search (BFS)-based distributed computation offloading game. Building upon this, we formulate a global latency minimization problem that jointly optimizes UAV hovering coordinates and arrival times. This problem is solved by decomposing it into subproblems addressed via a joint Alternating Direction Method of Multipliers (ADMM) and Successive Convex Approximation (SCA) approach, effectively reducing the time between UAV arrivals and hovering coordinates. Extensive simulations verify the effectiveness of our framework, demonstrating up to a 49.6% latency reduction compared with traditional offloading schemes.

1. Introduction

Shipping occupies a crucial position within the national transportation systems of various countries, delivering significant economic and social benefits [1]. With the rapid development of intelligent shipping and digitalization, maritime IoT systems have recently emerged as a key enabler for enabling real-time vessel monitoring, environmental sensing, and autonomous navigation [2,3,4]. However, unlike terrestrial IoT, maritime IoT networks face unique challenges, including sparse wireless connectivity, harsh propagation environments, and the limited onboard computation capacity of USVs [5,6]. At the same time, computation-intensive tasks such as vision-based navigation, image recognition, and safety-critical decision-making involve processing substantial volumes of raw data, and the computational latency incurred may exceed the permissible thresholds [7]. These factors highlight the necessity of task offloading networks, where USVs can offload workloads to nearby assisting vessels or UAV-assisted edge nodes to ensure efficient and timely task execution.
Mobile edge computing (MEC), built upon 5G/6G wireless communication technologies, offers a promising solution [8]. MEC addresses this challenge by pushing abundant computational resources from cloud servers to the network edge, thereby meeting the escalating computational and communication demands of USVs. However, constrained by the inherent limitations of the hardware capabilities of MEC platforms themselves, MEC systems currently cannot provide on-demand, ubiquitous temporary services within hotspot areas. Compared to traditional MEC, UAV-assisted MEC offers the capability to rapidly establish edge computing nodes in areas lacking fixed infrastructure, thereby overcoming the spatial constraints inherent in conventional edge computing deployments. Furthermore, UAVs can dynamically adjust their positions in the airspace, enabling broader coverage and enhanced proximity to task locations, which significantly improves computational efficiency and service quality.
The inherent dynamic resource scheduling capability of UAV-assisted systems allows for optimization of the computational resource distribution based on task demands, thereby enhancing system adaptability and resilience. In [9], the authors integrate bandwidth allocation and UAV positioning to minimize the task delay. In [10], the authors optimize the task offloading ratio by establishing a two-tier architecture consisting of users and UAVs. In [11], the authors formulate a UAV energy minimization problem by comprehensively considering the USVs’ task execution methods, UAV trajectories, UAV arrival times, and UAV hovering coordinates. In [12], the authors proposed approach involves a USV-UAV cooperative platform where UAVs dynamically position themselves and land on USVs with low latency to perform tasks. Another proposal introduces a UAV-assisted maritime IoT network, enabling USVs to offload computationally intensive tasks to UAVs [13]. Although UAV-assisted MEC pushes computational resources from the remote cloud towards the network edge, resource contention arises when multiple USVs simultaneously require task offloading to the edge cloud. This competition for resources directly impacts user experience.
D2D communication, enabling direct data transmission between adjacent users, has garnered significant academic interest for its potential application as an auxiliary approach to task offloading. In [14], the authors discussed the potential of D2D communication for task offloading, aiming to maximize the number of users capable of completing computational tasks through optimized D2D link establishment. However, most existing research suffers from two common limitations. Firstly, there is a prevalent assumption that stable D2D communication links are pre-established. In practice, constrained by factors such as physical distance and social ties, certain mobile users struggle to establish stable D2D links. This foundational assumption deviates from real-world scenarios, necessitating in-depth investigation into effective D2D pairing mechanisms. Secondly, existing research has predominantly focused on individual optimization dimensions, such as channel allocation, D2D pairing, and task offloading modes, ignoring the strong coupling relationships among these three aspects.
Game theory provides an effective theoretical foundation for multi-agent resource allocation, incentive mechanism design, and system-wide collaborative optimization. The construction of suitable game-theoretic models enables the capture of the evolution of each participant’s strategy under mutual influence, thereby helping the system maximize overall utility or payoff under limited resources. In [15,16], game theory is used to manage communication resources. By modeling the channel selection problem as an exact potential game (EPG), a balance between delay and energy consumption is achieved. In [17], a stochastic congestion game based on an EPG was proposed to investigate the load balancing issue in MEC, aiming to minimize the delay of task execution. In [18], an EPG is used for federated split learning. On the basis of BFS, distributed machine learning with low latency costs is realized through an EPG and resource optimization. In [19], the authors model the decision process in task offloading and resource allocation as a potential game, which achieves efficient, distributed task offloading and resource allocation with a convergence guarantee in a large-scale U-MEC network.
To integrate the aforementioned technological advantages while ensuring alignment with practical shipping application scenarios, we design an accelerated D2D distributed computing offloading framework based on EPG theory, called ADTO. This framework aims to achieve efficient task execution by leveraging the high-mobility and cluster head (CH) [20,21] characteristics of UAVs in UAV-assisted edge networks and the constrained computational resources in D2D-assisted edge networks [22]. Specifically, the proposed framework employs potential game theory to model the client clustering optimization problem as a distributed computation offloading game. This approach aims to maximize the overall offloading efficiency while simultaneously addressing communication limitations and enhancing resource utilization. Building upon this, we formulate a global latency minimization problem that jointly optimizes UAV hovering coordinates and arrival times. This problem is solved by decomposing it into subproblems addressed via a joint ADMM and SCA approach, effectively reducing the time between UAV arrivals and hovering coordinates. The main contributions of this paper can be outlined as follows:
  • This paper introduces a novel edge computing architecture in maritime IoT systems to fully utilize the advantage of UAV-assisted edge computing (with UAVs serving as dynamic CHs) and D2D-assisted edge networks (with USVs cooperating in clusters), aiming to provide USVs with low-latency and reliable computing services.
  • A global task offloading latency minimization model is constructed by jointly optimizing D2D link selection, UAV arrival time, and hovering coordinates. To reduce computational complexity, a heuristic solution is proposed to decompose the proposed problem into multiple subproblems and design suboptimal solutions, thereby reducing the optimization cost associated with long-term repeated optimization.
  • The simulation results under simulated realistic scenarios and various system settings demonstrate that our proposed framework can effectively reduce the overall system delay while making full use of the available communication and computing resources.
The rest of this paper is organized as follows: Section 2 mathematically models the global delay issue and presents an overview of the proposed ADTO algorithm. Section 3 presents a solution to the problem mentioned in Section 2. Section 4 presents the results of the experiment. Section 5 offers a conclusion to and discussion on this essay.

2. System Overview and Problem Formulation

2.1. System Model

The UAV-assisted D2D edge network under consideration comprises multiple distributed USVs possessing heterogeneous computational and communication resources, multiple UAVs equipped with identical communication resources, and a single terrestrial base station (TBS) acting as an edge server with abundant computational resources. Furthermore, the TBS is equipped with a global controller capable of perceiving USV positions, UAV computational and energy states, and a priori Channel State Information (CSI). Each USV can establish D2D links with neighboring USVs. However, due to constraints imposed by geographical factors and hardware limitations, USVs cannot establish direct communication links with the TBS; consequently, UAVs act as communication relays between the TBS and USVs by establishing wireless cellular links with USVs and forming Line of Sight (LoS) connections with the TBS. Specifically, the distributed USVs are categorized into two types: task clients (TCs) and assisting clients (ACs). There are L TCs capable of participating in task offloading by contributing their local tasks, represented as L = { 1 , 2 , , L } , and C ACs located near TCs that can assist TCs in task completion by providing spare computational resources, represented as C = { 1 , 2 , , C } . Therefore, each TC can form a collaborative cluster with multiple ACs via D2D communication to perform task offloading, thereby overcoming bottlenecks caused by limited computational or communication resources, with the L TCs clustered into L collaborative clusters. To simplify the analysis, we assume each cluster contains exactly one TC. Without loss of generality, cluster l L is associated with a total of n l ACs, denoted by N l = { 0 , 1 , , n l } . When N l = 0 , it denotes the index of the TBS. Within a three-dimensional Cartesian coordinate system, UAVs are assumed to fly and hover at a fixed altitude H; when UAV l serves USV i located at coordinates q i = ( x i , y i , 0 ) , it has a corresponding hovering coordinate q l = ( x l , y l , H ) . To simplify the analysis and prevent resource sharing conflicts among ACs, we assume each AC can join at most one cluster. Let the binary variable v l indicate the association status between AC l and cluster l, where V l = 1 if AC l is selected by cluster l, and V l = 0 otherwise. Finally, we can derive
l = 1 L V l , c 1 , c C .
The proposed method aims to collaboratively complete tasks by splitting a task with a linear topology into multiple subtasks within each learning cluster and assigning these subtasks to cluster members based on their computational capabilities. For simplicity, the tasks considered in this paper can be divided into up to the total number of clients within a cluster. Each task contains D segmentable layers, denoted as D = { 1 , 2 , , D } . Let the binary variable z l , d indicate the splitter selection status for segmentable layer d D , where z l , d = 1 signifies that segmentation layer d is selected, and z l , d = 0 otherwise. Therefore, the task allocation corresponding to cluster l can be denoted as the vector z l = { z l , 1 , z l , 2 , , z l , D } . For simplicity, each cluster member is restricted to forwarding its model execution output solely to its immediate successor within the chain. Therefore, the USV clustering and task assignment strategies should adhere to the following constraints:
d = 1 D z l , d D , l L .
To facilitate further analysis of this scenario, we introduce the definitions as follows.
Definition 1
(Connected graph). For any graph G = ( V , E ) , let ( V ) denote the set of nodes, representing the set of USVs, and let ( E ) denote the set of edges, representing the wireless communication links established between these nodes. If any two distinct vertices in V are connected, the graph G is referred to as a connected graph.

2.2. Problem Formulation

Based on the discussion in the previous section, the latency incurred by the distributed task offloading framework proposed in this paper comprises two components: intra-cluster task execution delay and UAV flight delay. This subsection provides a detailed analysis of the latency contributions from each component.
Global Task Distribution: When the computation tasks commence, the TBS broadcasts the global task to the CH of each cluster. The downlink data transfer rate from TBS to CH l in a cluster can be expressed as
r l D L = B l log 2 1 + p h l , 0 σ 2 d 0 , l 2 ,
where B l ( 0 < B l ) denotes the radio bandwidth allocated by the TBS to the UAV serving as the CH, p denotes the transmission power of the TBS, σ 2 represents the noise variance, d 0 , l = q l q 0 2 + H 2 signifies the distance between the TBS and the UAV l hovering coordinate, p is the transmit power of the TBS, and h l . 0 represents the channel power gain between the UAV and the TBS. The transmission delay from the TBS to the CH of each cluster can be expressed as
t l D L = w l R l D L ,
where w l represents the data size of a global task, which is assumed to be identical for all clusters.
Intra-Cluster Task Processing: Intra-cluster task execution consists of three primary sub-phases: intra-cluster task distribution, the task execution process, and task collection by the CH. For analytical convenience, we discuss the process using cluster l as a representative example.
  • Intra-Cluster Task Distribution: Within the cluster, the designated UAV serving as the CH acts as the communication relay. USVs access the CH via a wireless cellular link. Consequently, the intra-cluster task distribution latency from the CH to USV i can be expressed as
    t a , i = w l , i r i ,
    where r i = B log 2 1 + p h l , 0 σ 2 ( q i q l 2 + H 2 ) represents the data transmission rate between the CH and USV i, measured in bits per second, and w l , i denotes the size of the task processed by USV i.
  • The Task Execution Process: Once intra-cluster task allocation is completed, USV i immediately executes its assigned subtask. Therefore, the task execution delay of USV i can be expressed as
    t l , i c o m p = C i w l , i f i ,
    where C i represents the number of CPU cycles required to process a data sample, and f i denotes the CPU computation frequency of USV i.
    Let w l , i i d denote the intermediate data forwarded from USV i to USV j after local computation. The corresponding communication delay is
    t l , i c o m m = w l , i i d r i , j ,
    where r i , j denotes the D2D data transmission rate between USV i and USV j.
  • Task Collection by the CH: Upon the completion of execution, the CH instructs the USVs within the cluster to return their processed segments for aggregation. Since the task collection process is almost identical to the intra-cluster task distribution process, the delay of model collection t c , i is equal to t a , i .
    Finally, the total intra-cluster processing delay can be calculated as
    t l , i T T E = 2 t a , i + t T E ,
    where t T E = t l , i c o m m + t l , i c o m p .
Local Subtask Uploading: Upon task completion, the CH uploads the aggregated result to the TBS. The transmission rate from the CH to the TBS can be calculated as
r l U L = B l log 2 1 + p l h l σ 2 d l , 0 2 ,
where p l denotes the transmission power of the CH. The corresponding task upload delay from the CH to the TBS can be expressed as
t l U L = w l r l U L .
Finally, under the USV clustering strategy and task allocation strategy, the overall delay of the cluster can be expressed as
T l = t l D L + t l , i T T E + t l U L .
The UAV Time Cost Model: We assume the propulsion power of each UAV is independent of external factors and solely dependent on its flight velocity v l . The time consumed for a UAV to travel between any two hovering coordinates associated with USVs can be derived as
t l ( i , j ) f = q j q i v l .
Let the binary variable ρ l ( i , j ) indicate whether UAV l travels from hovering coordinate i to hovering coordinate j, where ρ l ( i , j ) = 1 signifies that UAV l flies from point i to point j, and ρ l ( i , j ) = 1 otherwise. When i = 0 or j = 0 , it denotes the index of the TBS. Given that UAV l must depart from the TBS and ultimately return to it, we derive the following constraints:
i = 0 n l ρ l ( 0 , i ) = g = 0 n l ρ l ( j , 0 ) = 1 , l L .
Due to the sequential dependency of D2D computation offloading subtasks, UAV l can serve USV j if and only if it has successfully completed service to USV i. Thus, the constraint can be derived as follows:
i = 0 n l ρ l ( i , j ) = g = 0 n l ρ l ( j , g ) = 1 , l L , g i , j .
It is noteworthy that UAV l must remain in a hovering state until USV i completes the execution of its allocated subtask. This requirement leads to the following constraint
t l , i a + T l + t l ( i , j ) f t l , j a , i , j N l , l L ,
where t l , i a is the time when UAV l reaches the hovering coordinates of USV i.
Subject to the maximum battery capacity E l m a x of the UAV, let T l m a x denote its maximum allowable service time. This imposes the following constraint:
i = 0 n l j = 0 n l ρ l ( i , j ) ( T l + t l ( i , j ) f ) t l max .
Considering the limited computational resources of the USVs and the limited communication resources of the TBS, this paper globally optimizes the USV clustering scheme, the task allocation strategy, and the arrival time and hovering coordinates of each UAV to minimize the total delay cost of each TC. The problem can be formulated as a total latency cost minimization problem, with the objective and constraints described as follows:
min { n l , s l , t , q l } : T = l = 1 L i = 0 n l j = 0 n l ρ l ( i , j ) ( T l + t l ( i , j ) f ) s . t . ( 1 ) , ( 2 ) , ( 13 ) ( 16 ) .

3. Problem Decomposition and Proposed Method

The problem formulated in the preceding section involves three tightly coupled subproblems: the USV clustering strategy, the task allocation strategy, UAV arrival time optimization, and hovering coordinate optimization. For instance, the task allocation strategy inherently depends on the established client clustering strategy. This tight coupling results in the exponential complexity evident in (17), substantially increasing the computational costs. To address this challenge, as shown in Figure 1, we first propose a client clustering game based on BFS and EPG theory. Subsequently, we efficiently optimize the task allocation strategy and UAV hovering coordinate problem utilizing a greedy algorithm combined with the ADMM. When the TBS receives the current environment state as a global controller, the current optimal UAV flight trajectory and the optimal D2D offloading decision are calculated by running the proposed scheme and fed back to the USV and UAV in the environment.

3.1. BFS-Based Distributed Game Clustering

Each learning cluster seeks a local strategy that minimizes its own latency. Accordingly, the client-clustering task is modeled as a multi-player game in which L clusters serve as players. The strategy of cluster l is denoted by s l , with its feasible strategy set represented by S l . Here, we generate the game’s strategy space by applying BFS. Specifically, as depicted in Figure 2, starting from the origin TC, BFS prioritizes exploring all neighboring ACs before proceeding to explore ACs at the next level further away, proceeding level by level until the target is found or all reachable ACs have been traversed.
We assume that communication state variations within each time window are relatively stable. Under this distributed game framework, each agent considers not only its own latency but also the impact of its actions on the overall network state. Specifically, for each TC, a clustering strategy s l can be determined. The joint strategy of L clusters can then be represented as s = { s 1 , s 2 , , s L } . Notably, s l denotes the clustering strategies of all clusters except cluster l. Within this context, we employ marginal utility theory [23,24] to evaluate the overall impact of a strategy. Furthermore, aligning with the optimization objective in (17), the utility function for a cluster is defined as
A l ( s l , s l ) = ϕ l ( s l , s l ) + j l [ ( ϕ j ( s j , s j ) + ϕ j ( s j , s j l ) ] ,
where ϕ j ( s j , s j l ) denotes the utility of cluster j under the condition that cluster l does not take any action. Therefore, j l [ ( ϕ j ( s j , s j ) + ϕ j ( s j , s j l ) ] signifies the change in the aggregate utility of the other clusters induced by the strategic action of cluster l.
The objective of the distributed clustering game is to minimize cluster conflicts and maximize each cluster’s utility, which critically depends on the existence of a Nash Equilibrium (NE) within this distributed clustering game framework.
Definition 2
(Nash Equilibrium [25]). A joint strategy s * = { s 1 * , , s L * } is called an NE of the formulated game if and only if, holding all other clusters’ strategies fixed, no single cluster can improve its utility by unilaterally altering its own strategy. In other words,
A l ( s l * , s l * ) A l ( s l , s l * ) , l L , s l S l .
To ensure that the proposed game-based method possesses an NE and achieves convergence, we introduce the concept of the EPG and further explore the existence of an NE under its theoretical framework.
Definition 3
(EPG [26]). If an exact potential function ψ ( s l , s l ) exists that satisfies the following conditions, then the game is called an EPG:
A l ( s l , s l ) A l ( s l , s l ) = ψ ( s l , s l ) ψ ( s l , s l ) ,
where s l , s l S l .
Theorem 1. 
A distributed USV clustering game is an EPG if and only if at least one pure-strategy NE point exists.
Proof. 
Based on the optimization problem, we can define an exact potential function that satisfies the following conditions:
μ ( s l , s l ) = l = 1 L ψ l ( s l , s l ) .
The potential function is essentially the sum of all groups’ payoffs across the entire network. Suppose that the decision of group l changes from s l to s l . The change in its utility function is presented in (22).
A l ( s l , s l ) A l ( s l , s l ) = ϕ l ( s l , s l ) + j l ( ϕ j ( s j , s j ) + ϕ j ( s j , s j l ) ) ϕ l ( s l , s l ) + j l ( ϕ j ( s j , s j ) + ϕ j ( s j , s j l ) ) = ϕ l ( s l , s l ) + ϕ l ( s l , s l ) + j l ( ϕ j ( s j , s j ) + ϕ j ( s j , s j ) ) j l ( ϕ j ( s j , s j l ) + ϕ j ( s j , s j l ) )
Although the behavior of cluster l has changed, if cluster l abandons its decision while other clusters maintain their own decisions, the absence of cluster l’s action would have the same impact on the other clusters (i.e., ψ j ( s j , s j l ) = ψ j ( s j , s j l ) ). Thus, we can ignore the third term in (18) and reorganize the above expression, as shown in (23).
A l ( s l , s l ) A l ( s l , s l ) = ϕ l ( s l , s l ) + ϕ l ( s l , s l ) + j l ( ϕ j ( s j , s j ) + ϕ j ( s j , s j ) ) = ϕ l ( s l , s l ) + j l ϕ j ( s j , s j ) ϕ l ( s l , s l ) + j l ϕ j ( s j , s j ) = ψ ( s l , s l ) ψ ( s l , s l )
Therefore, any unilateral change in a cluster’s decision results in an identical variation in both its individual utility and the potential function, confirming that the proposed distributed task offloading game is an EPG. According to the fundamental properties of an EPG, at least one pure-strategy NE exists, thus completing the proof of Theorem 1. □

3.2. Optimizing the Task Allocation for a Given Clustering Strategy

We propose a greedy-based heuristic algorithm that proportionally assigns computational loads based on each USV’s resources. UAVs within clusters execute a zero-workload virtual segment, ensuring feasibility of task allocation. The detailed procedure is presented in Algorithm 1.
Algorithm 1 Task offloading algorithm for given clustering strategy.
Input: Clustering strategy: s l ; computing capability of each USV: { f 1 , f 2 , , f n l + 1 } ; transmission rates between nodes: { r 1 , 2 , r 2 , 3 , , r n l , n l + 1 } ; computational workload of all D layers: { w 1 , w 2 , , w D } ; transmitted intermediate data size between corresponding M layers: { w 1 , 2 i d , w 2 , 3 i d , , w D 1 , D i d } .
Output: Task splitting and allocation strategy: z l ;
1:
Initialize the last selected split layer d = 0 ;
2:
Initialize the computation workload of each USV i as w i = f i d = 1 D w d i = 1 n l + 1 f i ;
3:
Initialize the initial communication cost of each USV i as c o m m i = w d , d + 1 i d r i , i + 1 , i N l , d D ;
4:
for each USV i = 1 , , n l  do
5:
   Calculate computational workload from d to d ;
6:
   while  d d w d w i  do
7:
      Update d = d , k l , m 1 ;
8:
      Update c o m m i ;
9:
   end while
10:
end for

3.3. Optimizing UAV Arrival Times and Hoverings Coordinate for a Given Clustering Strategy

To address the problem of optimizing UAV arrival times and hovering coordinates given fixed client clustering and task allocation strategies, we decouple and reformulate the problem into dedicated subproblems for optimization.
Optimizing UAV Arrival Time t: For any feasible q l , (17) can be reduced to
min { t } : T = l = 1 L i = 0 n l j = 0 n l ρ l ( i , j ) ( T l + t l ( i , j ) f ) s . t . ( 15 ) , ( 16 ) .
Obviously, (24) constitutes a convex optimization problem with respect to the arrival time t. Consequently, we can efficiently solve it using the method of Lagrange multipliers. Having determined when the UAV arrives at the task point, the uncertainty surrounding its hovering coordinate q l is reduced, thereby simplifying subsequent optimization stages.
Optimizing UAV Hovering Coordinates  q l : After obtaining a feasible solution for the UAV arrival time according to (24), the optimization problem for UAV hovering coordinates can be expressed as follows.
min { q l } : T = l = 1 L i = 0 n l j = 0 n l ρ l ( i , j ) ( T l + t l ( i , j ) f ) s . t . ( 15 ) , ( 16 ) .
Due to the nonlinear relationship between T l , t l ( i , j ) f , and the UAV hovering coordinate q l , (25) is rendered a non-convex problem. To address this, we employ the ADMM for its solution. Specifically, we first reformulate 25 into an ADMM-compliant form and then decompose it into a set of subproblems that can be efficiently solved in parallel. To render (25) separable, we introduce the following two auxiliary variables, namely q l * and q l , such that
q l * = q l , q l = q l .
Building upon (25), constraints (15) and (16) can be reformulated, after substituting q l , as
t l , i a + T l * + t l ( i , j ) * f t l , j a , i , j N l , l L ,
i = 0 n l j = 0 n l ρ l ( i , j ) ( T l + t l ( i , j ) f ) t l max .
Therefore, (25) can be reformulated in the equivalent ADMM form as follows:
min { q l , q l * , q l } : T = l = 1 L i = 0 n l j = 0 n l ρ l ( i , j ) ( T l + t l ( i , j ) f ) s . t . ( 26 ) ( 28 ) .
Through the introduction of auxiliary variables, constraints (27) and (28) are decoupled, enabling the problem to be decomposed. Following decoupling, the application of the ADMM allows each subproblem to be computed in parallel, thereby enhancing the computational efficiency. Here, we construct the augmented Lagrangian function with an additional quadratic penalty term to accelerate the convergence and improve the numerical stability, as follows:
L ( q l , q l * , q l , ω 1 , ω 2 ) = l = 1 L i = 0 n l j = 0 n l ρ l ( i , j ) ( T l + t l ( i , j ) f ) + υ 1 2 q l * q l + ω 1 2 + υ 2 2 q l q l + ω 2 2 ,
where ω 1 and ω 2 are the error variables corresponding to (27) and (28), respectively, which function as Lagrange multipliers during the ADMM iterative process; υ 1 and υ 2 are the penalty factors. Regarding the primal variables { q l , q l * , q l } , they can be partitioned into two distinct groups, namely q l and the set { q l * , q l } . Based on this partitioning, the augmented Lagrangian function is also separable. Consequently, (29) can be solved by iteratively updating these two groups of optimization variables. The associated ADMM algorithm procedure primarily consists of the following three steps:
  • Update { q l * , q l } : Based on the aforementioned definitions of the variables { q l * , q l } , their optimization can be processed separately and independently. The optimization procedure for each parameter can be formulated as
    min { q l * } υ 1 2 q l * q l n + ω 1 n 2 s . t . t l , i a + T l * + t l ( i , j ) * f t l , j a , i , j N l , l L ,
    min { q l } υ 2 2 q l q l n + ω 2 n 2 s . t . i = 0 n l j = 0 n l ρ l ( i , j ) ( T l + t l , ( i , j ) f ) t l max .
    where q l n , ω 1 n , ω 2 n represent the solutions obtained after the n-th iteration. Due to the influence of constraints, (31) constitutes a non-convex problem. To resolve this issue, we introduce auxiliary variables δ 1 = { δ l D L , l L } , δ 2 = { δ i , i n l + 1 } , and δ 3 = { δ l U L , l L } , corresponding to the transmission rates r l D L , r i , and r l U L , respectively. Thus, (31) can be reformulated as
    min { q l * , δ 1 , δ 2 , δ 3 } υ 1 2 q l * q l n + ω 1 n 2 s . t . t l , i a + T l * + t l ( i , j ) * f t l , j a , i , j N l , l L , δ l D L r l D L * , l L , δ i r i * , i N l , δ l U L r l U L * , l L ,
    where r l D L * , r i * , and r l U L * represent the transmission rates after substituting q l . However, since r l D L * , r i * , and r l U L * remain non-convex with respect to q l * , (33) is still intractable for direct solution. Notably, r l D L * and r l U L * exhibit convexity with respect to q l * q 0 2 , while r i * is convex with respect to q l * q i 2 . To address this, we seek convex lower bounds for R l D L * , R i * , and R l U L * to replace the original non-convex functions, thereby transforming the optimization problem into a convex problem. Assuming the current iteration point is q l n , the convex lower bounds for r l D L * , r i * , and r l U L * obtained via first-order Taylor expansion at q l n can be expressed as
    r l D L B l log 2 1 + p h l , 0 σ 2 ( q l n q 0 2 + H 2 ) B l p h l , 0 ( q l q 0 2 q l n q 0 2 ) ln ( 2 ) ( q l n q 0 2 + H 2 ) σ 2 ( q l n q 0 2 + H 2 ) + p h l , 0 ,
    r i * B log 2 1 + p l h l , i σ 2 ( q l n q i 2 + H 2 ) B p l h l , i ( q l q i 2 q l n q i 2 ) ln ( 2 ) ( q l n q i 2 + H 2 ) σ 2 ( q l n q i 2 + H 2 ) + p h l , i ,
    r l U L * B l log 2 1 + p l h l , 0 σ 2 ( q l n q 0 2 + H 2 ) B l p l h l , 0 ( q l q 0 2 q l n q 0 2 ) ln ( 2 ) ( q l n q 0 2 + H 2 ) σ 2 ( q l n q 0 2 + H 2 ) + p h l , 0 ,
    Substituting (34)–(36) into (33) transforms the latter into a convex optimization problem, which can be efficiently solved using conventional convex optimization methods. Similarly, (32) can be solved following an analogous procedure, the details of which are omitted here for brevity.
  • Update  q l : The optimization procedure for q l can be formulated as
    min q l l = 1 L i = 0 n l j = 0 n l ρ l ( i , j ) ( T l + t l ( i , j ) f ) + υ 1 2 q l * n + 1 q l + ω 1 n 2 + υ 2 2 q l n + 1 q l + ω 2 n 2 ,
    Following the same solution approach applied to (31), we introduce auxiliary variables ζ 1 = { ζ l D L , l L } , ζ 2 = { ζ i , i N l } , and ζ 3 = { ζ l U L , l L } corresponding to the transmission rates r l D L , r i , and r l U L , respectively. Thus, (37) can be reformulated as
    min q l , ζ 1 , ζ 2 , ζ 3 l = 1 L i = 0 n l j = 0 n l ρ l ( i , j ) ( T l + t l ( i , j ) f ) + υ 1 2 q l * n + 1 q l + ω 1 n 2 + υ 2 2 q l n + 1 q l + ω 2 n 2 , s . t . ζ l D L r l D L , l L , ζ i r i , i N l , ζ l U L r l U L , l L .
    The analytical approach for r l D L , r i , and r l U L follows the same methodology applied to r l D L * , r i * , and r l U L * and thus will not be reiterated here. After this reformulation, (38) becomes a convex optimization problem that can be efficiently solved using standard convex optimization techniques.
  • Updating the Lagrange multiplier: The optimization procedure for the Lagrange multiplier can be formulated as
    ω 1 n + 1 = ω 1 n + q l * n + 1 q l n + 1 ,
    ω 2 n + 1 = ω 2 n + q l n + 1 q l n + 1 .
    The detailed procedure of addressing the problem of optimizing the UAV arrival times and hovering coordinates given fixed client clustering and task allocation strategies is presented in Algorithm 2.
Algorithm 2 ADMM-based UAV optimization algorithm for a given clustering strategy.
Input: The joint strategy of the L clusters: s = { s 1 , s 2 , , s L } ; B, B l ;
Output: Optimal UAV arrival time t and hovering coordinates q l ;
1:
Initialize the Lagrange multiplier ω 1 = 0 , ω 2 = 0 ;
2:
Initialize the iteration index I = 0 ;
3:
Initialize the inner-iteration index n = 0 ;
4:
Repeat iteration
5:
for each cluster l L  do
6:
   Optimize the UAV arrival time t by solving (24);
7:
   Introduce two auxiliary variables q l * , q l and reformulate (15), (16) as (27),(28);
8:
   Reformulate (25) into the equivalent ADMM form;
9:
   while  n < n s e t  do
10:
      n = n + 1
11:
     Obtain { q l n , q l n } by solving (31)–(33);
12:
     Obtain { q l } by solving (37);
13:
     Update the Lagrange multiplier ω 1 n , ω 2 n by calling (39), (40);
14:
   end while
15:
end for
16:
q l I q l n s e t ;
17:
I = I + 1 ;
18:
until  I = I s e t
19:
return Optimal UAV arrival time t and hovering coordinates q l

3.4. Overview of Clustering-Based Distributed Task Offloading Algorithms

Based on the optimization objective in (17), the utility of cluster l can be defined as follows:
ϕ l ( s l , s l ) = α T l + ( 1 α ) t l f ,
where t l f = i = 0 n l j = 0 n l ρ l ( i , j ) t l ( i , j ) f denotes the flight time of UAV l under the current offloading link. α denotes the penalty factor. Considering the other clusters’ policy profiles s l , each cluster updates its policy by selecting policy s l in order to
s l = argmax s l S l A l ( s l , s l ) .
The algorithm begins by initializing a network consisting of L TCs, C ACs, L UAVs, and a TBS. Initially, each cluster selects a clustering strategy s l through BFS-based game clustering before evaluating its utility A l ( s l , s l ) . Next, each cluster chooses a best response strategy [27] to maximize its utility. If the newly chosen strategy provides higher utility than the existing one, it will replace the existing strategy. These steps are repeated until no cluster can improve its utility by updating its strategy. The detailed procedure is presented in Algorithm 3.
Algorithm 3 Overview of clustering-based distributed task offloading algorithms.
Input: Clustering strategy: s l ;
Output: Optimal global latency T;
1:
Initialize the last selected split layer m = 0 ;
2:
Initialize the iteration index k = 0 ;
3:
Initialize the decision-making process for each TC by assigning each user a randomly selected strategy from the available strategy space;
4:
Repeat iteration
5:
for each cluster l L  do
6:
   Calculate the global utility as negative reward by calling Algorithms 1 and 2;
7:
   if  A l ( s l , s l ) < A l ( s l , s l )  then
8:
     Let  s l ( k + 1 ) = s l ;
9:
   else
10:
     Let  s l ( k + 1 ) = s l ( k )
11:
   end if
12:
end for

3.5. Convergence and Complexity Analysis

In this subsection, we conduct a brief convergence and computational complexity analysis of the proposed ADTO framework during the training process. The solution obtained from NE is not necessarily optimal. We use the Price of Anarchy (PoA) to quantify the worst-case scenario of NE. As described in Definition 2, let s * = { s 1 * , , s L * } be an NE strategy profile and A l ( s l * , s l * ) denote maximizing the utility; then, the PoA can be expressed as
P o A = m a x s l * s * l L A l ( s l * , s l * ) m i n s l S l l L A l ( s l , s l ) .
Theorem 2.
The maximum value of the PoA for the distributed USV clustering game is
l L ( t l D L + t l l o c a l + t l U L + t l f ) l L m i n ( T l l o c a l , T l D 2 D ) .
Proof. 
Under the NE, the overall delay for each TC l to complete the global task Q l is at most t l D L + t l l o c a l + t l U L + t l f , corresponding to the strategy in which the TC always executes its computation tasks locally. Hence, we obtain
l L A l ( s l * , s l * ) A l l o c a l ( s l , s l ) = l L ( t l D L + t l l o c a l + t l U L + t l f ) .
l L A l ( s l , s l ) m i n ( A l l o c a l , A l D 2 D ) = m i n ( T l l o c a l + t l , l o c a l f , T l D 2 D + t l , D 2 D f ) .
According to (45) and (46), we can derive the upper bound of the PoA:
P o A l L ( t l D L + t l l o c a l + t l U L + t l f ) l L m i n ( T l l o c a l + t l , l o c a l f , T l D 2 D + t l , D 2 D f ) .
Theorem 2 establishes that even if the algorithm converges to the worst NE, the overall optimization objective does not deteriorate arbitrarily. Crucially, even in the worst-case scenario, its performance remains consistently within a constant factor of the centralized optimal solution.
The computational complexity of BFS-based distributed game clustering primarily depends on the number of edges E and nodes V in the graph. Thus, the computational complexity of BFS-based distributed game clustering can be expressed as O ( | V | + | E | ) . The computational complexity of Algorithm 1 is denoted as O ( n l ) , while the computational complexity of Algorithm 2 is denoted as O ( I · L · n s e t · n l ) , where I represents the number of iterations in Algorithm 2. After omitting constant terms, the overall complexity of ADTO is derived as T ( | V | + | E | + n l + I · L · n s e t · n l ) . After omitting the constant term, the overall computational complexity can be expressed as T ( | V | + | E | + L · n l ) . In summary, the computational complexity of ADTO is acceptable, and this design is well suited to scenarios with high real-time performance requirements and limited resources.

4. Experimental Results and Analysis

In this section, we implement simulations of the proposed framework using Python 3.9 and PyTorch 11.3. Meaningful results from extensive experiments are presented to validate the effectiveness of the developed solution.

4.1. Parameter Settings

We consider a sector-shaped area centered at the TBS, which defines the free flight area of the UAVs. This area contains multiple ACs and TCs, totaling 12 nodes. Since each UAV acts as a CH, the number of UAVs equals the number of TCs. The sector radius is 500 m, and thus, the coordinates of the TBS and the UAV charging station are q 0 = ( 0 , 0 ) . For D2D communication links between clients i and j, we configure all clients with an identical transmission power of 24 dBm. The noise variance σ 2 = 110 dBm and the channel power gain is −60 dB, which are constant in all phases. The flying altitude H of the UAV is set to 100 m, and the flight speed is set to 20 m/s. For each TC, the global task data size is 15 Mbits. For all USVs, the required CPU cycles per bit are uniformly distributed in [1500, 2000] cycles/bit. The computing resources for the TC and AC are configured as f t [ 0.5 , 2 ] × 10 9 CPU cycles/s and f a [ 6 , 10 ] × 10 9 CPU cycles/s, respectively [23]. For the TBS, its transmit power P is 46 dBm, the default communication bandwidth is 5 MHz, and the computing capability is f t b s = 40 × 10 9 CPU cycles/s. The penalty factor α = 0.9 .

4.2. Convergence Behavior

We first analyze the convergence properties of the ADTO algorithm under a configuration of 6 TCs and 6 ACs. As illustrated in Figure 3, 500 independent trials were conducted under identical topological conditions. Consistent with theoretical expectations, the global utility increased with iteration count and converged after approximately 38 iterations. When combined with the theoretical analyses of Theorems 1 and 2, these experimental results confirm that ADTO exhibits robust convergence behavior and attains stable solutions within finite iterations. The penalty factor α is set to 0.9.

4.3. Task Execution Latency Comparison

4.3.1. Local Offloading Mechanisms

We selected several advanced local offloading algorithms for comparison with ADTO, and the details of the selected algorithms are described below.
Random offloading: The random offloading approach randomly assigns the size of subtasks to the USVs within the cluster. This methodology fails to ensure optimal task assignment to the most suitable nodes, consequently inducing suboptimal system performance.
Greedy: The greedy approach offloads the entire task to the nearest and most computationally powerful AC without task splitting.
MAC-L: This approach models complex computation tasks as “task flows” with dependencies and employs the multi-actors-critic (MAC)-based MARL approach. For the purpose of comparison, only the local latency is considered here.
Figure 4 compares the ADTO algorithm against three intra-cluster offloading schemes. As the number of TCs increases, the greedy method is only marginally affected, whereas the other three methods exhibit a clear upward trend in the delay. Nevertheless, despite its relative insensitivity to TC count, the greedy approach consistently incurs the highest latency among the four. In contrast, ADTO delivers the lowest delay across all tested TC levels.
Figure 5 depicts the performance of the three schemes as the number of ACs grows, with the number of TCs held constant at 6. Because the greedy algorithm simply offloads the entire task to the nearest AC with the greatest computational capacity, increasing the number of ACs does not significantly improve its overall performance. The random offload approach is further hampered by resource conflicts and thus underperforms relative to ADTO. Furthermore, MAC-L is the method among the three that has the closest performance to that of ADTO. This is because as the number of ACs increases, the impact of resource conflicts on the task scheduling of MAC-L gradually diminishes. Therefore, ADTO remains the most performant method among the four.

4.3.2. Global Offloading Mechanisms

Next, we selected several advanced local offloading algorithms for comparison with ADTO, and the details of the selected algorithms are described below.
Global local computing (GLC): After receiving the TBS task transmitted via the UAV, each TC selects to execute the task locally.
Global edge offloading (GEO): Based on Algorithm 1, when the local TC receives the TBS task transmitted via the UAV, it decides to offload part of the task to the TBS for execution.
MAC-L: The MAC-L method takes into account the communication delay while remaining the same as the previous method.
We conducted a comparative evaluation of the ADTO algorithm against three other global offloading mechanisms. As shown in Figure 6, the average latency of all four schemes increases as the number of TCs grows. However, the GEO algorithm’s latency rises sharply due to its sensitivity to constrained communication resources. In contrast, the GLC scheme exhibits relatively minor fluctuations but registers the highest average delay when fewer than four TCs are present. As a scheduling algorithm, MAC-L exhibits increasing latency when the number of TCs rises and the number of ACs relatively decreases. This degradation stems from exacerbated scheduling complexity when allocating TC tasks across diminished computational resources. In contrast, ADTO consistently outperforms all three baseline methods, maintaining the lowest observed latency across all evaluated conditions.
Figure 7 illustrates a global performance comparison of the three mechanisms as the number of ACs varies. Because the performance of both GEO and GLC is independent of AC count, their curves appear as horizontal lines. In contrast, the total latency under ADTO decreases with an increasing number of ACs. This declining trend does not continue indefinitely as AC numbers grow since a balance point will be reached where the intra-cluster communication and computing overhead offsets the benefit gained from adding more ACs.

4.4. UAV Time Cost Comparison

Finally, we compare the latency performance of four schemes: (1) our proposed D2D offloading method, integrating Algorithms 1 and 2, denoted by ADTO; (2) the ADTO method which uses UAV-assisted computation offloading and where the UAV undertakes the computation task, denoted by ADTO-U; (3) the ADTO method with the UAV hover coordinates fixed at the horizontal coordinates of the served USV, denoted by ADTO-F; and (4) the ADTO method with tasks partially and randomly offloaded to neighboring USVs, denoted by ADTO-R.
Figure 8 presents the variations in UAV flight time for different schemes as the number of TCs increases. It can be observed that across all schemes, UAV flight time correspondingly rises with an increasing number of TCs. Under the same number of TCs, ADTO consistently achieves the shortest flight time. Specifically, for ADTO-F, its hovering coordinates are fixed, which results in a longer flight distance compared to that of ADTO. Regarding ADTO-U, the UAV is required to perform local computational tasks, necessitating closer proximity to the TCs. Additionally, it is constrained by battery capacity, leading to frequent travel between the TBS and TCs. Finally, although ADTO-R is the closest scheme to ADTO and has a relatively shorter flight time compared to that of the other two schemes, the introduction of randomness prevents it from guaranteeing an optimal UAV flight trajectory.

5. Conclusions

A novel distributed computation offloading framework for maritime IoT systems has been proposed in this paper. Considering practical communication constraints and real-world application demands in shipping operations, the proposed framework employs potential game theory to model the client clustering optimization problem as a distributed computation offloading game. This approach aims to maximize the overall offloading efficiency while simultaneously addressing communication limitations and enhancing resource utilization. Building upon this, we formulate a global latency minimization problem that jointly optimizes UAV hovering coordinates and arrival times. This problem is solved by decomposing it into subproblems addressed via a joint ADMM and SCA approach, effectively reducing the time between UAV arrivals and hovering coordinates. Extensive simulation results validate that the framework can effectively reduce the overall system delay while making full use of the available computing resources.
Although the distributed computational offloading framework proposed in this paper demonstrates significant effectiveness and outperforms several prevalent schemes in reducing global latency, there remain opportunities for further improvements. Firstly, as the number of TCs increases, the performance of ADTO exhibits a declining trend. Introducing Digital Twin (DT) technology can provide a novel approach to ensuring quality of service in regions with high-density data centers and efficiently offloading complex tasks [28]. Secondly, considering the movement characteristics of USVs, future research directions could include advanced positioning techniques such as particle filter-based Received Signal Strength (RSS) localization, multi-agent Q-learning methods for trajectory tracking [29], and multi-agent reinforcement learning (MARL) methods for dynamic resource allocation [30]. Furthermore, the trustworthiness of D2D computational offloading has become a critical research area. While offloading tasks from TCs to adjacent ACs alleviates computational deficits of individual TCs, it simultaneously introduces risks of erroneous computations or malicious interference from untrusted nodes. The Fuzzy Comprehensive Trust Evaluation (FCTE) algorithm, which has proven effective in vehicular edge computing scenarios, represents a viable solution for enhancing offloading security and could serve as a potential approach to improving overall offloading safety [31].

Author Contributions

Conceptualization: B.L. and T.Y.; methodology: B.L., J.Z., and T.Y.; software: B.L.; validation: B.L. and J.Z.; formal analysis: T.Y.; investigation: B.L.; resources: B.L.; writing—original draft preparation: B.L.; writing—review and editing: J.Z.; supervision: T.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was developed by the National Natural Science Foundation of China (NSFC) under grant no. 52101399.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data is not publicly available due to confidentiality agreements with the data provider.

Acknowledgments

We are indebted to our principal collaborators at the Rundian new energy company, Wei Gui and Cheng Luo, for their assistance with the data preparation/for providing help with the data visualization.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
UAVunmanned aerial vehicle
USVunmanned surface vessel
D2Ddevice-to-device
BFSbreadth-first search
ADMMAlternating Direction Method of Multipliers
MECmobile edge computing
SCASuccessive Convex Approximation
IoTInternet of Things
CHcluster head
CSIChannel State Information
LoSLine of Sight
TCtask client
ACassisting client
EPGexact potential game
NENash Equilibrium
RSSReceived Signal Strength
MARLmulti-agent reinforcement learning
FCTEFuzzy Comprehensive Trust Evaluation
DTDigital Twin
TBSterrestrial base station

References

  1. Wang, J.B.; Zeng, C.; Ding, C.; Zhang, H.; Lin, M.; Wang, J. Unmanned Surface Vessel Assisted Maritime Wireless Communication Toward 6G: Opportunities and Challenges. IEEE Wirel. Commun. 2022, 29, 72–79. [Google Scholar] [CrossRef]
  2. Malik, U.M.; Javed, M.A.; Zeadally, S.; Islam, S.U. Energy-Efficient Fog Computing for 6G-Enabled Massive IoT: Recent Trends and Future Opportunities. IEEE Internet Things J. 2022, 9, 14572–14594. [Google Scholar] [CrossRef]
  3. Hesselbarth, A.; Medina, D.; Ziebold, R.; Sandler, M.; Hoppe, M.; Uhlemann, M. Enabling Assistance Functions for the Safe Navigation of Inland Waterways. IEEE Intell. Transp. Syst. Mag. 2020, 12, 123–135. [Google Scholar] [CrossRef]
  4. Alqurashi, F.S.; Trichili, A.; Saeed, N.; Ooi, B.S.; Alouini, M.S. Maritime Communications: A Survey on Enabling Technologies, Opportunities, and Challenges. IEEE Internet Things J. 2023, 10, 3525–3547. [Google Scholar] [CrossRef]
  5. Zhang, G.; Yin, S.; Li, J.; Zhang, W.; Zhang, W. Game-Based Event-Triggered Control for Unmanned Surface Vehicle: Algorithm Design and Harbor Experiment. IEEE Trans. Cybern. 2025, 55, 2729–2741. [Google Scholar] [CrossRef]
  6. Zhang, G.; Xing, Y.; Zhang, W.; Li, J. Prescribed Performance Control for USV-UAV via a Robust Bounded Compensating Technique. IEEE Trans. Control Netw. Syst. 2025, 1–11. [Google Scholar] [CrossRef]
  7. Liao, Y.; Chen, X.; Xia, S.; Ai, Q.; Liu, Q. Energy Minimization for UAV Swarm-Enabled Wireless Inland Ship MEC Network with Time Windows. IEEE Trans. Green Commun. Netw. 2023, 7, 594–608. [Google Scholar] [CrossRef]
  8. Liu, X.; Chen, A.; Zheng, K.; Chi, K.; Yang, B.; Taleb, T. Distributed Computation Offloading for Energy Provision Minimization in WP-MEC Networks with Multiple HAPs. IEEE Trans. Mob. Comput. 2025, 24, 2673–2689. [Google Scholar] [CrossRef]
  9. Wu, Q.; Cui, M.; Zhang, G.; Wang, F.; Wu, Q.; Chu, X. Latency Minimization for UAV-Enabled URLLC-Based Mobile Edge Computing Systems. IEEE Trans. Wirel. Commun. 2024, 23, 3298–3311. [Google Scholar] [CrossRef]
  10. Zhang, X.; Wang, J.; Wang, B.; Jiang, F. Offloading strategy for UAV-assisted mobile edge computing based on reinforcement learning. In Proceedings of the IEEE/CIC International Conference on Communications in China (ICCC), Foshan, China, 11–13 August 2022; pp. 702–707. [Google Scholar]
  11. Liao, Y.; Chen, X.; Liu, J.; Han, Y.; Xu, N.; Yuan, Z. Cooperative UAV-USV MEC Platform for Wireless Inland Waterway Communications. IEEE Trans. Consum. Electron. 2024, 70, 3064–3076. [Google Scholar] [CrossRef]
  12. Lyu, L.; Chu, Z.; Lin, B.; Dai, Y.; Cheng, N. Fast Trajectory Planning for UAV-Enabled Maritime IoT Systems: A Fermat-Point Based Approach. IEEE Wirel. Commun. Lett. 2022, 11, 328–332. [Google Scholar] [CrossRef]
  13. Qian, L.P.; Zhang, H.; Wang, Q.; Wu, Y.; Lin, B. Joint Multi-Domain Resource Allocation and Trajectory Optimization in UAV-Assisted Maritime IoT Networks. IEEE Internet Things J. 2023, 10, 539–552. [Google Scholar] [CrossRef]
  14. He, Y.; Ren, J.; Yu, G.; Cai, Y. D2D Communications Meet Mobile Edge Computing for Enhanced Computation Capacity in Cellular Networks. IEEE Trans. Wirel. Commun. 2019, 18, 1750–1763. [Google Scholar] [CrossRef]
  15. Chen, X.; Jiao, L.; Li, W.; Fu, X. Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing. IEEE/ACM Trans. Netw. 2016, 24, 2795–2808. [Google Scholar] [CrossRef]
  16. Jiang, Q.; Xu, X.; Bilal, M.; Crowcroft, J.; Liu, Q.; Dou, W.; Jiang, J. Potential Game Based Distributed IoV Service Offloading with Graph Attention Networks in Mobile Edge Computing. IEEE Trans. Intell. Transp. Syst. 2024, 25, 10912–10925. [Google Scholar] [CrossRef]
  17. Zhang, F.; Wang, M.M. Stochastic Congestion Game for Load Balancing in Mobile-Edge Computing. IEEE Internet Things J. 2021, 8, 778–790. [Google Scholar] [CrossRef]
  18. Cheng, Z.; Xia, X.; Liwang, M.; Fan, X.; Sun, Y.; Wang, X.; Huang, L. CHEESE: Distributed Clustering-Based Hybrid Federated Split Learning Over Edge Networks. IEEE Trans. Parallel Distrib. Syst. 2023, 34, 3174–3191. [Google Scholar] [CrossRef]
  19. He, H.; Yang, X.; Huang, F.; Shen, H.; Tian, H. Enhancing QoE in Large-Scale U-MEC Networks via Joint Optimization of Task Offloading and UAV Trajectories. IEEE Internet Things J. 2024, 11, 35710–35723. [Google Scholar] [CrossRef]
  20. Wang, J.; Zhu, K.; Chen, B.; Han, Z. Distributed Clustering-Based Cooperative Vehicular Edge Computing for Real-Time Offloading Requests. IEEE Trans. Veh. Technol. 2022, 71, 653–669. [Google Scholar]
  21. Rohoden, K.; Estrada, R.; Otrok, H.; Dziong, Z. Stable femtocells cluster formation and resource allocation based on cooperative game theory. Comput. Commun. 2019, 134, 30–41. [Google Scholar] [CrossRef]
  22. Wu, D.; Wang, J.; Hu, R.Q.; Cai, Y.; Zhou, L. Energy-Efficient Resource Sharing for Mobile Device-to-Device Multimedia Communications. IEEE Trans. Veh. Technol. 2014, 63, 2093–2103. [Google Scholar] [CrossRef]
  23. Fang, T.; Yuan, F.; Ao, L.; Chen, J. Joint Task Offloading, D2D Pairing, and Resource Allocation in Device-Enhanced MEC: A Potential Game Approach. IEEE Internet Things J. 2022, 9, 3226–3237. [Google Scholar] [CrossRef]
  24. Wu, Q.; Wu, D.; Xu, Y.; Wang, J. Demand-Aware Multichannel Opportunistic Spectrum Access: A Local Interaction Game Approach with Reduced Information Exchange. IEEE Trans. Veh. Technol. 2015, 64, 4899–4904. [Google Scholar] [CrossRef]
  25. Osborne, M.J.; Rubinstein, A. A Course in Game Theory; MIT Press: Cambridge, MA, USA, 1994. [Google Scholar]
  26. Monderer, D.; Shapley, L.S. Potential games. Games Econ. Behav. 1996, 14, 124–143. [Google Scholar] [CrossRef]
  27. Lã, Q.D.; Chew, Y.H.; Soong, B.H. Potential Game Theory: Applications in Radio Resource Allocation, 1st ed.; Springer: New York, NY, USA, 1994. [Google Scholar]
  28. Guo, H.; Zhou, X.; Wang, J.; Liu, J.; Benslimane, A. Intelligent Task Offloading and Resource Allocation in Digital Twin Based Aerial Computing Networks. IEEE J. Sel. Areas Commun. 2023, 41, 3095–3110. [Google Scholar] [CrossRef]
  29. Soleymani, S.A.; Goudarzi, S.; Xiao, P.; Mihaylova, L.; Shojafar, M.; Wang, W. Multi-agent Q-learning with Particle Filtering for UAV Tracking in Open-RAN Environment. IEEE Trans. Aerosp. Electron. Syst. 2025, 61, 1–21. [Google Scholar] [CrossRef]
  30. Zhu, S.; Gui, L.; Zhao, D.; Cheng, N.; Zhang, Q.; Lang, X. Learning-Based Computation Offloading Approaches in UAVs-Assisted Edge Computing. IEEE Trans. Veh. Technol. 2021, 70, 928–944. [Google Scholar] [CrossRef]
  31. Guo, H.; Chen, X.; Zhou, X.; Liu, J. Trusted and Efficient Task Offloading in Vehicular Edge Computing Networks. IEEE Trans. Cogn. Commun. Netw. 2024, 10, 2370–2382. [Google Scholar] [CrossRef]
Figure 1. Illustration of proposed problem decomposition and solution approach.
Figure 1. Illustration of proposed problem decomposition and solution approach.
Sensors 25 05820 g001
Figure 2. Illustration of BFS-based distributed game clustering.
Figure 2. Illustration of BFS-based distributed game clustering.
Sensors 25 05820 g002
Figure 3. The convergence of the total utility.
Figure 3. The convergence of the total utility.
Sensors 25 05820 g003
Figure 4. Comparison of local performance under four mechanisms for varying number of TCs.
Figure 4. Comparison of local performance under four mechanisms for varying number of TCs.
Sensors 25 05820 g004
Figure 5. Comparison of local performance under four mechanisms for varying number of ACs.
Figure 5. Comparison of local performance under four mechanisms for varying number of ACs.
Sensors 25 05820 g005
Figure 6. Comparison of global performance under four mechanisms for varying number of TCs.
Figure 6. Comparison of global performance under four mechanisms for varying number of TCs.
Sensors 25 05820 g006
Figure 7. Comparison of global performance under four mechanisms for varying number of ACs.
Figure 7. Comparison of global performance under four mechanisms for varying number of ACs.
Sensors 25 05820 g007
Figure 8. Comparison of the UAV flying time for varying numbers of ACs.
Figure 8. Comparison of the UAV flying time for varying numbers of ACs.
Sensors 25 05820 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, B.; Zhao, J.; Yang, T. UAV-Enabled Maritime IoT D2D Task Offloading: A Potential Game-Accelerated Framework. Sensors 2025, 25, 5820. https://doi.org/10.3390/s25185820

AMA Style

Li B, Zhao J, Yang T. UAV-Enabled Maritime IoT D2D Task Offloading: A Potential Game-Accelerated Framework. Sensors. 2025; 25(18):5820. https://doi.org/10.3390/s25185820

Chicago/Turabian Style

Li, Baiyi, Jian Zhao, and Tingting Yang. 2025. "UAV-Enabled Maritime IoT D2D Task Offloading: A Potential Game-Accelerated Framework" Sensors 25, no. 18: 5820. https://doi.org/10.3390/s25185820

APA Style

Li, B., Zhao, J., & Yang, T. (2025). UAV-Enabled Maritime IoT D2D Task Offloading: A Potential Game-Accelerated Framework. Sensors, 25(18), 5820. https://doi.org/10.3390/s25185820

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop