基于车联网的安全卸载和资源分配动态定价方案

IF 4.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Ad Hoc Networks Pub Date : 2024-05-09 DOI:10.1016/j.adhoc.2024.103545
Jianbin Xue, Jia Yao, Jiahao Wang
{"title":"基于车联网的安全卸载和资源分配动态定价方案","authors":"Jianbin Xue,&nbsp;Jia Yao,&nbsp;Jiahao Wang","doi":"10.1016/j.adhoc.2024.103545","DOIUrl":null,"url":null,"abstract":"<div><p>With the development of sixth-generation (6G) wireless communication technology, billions of vehicles will access the network in the future, and the number of vehicle applications and user data will also increase dramatically. Traditional cloud computing faces serious problems of latency and energy consumption in handling massive data. Mobile edge computing (MEC) has emerged to dramatically improve computing efficiency and reduce energy consumption by placing computing servers at network edge locations close to vehicles. However, the service range of MEC servers is limited and cannot fully satisfy user requirements. In addition, the task offloading process has security risks. The current research focuses on how to reduce the energy consumption and latency overhead of task offloading and neglects the economic cost or data transmission security of vehicles. To solve the above problems, we propose a cooperative security offloading (CSO) scheme for auxiliary vehicles and MEC servers. Firstly, we propose a dynamic pricing mechanism for computing resources by considering the credibility of MEC servers and auxiliary vehicles, the urgency of the task, and the number of users competing for auxiliary vehicles. Secondly, to prevent malicious MEC servers and eavesdroppers from attacking, we employ homomorphic encryption to protect user privacy. Meanwhile, efficient and secure computing services are achieved by optimizing user selection decisions, offloading decisions, and resource allocation decisions. Finally, the optimal decisions are obtained by the dueling DQN-based resource allocation and pricing strategy (DDRP) and the cost-minimizing security offloading (CMSO) algorithm, which minimizes the economic cost of users while maximizing security. Simulation results show that, compared with some existing schemes, the CSO scheme effectively reduces the economic cost of users while ensuring the security of data transmission.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4000,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A dynamic pricing scheme for secure offloading and resource allocation based on the internet of vehicles\",\"authors\":\"Jianbin Xue,&nbsp;Jia Yao,&nbsp;Jiahao Wang\",\"doi\":\"10.1016/j.adhoc.2024.103545\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>With the development of sixth-generation (6G) wireless communication technology, billions of vehicles will access the network in the future, and the number of vehicle applications and user data will also increase dramatically. Traditional cloud computing faces serious problems of latency and energy consumption in handling massive data. Mobile edge computing (MEC) has emerged to dramatically improve computing efficiency and reduce energy consumption by placing computing servers at network edge locations close to vehicles. However, the service range of MEC servers is limited and cannot fully satisfy user requirements. In addition, the task offloading process has security risks. The current research focuses on how to reduce the energy consumption and latency overhead of task offloading and neglects the economic cost or data transmission security of vehicles. To solve the above problems, we propose a cooperative security offloading (CSO) scheme for auxiliary vehicles and MEC servers. Firstly, we propose a dynamic pricing mechanism for computing resources by considering the credibility of MEC servers and auxiliary vehicles, the urgency of the task, and the number of users competing for auxiliary vehicles. Secondly, to prevent malicious MEC servers and eavesdroppers from attacking, we employ homomorphic encryption to protect user privacy. Meanwhile, efficient and secure computing services are achieved by optimizing user selection decisions, offloading decisions, and resource allocation decisions. Finally, the optimal decisions are obtained by the dueling DQN-based resource allocation and pricing strategy (DDRP) and the cost-minimizing security offloading (CMSO) algorithm, which minimizes the economic cost of users while maximizing security. Simulation results show that, compared with some existing schemes, the CSO scheme effectively reduces the economic cost of users while ensuring the security of data transmission.</p></div>\",\"PeriodicalId\":55555,\"journal\":{\"name\":\"Ad Hoc Networks\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2024-05-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ad Hoc Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1570870524001562\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870524001562","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

随着第六代(6G)无线通信技术的发展,未来将有数十亿辆汽车接入网络,汽车应用和用户数据的数量也将急剧增加。传统云计算在处理海量数据时面临严重的延迟和能耗问题。移动边缘计算(MEC)的出现,通过将计算服务器放置在靠近车辆的网络边缘位置,大大提高了计算效率并降低了能耗。然而,MEC 服务器的服务范围有限,无法完全满足用户需求。此外,任务卸载过程还存在安全风险。目前的研究主要集中在如何降低任务卸载的能耗和延迟开销,而忽略了车辆的经济成本或数据传输安全。为解决上述问题,我们提出了一种辅助车辆与 MEC 服务器协同安全卸载(CSO)方案。首先,考虑到 MEC 服务器和辅助车辆的信誉、任务的紧迫性以及竞争辅助车辆的用户数量,我们提出了计算资源动态定价机制。其次,为了防止恶意 MEC 服务器和窃听者的攻击,我们采用了同态加密技术来保护用户隐私。同时,通过优化用户选择决策、卸载决策和资源分配决策,实现高效安全的计算服务。最后,通过基于决斗 DQN 的资源分配和定价策略(DDRP)以及成本最小化安全卸载算法(CMSO)获得最优决策,从而在最大限度提高安全性的同时,使用户的经济成本最小化。仿真结果表明,与现有的一些方案相比,CSO 方案在确保数据传输安全的同时,有效降低了用户的经济成本。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A dynamic pricing scheme for secure offloading and resource allocation based on the internet of vehicles

With the development of sixth-generation (6G) wireless communication technology, billions of vehicles will access the network in the future, and the number of vehicle applications and user data will also increase dramatically. Traditional cloud computing faces serious problems of latency and energy consumption in handling massive data. Mobile edge computing (MEC) has emerged to dramatically improve computing efficiency and reduce energy consumption by placing computing servers at network edge locations close to vehicles. However, the service range of MEC servers is limited and cannot fully satisfy user requirements. In addition, the task offloading process has security risks. The current research focuses on how to reduce the energy consumption and latency overhead of task offloading and neglects the economic cost or data transmission security of vehicles. To solve the above problems, we propose a cooperative security offloading (CSO) scheme for auxiliary vehicles and MEC servers. Firstly, we propose a dynamic pricing mechanism for computing resources by considering the credibility of MEC servers and auxiliary vehicles, the urgency of the task, and the number of users competing for auxiliary vehicles. Secondly, to prevent malicious MEC servers and eavesdroppers from attacking, we employ homomorphic encryption to protect user privacy. Meanwhile, efficient and secure computing services are achieved by optimizing user selection decisions, offloading decisions, and resource allocation decisions. Finally, the optimal decisions are obtained by the dueling DQN-based resource allocation and pricing strategy (DDRP) and the cost-minimizing security offloading (CMSO) algorithm, which minimizes the economic cost of users while maximizing security. Simulation results show that, compared with some existing schemes, the CSO scheme effectively reduces the economic cost of users while ensuring the security of data transmission.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Ad Hoc Networks
Ad Hoc Networks 工程技术-电信学
CiteScore
10.20
自引率
4.20%
发文量
131
审稿时长
4.8 months
期刊介绍: The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to: Mobile and Wireless Ad Hoc Networks Sensor Networks Wireless Local and Personal Area Networks Home Networks Ad Hoc Networks of Autonomous Intelligent Systems Novel Architectures for Ad Hoc and Sensor Networks Self-organizing Network Architectures and Protocols Transport Layer Protocols Routing protocols (unicast, multicast, geocast, etc.) Media Access Control Techniques Error Control Schemes Power-Aware, Low-Power and Energy-Efficient Designs Synchronization and Scheduling Issues Mobility Management Mobility-Tolerant Communication Protocols Location Tracking and Location-based Services Resource and Information Management Security and Fault-Tolerance Issues Hardware and Software Platforms, Systems, and Testbeds Experimental and Prototype Results Quality-of-Service Issues Cross-Layer Interactions Scalability Issues Performance Analysis and Simulation of Protocols.
期刊最新文献
TAVA: Traceable anonymity-self-controllable V2X Authentication over dynamic multiple charging-service providers RL-based mobile edge computing scheme for high reliability low latency services in UAV-aided IIoT networks Editorial Board PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks A two-context-aware approach for navigation: A case study for vehicular route recommendation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1