Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2021, Vol. 61 Issue (11) : 1246-1253     DOI: 10.16511/j.cnki.qhdxxb.2021.25.005
VULNERABILITY ANALUSIS AND RISK ASSESSMENT |
Secure and energy efficient offloading of mobile edge computing in the Internet of vehicles
SONG Yubo1,2, JING Xingyu1,2, YAN Feng3, HU Aiqun2,3
1. Jiangsu Key Laboratory of Computer Networking Technology, School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China;
2. Purple Mountain Laboratories, Nanjing 211189, China;
3. National Mobile Communications Research Laboratory, School of Information Science and Engineering, Southeast University, Nanjing 211189, China
Download: PDF(1649 KB)   HTML
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  Task offloading negotiations between vehicles and multiple edge servers in mobile edge computing environments of the internet of vehicles have security problems and excessive system energy consumption. This paper presents a security offloading mechanism based on cooperation between the edge server task offload strategy and the vehicle server. The strategy has a secure switching interaction protocol when the vehicle is moving with a task assignment negotiation algorithm and constraints based on the edge server coverage. Simulations show that the scheme effectively guarantees security during communications while reducing the offloading energy consumption by 58% and the offloading time by 17% compared with an existing scheme.
Keywords Internet of vehicles      mobile edge computing      authentication mechanism      offloading strategy      task segmentation     
Issue Date: 19 October 2021
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
SONG Yubo
JING Xingyu
YAN Feng
HU Aiqun
Cite this article:   
SONG Yubo,JING Xingyu,YAN Feng, et al. Secure and energy efficient offloading of mobile edge computing in the Internet of vehicles[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(11): 1246-1253.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2021.25.005     OR     http://jst.tsinghuajournals.com/EN/Y2021/V61/I11/1246
  
  
  
  
  
  
  
  
[1] MACH P, BECVAR Z. Mobile edge computing:A survey on architecture and computation offloading[J]. IEEE Communications Surveys & Tutorials, 2017, 19(3):1628-1656.
[2] ZHANG T. Data offloading in mobile edge computing:A coalition and pricing based approach[J]. IEEE Access, 2017, 6:2760-2767.
[3] WU S Y, XIA W W, CUI W Q, et al. An efficient offloading algorithm based on support vector machine for mobile edge computing in vehicular networks[C]//2018 10th International Conference on Wireless Communications and Signal Processing (WCSP). Hangzhou, China:IEEE, 2018:1-6.
[4] ZHANG L, ZHAO Z, WU Q W, et al. Energy-aware dynamic resource allocation in UAV assisted mobile edge computing over social internet of vehicles[J]. IEEE Access, 2018, 6:56700-56715.
[5] XIAO L, WAN X Y, DAI C H, et al. Security in mobile edge caching with reinforcement learning[J]. IEEE Wireless Communications, 2018, 25(3):116-122.
[6] LI L J, ZHOU H M, XIONG S X, et al. Compound model of task arrivals and load-aware offloading for vehicular mobile edge computing networks[J]. IEEE Access, 2019, 7:26631-26640.
[7] GUO H Z, LIU J J, ZHANG J. Computation offloading for multi-access mobile edge computing in ultra-dense networks[J]. IEEE Communications Magazine, 2018, 56(8):14-19.
[8] GUO H Z, LIU J J. Collaborative computation offloading for multiaccess edge computing over fiber-wireless networks[J]. IEEE Transactions on Vehicular Technology, 2018, 67(5):4514-4526.
[9] LIU M Y, LIU Y. Price-based distributed offloading for mobile-edge computing with computation capacity constraints[J]. IEEE Wireless Communications Letters, 2018, 7(3):420-423.
[10] ADITHTHAN A, RAMESH S, SAMII S. Cloud-assisted control of ground vehicles using adaptive computation offloading techniques[C]//Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). Dresden, Germany:IEEE, 2018, 1:589-592.
[11] WANG X J, WEI X, WANG L. A deep learning based energy-efficient computational offloading method in Internet of vehicles[J]. China Communications, 2019, 16(3):81-91.
[12] DU J B, YU F R, CHU X L, et al. Computation offloading and resource allocation in vehicular networks based on dual-side cost minimization[J]. IEEE Transactions on Vehicular Technology, 2019, 68(2):1079-1092.
[13] HOU X S, LI Y, CHEN M, et al. Vehicular fog computing:A viewpoint of vehicles as the infrastructures[J]. IEEE Transactions on Vehicular Technology, 2016, 65(6):3860-3873.
[14] FAROOQ M U, PASHA M, KHAN K U R. Cloud enabled and cluster based efficient data broadcasting in VANETs[C]//2015 International Conference on Green Computing and Internet of Things (ICGCIoT). Noida, India:IEEE, 2015.
[15] WANG X J, NING Z L, WANG L. Offloading in internet of vehicles:A fog-enabled real-time traffic management system[J]. IEEE Transactions on Industrial Informatics, 2018, 14(10):4568-4578.
[16] YU R, ZHANG Y, GJESSING S, et al. Toward cloud-based vehicular networks with efficient resource management[J]. IEEE Network, 2013, 27(5):48-55.
[1] LIU Wu, WANG Yongke, SUN Donghong, REN Ping, LIU Ke. Login authentication vulnerability mining and improved login authentication method based on an open source intelligent terminal[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(9): 897-902.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd