2020
DOI: 10.1186/s13677-020-00201-x
|View full text |Cite
|
Sign up to set email alerts
|

A collaborative scheduling strategy for IoV computing resources considering location privacy protection in mobile edge computing environment

Abstract: This paper proposes a collaborative scheduling strategy for computing resources of the Internet of vehicles considering location privacy protection in the mobile edge computing environment. Firstly, a multi area multi-user multi MEC server system is designed, in which a MEC server is deployed in each area, and multiple vehicle user equipment in an area can offload computing tasks to MEC servers in different areas by a wireless channel. Then, considering the mobility of users in Internet of vehicles, a vehicle … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…Each step has a reward for each state transition brought on by each action step. [46] AI is great at handling spare and heterogeneous data which makes it a great candidate for VANET resource management as well. [47]…”
Section: Algorithmsmentioning
confidence: 99%
“…Each step has a reward for each state transition brought on by each action step. [46] AI is great at handling spare and heterogeneous data which makes it a great candidate for VANET resource management as well. [47]…”
Section: Algorithmsmentioning
confidence: 99%
“…During task allocation, the execution strategy corresponding to the solution x needs to be solved to meet the dependencies between tasks and environmental parameters, that is, the solution obtained should be in the feasible space. In the research of task allocation, the existing deep reinforcement learning methods usually regard it as an end-to-end learning task, and have designed different models and training methods [11][12][13][14][15][16][17]. However, by exploring each step of action, the model will not get a reward function value for completing the task until the whole scheduling task is completed, resulting in sparse rewards, large state space, and difficulty in training.…”
Section: Graph Convolution Fusion Scheduling Modelmentioning
confidence: 99%
“…Fog computing using cloud resources reduced latency in big-data processing, according to the findings. According to Pang, Wang and Fang [18], a comparable architecture was proposed for collecting data from a variety of sensors by employing cloud computing and hierarchical edge strategy. Many sensors provide information to the first layer of collectors, which is called edge level, before it is sent to a generic cloud service provider.…”
Section: Hierarchical Dicentralized Fog Computing Platforms For the S...mentioning
confidence: 99%