2021
DOI: 10.3390/rs13081547
|View full text |Cite
|
Sign up to set email alerts
|

Joint Task Offloading, Resource Allocation, and Security Assurance for Mobile Edge Computing-Enabled UAV-Assisted VANETs

Abstract: In this paper, we propose a mobile edge computing (MEC)-enabled unmanned aerial vehicle (UAV)-assisted vehicular ad hoc network (VANET) architecture, based on which a number of vehicles are served by UAVs equipped with computation resource. Each vehicle has to offload its computing tasks to the proper MEC server on the UAV due to the limited computation ability. To counter the problems above, we first model and analyze the transmission model and the security assurance model from the vehicle to the MEC server o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 43 publications
(18 citation statements)
references
References 62 publications
0
17
0
1
Order By: Relevance
“…If j is outside the range of k, then the algorithm will determine the value of h, such that the vehicle will be in the range of RSU k + h while receiving the response. The value of h is computed using Equation (27).…”
Section: Request-response Deliverymentioning
confidence: 99%
See 1 more Smart Citation
“…If j is outside the range of k, then the algorithm will determine the value of h, such that the vehicle will be in the range of RSU k + h while receiving the response. The value of h is computed using Equation (27).…”
Section: Request-response Deliverymentioning
confidence: 99%
“…The value for RSU transmission power for the MEES algorithm is based on the literature [10]. The latency requirement [26] and the processing time and deadline requirements [27] for the request are based on the literature.…”
Section: Experimental Environmentmentioning
confidence: 99%
“…Such limited resources raise privacy concerns, a major issue that has prevented the widespread spread of RFID technology. Researchers have implemented multiple researches on designing privacy protection methods for RFID systems [34][35][36][37][38]. Liu et al in [34] proposed a grouping proof authentication protocol for RFID systems, which could improve authentication security.…”
Section: Rfid System Securitymentioning
confidence: 99%
“…In addition, the authors in [36,37] proposed a novel authentication protocol that could offer an adequate security level. In [38], Fan et al designed a lightweight RFID privacy protection scheme, which could ensure the privacy of collected data.…”
Section: Rfid System Securitymentioning
confidence: 99%
“…Adjusting the phase shift of all components together and utilizing the coherence of electromagnetic waves, the signals from different transmission paths will be aligned at the desired receiver to improve the achievable rate and energy efficiency. Combining the advantages of UAV and RIS can greatly improve the UAV's energy efficiency [13][14][15]. Moreover, the RIS is easy to implement, since the hardware cost of RIS is lower and there is no signal forwarding equipment.…”
Section: Introductionmentioning
confidence: 99%