Browsing by Author "Feng, Jie"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Joint Optimization of Security Strength and Resource Allocation for Computation Offloading in Vehicular Edge Computing(IEEE Transactions on Wireless Communications, 2023-04-13) Xiao, Huizi; Zhao, Jun; Feng, Jie; Liu, Lei; Pei, Qingqi; Shi, WeisongVehicular Edge Computing (VEC) is a promising new paradigm that has attracted much attention in recent years, which can enhance the storage and computing capabilities of vehicular networks to provide users with low latency and high-quality services. Due to the open access and unreliable wireless channels, some appropriate security measures should be implemented in the VEC to ensure information security. However, the operation of the security mechanism dominates supererogatory computing resources, thus affecting the performance of VEC systems. The scarcity of computation and energy resources of the vehicles conflicts with the requirement of tasks for time delay and information security. In this paper, taking the driving velocity and position of the vehicles, the number of lanes, the model and density of the attackers, and security strength into consideration, we formulate a max-min optimization problem to jointly optimize offloading decision, transmit power, task computation frequency, encryption computation frequency, edge computation frequency, and block length to obtain optimal secure information capacity and local computation delay. The formulated optimization problem is a mixed integer nonlinear programming (MINLP), which is intractable. We apply the generalized benders decomposition (GBD)-based method to solve it. The simulation results show that our proposed algorithms have convergence and effectiveness and achieve fairness among vehicles on the road.Item Resource Optimization of MAB-based Reputation Management for Data Trading in Vehicular Edge Computing(IEEE Transactions on Wireless Communications, 2023-01-09) Xiao, Huizi; Cai, Lin; Feng, Jie; Pei, Qingqi; Shi, WeisongVehicles are hesitant to upload data to edge servers in vehicle edge computing (VEC) as many vehicle data collected and perceived by various on-board sensors contain sensitive and personal information and lack economic incentive. Instead of free access to shared data, encrypted data trading will alleviate security and privacy concerns and provide an incentive for vehicle owners to share their data. The edge server needs to pay the price in data trading, and reputation management is a great method to help it trade with reliable and available vehicles. In this paper, we propose a multi-armed bandit (MAB)-based reputation management scheme, so the edge servers can select the high reputation vehicles for data trading, which can ensure the credibility and reliability of the data. The encryption scheme is applied to achieve the required transmission security level and defend the rights and interests of the edge server. On the other hand, implementing security measures will consume the computation and communication resources of the vehicles. We formulate an optimization problem that maximizes the revenue of vehicles in data trading under the constraints of time delay, energy consumption, and security level. Simulation results demonstrate that the proposed scheme is effective and efficient for vehicle reputation management, data trading selection, and resource allocation.