[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks

Published: 01 June 2019 Publication History

Abstract

Mobile Edge Computing (MEC) is a promising solution to improve vehicular services through offloading computation to cloud servers in close proximity to mobile vehicles. However, the self-interested nature together with the high mobility characteristic of the vehicles make the design of the computation offloading scheme a significant challenge. In this paper, we propose a new Vehicular Edge Computing (VEC) framework to model the computation offloading process of the mobile vehicles running on a bidirectional road. Based on this framework, we adopt a contract theoretic approach to design optimal offloading strategies for the VEC service provider, which maximize the revenue of the provider while enhancing the utilities of the vehicles. To further improve the utilization of the computing resources of the VEC servers, we incorporate task priority distinction as well as additional resource providing into the design of the offloading scheme, and propose an efficient VEC server selection and computing resource allocation algorithm. Numerical results indicate that our proposed schemes greatly enhance the revenue of the VEC provider, and concurrently improve the utilization of cloud computing resources.

References

[1]
Qu Z, Keeney J, Robitzsch S, Zaman F, Wang X (2016) Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China Commun 13(7):108---116
[2]
Zhou Z, Wang Y, Wu QMJ, Yang C, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48---63
[3]
Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507---518
[4]
Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the chinese character encoding. J Internet Technol 18(2):91---98
[5]
Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546---2559
[6]
Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706---2716
[7]
Kong Y, Zhang M, Ye D (2017) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl-Based Syst 115:123---132
[8]
Shen J, Shen J, Chen X, Huang X, Susilo W An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Information Forensics and Security, accepted
[9]
Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netw 9(17):4002---4012
[10]
Liu X, Li Y, Chen H (2016) Wireless resource scheduling based on backoff for multiuser multiservice mobile cloud computing. IEEE Trans Veh Technol 65(11):9247---9259
[11]
Shen J, Chang S, Shen J, Liu Q, Sun X (2016) A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems
[12]
Gu B, Sheng VS A robust regularization path algorithm for ?-support vector classification. IEEE Trans Neural Networks and Learning Systems, accepted
[13]
Zhang K, Mao Y, Leng S, Zhao Q, Li L, Peng X, Pan L, Zhang G, Maharjan S, Zhang Y (2016) Energy-efficient offloading for mobile edge computing in 5G heterogenous networks. IEEE Access 4:5896---5907
[14]
Yu R, Huang X, Kang J, Ding J, Maharjan S, Gjessing S, Zhang Y (2015) Cooperative resource management in cloud-enabled vehicular networks. IEEE Trans Ind Electron 62(12):7938---7951
[15]
Werin L, Wijkander H (1992) Contract economics. Blackwell, Oxford
[16]
Huang X, Yu R, Kang J, Wang N, Maharjan S, Zhang Y (2016) Software defined networking with pseudonym systems for secure vehicular clouds. IEEE Access 4:3522---3534
[17]
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340---352
[18]
Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594---2608
[19]
Zheng K, Meng H, Chatzimisios P, Lei L, Shen X (2015) An SMDP-based resource allocation in vehicular cloud computing systems. IEEE Trans Ind Electron 62(12):7920---7928
[20]
Kwak D, Liu R, Kim D, Nath B, Iftode L (2016) Seeing is believing: sharing real-time visual traffic information via vehicular clouds. IEEE Access 4:3617---3631
[21]
Pan Z, Jin P, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast reference frame selection based on content similarity for low complexity HEVC encoder. J Vis Commun Image Represent 40(Part B):516---524
[22]
Chen Y, Hao C, Wu W, Wu E (2016) Robust dense reconstruction by range merging based on confidence estimation. Sci China Inf Sci 59(9):1---11
[23]
Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF. J Internet Technol 18(2):209---216
[24]
Tong L, Li Y, Gao W (2016) A hierarchical edge cloud architecture for mobile computing. In: Proceedings of the IEEE international conference on computer communications (INFOCOM), pp 1---9
[25]
Wang Y, Sheng M, Wang X, Wang L, Li J (2016) Mobile-edge computing: partial computation offloading using dynamic voltage scaling. IEEE Trans Commun 64(10):4268---4282
[26]
Sun X, Ansari N (2016) PRIMAL: profit maximization avatar placement for mobile edge computing. In: Proceedings of IEEE international conference on communications (ICC), pp 1---6
[27]
Sapienza M, Torre GL, Leombruno G, Guardo E, Cavallo M, Tomarchio O (2016) Solving critical events through mobile edge computing: an approach for smart cities. In: Proceedings of IEEE international conference on smart computing (SMARTCOMP), pp 1---5
[28]
Kumar N, Zeadally S, Rodrigues JJPC (2016) Vehicular delay-tolerant networks for smart grid data management using mobile edge computing. IEEE Commun Mag 54(10):60---66
[29]
Chen X, Jiao L, Li W, Fu X (2016) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Netw 24(5):2795---2808
[30]
Gao L, Wang X, Xu Y, Zhang Q (2011) Spectrum trading in cognitive radio networks: a contract-theoretic modeling approach. IEEE J Sel Areas Commun 29(4):843---855
[31]
Li Y, Wang P, Niyato D, Zhang Y (2014) Contract-theoretic modeling for content delivery in relay-based publish-subscribe networks. In: IEEE international conference on communications (ICC), pp 2678---2683
[32]
Zhang Y, Song L, Saad W, Dawy Z, Han Z (2015) Contract-based incentive mechanisms for device-to-device communications in cellular networks. IEEE J Sel Areas Commun 33(10):2144---2155
[33]
Zhang K, Mao Y, Leng S, Maharjan S, Zhang Y, Vinel A, Jonsson M (2016) Incentive-driven energy trading in the smart grid. IEEE Access 4:1243---1257
[34]
Yuan C, Sun X, LV R (2016) Fingerprint liveness detection based on multi-scale LPQ and PCA. China Commun 13(7):60---65
[35]
Zhang Y, Yu R, Yao W, Xie S, Xiao Y, Guizani M (2011) Home M2M networks: architectures, standards, and QoS improvement. IEEE Commun Mag 49(4):44---52
[36]
Fu Z, Huang F, Sun X, Vasilakos AV, Yang C Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Services Computing, accepted
[37]
Pan Z, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast motion estimation based on content property for low-complexity H.265/HEVC encoder. IEEE Trans Broadcast 62(3):675---684
[38]
Gu B, Sun X, Sheng VS Structural minimax probability machine. IEEE Trans Neural Networks and Learning Systems, accepted
[39]
Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broadcast 61(2):166---176
[40]
Zhou Z, Yang C, Chen B, Sun X, Liu Q, Wu QMJ (2016) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans. Inf Syst E99-D(6):1531---1540
[41]
Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forensics Secur 12(8):1874--- 1884
[42]
Tian Q, Chen S (2017) Cross-heterogeneous-database age estimation through correlation representation learning. Neurocomputing 238:286---295
[43]
Bolton P, Dewatripont M (2005) Contract theory. MIT Press, Cambridge, pp 31---64
[44]
Zhang Y, Sun X, Wang B (2016) Efficient algorithm for K-barrier coverage based on integer linear programming. China Commun 13(7):16---23
[45]
Gu B, Sheng VS, Tay KY, Romano W, Li S (2015) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1403---1416

Cited By

View all
  • (2024)Vehicular Edge Computing Meets Cache: An Access Control Scheme With Fair Incentives for Privacy-Aware Content DeliveryIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.335752225:8(8404-8418)Online publication date: 1-Aug-2024
  • (2023)Contract-based Cooperative Computation and Communication Resources Sharing in Mobile Edge ComputingJournal of Grid Computing10.1007/s10723-023-09649-y21:1Online publication date: 27-Feb-2023
  • (2022)5G Converged Network Resource Allocation Strategy Based on Reinforcement Learning in Edge Cloud Computing EnvironmentComputational Intelligence and Neuroscience10.1155/2022/61747082022Online publication date: 1-Jan-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Mobile Networks and Applications
Mobile Networks and Applications  Volume 24, Issue 3
Jun 2019
414 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 June 2019

Author Tags

  1. Cloud
  2. Contract theory
  3. Mobile edge computing
  4. Vehicular network

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Vehicular Edge Computing Meets Cache: An Access Control Scheme With Fair Incentives for Privacy-Aware Content DeliveryIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.335752225:8(8404-8418)Online publication date: 1-Aug-2024
  • (2023)Contract-based Cooperative Computation and Communication Resources Sharing in Mobile Edge ComputingJournal of Grid Computing10.1007/s10723-023-09649-y21:1Online publication date: 27-Feb-2023
  • (2022)5G Converged Network Resource Allocation Strategy Based on Reinforcement Learning in Edge Cloud Computing EnvironmentComputational Intelligence and Neuroscience10.1155/2022/61747082022Online publication date: 1-Jan-2022
  • (2022)A Novel Contract Theory-Based Incentive Mechanism for Cooperative Task-Offloading in Electrical Vehicular NetworksIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2021.307891323:7(8380-8395)Online publication date: 1-Jul-2022
  • (2021)Vehicular Edge Computing: Architecture, Resource Management, Security, and ChallengesACM Computing Surveys10.1145/348512955:1(1-46)Online publication date: 23-Nov-2021
  • (2021)A Novel Deep Reinforcement Learning-based Approach for Task-offloading in Vehicular Networks2021 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOBECOM46510.2021.9685073(1-6)Online publication date: 7-Dec-2021
  • (2021)Computation offloading and content caching and delivery in Vehicular Edge NetworkComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2021.108228197:COnline publication date: 9-Oct-2021
  • (2021)Tasks Offloading for Connected Autonomous Vehicles in Edge ComputingMobile Networks and Applications10.1007/s11036-021-01794-627:6(2295-2304)Online publication date: 3-Aug-2021
  • (2021)A Novel Task-Allocation Framework Based on Decision-Tree Classification Algorithm in MECNetwork and Parallel Computing10.1007/978-3-030-93571-9_8(93-104)Online publication date: 3-Nov-2021
  • (2021)Cooperative mobile edge computing‐cloud computing in Internet of vehicleTransactions on Emerging Telecommunications Technologies10.1002/ett.409532:8Online publication date: 6-Aug-2021

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media