Xiao et al., 2020 - Google Patents
A reinforcement learning and blockchain-based trust mechanism for edge networksXiao et al., 2020
- Document ID
- 16061377777030682028
- Author
- Xiao L
- Ding Y
- Jiang D
- Huang J
- Wang D
- Li J
- Poor H
- Publication year
- Publication venue
- IEEE Transactions on Communications
External Links
Snippet
Mobile edge computing (MEC) raises the issue of resisting selfish edge attackers that use less computation resources than promised to process offloading tasks or provide faked computation results. In this paper, we present a blockchain based trust mechanism to help …
- 230000002787 reinforcement 0 title abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/505—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the load
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—INDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B60/00—Information and communication technologies [ICT] aiming at the reduction of own energy use
- Y02B60/10—Energy efficient computing
- Y02B60/16—Reducing energy-consumption in distributed systems
- Y02B60/167—Resource sharing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—INDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B60/00—Information and communication technologies [ICT] aiming at the reduction of own energy use
- Y02B60/10—Energy efficient computing
- Y02B60/14—Reducing energy-consumption by means of multiprocessor or multiprocessing based techniques, other than acting upon the power supply
- Y02B60/142—Resource allocation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—INDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B60/00—Information and communication technologies [ICT] aiming at the reduction of own energy use
- Y02B60/50—Techniques for reducing energy-consumption in wireless communication networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xiao et al. | A reinforcement learning and blockchain-based trust mechanism for edge networks | |
Guan et al. | Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach | |
Dai et al. | Deep reinforcement learning and permissioned blockchain for content caching in vehicular edge computing and networks | |
Liu et al. | A Bayesian Q-learning game for dependable task offloading against DDoS attacks in sensor edge cloud | |
Gu et al. | Privacy on the edge: Customizable privacy-preserving context sharing in hierarchical edge computing | |
Li et al. | Providing efficient privacy-aware incentives for mobile sensing | |
Abdallah et al. | Lightweight security and privacy preserving scheme for smart grid customer-side networks | |
Duan et al. | TSRF: A trust-aware secure routing framework in wireless sensor networks | |
Huang et al. | Security and cost‐aware computation offloading via deep reinforcement learning in mobile edge computing | |
Zou et al. | Reportcoin: A novel blockchain-based incentive anonymous reporting system | |
Yin et al. | Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks | |
Li et al. | Fog computing-enabled secure demand response for internet of energy against collusion attacks using consensus and ACE | |
Liu et al. | A stochastic evolutionary coalition game model of secure and dependable virtual service in sensor-cloud | |
Seng et al. | User matching on blockchain for computation offloading in ultra-dense wireless networks | |
Gao et al. | TrustWorker: A trustworthy and privacy-preserving worker selection scheme for blockchain-based crowdsensing | |
Deng et al. | Blockchain assisted federated learning over wireless channels: Dynamic resource allocation and client scheduling | |
Xiong et al. | Achieving incentive, security, and scalable privacy protection in mobile crowdsensing services | |
Xu et al. | Deep reinforcement learning assisted edge-terminal collaborative offloading algorithm of blockchain computing tasks for energy Internet | |
Haseeb et al. | EBDS: An energy-efficient big data-based secure framework using Internet of Things for green environment | |
Sun et al. | Network security technology of intelligent information terminal based on mobile internet of things | |
Xuemin et al. | Self-Organizing Key Security Management Algorithm in Socially Aware Networking | |
Li et al. | Logisticschain: a blockchain‐based secure storage scheme for logistics data | |
Wu et al. | A cloudlet-based multi-lateral resource exchange framework for mobile users | |
Wei et al. | Privacy-aware multiagent deep reinforcement learning for task offloading in vanet | |
Kumar et al. | Bayesian cooperative coalition game as a service for RFID-based secure QoS management in mobile cloud |