With the development of Internet of Vehicles (IoV) and the gradual maturity of 5th Generation Mobile Networks (5G) technology, the further development of the IoV highly relies on network energy and resources. However, basic methods of researching new energy or improving equipment result in high cost. This article focuses on researching how to minimize energy consumption and maximize resource utilization with the constraints of existing environment and equipment. We jointly discuss 5G technology, mobile edge computing and deep reinforcement learning in green IoV. We also discuss how to make rational use of resources to realize the sustainable development of IoV. By classifying and comparing the existing researches according to different emphases, the energy consumption can be managed effectively with the above-mentioned technologies. Finally, we analyze the possible research directions and challenges in the future.INDEX TERMS Green Internet of Vehicles, 5G, mobile edge computing, deep reinforcement learning.
How can training performance data (e.g., running or walking routes) be collected, measured, and published in a mobile program while preserving user privacy? This question is becoming important in the context of the growing use of reward-based location-based service (LBS) applications, which aim to promote employee training activities and to share such data with insurance companies in order to reduce the healthcare insurance costs of an organization. One of the main concerns of such applications is the privacy of user trajectories, because the applications normally collect user locations over time with identities. The leak of the identified trajectories often results in personal privacy breaches. For instance, a trajectory would expose user interest in places and behaviors in time by inference and linking attacks. This information can be used for spam advertisements or individual-based assaults. To the best of our knowledge, no existing studies can be directly applied to solve the problem while keeping data utility. In this paper, we identify the personal privacy problem in a reward-based LBS application and propose privacy architecture with a bounded perturbation technique to protect user's trajectory from the privacy breaches. Bounded perturbation uses global location set (GLS) to anonymize the trajectory data. In addition, the bounded perturbation will not generate any visiting points that are not possible to visit in real time. The experimental results on real-world datasets demonstrate that the proposed bounded perturbation can effectively anonymize location information while preserving data utility compared to the existing methods.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.