2020
DOI: 10.1109/tcomm.2020.2995371
|View full text |Cite
|
Sign up to set email alerts
|

A Reinforcement Learning and Blockchain-Based Trust Mechanism for Edge Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 99 publications
(29 citation statements)
references
References 34 publications
0
29
0
Order By: Relevance
“…The trade-off and optimization among energy consumption, privacy, and latency were jointly considered. Furthermore, [29] investigated the trust mechanism for edge network by using blockchain technology. Selfish edge attacks were discussed in this paper.…”
Section: Tasks Offloading In Blockchain Systemsmentioning
confidence: 99%
“…The trade-off and optimization among energy consumption, privacy, and latency were jointly considered. Furthermore, [29] investigated the trust mechanism for edge network by using blockchain technology. Selfish edge attacks were discussed in this paper.…”
Section: Tasks Offloading In Blockchain Systemsmentioning
confidence: 99%
“…Furthermore, blockchain was introduced as a strong security mechanism for MEC systems in vehicular networks [34]. In addition, Reference [35] introduced a blockchain-based trust mechanism for MEC systems. By establishing a reputation system for the edge nodes, the miner in the blockchain network was, thus, selected in a trusted manner.…”
Section: Integration Of Mec and Dltmentioning
confidence: 99%
“…(22). In the following, we show that a set of control policies obtained by Algorithm 2 and a well-trained orchestrator together minimize the statistical distance of normal and target environments, as represented by the hierarchical learning objective in Eq (30).…”
Section: Policy Transferabilitymentioning
confidence: 99%
“…We set longrange dynamic map information such as the trajectories of moving objects as near-edge global data. This configuration is based on one of the edge computing scenarios [29], [30]. Furthermore, the dynamic map information is updated to the device, similarly to the learning map scenario [31], where update periods are randomly given.…”
Section: B Case Studymentioning
confidence: 99%
See 1 more Smart Citation