2023
DOI: 10.1109/tii.2022.3184070
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Incentives for Intelligent Offloading and Resource Allocation in Digital Twin Driven Smart Industry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 31 publications
(9 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…3) Game-Theoretical IoDT Governance. Apart from the solutions built on blockchain and AI technologies, gametheoretical approaches have been widely investigated in the literature for attack defense [114], service congestion governance [115], and long-term incentive design [116]. Xu et al [114] identify a novel stealthy estimation threat, where smart attackers can learn defense strategies to alter the digital twins' state estimation without being detected.…”
Section: F Provenance Governance and Accountability In Iodtmentioning
confidence: 99%
See 1 more Smart Citation
“…3) Game-Theoretical IoDT Governance. Apart from the solutions built on blockchain and AI technologies, gametheoretical approaches have been widely investigated in the literature for attack defense [114], service congestion governance [115], and long-term incentive design [116]. Xu et al [114] identify a novel stealthy estimation threat, where smart attackers can learn defense strategies to alter the digital twins' state estimation without being detected.…”
Section: F Provenance Governance and Accountability In Iodtmentioning
confidence: 99%
“…In IoDT, the intensive and dynamic virtual twin service demands can easily result in service congestion, which eventually deteriorates the QoS and stability of digital twin services. Peng et al [115] study a digital twin-empowered two-stage offloading mechanism in DTENs for mitigating latency-critical tasks from end devices to edge servers. In the first stage, credit-based incentives are assigned to optimize digital twins' resource allocation strategies; while in the second stage, a Stackelberg game is designed to derive the optimal offloading and privacy investment policies for digital twins.…”
Section: F Provenance Governance and Accountability In Iodtmentioning
confidence: 99%
“…Consequently, it is worthwhile to investigate ways to increase the resource utilization of edge servers. Let mark(a i , v) denotes whether task a i is offloaded to the edge server v, TO v indicates the total resources of v. The resource utilization R total can be calculated by Equations ( 14) and (15).…”
Section: 32mentioning
confidence: 99%
“…Afterwards, the value of OC (𝜃,v) and A ′ 𝜃 are updated for the next step (Lines 9 and 10). At last, we obtain MMF (𝜃,v) by traversing OC (𝜃,v) (Lines [15][16][17][18][19]. The MMF (𝜃,v) can be calculated by Equations ( 19)and ( 20)…”
Section: The Resource Fairness Evaluation Based On Weighted Mmfmentioning
confidence: 99%
“…The expanding range of RPL applications in industrial sectors clearly shows its efficiency. However, these circumstances make RPL networks vulnerable to various potential risks [ 17 ]. Such challenging circumstances demand multiple security solutions in order to ensure durable and satisfactory communication in industrial networks [ 18 ].…”
Section: Introductionmentioning
confidence: 99%