2022
DOI: 10.1109/tcss.2021.3074949
|View full text |Cite
|
Sign up to set email alerts
|

Joint Optimization of Task Offloading and Resource Allocation Based on Differential Privacy in Vehicular Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(7 citation statements)
references
References 31 publications
0
7
0
Order By: Relevance
“…According to (6), if the number of VUs requesting services from the ๐‘›th EN are less than L ๐‘› , each can have access to the single CPU core with capacity (๐‘ ๐‘… ๐‘› โ€ข ๐‘“ ๐‘… ๐‘› ). In case the number of users becomes higher than L ๐‘› , multiple VUs share CPU core resources.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…According to (6), if the number of VUs requesting services from the ๐‘›th EN are less than L ๐‘› , each can have access to the single CPU core with capacity (๐‘ ๐‘… ๐‘› โ€ข ๐‘“ ๐‘… ๐‘› ). In case the number of users becomes higher than L ๐‘› , multiple VUs share CPU core resources.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…This approach, known as vehicular edge computing (VEC), has the potential to serve VUs with reduced transmission delays and energy requirements. The importance of VEC in the VN scenarios is highlighted by several works in the recent past, mainly for enabling latency-critical applications [5], [6].…”
mentioning
confidence: 99%
“…While gathering and evaluating relevant sources, we noticed that not many papers came up to the topic of securing issues in VANETs or utilizing security mechanisms in VANET. [91] investigated secure actors by introducing a collaborative (Intrusion Detection Systems, (IDS) approach to monitoring traffic in VANETs, while [92] looked at securing base station data that is transmitted from vehicle nodes using a privacy ensuring minimal increase in latency. Since VANET applications tend to have a low latency threshold it makes security the communications difficult due to the added overhead to either encryption or validating the identities of the nodes.…”
Section: Securitymentioning
confidence: 99%
“…Several authentication schemes that have been developed are found to consume considerable processing time owing to the frequent round trip needed between the terminal of service provider and the consumer's domain. [15][16][17][18][19][20] Therefore, there is a need for secure and fast authentication policy.…”
Section: Authentication Delaymentioning
confidence: 99%