2020
DOI: 10.1109/jiot.2020.3007869
|View full text |Cite
|
Sign up to set email alerts
|

Resource Optimization for Delay-Tolerant Data in Blockchain-Enabled IoT With Edge Computing: A Deep Reinforcement Learning Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 87 publications
(36 citation statements)
references
References 44 publications
0
36
0
Order By: Relevance
“…Joint delay and blockchain-based security optimization has been presented in [69], focusing on (machine-tomachine) M2M communication. As blockchain systems require increased computation time to complete the smart contracts, delay requirements might not be met [70].…”
Section: ) Delay Reductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Joint delay and blockchain-based security optimization has been presented in [69], focusing on (machine-tomachine) M2M communication. As blockchain systems require increased computation time to complete the smart contracts, delay requirements might not be met [70].…”
Section: ) Delay Reductionmentioning
confidence: 99%
“…Furthermore, in decentralized learning paradigms, such as federated learning which better suit privacy sensitive applications, it is necessary to ensure that shared models will be based on information exchange among trustworthy peers. In this area, recent works have adopted blockchains and smart contracts, highlighting their efficiency in M2M, D2D and V2V RL-aided edge caching but still, further advancements are needed [69], [139], [140], [152], [153]. In addition, further adoption of FL can alleviate privacy concerns, as for example in F-RANs where data from IoT devices are collected and at central servers for content popularity prediction.…”
Section: E Security Privacy and Trustmentioning
confidence: 99%
“…Other concepts are based on the integration of blockchain and edge computing. These include concepts based on deep reinforcement learning [47], artificial intelligence [48,49], and video surveillance systems [50]. Most of these studies used permissionless blockchain, which does not provide adequate privacy.…”
Section: Blockchain-based Edge Computing Iot Architecturementioning
confidence: 99%
“…The optimal amount of computational resources allocated to devices would be formulated as a markov decision process (MDP) and solved by a RL-based algorithm, while a DRL version is presented to promote the computational performance further. By jointly considering the tasks caching, computing, as well as BC system usage, the work in [91] presents a novel resource allocation framework to reduce the unnecessary latency, while promoting the caching efficiency and system security in machine-to-machine communications. After data computing and processing, they can be uploaded into the BC, while being authorized by the consensus layer.…”
Section: Computing Devices (Cd)mentioning
confidence: 99%