2022
DOI: 10.1109/tvt.2022.3189818
|View full text |Cite
|
Sign up to set email alerts
|

Secure Aerial Computing: Convergence of Mobile Edge Computing and Blockchain for UAV Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 31 publications
0
11
0
Order By: Relevance
“…Tang et al [ 30 ] propose a secure mobile-edge computing system that ensures the privacy of user data during the computation offloading process. The authors combine a block coordinate descent algorithm with a successive convex approximation method to generate optimal trajectories for UAVs.…”
Section: Related Workmentioning
confidence: 99%
“…Tang et al [ 30 ] propose a secure mobile-edge computing system that ensures the privacy of user data during the computation offloading process. The authors combine a block coordinate descent algorithm with a successive convex approximation method to generate optimal trajectories for UAVs.…”
Section: Related Workmentioning
confidence: 99%
“…They designed a well-tailored alternating direction method of multipliers algorithm and applied Lyapunov optimization to solve the system's energy-efficiency-maximizing optimization problem. Q. Tang et al [32] integrated MEC and blockchain technology for UAV networks to establish a secure aerial computing architecture. On this basis, they minimized the weighted sum of energy consumption and delay.…”
Section: Joint Optimization Of Resource Allocation and Uav Trajectory...mentioning
confidence: 99%
“…The above shows that all neural networks were fully connected neural networks. On this basis, in the absence of a special statement, in the single-agent case, the VNF-Q-Network has no hidden layer; the hidden layers of the Trajectory Actor Network have [32,16,8] neurons; the hidden layers of the Critic Network have [32,8,2] neurons. In the multiagent case, the hidden layers of VNF-Q-Network m(m ∈ M) have [32,16] neurons; the hidden layers of the Trajectory Actor Network m have [32,16,8] neurons; the hidden layers of the Critic Network m have [32,8,2] neurons.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Recently, blockchain technology is considered a possible solution to address the above challenges because of its advantages of decentralization, anonymity, and trust [195]. Blockchain is a decentralized ledger-based storage method, which provides a unique tool for secure transactions in a distributed fashion without trusted agents [196]. Since the SE framework has distributed structure, blockchain technology can well suit this framework supporting high security and privacy for integrated VHetNets.…”
Section: A Core Challenges Of Integrating Ai/ml Solutions In Sei-vhet...mentioning
confidence: 99%