2021
DOI: 10.1186/s13677-021-00262-6
|View full text |Cite
|
Sign up to set email alerts
|

Security-Aware computation offloading for Mobile edge computing-Enabled smart city

Abstract: Smart city has obtained increasing attention from both academic and industry which has the potential to improve human living standards. A smart city consists of a great number of smart devices which are generating large amounts of data and emerging applications all the time. However, the computing capacity of smart devices are limited. Fortunately, the emergence of MEC can solve the above problem. However, the resources of edge servers in MEC are limited and the capabilities of edge servers are heterogeneous. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 45 publications
0
6
0
Order By: Relevance
“…According to Peng et al [6], a related goal of edge computing is to migrate processing away from information centers and toward the network edge, using smart devices such as smartphones and networking gateways to conduct activities on purpose in the cloud. By pushing operations to the edge, it is feasible to offer material caching, delivery of services, permanent information storage, and IoT management, culminating in improved reaction times and transmission rates.…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to Peng et al [6], a related goal of edge computing is to migrate processing away from information centers and toward the network edge, using smart devices such as smartphones and networking gateways to conduct activities on purpose in the cloud. By pushing operations to the edge, it is feasible to offer material caching, delivery of services, permanent information storage, and IoT management, culminating in improved reaction times and transmission rates.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The deadline constrain and battery capacity constraint need to be considered in the offloading decision to ensure the security of AR applications 52 . In this article, the double constraints contain task latency and VD energy consumption is leveraged to represent security constraint model, which are represented as Sfalse(jy,ap,tfalse)Stddl,$$ S\left({j}_{y, ap,t}\right)\le {S}_t^{ddl}, $$ Efalse(jy,ap,tfalse)Eymax,$$ E\left({j}_{y, ap,t}\right)\le {E}_y^{max}, $$ where Stddl$$ {S}_t^{ddl} $$ represents the deadline constraint of task ty,ap$$ {t}_{y, ap} $$ and Eymax$$ {E}_y^{max} $$ represents the maximum battery capacity of y$$ y $$th VSU's VD.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…The deadline constrain and battery capacity constraint need to be considered in the offloading decision to ensure the security of AR applications. 52 In this article, the double constraints contain task latency and VD energy consumption is leveraged to represent security constraint model, which are represented as…”
Section: Security Constraint Modelmentioning
confidence: 99%
“…As successful and effective implementations, the light gradient boosting machine (LightGBM), extreme gradient boosting (XGBoost), and natural gradient boosting (NGBoost) approaches have garnered substantial popularity. [15][16][17] This paper offers a 2-fold improvement for task scheduling in the MEC environment and it is described as follows. An effective distributed task scheduling approach is developed by optimizing the cost and security level of each node using the Hybrid Fuzzy Archimedes (HFA) algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…The GBDT is a collection of decision tree‐based machine learning models. As successful and effective implementations, the light gradient boosting machine (LightGBM), extreme gradient boosting (XGBoost), and natural gradient boosting (NGBoost) approaches have garnered substantial popularity 15‐17 . This paper offers a 2‐fold improvement for task scheduling in the MEC environment and it is described as follows.…”
Section: Introductionmentioning
confidence: 99%