Journal
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
Volume 9, Issue 3, Pages 1373-1385Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TETC.2020.2971831
Keywords
Smart cities; Blockchain; Edge computing; Security; Task analysis; Quality of service; Load management; Consortium blockchain; Internet of Vehicles; mobile edge computing; smart city
Funding
- National Natural Science Foundation of China [61972255]
Ask authors/readers for more resources
In a smart city, IoV can assist in achieving flexible computing resource demand response by sharing idle vehicle computing resources. To ensure transaction security and privacy in the system, a consortium blockchain approach is employed without involving a centralized trusted third-party. Additionally, a two-stage Stackelberg game is constructed to encourage individual smart vehicles to participate and optimize utilities of buyers and sellers.
In a smart city, Mobile Edge Computing (MEC) are generally deployed in static fashion in base stations (BSs). While moving vehicles with advanced on-board equipment can be regarded as dynamic computing resource transporters ignoring geographical limitations. Thus Internet of Vehicle (IoV) could assist the smart city to achieve flexible computing resource demand response (DR) via paid sharing the idle vehicle computing resources. Motivated by this, we propose a Peer-to-Peer (P2P) computing resource trading system to balance computing resource spatio-temporal dynamic demands in IoV-assisted smart city. On one hand, to guarantee transaction security and privacy-preserving in our system, we employ a consortium blockchain approach and demonstrate the process of secure computing resource trading without involving a centralized trusted third-party. On the other hand, to encourage individual smart vehicles to participate in our system, we construct a two-stage Stackelberg game jointly optimizing the utilities of buyers and sellers. And we also derive the optimal computing pricing and trading amount strategies in this proposed game. Finally, security analysis shows the security performance of our system and numerical simulations show that our strategies can encourage the collaboration between the buyer and smart vehicles.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available