Trust-based mobile edge user task scheduling method

An edge user and task scheduling technology, applied in specific environment-based services, vehicle wireless communication services, communication between vehicles and infrastructure, etc., can solve the problems of being easily deceived, unable to evaluate trustworthiness, and unable to obtain mobile data Issues such as the interactive behavior of collectors, to achieve the effect of improving objectivity and accuracy, and increasing the rate of credible data collection

Active Publication Date: 2021-04-30
CENT SOUTH UNIV
View PDF14 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] First, for the new open and distributed IoT network, the traditional trust evaluation mechanism is difficult to obtain trust relationship and difficult to accurately evaluate
In the current Internet of Things, a huge number of mobile Internet of Things devices can become mobile data collectors. It is up to each mobile data collector to submit data to the system by itself. The trust evaluation system is limited by observation costs, privacy, etc. Unable to get mobile data collector interaction behavior
In addition, even if the interaction behavior of the mobile data collector is obtained, the trust evaluation system cannot give an effective trust evaluation because it cannot evaluate whether the data submitted by the mobile data collector is authentic or not.
[0006] Second, there are problems of being easily deceived and difficult to verify
The evaluation information used i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust-based mobile edge user task scheduling method
  • Trust-based mobile edge user task scheduling method
  • Trust-based mobile edge user task scheduling method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0046] This embodiment is a task scheduling method for mobile edge users based on trust. First, the cloud publishes evaluation tasks to all available mobile edge users, and releases information about the network topology and the location of each IoT device in the network. After receiving the release task, interested mobile edge users will participate in the bidding, and the user's bidding value is B i =(a i , c i ), where a i Indicates the evaluation capability of mobile edge users, which is related to the number of IoT devices in the evaluation area of ​​mobile edge users, c i Indicates the bidding price, that is, the expected remuneration of mobile edge users. Then, based on the greedy selection algorithm considering the trust degree, the cloud selects reliable users from the candidate mobile edge user set to perform the evaluation task. The spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trust-based mobile edge user task scheduling method, which selects a reliable user to execute a task by performing trust evaluation on a mobile edge user so as to realize optimization of task scheduling. The method is divided into two parts. The method comprises the following steps: 1, recruiting mobile edge users with high trust degree and low cost to execute tasks based on a greedy selection algorithm considering trust degree, thereby obtaining a credible evaluation result, accurately distinguishing the reliability of Internet of Things equipment in a network, and collecting data generated by reliable equipment; and 2, comprehensively applying an aggregation-based trust reasoning mechanism and an unmanned aerial vehicle-assisted active trust acquisition mechanism to perform trust evaluation and reasoning on the mobile edge users. An unmanned aerial vehicle is introduced to actively verify data uploaded by a mobile edge user, so that the accuracy of trust evaluation is improved. The trust-based task scheduling optimization method provided by the invention can effectively improve the recruitment performance of the cloud and reduce the recruitment cost.

Description

technical field [0001] The invention relates to a trust-based mobile edge user task scheduling method. Background technique [0002] With the rapid development of the Internet of Things and 5G and higher networks, a large number of data-collecting and data-based applications have emerged. The rise of the Internet of Things combined with the current 5G and higher networks has caused major changes in the current network structure. On the one hand, a large number of computing resources are deployed at the edge of the network, so that data processing and analysis can be carried out at the edge of the network, reducing the energy consumption and delay of data upload to the cloud, and bringing better service quality to users. On the other hand, the acquisition of a large amount of data has rapidly increased the types of applications that can be built. Due to the richer frequency, breadth, and granularity of acquired data, the functions and scope of application provided by applica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/44H04W12/00H04W24/02
CPCH04W4/44H04W12/009H04W24/02
Inventor 欧阳艳刘安丰白静
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products