Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A trust-based task scheduling method for mobile edge users

A trustworthy and task-based technology, applied in specific environment-based services, vehicle wireless communication services, communication between vehicles and infrastructure, etc., can solve the problem of being easily deceived, unable to evaluate trustworthiness, and unable to obtain mobile data collection Issues such as interactive behavior of the user can be solved to achieve the effect of improving objectivity and accuracy and increasing the rate of credible data collection

Active Publication Date: 2021-12-17
CENT SOUTH UNIV
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] First, for the new open and distributed IoT network, the traditional trust evaluation mechanism is difficult to obtain trust relationship and difficult to accurately evaluate
In the current Internet of Things, a huge number of mobile Internet of Things devices can become mobile data collectors. It is up to each mobile data collector to submit data to the system by itself. The trust evaluation system is limited by observation costs, privacy, etc. Unable to get mobile data collector interaction behavior
In addition, even if the interaction behavior of the mobile data collector is obtained, the trust evaluation system cannot give an effective trust evaluation because it cannot evaluate whether the data submitted by the mobile data collector is authentic or not.
[0006] Second, there are problems of being easily deceived and difficult to verify
The evaluation information used in the traditional trust reasoning and evolution mechanism comes from the evaluation results submitted by the evaluation object itself, and it is difficult to guarantee its accuracy for malicious evaluation objects
Some evaluation systems use a method that comprehensively considers the evaluation results submitted by the two parties in the interaction, which is easily deceived by the joint conspiracy of the two parties in the interaction.
[0007] Third, there is the problem of long timeliness required for evaluation
The traditional trust evolution mechanism needs to observe the interactive behavior of the evaluated object to obtain the evaluation result. The time required for evaluation cannot be controlled by the system. For example, if the evaluated object has no interactive behavior for a period of time, the system will not be able to trust it for a long time degree to evaluate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trust-based task scheduling method for mobile edge users
  • A trust-based task scheduling method for mobile edge users
  • A trust-based task scheduling method for mobile edge users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0046] This embodiment is a task scheduling method for mobile edge users based on trust. First, the cloud publishes evaluation tasks to all available mobile edge users, and releases information about the network topology and the location of each IoT device in the network. After receiving the release task, interested mobile edge users will participate in the bidding, and the user's bidding value is B i =(a i , c i ), where a i Indicates the evaluation capability of mobile edge users, which is related to the number of IoT devices in the evaluation area of ​​mobile edge users, c i Indicates the bidding price, that is, the expected remuneration of mobile edge users. Then, based on the greedy selection algorithm considering the trust degree, the cloud selects reliable users from the candidate mobile edge user set to perform the evaluation task. The spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for task scheduling of mobile edge users based on trust. By evaluating the trust of mobile edge users, reliable users are selected to perform tasks, and the optimization of task scheduling is realized. The inventive method is divided into two components. 1: Based on a greedy selection algorithm that considers trust, recruit mobile edge users with high trust and low cost to perform tasks, so as to obtain credible evaluation results, accurately identify the reliability of IoT devices in the network, and collect data generated by reliable devices . 2: Comprehensively use the aggregation-based trust reasoning mechanism and the UAV-assisted active trust acquisition mechanism to conduct trust evaluation and reasoning for mobile edge users. Introduce drones to actively verify data uploaded by mobile edge users, thereby improving the accuracy of trust assessment. The trust-based task scheduling optimization method proposed by the present invention can effectively improve the recruitment performance of the cloud and reduce the recruitment cost.

Description

technical field [0001] The invention relates to a trust-based mobile edge user task scheduling method. Background technique [0002] With the rapid development of the Internet of Things and 5G and higher networks, a large number of data-collecting and data-based applications have emerged. The rise of the Internet of Things combined with the current 5G and higher networks has caused major changes in the current network structure. On the one hand, a large number of computing resources are deployed at the edge of the network, so that data processing and analysis can be carried out at the edge of the network, reducing the energy consumption and delay of data upload to the cloud, and bringing better service quality to users. On the other hand, the acquisition of a large amount of data has rapidly increased the types of applications that can be built. Due to the richer frequency, breadth, and granularity of acquired data, the functions and scope of application provided by applica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/44H04W12/00H04W24/02
CPCH04W4/44H04W12/009H04W24/02
Inventor 欧阳艳刘安丰白静
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products