COPP-DDPG: Computation Offloading with Privacy Preservation in a Vehicular Edge Network
Abstract
:1. Introduction
- We employ a privacy-preserving computation-offloading framework that integrates the security component of the certificate authority (CA) into the edge-servers-assisted vehicular network, which involves multiple RSUs and intelligent connected vehicles (ICVs). In this proposed system model, due to the high mobility of multi-ICVs with random arrival tasks, the offloading strategies, computational resources assigned to the ICVs, and the pseudonym-changing decisions vary with time slots.
- Based on the architecture, we formulated the cooperative optimization problem of computation offloading and resource allocation with the consideration of privacy preservation and task priority as a Markov decision process (MDP) based on three aspects: the end-to-end delay, the computational resource cost, and the ICV’s privacy level to minimize the weighted cost in the VEN system. Furthermore, the state, action, and reward states are designed subsequently.
- In order to effectively solve the above-mentioned problem with continuous variables and meet the requirement of convergence, cooperative optimization for privacy and priority based on DDPG (COPP-DDPG) is proposed.
- The convergence of the proposed approach is verified by the simulation results. Furthermore, the sets of simulation results of the performance comparison demonstrate the proposed approach exhibits superior performance to the other four baseline algorithms.
2. Related Work
3. Model of VEN with Privacy Preservation
3.1. Scenario Description
3.2. Mobility Model
3.3. Communication Model
3.4. Computation Model
3.4.1. Local Computation
3.4.2. VEC Offloading
3.4.3. MEC Offloading
3.5. Privacy Model
4. Problem Formulation
5. Cooperative Optimization for Privacy and Priority Based on DDPG
5.1. State Space
5.2. Action Space
5.3. Reward Space
Algorithm 1: Cooperative Optimization for Privacy and Priority based on Deep Deterministic Policy Gradient COPP-DDPG | |
1 Randomly initialize the critic network and the actor network with weights and ; 2 Initialize the target critic network and the target actor network with weights and ; 3 Initialize the memory replay buffer ; 4 for episode do 5 Initialize a random process ; 6 Receive initial observation state ; 7 for i do 8 for t do 9 Select action according to the current 10 policy and exploration noise ; 11 Execute action and observe reward , the next state ; 12 Store all transitions () in ; 13 Sample a random mini-batch of transitions from ; 14 Set 15 | |
(28) | |
16 Update the critic network by minimizing the loss 17 | |
(29) | |
18 Update the actor policy by using the sampling policy gradient 19 | |
(30) | |
20 Update the target networks for each agent i: 21 | |
(31) | |
22 end 23 end 24 end |
6. Numerical Results
6.1. Simulation Setup
6.2. Performance Comparison
- BOP-DDPG: Although we adopt the DDPG algorithm, BOP-DDPG does not consider the situation of partial offloading, but only offloading all tasks to the MEC server, VEC, or local execution. However, the neural network has the same structure as each network as COPP-DDPG and the allocated computational resources for the vehicles from all RSUs are the same as COPP-DDPG.
- OT-MEC: The vehicular tasks generated by the ICVs are all offloaded and executed to the MEC server through their linked RSUs. The VEC is not considered in the simulation environment.
- OT-VEC: The vehicular tasks generated by the ICVs are all offloaded and calculated to VEC with spare computational resources. The MEC offloading strategy is not considered in the simulation.
- LE-VP: All computation tasks are executed by the local processor of ICV. VEC and the MEC server are not applicable for offloading tasks.
6.3. Simulation Results
6.3.1. Convergence Performance
6.3.2. Performance Comparison
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Chien, W.C.; Cho, H.H. Intelligent architecture for mobile HetNet in B5G. IEEE Netw. 2019, 33, 34–41. [Google Scholar] [CrossRef]
- Hu, L.; Tian, Y. Ready player one: UAV-clustering-based multi-task offloading for vehicular VR/AR gaming. IEEE Netw. 2019, 33, 42–48. [Google Scholar] [CrossRef] [Green Version]
- Liu, S.; Liu, L. Edge computing for autonomous driving: Opportunities and challenges. Proc. IEEE 2019, 107, 1697–1716. [Google Scholar] [CrossRef]
- Qiao, X.; Ren, P. A new era for web AR with mobile edge computing. IEEE Internet Comput. 2018, 22, 46–55. [Google Scholar] [CrossRef]
- Zhao, J.; Dong, P. Mobile-aware and relay-assisted partial offloading scheme based on parked vehicles in B5G vehicular networks. Phys. Commun. 2020, 42, 101163. [Google Scholar] [CrossRef]
- Vo, N.; Duong, T.Q. Editorial: The Key Trends in B5G Technologies, Services and Applications. Mob. Netw. Appl. 2022, 27, 1716–1718. [Google Scholar] [CrossRef]
- Alshamrani, S.S.; Jha, N. B5G Ultrareliable Low Latency Networks for Efficient Secure Autonomous and Smart Internet of Vehicles. Math. Probl. Eng. 2021, 2021, 3697733. [Google Scholar] [CrossRef]
- Xiong, R.; Zhang, C. Reducing Power Consumption for Autonomous Ground Vehicles via Resource Allocation Based on Road Segmentation in V2X-MEC With Resource Constraints. IEEE Trans. Veh. Technol. 2022, 71, 6397–6409. [Google Scholar] [CrossRef]
- Liu, L.; Chen, C. Vehicular Edge Computing and Networking: A Survey. Mob. Netw. Appl. 2021, 26, 1145–1168. [Google Scholar] [CrossRef]
- Karimi, E.; Chen, Y. Task offloading in vehicular edge computing networks via deep reinforcement learning. Comput. Commun. 2022, 189, 193–204. [Google Scholar] [CrossRef]
- Duan, W.; Gu, X. Resource Management for Intelligent Vehicular Edge Computing Networks. IEEE Trans. Intell. Transp. Syst. 2022, 23, 9797–9808. [Google Scholar] [CrossRef]
- Zhang, Y.; Nalam, V.A. RAVEN: Resource Allocation using Reinforcement Learning for Vehicular Edge Computing Networks. IEEE Commun. Lett. 2022, 26, 2636–2640. [Google Scholar] [CrossRef]
- Li, Y.; Tao, X. Privacy-Preserved Federated Learning for Autonomous Driving. IEEE Trans. Intell. Transp. Syst. 2022, 23, 8423–8434. [Google Scholar] [CrossRef]
- Onieva, J.A.; Rios, R. Edge-Assisted Vehicular Networks Security. IEEE Internet Things J. 2019, 6, 8038–8045. [Google Scholar] [CrossRef]
- El-Sayed, H.; Zeadally, S. Edge-centric trust management in vehicular networks. Microprocess. Microsyst. 2021, 84, 104271. [Google Scholar] [CrossRef]
- Liu, J.; Zhang, S.; Liu, H. Distributed Collaborative Anomaly Detection for Trusted Digital Twin Vehicular Edge Networks. In Proceedings of the WASA, Nanjing, China, 25–27 June 2021. [Google Scholar] [CrossRef]
- Zhang, J.; Guo, H. Task Offloading in Vehicular Edge Computing Networks: A Load-Balancing Solution. IEEE Trans. Veh. Technol. 2020, 69, 2092–2104. [Google Scholar] [CrossRef]
- Sun, Y.; Guo, X. Adaptive Learning-Based Task Offloading for Vehicular Edge Computing Systems. IEEE Trans. Veh. Technol. 2019, 68, 3061–3074. [Google Scholar] [CrossRef] [Green Version]
- Zhou, Z.; Liao, H. When Vehicular Fog Computing Meets Autonomous Driving: Computational Resource Management and Task Offloading. IEEE Netw. 2020, 34, 70–76. [Google Scholar] [CrossRef]
- Tong, S.; Liu, Y. Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model. IEEE Trans. Veh. Technol. 2022; early access. [Google Scholar] [CrossRef]
- Guo, H.; Liu, J. Intelligent Task Offloading in Vehicular Edge Computing Networks. IEEE Wirel. Commun. 2020, 27, 126–132. [Google Scholar] [CrossRef]
- Liu, L.; Zhao, M. Mobility-aware multi-hop task offloading for autonomous driving in vehicular edge computing and networks. IEEE Trans. Intell. Transp. Syst. 2022; early access. [Google Scholar] [CrossRef]
- Wei, Z.; Li, B. OCVC: An Overlapping-Enabled Cooperative Vehicular Fog Computing Protocol. IEEE Trans. Mob. Comput, 2022; early access. [Google Scholar] [CrossRef]
- Fan, W.; Liu, J. Joint Task Offloading and Resource Allocation for Multi-Access Edge Computing Assisted by Parked and Moving Vehicles. IEEE Trans. Veh. Technol. 2022, 71, 5314–5330. [Google Scholar] [CrossRef]
- Wei, D.; Zhang, J. Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET. IEEE Trans. Intell. Transp. Syst. 2022; early access. [Google Scholar] [CrossRef]
- Wang, S.; Li, J. Joint Optimization of Task Offloading and Resource Allocation Based on Differential Privacy in Vehicular Edge Computing. IEEE Trans. Comput. Soc. Syst. 2022, 9, 109–119. [Google Scholar] [CrossRef]
- Xu, X.; Xue, Y. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener. Comput. Syst. 2019, 96, 89–100. [Google Scholar] [CrossRef]
- Gao, H.; Huang, W. PPO2: Location Privacy-Oriented Task Offloading to Edge Computing Using Reinforcement Learning for Intelligent Autonomous Transport Systems. IEEE Trans. Intell. Transp. Syst. 2022; early access. [Google Scholar] [CrossRef]
- Durrani, S.; Zhou, X. Effect of vehicle mobility on connectivity of vehicular ad hoc networks. In Proceedings of the IEEE 2010 IEEE 72nd Vehicular Technology Conference-Fall, Ottawa, ON, Canada, 6–9 September 2010. [Google Scholar] [CrossRef]
- Wisitpongphan, N.; Bai, F. Routing in sparse vehicular ad hoc wireless networks. IEEE J. Sel. Areas Commun. 2007, 25, 1538–1556. [Google Scholar] [CrossRef]
- Wang, Y.; Sheng, M. Mobile-edge computing: Partial computation offloading using dynamic voltage scaling. IEEE Trans. Commun. 2016, 64, 4268–4282. [Google Scholar] [CrossRef]
- You, C.; Huang, K. Energy-Efficient resource allocation for mobile-edge computation offloading. IEEE Trans. Wirel. Commun. 2017, 16, 1397–1411. [Google Scholar] [CrossRef]
- Zhang, Y.; Qin, X.; Song, X. Mobility-Aware Cooperative Task Offloading and Resource Allocation in Vehicular Edge Computing. In Proceedings of the WCNCW Workshops, Seoul, Republic of Korea, 6–9 April 2020. [Google Scholar] [CrossRef]
- Dai, Y.; Xu, D. Joint Load Balancing and Offloading in Vehicular Edge Computing and Networks. IEEE Internet Things J. 2019, 6, 4377–4387. [Google Scholar] [CrossRef]
- ETSI TS 102 941; Intelligent Transport Systems (ITS): Security; Trust and Privacy Management. European Telecommunications Standards Institute (ETSI): Valbonne, France, 2021.
- Förster, D.; Kargl, F.; Löhr, H. A framework for evaluating pseudonym strategies in vehicular ad-hoc networks. In Proceedings of the WISEC 15, New York, NY, USA, 22–26 June 2015. [Google Scholar] [CrossRef]
- Wang, J.; He, N. Optimization and non-cooperative game of anonymity updating in vehicular networks. Ad Hoc Netw. 2019, 88, 81–97. [Google Scholar] [CrossRef]
- Freudiger, J.; Manshaei, M.H.; Hubaux, J.P. On non-cooperative location privacy: A game-theoretic analysis. In Proceedings of the CCS 2009, Chicago, IL, USA, 9–13 November 2009. [Google Scholar] [CrossRef] [Green Version]
- Su, Z.; Hui, Y. Distributed Task Allocation to Enable Collaborative Autonomous Driving with Network Softwarization. IEEE J. Sel. Areas Commun. 2018, 36, 2175–2189. [Google Scholar] [CrossRef]
- Lillicrap, T.P.; Hunt, J.J.; Pritzel, A.; Heess, N.; Erez, T.; Tassa, Y.; Silver, D.; Wierstra, D. Continuous Control with Deep Reinforcement Learning. arXiv 2015, arXiv:1509.02971. [Google Scholar]
Notation | Definition |
---|---|
Set/number of RSUs | |
Set/number of ICVs | |
i/j | The ICV index /the RSU index |
ICVs’ arrival rate | |
ICV’s position/speed | |
Vehicular task required computational resource/input data size/output data size/maximum completion deadline/priority | |
Link duration of V2I communication/V2V communication | |
Transmission rate of V2I communication/V2V communication | |
Computation resource of the ICV/VEC/allocated to MEC-j/MEC server | |
ICV-i pseudonym changing decision/number of ICVs changing the pseudonym at time t | |
ICV’s maximum privacy/privacy loss/actual privacy at time slot t | |
Weighted cost function of ICV-i under different offloading strategies | |
Offloading strategy/computational resource allocation/pseudonym changing decision sets of ICVs |
Parameters | Value |
---|---|
Size of the first hidden layer for actor and critic | 300 |
Size of the second hidden layer for actor and critic | 300 |
Learning rate of actor and critic | 0.0001/0.001 |
Size of experience memory | 20,000 |
Parameters for OU noise | 0.15, 0.15, 0.10 |
Discount factor | 0.95 |
Penalty for failed tasks execution | 8 |
Total number of all episodes | 1000 |
Total time periods of one episode | 110 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, Y.; Wang, J.; Ke, H.; Sun, Z. COPP-DDPG: Computation Offloading with Privacy Preservation in a Vehicular Edge Network. Appl. Sci. 2022, 12, 12522. https://doi.org/10.3390/app122412522
Wang Y, Wang J, Ke H, Sun Z. COPP-DDPG: Computation Offloading with Privacy Preservation in a Vehicular Edge Network. Applied Sciences. 2022; 12(24):12522. https://doi.org/10.3390/app122412522
Chicago/Turabian StyleWang, Yancong, Jian Wang, Hongchang Ke, and Zemin Sun. 2022. "COPP-DDPG: Computation Offloading with Privacy Preservation in a Vehicular Edge Network" Applied Sciences 12, no. 24: 12522. https://doi.org/10.3390/app122412522
APA StyleWang, Y., Wang, J., Ke, H., & Sun, Z. (2022). COPP-DDPG: Computation Offloading with Privacy Preservation in a Vehicular Edge Network. Applied Sciences, 12(24), 12522. https://doi.org/10.3390/app122412522