You are currently on the new version of our website. Access the old version .
Applied SciencesApplied Sciences
  • Article
  • Open Access

18 November 2025

Many-Objective Edge Computing Server Deployment Optimization for Vehicle Road Cooperation

and
1
School of Artificial Intelligence, Hebei University of Technology, Tianjin 300401, China
2
State Key Laboratory of Intelligent Power Distribution Equipment and System, Hebei University of Technology, Tianjin 300401, China
*
Author to whom correspondence should be addressed.

Abstract

In the Internet of Vehicles (IoV), vehicles need to process a large amount of perception data to support tasks such as road navigation and autonomous driving. However, their computational resources are limited. Therefore, it is necessary to explore the combination of vehicle–road cooperation with edge computing. Roadside units (RSUs) can provide data access services for vehicles, and deploying edge servers on RSUs can improve the data processing capability in IoV environments and ensure the sustainability of vehicle communications, thus supporting complex traffic scenarios more effectively. In this work, we study the deployment of RSUs in vehicle–road cooperative systems. To balance the deployment cost of RSUs and the quality of service (QoS) of vehicle users, we propose an RSU deployment optimization model with six objectives, including time delay, energy consumption and security when vehicles offload their tasks to RSUs, as well as load balancing and the number and communication coverage area of RSUs. In addition, we propose a Wasserstein generative adversarial network (WGAN)-based Two_Arch2 (WGTwo_Arch2) to solve this many-objective optimization problem to better ensure the diversity and convergence of the solutions. In addition, a polynomial variation strategy based on Lecy’s flight mechanism and a diversity archive selection strategy with an adaptive Lp-norm are also proposed to balance the exploratory and exploitative capabilities of the algorithm. The effectiveness of the proposed algorithm WGTwo_Arch2 for 6-objective RSU deployment optimization is verified by comparisons with five different algorithms.

1. Introduction

In recent years, with the rapid development of new generation communication technologies such as 5G and 6G, the number of vehicles connected to the Internet of Vehicles (IoV) and the amount of data for in-vehicle applications have increased [1]. However, vehicles have limited computing power and storage to perform many computational tasks, requiring them to offload tasks to servers for processing. Cloud servers can provide powerful computational services. However, they are physically far away from vehicle users and incompatible with latency-sensitive tasks. Unlike traditional cloud processing, edge computing effectively reduces network latency, saves energy in vehicle transmissions by processing data locally, and reduces the risk of cybersecurity attacks when data are in the cloud. As an infrastructure in the IoV, roadside units (RSUs) are fixed devices installed near roads that have stronger communication and computation capabilities than vehicles do. RSUs provide wide-coverage network access for vehicles [2] and play a key role in vehicle–road cooperation [3]. In IoV, edge servers are usually deployed on RSUs to provide various real-time services for vehicles. Intelligent vehicles in real-world scenarios can provide a variety of intelligent services. For example, vehicle control and road traffic-type services require high real-time performance to improve road safety and avoid hazardous situations, and entertainment and media-type services require continuous data streams to maintain a better service experience [4], whereas RSUs are costly to install and maintain, and large-scale deployments can impose expensive overheads on operators. Therefore, the RSU deployment problem is modeled as a multiobjective optimization problem, aiming to balance between conflicting user service quality and deployment cost, which is more suitable for practical application scenarios.
Vehicle–road cooperation systems rely primarily on wireless communication; however, when the wireless transmission range is limited, RSUs can provide access services only to vehicles within the communication area. To reduce the energy consumption and time delay of vehicles, in this study, task computation in vehicles is not considered. Instead, the tasks are offloaded to edge or cloud servers to provide satisfactory quality of service (QoS) for users. In addition, considering vehicle mobility, the time required to complete computational tasks may necessitate data transmissions across multiple RSUs during task execution [5]. Then, it is necessary to backhaul the data in the form of wireless multihop communication between multiple RSUs. However, this process can easily be used by attackers to steal sensitive information, thus exposing vehicle users to security threats. Therefore, the ability to ensure the privacy of vehicle users is a key factor affecting the QoS. Existing security algorithms typically rely on encryption for ensuring data privacy. However, the extensive encryption/decryption process leads to severe latency and energy consumption, which is a key challenge for resource-limited vehicles. In this study, instead of using security techniques such as encryption and authentication, the probability of eavesdropping during multihop transmission is used as an optimization objective to secure the network while minimizing latency and energy consumption. Providing higher QoS to more vehicles is the fundamental purpose of deploying RSUs. Therefore, the coverage area is also an important measure used to evaluate the QoS provided by the network. To fully utilize the computational potential of edge computing so that vehicle requests should be processed in RSUs as much as possible, in this study, the number of vehicles covered by RSUs is used as an objective to measure RSU coverage. In addition, RSUs are expensive to install and maintain. When RSUs are not load balanced, the prolonged high loads on certain servers can lead to overheating and hardware failure, whereas idle RSUs lead to resource waste. Therefore, this paper introduces the concept of maximizing the load balance of RSUs to reduce the maintenance cost and maximize the operator’s investment. Most studies maximize the QoS within a limited budget [4,6,7]. Previous RSU deployment optimization studies usually consider deployment cost, coverage area, time delay, or energy consumption as a measure of QoS [8,9,10], but few consider factors such as transmission security and load balancing; therefore, in this paper, we construct a six-objective RSU deployment optimization model including network delay and energy consumption, network transmission security, load balancing, deployment cost, and coverage area.
The RSU deployment strategy has been shown to be an NP-hard problem [1,11]. The evolutionary algorithm (EA) is a population-based stochastic optimization algorithm inspired by the law of natural evolution that does not easily fall into local optimal solutions when solving NP-hard problems and has good performance in non-differentiable non-convex and multi-objective optimization problems [12,13,14,15]. However, when the number of objectives to be optimized increases, the convergence speed and diversity of traditional multi-objective evolutionary algorithms decrease. Therefore, when solving many-objective optimization problems (the number of objectives is greater than 3), the overall optimization often leads to many locally optimal solutions during the search process as the dimensionality of the decision variables grows rapidly, which not only prevents the algorithms from finding the globally optimal solution but may also trigger premature convergence or even stagnation. To address this challenge effectively, Wang et al. [12] proposed the Two_Arch2 algorithm for solving many-objective optimization problems. The algorithm preserves the diversity and convergence of candidate solutions by maintaining two different archives, each with a specific selection and updating strategy. The algorithm performs well in terms of convergence, diversity, and complexity. In addition, by learning sufficiently from high-quality datasets, deep neural networks exhibit strong feature representation and non-linear fitting capabilities. Data generation methods based on deep generative adversarial network (GAN) models have shown extremely superior performance in learning complex high-dimensional data distributions. The traditional GAN [16] is a generative and discriminative gaming process through which adversarial training ultimately leads to the generation of high-quality synthetic data. Wasserstein-GAN (WGAN) [17] is an improved GAN model that introduces the Wasserstein distance as an optimization objective to train generators and discriminators in a more stable and interpretable way. Therefore, this paper introduces the WGAN-based Two_Arch2 algorithm (WGTwo_Arch2), which uses a WGAN-based population initialization strategy and population mating selection strategy to improve the diversity of solutions in the population, as well as a polynomial mutation strategy based on Levy’s flight mechanism and a diversity archive updating strategy based on the adaptive Lp-norm to increase the exploration efficiency and global convergence of the algorithm.
This study focuses on the MaOP algorithm and its application to the problem of deploying RSUs in edge computing-based vehicle-road cooperation. The main contributions of this study are as follows:
  • A six-objective optimization model incorporating time delay, energy consumption, security, load balancing, and number and communication coverage areas is proposed for the RSU deployment optimization problem.
  • The WGTwo_Arch2 algorithm is proposed to optimize the many-objective deployment model of RSUs. To enhance the algorithm’s ability to identify diverse solutions, Kent chaotic mapping data is applied to train the WGAN to generate random individuals covering the entire distribution space during the population initialization process, making the initial population distribution more uniform. A mating selection strategy based on the WGAN is designed to generate more diverse solutions for offspring generation.
  • To improve the global search ability and convergence speed of the algorithm when dealing with many-objective problems, a polynomial variation strategy based on the Levy flight mechanism is proposed. The stochastic wandering mechanism of the Levy flight is used to generate variation probabilities, enabling better exploration of the global search space. An adaptive Lp-norm-based strategy for updating diversity archives is proposed to control exploration and exploitation. Finally, the effectiveness of the proposed algorithm in solving the RSU many-objective deployment optimization problem is experimentally verified.
The remainder of this paper is arranged as follows. The related work is given in Section 2. The architecture of the vehicle-road cooperation system based on RSUs and the RSU deployment optimization model are presented in Section 3.1. The proposed WGTwo_Arch2 algorithm is described in Section 3.2. Section 4 provides the experimental comparison results and analysis. In Section 5, we discuss the limitations of this work and future research directions. Finally, Section 6 summarizes this article.

3. Methods

3.1. System Model and Problem Formulation

In this section, we introduce the architecture of an edge computing-based vehicle-road cooperation. Within this framework, RSUs equipped with edge servers play a central role by providing services to IoV devices. RSUs are not only responsible for storing massive amounts of data but also for analyzing and processing these data in depth to ensure that IoV devices can obtain accurate and timely service support. Therefore, to optimize the overall system performance, we propose a many-objective RSU deployment optimization model, which integrally considers six objectives, including the time delay, energy consumption, and security of vehicle offloading tasks, as well as load balancing, deployment cost, and coverage area of RSUs.

3.1.1. The Vehicle-Road Cooperation System for RSU-Based Deployment

The architecture of the edge computing-based vehicle-road cooperation is shown in Figure 1. It is assumed that vehicles and RSUs carrying edge servers are randomly distributed on a unidirectional road with a distance of 3 km. The RSUs are distributed along the road, and each RSU covers a communication area where vehicles can offload their computational tasks via a wireless local area network (WLAN). The RSUs are connected to each other via a 5G core network. Assume that there are m edge computing servers in the system and that these m RSUs are arranged in order from left to right as E = e 1 , e 2 , , e m . The system includes n ( n = 50 ) vehicles, denoted by V = v 1 , v 2 , , v n . It is assumed that each vehicle has a task to process and offload to the nearest edge server or to a cloud server for processing. In addition, assume that each vehicle v n has a computationally intensive task Z n = b n , d n [21], where b n denotes the size of the input data (in bits) for this task, which is randomly set to the size of [400, 600] (in kbits). d n denotes the total number of CPU cycles required to complete the computational task, which is randomly set to [900, 1100] (in megacycles). The number of CPU cycles d n is positively correlated with the task size b n .
Figure 1. Vehicle–road cooperation based on edge-computing.
During a certain period, vehicles simultaneously send task processing requests to RSUs. The offloading decision of user v n is denoted by x n i ; if i 1 m , then user v n offloads the task to the edge server e m , and the vehicle users assigned to e m are denoted by the set E S m = v 1 , v 2 , , v k ( 0 k n ) according to the priority (i.e., v 1 is the first to be processed). The data that arrives at RSUs with priority are processed first, and the queuing priority can be known according to the transmission delay. In addition, the RSU has limited computing power and cannot serve all the user task requests it receives. The queuing time strongly affects the service experience of the vehicle user. If the queuing time of the vehicle user is greater than the time of transmission of the vehicle to the cloud server (i.e., T n Que > T n cloud ), the vehicle task is directly offloaded to the cloud server. The maximum wireless communication range of the RSU is assumed to be d (d = 250 m). If there is no RSU within this distance, the vehicle offloads the task directly to the cloud server, and the vehicle offloaded to the cloud server is denoted as C L = v 1 , v 2 , , v c ( 0 c n ). In addition, owing to the mobility of the vehicle, the vehicle’s original location (denoted by v o ) and destination location (denoted by v d ) affect the selection of the computational task offloading method [22]. Assuming that the vehicle is moving in one direction along the road at a constant speed, the destination position v d n is calculated from the initial position v o n of vehicle v n and its speed v:
v d n = v o n + T n t + T n Q u e + T n c · v
Assuming that v o and v d are in the same RSU coverage area d, v o should offload the computational data to this RSU e i for processing via wireless communication technology. At the end of the computation process, the data can be returned from e i to the vehicle located at v d . Assuming that the original and destination positions of the vehicle are within two RSUs e i and e j , respectively, the task is offloaded to the nearest RSU e i that is connected to the v o , and after the processing is completed, e i transmits the data through multiple hops to e j , which in turn transmits the processed data to the vehicle.
After processing the task, the RSU must transmit the processed data back to the vehicle. It determines whether the vehicle is still in the transmission range of RSU e m after T n t + T q c time. If the vehicle is still in the transmission range, the data are directly transmitted back. Alternatively, if the vehicle is in the transmission range of another RSU e q , e m is transmitted to e q via a multihop. Finally, if the vehicle is not in the transmission range of any of the RSUs, the processed data are sent via a multihop to the nearest RSU to the vehicle, and when the vehicle passes through the transmission range of that RSU, the data are transmitted back to the vehicle. Transmission between the RSUs is performed via a wireless backhaul link.

3.1.2. The RSUs Deployment Optimization Model

In this section, we focus on the optimization problem of RSU deployment in edge computing-based vehicle-road cooperation system. In this scenario, RSUs play a crucial role in that they not only reduce the computational burden of vehicular devices but also effectively scale down the transmission delay and guarantee real-time performance for high-bandwidth applications. Therefore, a six-objective optimization model that comprehensively considers total delay, energy consumption, security, load balancing, deployment cost, and coverage is constructed. The details are as follows:
1.
Total delay
In computationally intensive applications, the output data of a computation are often significantly smaller than the input data. Therefore, the time required to return the computation results to the vehicle is negligible. If the vehicle transmits data to an RSU for processing, the user’s time delay mainly consists of the transmission delay, queuing delay, and computation delay of the data in the RSU. If the vehicle transmits data to the cloud server for processing, the queuing time and the computation processing time are negligible because the cloud server has sufficient computational resources, and only the transmission delay needs to be considered.
The time delay of the vehicle transmits data to an RSU: when vehicle v n transmits task Z n to RSU e m , the transmission delay is generated at this time as follows:
T n t = b n λ n , m
where λ n , m denotes the transmission rate (in bps) obtained by vehicle user v n when it offloads the task to RSU e m :
λ n , m = W × log 2 1 + p n ρ 0 l n , m β δ 0 2 + v i E S m · a n d v i v n p i ρ 0 l i , m β
where W is the channel bandwidth, which is set to 5 MHz. The transmission power p n of the vehicle determines the strength of the signal sent by the vehicle, and the transmit power and idle power are set to 500 mW and 100 mW, respectively. The small-scale fading coefficient ρ 0 accounts for the rapid variation in the signal over short distances due to multipath effects, etc. The distance between vehicle user n and base station m is expressed as l ( n , m ) , and β denotes the path loss coefficient (a constant), which is set to 3. δ 0 2 denotes the noise power spectral density, which is set to 10 9 W [28].
The vehicle’s queuing delay in the RSUs: The vehicles in the set E S m transmit messages to e m at the same time and wait in line to be processed. The waiting time of vehicle v n ( n > 1 ) in e m is computed as follows:
T n Que = T n 1 t + T n 1 c + T n 1 Q u e T n t , T n 1 t + T n 1 c + T n 1 Q u e > T n t 0 , T n 1 t + T n 1 c + T n 1 Q u e T n t
The vehicle’s computation delay in the RSU: When a task arrives at the RSU, the RSU processes it, assuming that the computational power of the RSU is F e s , which is set to 5 GHz. The average computation time for all the vehicles in the system is
T n c = d n F e s
The vehicle’s transmission delay in the cloud server: The time delay of the vehicle user v n who is processing the task in the cloud server can be calculated as
T n cloud = b n λ n , cloud
Therefore, the average time delay for all vehicles is
T ¯ = j = 1 m v i E S j T i t + T i c + T i Q u e + i C L T i c l o u d n
The objective function for minimizing the time delay can be normalized and expressed as
min f delay = 1 T ¯
2.
Energy consumption of vehicles
When user v n transmits task Z n to RSU e m , the transmission energy consumption is
E n e s = p n T n t = p n b n R n , m
where p n is set to 500 mW. The transmission energy consumption when user v n transmits task Z n to the cloud server is as follows:
E n cloud = p n b n R n , cloud
When the RSU processes the task of user v n , user v n is in the idle state, and the idle energy consumption of the vehicle can be calculated as follows:
E n c = p idle T n c = p idle d n F e s
where p idle is the power consumption in the idle state, which is set to 100 mW. The cloud server has sufficient computational resources to process the task very quickly, so the idle energy consumption of the vehicle assigned to the cloud server is ignored, and only the transmission energy is consumed. In the last step, user v n downloads the output data from the server. Since the size of the output data is much smaller than the size of the input data, the latency and energy consumption in this phase are intentionally ignored. The total energy consumption of the vehicle is defined as
V total = E n e s + E n c , RSU E n cloud , Cloud
The average energy consumption objective function for all vehicles is
E total = j = 1 m v i E S j E n e s + E n c + i C L E i cloud n
The objective function for minimizing energy consumption can be normalized and expressed as:
min f ene = 1 E total
3.
Security
Secure transmission is a key metric of QoS and is used to measure the probability of successful transmission. RSUs return data via multiple hops. Assuming that the probability that the link between two RSUs in the network is eavesdropped (i.e., transmitted packets may be intercepted) is p d , the probability of successful forwarding between RSUs between each hop is 1 p d . When the number of hops in the path increases, the cumulative probability of successful eavesdropping on the end-to-end overall link will rise significantly, leading to a marked decline in the overall security of the path with more hops. In addition, a greater number of RSUs through which the data packets pass not only increases the delay but also means that the failure of any RSU in the path will cause the entire path becoming unavailable, thereby reducing the reliability of data transmission. Therefore, the number of RSU hops passed through when returning data is used as a measure of security. If the vehicle’s original and destination locations are within two RSUs e m and e i , respectively, and j RSUs need to be passed between e m and e i , the probability that e m forward the data successfully to vehicle v n is as follows:
p n m = 1 p d j + 1
where p d = 10 9 .
Therefore, the average safe forwarding rate for all vehicles is denoted as:
V sec = j = 1 m v i E S j p i J j = 1 m v i E S j 1
The minimization objective function is expressed as follows:
min f sec = 1 V sec
4.
Load balancing of RSUs
Load balancing improves both the availability of RSUs, by optimizing their resource allocation, and the reliability of the network by effectively handling congestion and failure events. The average load of the RSUs is denoted as
C ¯ = i = 1 m E S i m
The vehicles covered by each RSU should be the same as possible. When an excessive number of vehicles are connected to certain RSUs, it often results in in a greater level of interference in vehicle data transmission. This also leads to stress overload in busy task RSUs and resource waste in idle RSUs. The standard deviation of the RSU load is used to denote the balanced load among them:
S t d = i = 1 m E S i | C ¯ | 2 m
The balanced load of the RSUs is normalized and expressed as a minimization objective function:
minf load = 1 1 1 + s t d
5.
Cost of deploying RSUs
The RSU cost is related mainly to the number of RSUs, so the minimized RSU cost is denoted as
min f cost = N 12
6.
Coverage area of RSUs
The more vehicles that RSUs can communicate with, the greater the coverage of the car network. Therefore, the coverage should be maximized and denoted as
Cov = i = 1 m E S i n
The objective function is expressed as follows:
min f cov = 1 Cov
7.
Six-objective optimization model
In summary, we construct a six-objective optimization model. That is, minimize total delay, energy consumption, balanced load, and deployment cost, and maximize security and coverage. The six-objective optimization model based on RSUs deployment is shown below:
min f delay ,   f ene ,   f sec ,   f load ,   f cost ,   f cov

3.2. The Proposed WGTwo_Arch2 Approach

This section presents the solution framework for the six-objective optimization model proposed in Section 3. This approach is based on the Two_Arch2 algorithm. The proposed WGAN-based population initialization strategy and mating selection strategy, Levy distribution-based polynomial variation strategy and adaptive Lp-norm diversity archive updating strategy are first introduced, and then the proposed improvements are incorporated into the Two_Arch2 optimization framework to form the WGTwo_Arch2 algorithm. The pseudocode is shown in Algorithm 2. Finally, the superiority of WGTwo_Arch2 is verified by analyzing the experimental results through the objective function value and performance evaluation metrics.
Algorithm 2: Population initialization strategy based on WGAN
Applsci 15 12240 i002

3.2.1. WGAN-Based Population Initialization Strategy and Mating Selection Strategy

GANs [26] mainly consist of a generator and a discriminator. The generator receives random noise vectors and generates new samples similar to the real data through an inverse convolutional network. The discriminator is a binary classifier that extracts features of the input data on the basis of a convolutional network, aiming at distinguishing whether the input samples are generated data or real data. The generator and discriminator are trained in an alternating adversarial game process, where the competition between the generator and the discriminator leads to an equilibrium process as the training progresses. Once training is complete, the generator can be used to generate high-quality synthetic data such that the discriminator cannot effectively distinguish between true and false data. The Jensen–Shannon (JS) scatter or Kullback–Leibler (KL) scatter used by traditional GANs as a loss function is as follows:
D loss = 1 m i = 1 m log D x ( i ) + log 1 D G z ( i )
G loss = 1 m i = 1 m log D G z ( i )
where D l o s s is the discriminator loss, G l o s s is the generator loss, D ( x ) denotes the judgment probability of the discriminator on a real sample, and D ( G ( z ) ) denotes the judgment probability on a generated sample. With respect to the original loss function, problems such as training instability exist. The WGAN [27] introduces the Wasserstein distance as a loss function to improve the stability of the gradient, providing a better measure of the difference between the two distributions and makes it easier to generate high-quality data samples:
W D loss = E x p data [ D ( x ) ] E z p z [ D ( G ( z ) ) ]
W G loss = E z p z [ D ( G ( z ) ) ]
where W D loss is the discriminator loss, i.e., maximizing the difference between the real sample and the generated sample, W G loss is the generator loss, i.e., minimizing the Wasserstein distance between the generated sample and the real sample, D ( x ) denotes the judgment probability of the discriminator on the real sample, and D ( G ( z ) ) denotes the judgement probability on the generated sample. In the Two_Arch2 algorithm, the initial population is generated through randomization. However, this may lead to a non-uniform distribution of the initial population, thus reducing the population diversity and introducing high levels of uncertainty into the optimization process. The chaotic system is described as a non-linear, stochastic-like deterministic bounded system that is neither periodic nor convergent and is highly sensitive to its initial parameters and conditions. Owing to its regularity, stochasticity, ergodicity and unpredictability, chaos is regarded as a reliable source of stochasticity that provides a more efficient search strategy for heuristic optimization algorithms than traditional random sequences do. The Kent chaotic map is a type of non-linear chaotic mapping with a wireless number of mapping folding, which has good traversability, uniformity and randomness and can effectively prevent the algorithm from falling into local extremes. The Kent map is used to generates the solution sequence:
x i + 1 = x i a ,    0 x i a 1 x i 1 a , a < x i < 1
where a is a control parameter, a ( 0 , 1 ) , which is set to a value of 0.4. The range of its chaotic orbital state values is (0, 1). Therefore, the population initialization formula is
x i + 1 = x i a × value high value low + value low 1 x i 1 a × value high value low + value high
where valuehigh and valuelow are the maximum and minimum values of the decision variables, respectively.
In the population initialization stage, we abandon the traditional random initialization method. Firstly, we use the Kent chaotic map to generate an initial sequence with good traversal and non-repetitiveness, providing high-quality initial training data for WGAN. Subsequently, we use the trained WGAN model to generate the initial population. The generated initial individuals are not only random but also cover the “remote” areas in the entire distribution space that are ignored by traditional methods, enhancing the global diversity of the population and effectively avoiding the algorithm from prematurely falling into a local optimal region. The pseudocode is shown in Algorithm 2.
Mating selection is employed to produce the next generation by selecting certain individuals from the CA and DA for crossover and mutation. An effective mating selection strategy for a population is crucial for maintaining the genetic diversity of the population and driving the search process toward the Pareto optimal frontier. In the Two_Arch2 algorithm, a random selection strategy and a Pareto dominance selection strategy are utilized to select individuals for offspring generation. To increase the diversity of the solutions, we propose a Pareto dominance selection strategy based on the WGAN, i.e., we use the non-dominated solutions in the CA to train the generator and discriminator of the WGAN, and the WGAN-generated individuals are selected for mating. Therefore, during the evolutionary process, in addition to mating selection from the current population, WGAN is regularly used to generate new individuals to participate in the generation of offspring. This breaks the possible “inbreeding” of the population in the later stage of evolution. It is crucial for maintaining the wide distribution of the Pareto Front solution set, especially in handling many-objective problems, effectively preventing the population from contracting to a small segment of the front. Therefore, the new solutions generated by WGAN may be located in areas that the current population has not explored but have high potential, thereby helping the algorithm escape from local Pareto optimality and move towards the global Pareto optimal front to promote convergence. The pseudocode is shown in Algorithm 3.
Algorithm 3: The mating selection strategy based on WGAN
  •  Input: CA,DA,Population size N;
  •  Output: ParentC, ParentM;
 1
ParentM ← N individuals randomly selected from CA;
 2
ParentC ← N/2 individuals randomly selected from DA;
 3
NonDominate ← N/2 individuals randomly selected from CA;
 4
Training generators and discriminators of WGAN using non-dominated solutions;
 5
ParentC ← N/2 solutions are generated using WGAN;
 6
return ParentC and ParentM;

3.2.2. Polynomial Variation Strategy Based on the Levy Distribution

Variation operations are an important way for individuals in a population to explore the solution space. Polynomial variation is a probability-based variation operation that generates new individuals by randomly perturbing individual genes, effectively introducing diverse individuals and improving the global search ability of the algorithm. The Two_Arch2 algorithm enables better searches for the optimal solution by polynomially varying the individuals. Specifically, chromosomal variation is achieved by first randomly generating a variation parameter u, randomly selecting an individual for a particular gene, and then summing the variation value with the value of that gene. The parameters of polynomial variation include the variation probability, perturbation size, and perturbation index. Among them, the mutation probability determines the probability of each individual being mutated, the perturbation size determines the size of the perturbation, and the perturbation index determines the direction of the perturbation. The mutation formula is as follows:
x t = x t + u t l t 2 r + ( 1 2 r ) u t x t u t l t d + 1 1 d + 1 1 , r 0.5 x t + u t l t 1 2 ( 1 r ) + 2 ( r 0.5 ) x t l t u t l t d + 1 1 d + 1 , r > 0.5
where x t denotes a randomly selected locus, x t denotes the mutated locus, and r denotes a random number uniformly distributed in the interval (0, 1). d denotes the probability of mutation, and u t and l t denote the upper and lower bounds of the variable, respectively.
To avoid blindly applying variation operations, the variation parameter r in polynomial variation is randomly generated. A polynomial variation strategy based on the Levy distribution is adopted to reasonably determine the variation range of the population. We adopt the random walk characteristics of Levy flight to dynamically control the mutation step size. Compared with a fixed mutation probability, Levy flight has the features of both small-scale local search and large-scale long-distance leaps. The “long jumps” in Levy flight enable the algorithm to explore unknown regions far from the current population, which is crucial for enhancing global search capabilities and discovering potential optimal solutions. Meanwhile, the “short jumps” allow the algorithm to conduct fine exploitation after identifying promising areas. This self-balancing characteristic of “exploration” and “exploitation” ensures that the algorithm conducts guided random search in a relatively large population, maintaining diversity without sacrificing convergence speed. Therefore, generating the variational parameter r from the Levy flight strategy not only increases the search region of the solution but also enhances the algorithm’s ability to search for the solution. This strategy enables the algorithm to avoid falling into local optima, thus increasing its probability of finding the global optimum solution. The formula for generating the variational parameter r using the Levy flight strategy is as follows:
σ = Γ ( 1 + β ) sin ( π β / 2 ) π β Γ ( ( 1 + β ) / 2 ) × 2 ( β 1 ) / 2 β 1 / β
u = norm ( 0 , σ )
v = norm ( 0 , 1 )
r = u | ν | 1 / β
where Γ is the gamma function, β is the shape parameter of the step size distribution with a value of 1.5, and u and v denote the standard normal distributions N 0 , σ 2 and N ( 0 , 1 ) of random numbers, respectively.

3.2.3. Diversity Archive Update Based on the Adaptive Lp-Norm

The DA in Two_Arch2 complements the CA, which guides the population to converge to the PF. In contrast, the DA focuses on maintaining the diversity of the population, and its update is based on the Pareto dominance strategy. However, unlike traditional algorithms that use the crowding distance as a criterion for environment selection, the DA uses the Lp-norm-based distance as a similarity measure between solutions, prioritizing the retention of solutions in sparse regions. The setting of p can affect the evaluation of diversity and thus the distribution of solutions in the target space. In the original DA update strategy, p is set to 1/m (m is the number of objects). Although the distance based on the Lp-norm can largely improve the diversity of the algorithm, it is not conducive to the utilization of its own characteristics if it is used indiscriminately for all individuals in each iteration. Therefore, in this paper, the value of p is dynamically adjusted on the basis of the number of iterations. Therefore, the algorithm has a better global search ability to cover the potentially optimal region at the early stage of optimization and focuses on local depth-seeking at the later stage to achieve a wide distribution of the solution set and ensure the balance between exploration and exploitation of the algorithm, with the following formula:
p = 1 1 + e p × t T
where T is the maximum number of iterations and t is the current number of iterations.

4. Experimental Evaluation

This section first describes the parameter settings of the edge computing-based vehicle–road cooperation architecture. Then, a comparison of the proposed algorithm with MaOEA-IGD [29], TiGE2 [30], hpaEA [31], Two_Arch2 [12], and NSGA-III [27] on the basis of the values of hypervolume (HV) metric and the six optimization objectives proposed in this section.

4.1. Experimental Parameter Settings

Assuming that there are 50 vehicles on a one-way road with a range of 3 km, we set up experiments with 1 to 12 RSUs. We use four optimization algorithms to solve the RSU deployment optimization problem. Each algorithm is run 20 times, and the objective function is evaluated 100,000 times. The other experimental parameters are shown in Table 1.
Table 1. Parameter settings.

4.2. Comparison and Analysis of Experimental Results

The variability in the number of RSUs deployed is analyzed on the basis of the set of Pareto optimal solutions obtained. Figure 2 presents a visualization of the experimental results for the the six algorithms on each optimization objective (the smaller the objective value is, the better the optimization). As shown in Figure 2a,b,d, the performance of the solution obtained by the improved algorithm WGTwo_Arch2 is significantly better than that of the remaining five algorithms on three objectives, time delay, energy consumption and security. The performance of the six algorithms under the load balancing and coverage area objective is shown in Figure 2c,e, where the WGTwo_Arch2 algorithm is optimized after MaOEA-IGD. However, MaOEA-IGD can only find solution sets with RSU numbers less than 9, which has significant shortcomings in terms of diversity. In summary, the WGTwo_Arch2 algorithm demonstrates superior performance in solving the many-objective deployment optimization problem for RSUs in the IoV, achieving low latency, effectively reducing the energy overhead of the system and ensuring the security of data transmission.
Figure 2. Comparison of average objective values between WGTwo_Arch2 and other algorithms.

4.3. Comparison of HV Indicator Values

The HV, as a comprehensive evaluation metric, can be used to assess the performance of algorithm-generated PFs effectively in terms of diversity and convergence. This metric quantifies the performance of an algorithm by calculating the volume of the space enclosed by the PFs with respect to a predefined reference point. This reference point is usually set as the point of minimum value in each target direction, which serves as a benchmark for evaluation. If a larger value of HV is obtained during the calculation process, then the algorithm usually performs better in terms of convergence and diversity. The HV is calculated via the following equation:
H V ( p s , r e f ) = V O L f p s f 1 , f 1 r e f × × f m , f m r e f
where p s denotes the set of optimal solutions obtained by the algorithm, which contains solutions that perform well under multiple objective functions. r e f is the set reference point, which is usually chosen as the minimum value point in each objective direction as the benchmark for calculating the hypervolume. m denotes the number of objectives, which determines the dimensions of the objective space that need to be accounted for during HV calculation. In this paper, the proposed algorithm is compared with the other five algorithms in terms of the HV term. The number of evaluations is set to 100,000, and each algorithm is tested independently over 20 runs. The final HV value is computed as the average of these 20 runs. As shown in Table 2 and Figure 3, the HV metric value of the WGTwo_Arch2 algorithm is the largest, indicating its superior performance in solving the many-objective RSU deployment optimization problem.
Table 2. HV index values.
Figure 3. The HV value evolutionary curves of algorithms for the six-objective optimization model.
Based on the HV values obtained from 20 experiments, the mean and standard deviation 95% confidence intervals of six algorithms were calculated as follows: For WGTwo_Arch2, the confidence interval of the mean is (0.001372, 0.001392) and the standard deviation is (0.0000160, 0.0000307). For Two_Arch2, the 95% confidence interval of the mean is (0.001264, 0.001306) and the standard deviation is (0.0000339, 0.0000651). For hpaEA, the 95% confidence interval of the mean is (0.001199, 0.001248) and the standard deviation is (0.0000404, 0.0000777). For NSGA-III, the 95% confidence interval of the mean is (0.001216, 0.001260) and the standard deviation is (0.0000364, 0.0000700). For MaOEA-IGD, the 95% confidence interval of the mean is (0.001009, 0.001065) and the standard deviation is (0.0000459, 0.0000880). For TiGE2, the 95% confidence interval of the mean is (0.001284, 0.001310) and the standard deviation is (0.0000214, 0.0000412). The larger the HV value, the better the comprehensive performance of the algorithm in solving practical application problems. Among them, the mean of WGTwo_Arch2 is higher than that of other algorithms and its interval is the narrowest, indicating that the average performance of WGTwo_Arch2 is better. In addition, the standard deviation interval of WGTwo_Arch2 is the smallest, indicating that this algorithm has the most stable performance.

4.4. Time Complexity Analysis

Assuming the population size is N, the decision variables are D and the number of objective functions is m. In WGTwo_Arch2, the Kent chaos mapping and WGAN are applied to generate N individuals with m objectives, with time complexities of O ( m N ) and O ( m N d ) respectively, where d represents the complexity of the generator network (such as the number of layers and neurons per layer). In the mating selection strategy, WGAN is employed to generate individuals with a time complexity of O ( m N d ) . Then, updating the CA based on indicator selection with time complexity of O N 2 , updating the DA involves performing non-dominant sorting and diversity maintenance based on the Lp norm, so the time complexity is max O N 2 log m 2 N , O m N 2 . Therefore, the total complexity of WGTwo_Arch2 is max O N 2 log m 2 N , O m N 2 , O ( m N d ) . The comparison of computational complexity with other algorithms is shown in Table 3.
Table 3. Computational complexity of compared algorithms.

5. Discussion

This paper focuses on the deployment optimization of RSUs in edge computing-based cooperative vehicle-infrastructure systems. A many-objective deployment optimization model for RSUs is established and a corresponding algorithm named WGTwo_Arch2 is proposed. Experimental results demonstrate that the proposed algorithm exhibits good optimization performance on the constructed model. However, there are still certain limitations in terms of model construction and algorithm design. Firstly, the constructed RSU deployment optimization model is a simplified model, which fails to fully reflect the complex traffic conditions in reality, thus limiting the applicability and credibility of the model in actual road networks. In future research, we will focus on incorporating more realistic road condition parameters (such as real-time traffic density, vehicle speed distribution and communication load) or directly integrating real traffic flow data to enhance the practicality and generalization ability of the model. Secondly, although the WGTwo_Arch2 algorithm performs well in the currently experimental scenarios, its scalability in handling larger-scale problems has not been verified. For example, when the number of RSUs increases significantly, the road range expands, or the scale of vehicle nodes grows, further investigation is needed to determine whether the algorithm can still maintain good convergence speed and solution diversity. In addition, whether the algorithm is applicable to other types of many-objective optimization problems (such as task offloading and resource allocation) also needs to be explored.

6. Conclusions

Efficient IoV networks require optimal RSU deployment for a given road layout, which can reduce network latency and improve data transmission efficiency. However, deploying and maintaining RSUs is costly. Therefore, maximizing the QoS with a limited budget is a major challenge. In this paper, we describe the RSU deployment problem in edge computing-based vehicle–road cooperation and model it as a deployment optimization problem with multiple objectives. To evaluate the performance of the system architecture comprehensively, a six-objective optimization model is constructed that integrates several key factors, such as time delay, energy consumption, security, load balancing, deployment cost and coverage area. The WGTwo_Arch2 algorithm is subsequently proposed by incorporating the WGAN-based population initialization strategy and mating selection strategy, the Kent map-based population initialization strategy, the polynomial variation strategy based on the Levy distribution, and the diversity archive updating strategy based on the adaptive Lp norm into the Two_Arch2 framework. The execution process and pseudocode of the proposed enhancements are detailed. Finally, by comparing the objective function values and performance evaluation indices, it is verified that the WGTwo_Arch2 algorithm clearly outperforms the other algorithms in several aspects.

Author Contributions

Methodology, S.F.; software, S.F.; validation, S.F. and B.C.; formal analysis, S.F.; investigation, S.F.; writing—original draft preparation, S.F.; writing—review and editing, S.F.; visualization, S.F.; supervision, B.C.; project administration, B.C.; funding acquisition, B.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Key R&D Program of China under Grant No. 2023YFB4503000. This work was supported in part by National Natural Science Foundation of China (NSFC) under Grant No. 62473129, in part by the Natural Science Fund of Hebei Province for Distinguished Young Scholars under Grant No. F2021202010, in part by Science and Technology Project of Hebei Education Department under Grant No. JZX2023007, in part by the S&T Program of Hebei under Grant No. 24464401D. The APC was funded by the same grant.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data will be made available on request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Fan, X.; Gu, W.; Long, C.; Gu, C.; He, S. Optimizing task offloading and resource allocation in vehicular edge computing based on heterogeneous cellular networks. IEEE Trans. Veh. Technol. 2023, 73, 7175–7187. [Google Scholar] [CrossRef]
  2. Ning, Z.; Huang, J.; Wang, X.; Rodrigues, J.J.; Guo, L. Mobile edge computing-enabled internet of vehicles: Toward energy-efficient scheduling. IEEE Netw. 2019, 33, 198–205. [Google Scholar] [CrossRef]
  3. Huo, Y.; Yang, R.; Jing, G.; Wang, X.; Mao, J. A multi-objective Roadside Units deployment strategy based on reliable coverage analysis in Internet of Vehicles. Ad Hoc Netw. 2024, 164, 103630. [Google Scholar] [CrossRef]
  4. Massobrio, R.; Toutouh, J.; Nesmachnow, S.; Alba, E. Infrastructure deployment in vehicular communication networks using a parallel multiobjective evolutionary algorithm. Int. J. Intell. Syst. 2017, 32, 801–829. [Google Scholar] [CrossRef]
  5. Zhang, K.; Mao, Y.; Leng, S.; He, Y.; Zhang, Y. Mobile-edge computing for vehicular networks: A promising network paradigm with predictive off-loading. IEEE Veh. Technol. Mag. 2017, 12, 36–44. [Google Scholar] [CrossRef]
  6. Nikookaran, N.; Karakostas, G.; Todd, T.D. Combining capital and operating expenditure costs in vehicular roadside unit placement. IEEE Trans. Veh. Technol. 2017, 66, 7317–7331. [Google Scholar] [CrossRef]
  7. Yu, H.; Liu, R.; Li, Z.; Ren, Y.; Jiang, H. An RSU deployment strategy based on traffic demand in vehicular ad hoc networks (VANETs). IEEE Internet Things J. 2021, 9, 6496–6505. [Google Scholar] [CrossRef]
  8. Talpur, A.; Gurusamy, M. Drld-sp: A deep-reinforcement-learning-based dynamic service placement in edge-enabled internet of vehicles. IEEE Internet Things J. 2021, 9, 6239–6251. [Google Scholar] [CrossRef]
  9. Lin, M.; Huo, J.; Wang, L.; Yao, G.; Chen, Y.; Lu, Z. A Multi-Objective Optimization Approach for Roadside Unit Deployment Strategy in IoV. In Proceedings of the 2024 IEEE Wireless Communications and Networking Conference (WCNC), Dubai, United Arab Emirates, 14–17 April 2024; pp. 1–6. [Google Scholar]
  10. Zhang, L.; Wang, L.; Zhang, L.; Zhang, X.; Sun, D. An RSU deployment scheme for vehicle-infrastructure cooperated autonomous driving. Sustainability 2023, 15, 3847. [Google Scholar] [CrossRef]
  11. Chaudhary, R.; Kumar, N. Secgreen: Secrecy ensured power optimization scheme for software-defined connected iov. IEEE Trans. Mob. Comput. 2023, 22, 2370–2386. [Google Scholar] [CrossRef]
  12. Wang, H.; Jiao, L.; Yao, X. Two_Arch2: An improved two-archive algorithm for many-objective optimization. IEEE Trans. Evol. Comput. 2014, 19, 524–541. [Google Scholar]
  13. Praditwong, K.; Yao, X. A new multi-objective evolutionary optimisation algorithm: The two-archive algorithm. In Proceedings of the 2006 International Conference on Computational Intelligence and Security, Guangzhou, China, 3–6 November 2006; pp. 286–291. [Google Scholar]
  14. Zitzler, E.; Künzli, S. Indicator-based selection in multiobjective search. In Proceedings of the International Conference on Parallel Problem Solving from Nature, Birmingham, UK, 18–22 September 2004; pp. 832–842. [Google Scholar]
  15. Deb, K.; Goyal, M. A combined genetic adaptive search (GeneAS) for engineering design. Comput. Sci. Inform. 1996, 26, 30–45. [Google Scholar]
  16. Goodfellow, I.J.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Bengio, Y. Generative adversarial nets. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 8–13 December 2014; Volume 27. [Google Scholar]
  17. Arjovsky, M.; Chintala, S.; Bottou, L. Wasserstein generative adversarial networks. In Proceedings of the International Conference on Machine Learning, Long Beach, CA, USA, 9–15 July 2017; pp. 214–223. [Google Scholar]
  18. Chen, F.; Zhou, J.; Xia, X.; Xiang, Y.; Tao, X.; He, Q. Joint optimization of coverage and reliability for application placement in mobile edge computing. IEEE Trans. Serv. Comput. 2023, 16, 3946–3957. [Google Scholar] [CrossRef]
  19. Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T.A.M.T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef]
  20. Kumrai, T.; Ota, K.; Dong, M.; Champrasert, P. RSU placement optimization in vehicular participatory sensing networks. In Proceedings of the 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 27 April–2 May 2014; pp. 207–208. [Google Scholar]
  21. Wang, F.; Wang, C.; Wang, K.; Jiang, Q.; Wang, B.; He, W. Multiobjective differential evolution with discrete elite guide in internet of vehicles roadside unit deployment. Wirel. Commun. Mob. Comput. 2021, 1, 4207130. [Google Scholar]
  22. Guerna, A.; Bitam, S. GICA: An evolutionary strategy for roadside units deployment in vehicular networks. In Proceedings of the 2019 International Conference on Networking and Advanced Systems (ICNAS), Annaba, Algeria, 26–27 June 2019; pp. 1–6. [Google Scholar]
  23. Wu, T.J.; Liao, W.; Chang, C.J. A cost-effective strategy for road-side unit placement in vehicular networks. IEEE Trans. Commun. 2012, 60, 2295–2303. [Google Scholar]
  24. Ghosh, D.; Katehara, H.; Rawlley, O.; Gupta, S.; Arulselvan, N.; Chamola, V. Artificial intelligence-empowered optimal roadside unit (RSU) deployment mechanism for internet of vehicles (IoV). In Proceedings of the 2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Belfast, UK, 14–17 June 2022; pp. 495–500. [Google Scholar]
  25. Lu, J.; Jiang, J.; Balasubramanian, V.; Khosravi, M.R.; Xu, X. Deep reinforcement learning-based multi-objective edge server placement in Internet of Vehicles. Comput. Commun. 2022, 187, 172–180. [Google Scholar] [CrossRef]
  26. Shen, B.; Xu, X.; Qi, L.; Zhang, X.; Srivastava, G. Dynamic server placement in edge computing toward internet of vehicles. Comput. Commun. 2021, 178, 114–123. [Google Scholar] [CrossRef]
  27. Deb, K.; Jain, H. An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: Solving problems with box constraints. IEEE Trans. Evol. Comput. 2013, 18, 577–601. [Google Scholar]
  28. Nath, S.; Li, Y.; Wu, J.; Fan, P. Multi-user multi-channel computation offloading and resource allocation for mobile edge computing. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar]
  29. Sun, Y.; Yen, G.G.; Yi, Z. IGD indicator-based evolutionary algorithm for many-objective optimization problems. IEEE Trans. Evol. Comput. 2018, 23, 173–187. [Google Scholar] [CrossRef]
  30. Zhou, Y.; Zhu, M.; Wang, J.; Zhang, Z.; Xiang, Y.; Zhang, J. Tri-goal evolution framework for constrained many-objective optimization. IEEE Trans. Syst. Man Cybern. Syst. 2018, 50, 3086–3099. [Google Scholar] [CrossRef]
  31. Chen, H.; Tian, Y.; Pedrycz, W.; Wu, G.; Wang, R.; Wang, L. Hyperplane assisted evolutionary algorithm for many-objective optimization problems. IEEE Trans. Cybern. 2019, 50, 3367–3380. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.