Constrained Vehicular(受限车辆)研究综述
Constrained Vehicular 受限车辆 - However, due to the extreme complexity of joint optimization task offloading and resource allocation, and the demand for computing-constrained vehicular terminals of railway (VTR), it is urgent to introduce the mobile edge computing and resource allocation algorithms into intelligent railway systems. [1] With the emergence of computation intensive vehicular applications, computation offloading based on mobile edge computing (MEC) has become a promising paradigm in resource constrained vehicular cloud networks (VCNs). [2] Most existing state-of-the-art exploit either pseudonyms or public key fully homomorphic encryption (FHE) to protect location privacy, which requires an online certificate authority (CA) or loads intolerably heavy computational/communication overhead on resource-constrained vehicular users. [3] However, the verification of beacon signatures introduces significant processing overhead for resource-constrained vehicular On-Board Units (OBUs). [4] In time-constrained vehicular systems, optimisation of the system architectures with respect to the system resources has a significant impact on the development cost, performance, and reliability of the systems. [5]然而,由于联合优化任务卸载和资源分配的极端复杂性,以及对计算受限的铁路车载终端(VTR)的需求,迫切需要将移动边缘计算和资源分配算法引入智能铁路系统。 [1] 随着计算密集型车载应用的出现,基于移动边缘计算(MEC)的计算卸载已成为资源受限车载云网络(VCN)中一种很有前景的范例。 [2] 大多数现有的最先进技术利用假名或公钥全同态加密 (FHE) 来保护位置隐私,这需要在线证书颁发机构 (CA) 或给资源受限的车辆用户带来无法忍受的繁重计算/通信开销。 [3] 然而,信标签名的验证为资源受限的车载单元 (OBU) 带来了巨大的处理开销。 [4] 在时间受限的车辆系统中,针对系统资源的系统架构优化对系统的开发成本、性能和可靠性具有重要影响。 [5]