iconOpen Access

ARTICLE

crossmark

UAV-Assisted Multi-Object Computing Offloading for Blockchain-Enabled Vehicle-to-Everything Systems

Ting Chen1, Shujiao Wang2, Xin Fan3,*, Xiujuan Zhang2, Chuanwen Luo3, Yi Hong3

1 School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China
2 School of Computer Science, Qufu Normal University, Rizhao, 276826, China
3 School of Information Science and Technology, Beijing Forestry University, Beijing, 100083, China

* Corresponding Author: Xin Fan. Email: email

Computers, Materials & Continua 2024, 81(3), 3927-3950. https://doi.org/10.32604/cmc.2024.056961

Abstract

This paper investigates an unmanned aerial vehicle (UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything (V2X) systems. Due to the presence of an eavesdropper (Eve), the system’s communication links may be insecure. This paper proposes deploying an intelligent reflecting surface (IRS) on the UAV to enhance the communication performance of mobile vehicles, improve system flexibility, and alleviate eavesdropping on communication links. The links for uploading task data from vehicles to a base station (BS) are protected by IRS-assisted physical layer security (PLS). Upon receiving task data, the computing resources provided by the edge computing servers (MEC) are allocated to vehicles for task execution. Existing blockchain-based computation offloading schemes typically focus on improving network performance, such as minimizing energy consumption or latency, while neglecting the Gas fees for computation offloading and the costs required for MEC computation, leading to an imbalance between service fees and resource allocation. This paper uses a utility-oriented computation offloading scheme to balance costs and resources. This paper proposes alternating phase optimization and power optimization to optimize the energy consumption, latency, and communication secrecy rate, thereby maximizing the weighted total utility of the system. Simulation results demonstrate a notable enhancement in the weighted total system utility and resource utilization, thereby corroborating the viability of our approach for practical applications.

Keywords

UAV; intelligent reflecting surface; vehicle to everything; task offloading; phase shift optimization

1  Introduction

The emergence of Vehicle to Everything (V2X) has ushered in an era based on ubiquitous connectivity and intelligent data processing. Integrating V2X with edge computing as mobile edge computing (MEC) reduces network load by processing and analyzing data at edge nodes [13], thereby decreasing the traffic transmitted to remote data centers. This alleviates the burden on the core network, improving the overall network efficiency and reliability. By deploying computational resources on devices in vehicles near a base station (BS) with MEC servers, MEC can effectively reduce the latency of computation [4,5], conserve computational resources, and minimize the energy consumption of these devices [2]. Therefore, MEC has the potential to handle compute-intensive and latency-critical tasks for V2X systems.

In urban environments where buildings are densely packed, these physical barriers severely block the signal transmission of data sent from vehicles to the BS. This complex urban structure not only weakens the signal strength but also increases the likelihood of multipath propagation and reflection of signals, which significantly reduces the reliability and efficiency of data transmission. In this context, UAV have become a key component of the connected vehicle ecosystem, providing greater flexibility and coverage for communication and data processing tasks. Moreover, edge computing architectures face significant centralization issues, posing several challenges. For example, centralized edge computing architectures have problems with flexibility, data privacy, and security [6]. Centralized storage and processing allow attackers to access large amounts of sensitive information by attacking only a small number of critical nodes, and this centralized vulnerability increases the risk of data leakage, highlighting the need for robust security measures to protect sensitive information. Blockchain can solve these problems [79], and integrating V2X and blockchain technology further enhances the security and reliability of data transmission across networks [10]. Smart contracts run on the blockchain and are responsible for performing an automated and trustless task-offloading process between nodes. This mechanism ensures that transactions are not rejected and that malicious behavior can be tracked [1113].

Computational offloading for V2X currently faces two challenges. First, traditional solutions usually focus on optimizing either computational or communication performance, such as minimizing computational latency, reducing energy consumption, or maximizing network throughput [14,15]. However, edge computing resources are limited, and there may be costs when they are used, which is not considered in most current computing offloading schemes. The efficient allocation and management of these resources to optimize the execution of computational tasks is a major challenge. Secondly, the high-speed movement of vehicles leads to frequent changes in V2X network topology, which increases the difficulty of maintaining stable and secure links. At the same time, due to the presence of eavesdroppers in the environment, rapidly changing topologies make it difficult to apply traditional static security mechanisms effectively. An intelligent reflecting surface (IRS) can effectively solve this problem outlined above, which can enhance signal coverage and connection stability by dynamically adjusting the direction and strength of the reflected signal [16,17]. Moreover, the IRS can modify the reflective surface in real time [18,19] to accommodate fluctuating network conditions and maintain a stable communication link when the vehicle is in motion at high speeds. In contrast to the above joint optimization methods, this paper introduces a unique approach by integrating UAVs, IRS, and blockchain technology to address the multifaceted challenges in Vehicle-to-Everything (V2X) networks. Unlike traditional methods that optimize either computational or communication performance, this approach simultaneously optimizes multiple objectives, including energy consumption, latency, communication secrecy rate, and cost. The flexibility of UAVs and the adaptive capabilities of the IRS allow for dynamic adjustments in real-time, maintaining stable communication and security in a fast-changing V2X environment. This distinctive combination provides a more comprehensive solution compared to the existing literature.

1.1 Related Work

In recent years, Blockchain has had a multitude of applications in the field of V2X, due to its decentralized, immutable, and transparent nature providing security and reliability.

Firdaus et al. [20] proposed a decentralized trust system based on the in-vehicle edge computing network that utilizes federated blockchain and smart contracts to ensure a trustworthy environment for securely storing and sharing data in the system. This addresses the challenges of mass data storage, trust management, and information security faced by traditionally architected intelligent transportation system (ITS) applications. Vishwakarma et al. [21] proposed a lightweight blockchain-based security protocol for secure communication and storage in vehicular networking, which supports modern software-defined networks (SDNs). The permission blockchain is used to ensure tamper-proof data storage and a fully traceable network for secure propagation of messages through cryptographic hash functions and encryption techniques. The scheme proposed by Lu et al. [22] can verify a vehicle’s identity in any driving scenario. By extending the traditional blockchain, it effectively satisfies the real-time condition, which presents a revocation-free list authentication scheme. The certificate and the real identity are encrypted with each other and stored in the blockchain, enabling conditional privacy. The scheme proposed by Lin et al. [23] ensured anonymous mutual authentication of vehicles, where only a trusted entity can recover the long-term public key, i.e., the true identity of the vehicle. A balance is struck between the requirements of anonymity, traceability, and key or certificate management in the Internet of Vehicles.

The utilization of a UAV as an MEC node enables the provision of enhanced location flexibility. UAVs can provide services at varying heights and locations, thereby extending the reach of traditional terrestrial BS to areas that would otherwise be inaccessible. Furthermore, the integration of UAV into V2X for task offloading can mitigate the obstruction of communication links, thus enhancing communication quality and reliability.

The UAV-assisted edge computing architecture proposed by Michailidis et al. indicates that hovering UAV can act as an airborne relay for task processing and further offload the computational tasks to ground-based roadside units, significantly reducing latency during data offloading and downloading and minimizing weighted total energy consumption [24]. In the study of Wang et al., the issue that users in heterogeneous wireless networks are unable to process data in a timely manner is addressed [25]. They propose an offloading scheme for UAV-assisted computation in a renewable energy-based MEC framework, which employs a deep reinforcement learning approach to minimize the offloading cost. Chen et al. combined UAV with MEC and proposed an efficient iterative algorithm, which represents the inaugural attempt to study the maximum-minimum average secrecy capacity problem [26]. The algorithm also addresses the security offloading issue that arises due to the absence of the exact location information in eavesdroppers.

In addition, as an emerging technology, the IRS demonstrates notable advantages in the offloading of tasks related to telematics. Optimizing the signal transmission path and improving the signal coverage and transmission efficiency can enhance the task offload performance of telematics. In recent developments, the deployment of IRS on UAVs has demonstrated potential for enhancing the performance of mobile vehicle communications. IRS can dynamically adjust the propagation environment to improve signal quality, thereby increasing system flexibility and reducing the risk of eavesdropping on air-to-ground channels. Another advantage of the IRS is that it can assist PLS, making the mission data upload link from the vehicle to the BS more secure. Upon receipt of the task data, the MEC server is able to allocate its computing resources to execute the task efficiently, thereby ensuring optimal processing. Zhai et al. proposed the use of a UAV as a relay IRS between the MEC server and the terrestrial MEC to minimize the total energy consumption of the system [27]. Wang et al. [28] proposed a secure transmission scheme for the presence of a single eavesdropper. This scheme jointly optimizes the BS transmit power, UAV position, and RIS phase shift to maximize the secure transmission rate. Hu et al. [29] and Xu et al. [30] focused on the energy consumption of IRS-assisted UAV MEC systems, where phase shifts and UAV trajectories are co-optimized by conventional iterative algorithms. In both cases, the IRS is deployed on the UAV, thereby exploiting the flexibility of the UAV to the fullest extent [31,32]. Xu et al. [33] sought to enhance the secrecy rate in the field of IRS-assisted PLS.

Qi et al. [34] proposed a RIS-assisted vehicular edge computing system. In order to minimize the power consumption of task offloading, it investigates the joint RIS phase-shift coefficient optimization and VU power allocation. To maximize energy efficiency, Qin et al. [35] proposed to iteratively optimize the bit allocation, transmit power, phase shift, and UAV trajectory.

Li et al. [36] proposed a novel Riemannian optimization method for optimizing the phase shift matrix with the objective of maximizing the secrecy rate. Liu et al. [37] proposed an IRS-assisted secure offloading scheme to improve the secrecy performance by adjusting the phase-shift matrix and deriving the traversal secrecy rate. This achieves more substantial computational resources for nodes paying higher Gas.

1.2 Motivations and Contributions

When a mobile vehicle offloads a computing task in V2X, factors such as latency, energy consumption, communication secrecy rate, computing resource allocation, and cost affect the offloading and computing of the task. At present, most of the existing mobile vehicle offloading task solutions often only consider a single factor, such as low latency, safety, or low energy consumption, when offloading computing tasks. However, they don’t take into account the full costs associated with task offloading and computation, including the service provider’s service fee. In addition, blockchain-enabled mobile vehicle computational offloading schemes tend to ignore the cost of blockchain, i.e., Gas fees. Scenarios that consider cost or multiple factors do not optimize the management of computing resources for multiple influencing factors at the same time. The proposed scheme in this paper considers the energy consumption, security, and latency of the system, as well as the cost of services for block and edge computing servers. The goal is to maximize the weighted utility in the system, which is defined in Section 2.4, by optimizing the IRS phase shift matrix, the transmit power of the moving vehicle, and the computational resource allocation scheme of the MEC. The main contributions are as follows:

(1)   This paper proposes a secure V2X computing task offloading scheme supported by blockchain technology. The proposed solution establishes a PLS-assisted computation offloading model, which comprehensively considers the secrecy rate, latency and energy consumption of communication, service fees, computation latency and energy consumption of MEC, and blockchain Gas fees when offloading computation tasks for mobile vehicles.

(2)   In the proposed scheme, the phase shift matrix of IRS and the transmission power of moving vehicles are jointly adjusted to increase the communication secrecy rate and reduce system latency and energy consumption during the communication process. Through this method, communication security can be maximized in the presence of Eve in the communication environment.

(3)   The original computational resource allocation problem is transformed into a two-dimensional matching problem for two-part graphs, which is then solved with the KuhnMunkres (KM) algorithm. In particular, the edges of the bipartite graph are constrained by the balance between vehicle costs and resources. This ensures that vehicles paying high costs receive priority and better computational resources.

(4)   The efficacy of our proposed scheme is demonstrated through simulations and performance evaluations. The results demonstrate a notable enhancement in the weighted total utility and resource utilization, thereby corroborating the viability of our approach for practical applications.

The remainder of this paper is as follows: Section 2 presents the system model and problem formulation. In Section 3, we present our optimization schemes for phase shift optimization and power optimization. The task offloading scheme is provided in Section 4, while the experimental results are presented in Section 5. Finally, Section 6 provides a summary of the paper.

Special Notations: Bold uppercase letters, such as A, denote matrices, and bold lowercase letters, such as a, denote column vectors. AH, AT, and A denote the conjugate transpose, transpose, and conjugate transformations of A, respectively. And diag (X) is the diagonal matrix of X. The Hadamard product is denoted as , and R(x) means the real part of the complex variable x.

2  System Model and Problem Formulation

As shown in Fig. 1, this paper considers a blockchain-authorized vehicle network that includes I mobile vehicles, denoted as N1,N2,,Ni,,NI. All vehicles have devices with a single antenna. There are K MECs deployed in BS with a single antenna, which are denoted by M1,M2,,Mk,,MK and Nb, respectively. At the same time, assuming that there is an eavesdropper (Eve) in the environment, denoted by Ne, eavesdropping on the channel transmission information and trying to disrupt the data transmission, may lead to the failure of the computational task. The corresponding unloading tasks for vehicles are denoted by Z1,Z2,,Zi,,ZI, where Zi represents the task of the i-th vehicle.

images

Figure 1: System model

When a mobile vehicle generates a computation task, it offloads the task to the BS, which in turn instructs an MEC server to perform the computation. Due to the distance between the vehicle and the BS and the presence of Eve, an IRS-equipped UAV (denoted as Nu) is deployed as a signal reflection repeater. When the vehicle sends data to the UAV, the data reaches the BS by being reflected by the UAV’s IRS. The phase-shifting feature of the IRS enhances the secrecy rate of the communication and increases the probability of successful signal arrival at the BS.

2.1 Communication Model

In our system, a total of I vehicles in the system collect data during the moving process. When there is a computation task, the vehicle offloads the data to the BS. There is a link to the BS through the UAV relay, and there is also a link between the vehicle and the BS. After the BS receives the data, the computation task is not directly performed on the BS, but assigned to a MEC server to perform the computation task. During the data transmission process, the phase shift optimization is carried out by using the UAV equipped with the IRS as a way to improve the secrecy rate of information transmission to prevent eavesdropping.

IRS and phase-shift adjustment techniques increase the security of data transmission, reducing the risk of attack and ensuring data integrity and trustworthiness in the communication process.

To describe the secure transmission process of signals, this paper first assumes that the physical location information of each device including the Eve is available at the BS. The locations of Ni vehicle, UAV, BS, and Eve are denoted by (xi,yi), (xu,yu,hu), (xb,yb), (xe,ye), respectively. Specifically, the IRS-UAV hovers at a fixed height H when the data task is transmitted. Then, the distances from the Ni vehicle to the BS, from the vehicle Ni to the IRS-UAV, and from the vehicle Ni to the Eve, are respectively denoted as follows:

di,b=(xbxi)2+(ybyi)2,(1)

di,u=(xuxi)2+(yuyi)2+(hu)2,(2)

di,e=(xexi)2+(yeyi)2.(3)

The distance from the IRS-UAV to the BS and to the Eve are respectively denoted as du,b and du,e.

du,b=(xbxu)2+(ybyu)2+(hu)2,(4)

du,e=(xexu)2+(yeyu)2+(hu)2.(5)

The distance between the BS and the Eve is denoted as db,e.

db,e=(xexb)2+(yeyb)2.(6)

In this paper, it is assumed that the signaling takes place in millimeter-wave communication. Then the channel gain link between Ni and the IRS-UAV is denoted by hi,uCN×1 [38].

hi,u=ω(di,u)a[1,ej2π/λdϕi,u,,ej2π/λ(N1)dϕi,u]T,(7)

where N is the number of reflecting elements of IRS, ϕi,u=xixudi,u and ϕi,e=xixedi,e represent the approximate cosine values of the deviation angles between Ni and the IRS-UAV, and Ni to the Eve, respectively. The wavelength carrier and antenna separation distances are denoted as λ and d. And ω is the path loss at a reference distance of 1 m. The channel between Ni and Eve is denoted by hi,eC1×1.

hi,e=ω(di,e)a(8)

The channel gain from the IRS-UAV to the BS and to the Eve is expressed as hu,bCN×1 and hu,eCN×1, respectively.

hu,b=ω(du,b)2[1,ej2π/λdϕu,b,,ej2π/λ(N1)dϕu,b]T,(9)

hu,e=ω(du,e)2[1,ej2π/λdϕu,e,,ej2π/λ(N1)dϕu,e]T.(10)

Also, the channel from Ni to the BS is denoted as hi,bC1×1.

hi,b=ω(di,b)a.(11)

The diagonal matrix of the IRS reflection element is denoted as Ψi=diag[exp(jθi,1),exp(jθi,2,,exp(jθi,N)], j=1, θi[0,2π), which is the phase introduced by the IRS at the n-th phase shift element of the i-th cycle.

The achievable data rate for unloading tasks is given by

Ri,b=Blog2(1+wi|hu,bHΨihi,u+hi,b|2σ2),(12)

where B is the bandwidth, wi is the vehicle-to-uplink transmit power, and σ2 is the noise power.

Therefore, the transmission delay for the vehicle to offload the task to the BS is Γi,b=dZiRi,b, where dZi is the size of the data task. In addition to the transmission delay, the whole system takes into account the computation delay of the MEC server [39,40], which is denoted as follows:

ΓZiMk=cZidZifZiMk,(13)

where cZi is the number of CPU cycles required for each bit of computation and fZiMk is the computational resources available to the MEC server.

2.2 Energy Consumption Model

The energy consumption of the whole system mainly includes computation energy consumption, transmission energy consumption, and block generation energy consumption. For the block generation energy consumption, it is assumed that the energy consumed by different nodes to generate blocks for this task is the same for task Zi. However, the block generation energy consumption is different for different tasks. Next, the energy consumption will be presented from the perspective of different nodes.

As for a vehicle node, the energy consumed by the vehicle includes offloading data task energy and generating block energy [41], which are denoted by εNi,Nb and εZiNi, respectively.

εNi,Nb=widZiRi,b,(14)

where εblcNi denotes the energy consumption of blocks generated by vehicles. Thus, the total energy of vehicles is denoted as

εZiNi=εNi,Nb+εblcNi.(15)

As for the UAV node, since the UAV does not forward the data, the IRS equipped on the UAV only reflects the signal, and in the process of reflecting the data from the IRS, the UAV hovers at a fixed altitude, so the energy consumption of the UAV consists of hovering energy and generating block energy. The hover energy consumption of the UAV is denoted by εNu.

εNu=PuHΓZi,(16)

and PuH is the hovering power, which depends on the mass of the UAV, propeller radius, gravity, and air density. Theoretically, these parameters are constant for a fixed altitude and stable environmental conditions. ΓZi is the total time to complete the task, i.e., ΓZi=Γi,b+ΓZiMk. Like the block energy consumption of a vehicle, the energy consumption of the UAV to create a block is also a fixed value, so the total energy consumption of a UAV is denoted by εZiNu.

εZiNu=εNu+εblcUAV.(17)

As for the energy consumption of BS and MEC, the MEC nodes need to perform task computation, which will generate corresponding energy consumption. In addition, after receiving the data, the BS will assign a suitable MEC to complete the task according to the computation capability of the MEC and the offer it has. After the MEC completes the computation, it will return the result to the BS, which will record the computation result and the identity of the MEC that performs the computation in the block to realize the traceability of the source of the result. Therefore, its energy consumption includes the computation energy consumption of the MEC and the block generation energy consumption of the BS. The energy consumption of the MEC computing task is denoted by εcomputeMk.

εcomputeMk=κ(fZiMk)2dZicnZi,(18)

where κ is the capacitance coefficient, fZiMk is the achievable computing resources allocated by MEC. cnZi (CCN/bit) is the CPU cycle number (CCN) per bit processing at Mk. εblcBS denotes the energy consumption of blocks generated by BS. So the total energy consumption required to complete the Zi task BS and MEC is

εZiNb,Mk=εcomputeMk+εblcBS.(19)

The total energy consumption required to complete the task Zi is the sum of the vehicle energy, UAV energy, BS energy, and MEC energy, denoted as

εZi=εZiNi+εZiNu+εZiNb,Mk.(20)

2.3 Computing Offloading Architecture Supported by Lightweight Blockchain

In our system, the lightweight blockchain is deployed on all participating nodes, including vehicles, UAV, and BS. These nodes all run lightweight blockchain clients that enable them to generate, validate, and store blockchain data. In order to reduce the overhead of the nodes, the specific data content is stored in the Inter Planetary File System (IPFS) [42,43], while only the hash information associated with this data is recorded on the blockchain.

Whenever data is being transferred, the sender needs to publish a task transfer block. The content of this block includes details such as the offloading task Zi, the hash message corresponding to the task, and the sender’s and receiver’s identities. It also includes the address information of both parties to the transaction, the Gas fee of this transaction, the unit price of Gas [44], and the service cost of the MEC. This information ensures the authenticity of the task and the verifiability of the source.

When the receiver receives the task, it also needs to publish a block. The content of the receiver’s block includes the identity and address information of the receiver and the sender, the hash message corresponding to the task Zi, and the various costs associated with this transaction. The complete record of the transaction is ensured by this two-way publishing of the block.

On the blockchain, each block stores only the hash information and metadata of the transaction, while the raw data and detailed information are stored in the IPFS file system. This design effectively reduces the storage burden of the blockchain, and at the same time ensures the security and durability of the data by taking advantage of the decentralized storage characteristics of IPFS.

In this way, all nodes generate and publish blocks when transmitting data, realizing the traceability and non-repudiation of data transmission. At the same time, the combination of blockchain and IPFS can effectively prevent the computational offloading behavior of untrusted nodes and protect the security and privacy of transactions. The blocks of all participating nodes together build a complete blockchain, which ensures the transparency and data consistency of the whole system. The vehicle needs to pay for blockchain and MEC. The payment in the blockchain for the offloading task is denoted as

cGasZi=ρGasdZi.(21)

The cost in MEC is denoted as

cMecZi=ρMecdZi,(22)

where ρGas 1 and ρMec are the unit price of the Gas fee and the price of the MEC service per bit of computation, respectively. Thus, the total cost to complete the task is that

cZi=cGasZi+cMecZi.(23)

2.4 Problem Formulation

Based on the above model, the essence of our work is to maximize the weighted total utility of the system by considering the system’s energy consumption, delay, and secrecy rate in the context of task allocation, power optimization, and phase shift optimization.

To measure the security performance, we use the secrecy rate R as a metric. The secrecy rate can be regarded as an inherent property of a given instantaneous channel state information (CSI) realization, and is a commonly used metric for physical layer security (PLS) schemes. Since Eve may intercept the channels of vehicles, UAV, and the BS, the effective transmission is the data transfer between vehicles and the BS. Assuming that Eve’s channel information is also fully known, we define the secrecy rate between vehicles and the BS as R=(RdRe)+.

Rd=Ri,b=Blog2(1+wi|hu,bHΨihi,u+hi,b|2σ2),(24)

Re=Blog2(1+wi|hu,eHΨihi,u+hi,e|2σ2).(25)

The utility value of the system for Ni vehicle on a mission is

μZi=αRβ1εZiβ2ΓZiβ3cZi.(26)

For the whole system, the utility value is then expressed as

μ=i=1NμZi.(27)

Mathematically, then, the optimization problem can be expressed as

P1:maxw,Ψiμ,(28)

s.t.wminwwmax,(28a)

Wi,k=0,1,i,k,(28b)

PPRr,(28c)

ΓZiγ,(28d)

Ψi=diag[exp(jθi,1),exp(jθi,2,,exp(jθi,N)].(28e)

The meaning of each of the above constraints is explained below. w in Eq. (28a) represents the column vector of the transmission power of all vehicles. Eq. (28a) has defined the upper and lower limits, indicating that the power value must be taken between the upper and lower limits. The reason for specifying the upper and lower limits is that the power affects the secrecy rate, energy consumption, and transmission time. If the power is too low, it results in a large transmission time, which may cause the entire task to take longer than the maximum tolerable time to complete, resulting in the failure of the task. In addition, it also results in a decrease in the secrecy rate. However, if the performance is too high, it leads to an increase in energy consumption. To optimize the weighted total utility, it is necessary to find an optimal power value that maximizes the weighted total utility.

Eq. (28b) indicates that each MEC server can only be assigned to one vehicle task, and similarly, a vehicle task can only be assigned to one MEC server. The assignment relationship between the Zi task and the Mk server is represented by a matrix W, where Wi,k is the element of the i-th row and k-th column in the matrix W. When an MEC server is assigned to the i-th vehicle, Wi,k=1, otherwise it is 0.

Eq. (28c) shows that there is a cost to completing the task, the Price-Performance Ratio (PPR) is used to measure the fairness between the cost and the allocation of computing resources. If PPRr, it can be allocated. If PPR>r, it cannot be allocated, where r is a positive constant and PPR=ρMecfZiMk.

Eq. (28d) indicates that the time to complete a task cannot be indefinitely long. The total time required for a task from offloading to computation completion is ΓZi, with the maximum tolerable time being γ. If ΓZiγ, the task is completed and the system utility is valid. Otherwise, the task fails and the system utility is 0.

Eq. (28e) is the passive phase shift constraint matrix.

P1 is represented in a complex non-convex form. To solve this problem, the original problem P1 is decomposed into two manageable subproblems, i.e., phase shift optimization and power optimization, and solve the subproblems iteratively to finally obtain the near-optimal solution. The subproblem-solving and the corresponding algorithm design are described in detail in the next section.

3  Problem Solution and Algorithm Design

In this section, an algorithm framework is proposed to improve system utility by optimizing the phase shift matrix and power allocation. To demonstrate the optimization process more clearly, Fig. 2 summarizes the algorithm design and implementation process in this section. Fig. 2 illustrates the specific steps of initializing parameters, performing phase shift matrix optimization, updating power, and iteratively optimizing system utility indicators. In each iteration, the algorithm continuously optimizes the phase shift matrix and power until the system utility value no longer significantly improves, ultimately achieving the goal of system optimization.

images

Figure 2: Workflow of the optimization process in Chapter 3

3.1 Phase Shift Optimization of IRS

From Eq. (26), the total delay and energy consumption decrease as Ri,b increases, and the secrecy rate increases as Ri,b increases. To reduce the energy consumption and delay and maximize the total system utility, the phase shift matrix needs to be adjusted to maximize Ri,b. Fixed power level wi, according to Eq. (12), P1 can be further understood as maximizing the channel gain between the BS and the vehicle. So, P1 is converted to P2.

P2:maxΨi|hu,bHΨihi,u+hi,b|2,(29)

s.t. (28e).

The objective parameter Ψi is the middle of two CSI parameters and is hard to handle. Hence, refer to [45], (hu,b)HΨihi,u can be re-formulated as

(hu,b)HΨihi,u=(hu,b)Hdiag(hi,u)qi=Θiqi,(30)

where qi=vec(Ψi)=[exp(jθi,1),,exp(jθi,N)]T, Θi=(hu,b)Hdiag(hi,u). With Eq. (29), the objective of P2 can be transformed as follows:

|(hu,b)HΨihi,u+hi,b|2=qiHΘiHΘiqi+hi,b2+hi,bHΘiqi+qiHΘiHhi,b.(31)

The minus of the objective in P2 is expressed as a function concerning qi, i.e.,

g(qi)=(qiHΘiHΘiqi+hi,b2+hi,bHΘiqi+qiHΘiHhi,b).(32)

The constraint (28e) is defined by a complex circle manifold [45], which is given by the following formula:

𝒪={qiCN||[qi]n|2=1,n=1,,N},(33)

where [qi]n is the n-th element of qi. By rewriting Eq. (31) and P2 we know that our goal is to find the optimal point qi, so P2 is equivalent to P3:

P3:minqi𝒪g(qi).(34)

P3 is regarded as a complex circle manifold optimization problem. Similar to [37], the Riemannian gradient descent algorithm is used to find qi, where the Riemannian gradient of a manifold point is jointly determined by the Euclidean gradient and the tangent space on the manifold 𝒪 at that point. For any point on the manifold, denoted by s, the tangent space is composed of all tangent vectors passing tangentially through s. Each tangent vector represents a direction along which the objective function can be optimized from s. Each tangent vector represents a direction along which the objective function can be optimized from s. For the complex circular manifold 𝒪, the tangent space at s is

Tqi(s)𝒪=vCN:R[vqi(s)]=0,(35)

where v is the tangent vector at qi(s). The Euclidean gradient concerning qi(s) is

qi(s)g(qi)=2ΘiHΘiqi(s)2ΘiHhi,b.(36)

Similar to the Euclidean space, there is one tangent vector with the steepest increase of the objective function, called the Riemannian gradient. As the complex circle manifold 𝒪 is a Riemannian submanifold of CN, the Riemannian gradient of a function g at qi(s), denoted by gradqi(s)g(qi):

gradqi(s)g(qi)=qi(s)g(qi)R(qi(s)g(qi)qi(s))qi(s).(37)

In Riemannian gradient descent, the direction of the next point of qi(s) is tsjs, where ts is the step size and js is the descent direction vector. The retraction function is introduced as a way to ensure that the next point qi(s+1) is still on manifold 𝒪, denoted as

qi(s+1)=Qqi(s)(tsjs).(38)

Typical retraction functions are normalization functions, i.e., Qx(y)=yi|yi|,i. Based on the Riemannian gradient and conjugate gradient descent algorithms for finding the optimal matrix, the update rule for searching on manifolds is as follows:

js+1=gradqi(s+1)g(qi)+φs𝒫qi(s)qi(s+1)(js),(39)

where φs is the Polak-Ribiere parameter. 𝒫qi(s)qi(s+1)(js) is the tangent vector js from the tangent space Tqi(s)𝒪 to the mapping function of the tangent space Tqi(s+1)𝒪, which is specifically expressed as

𝒫qi(s)qi(s+1)(js)=Tqi(s)𝒪Tqi(s+1)𝒪.(40)

Since the second-order derivatives of g(qi), i.e., 2ΘiHΘi and ΘiHΘi is positive semidefinite, so g(qi) is concave. Thus, the result solved by Algorithm 1 is the local optimum solution.

images

Complexity analysis. To meet the convergence condition, the conjugate-gradient descent algorithm requires N2 iterations. Each iteration needs the calculations of Eqs. (37)(39), and the parameter update, which requires 2N2+4N, N, N, and 4N2 inner-iterations, respectively. So, the worst-case computational complexity of Algorithm 1 is O(N4).

3.2 Power Solving and System Optimization

The previous solution, it is equivalent to the phase shift matrix and parameters are given. So the objective of P1 could be rewritten into P4 as follows:

P4:maxwαRβ1εβ2ΓZi,(41)

s.t. (28a),

(28d).

After defining the objective function P4, the analytic method is used to search for the optimal value of the objective function by measuring the key performance metrics of the system, such as secrecy rate, time delay, and energy consumption, subject to constraints. These constraints include device power limits and delay limits.

The alternating power and phase shift optimization algorithm performs the optimization by initializing the phase shift matrix Ψ0 and the power w0 followed by repeated iterations. In each iteration, Algorithm 1 is first used to update Ψn given the previous power wn1. Then, the new power wn is obtained by solving the optimization problem P4. Next, μn is computed and updated based on the current Ψn and wn, evaluated by solving problem P1. The iterative process continues until the μn is no longer significantly improved, i.e., μnμn+1, at which point the algorithm terminates, indicating that the optimization objective has been reached.

Complexity analysis. The loop runs until μn+1μn requires N iterations. Each iteration needs the calculations of Algorithm 1, P4, and P1, which require O(N4), N, and N inner-iterations, respectively. Consequently, the worst complexity of Algorithm 2 is O(N5).

images

4  Task Offloading Scheme Considering Gas

This chapter introduces a resource allocation plan that considers Gas fees. To ensure that the ratio of the cost paid for each vehicle to the computing resources obtained for the corresponding task of the vehicle is not less than the threshold, i.e., PPRr, NI vehicles are sorted as N1,N2,N3,,NI where their cost obey cZ1cZ2cZ3cZI. M MEC servers are sorted as M1,M2,M3,,MK, that obey fM1/cM1fM2/cM2fM3/cM3fMK/cMK. A bipartite graph as shown in Fig. 3 between the vehicle and MEC server for task offloading is generated. To meet PPR requirements, all vehicle-MEC pairs with r(Vi)r(fk/ck)>r cannot be recorded on the bipartite graph. Therefore, vehicle-MEC pairs in such situations are recorded as . r(Vi) is the descending index of the service fee provided by the MI vehicles, and r(fk/ck) is the descending index of the computing power of the MEC server.

images

Figure 3: Bipartite graph generation with the dissatisfaction degree constraint

Based on the above information, a matching matrix W is set, where the (i,k) element represents an edge. For example, Wi,k=1 indicates that vertex i and k are connected. For the other edge (ii,kk), we have iii and kkk to satisfy the constraint that any two edges do not share vertices. For W, the problem of computing resource allocation can be equivalently transformed into a two-dimensional matching problem.

P5:maxWiNIkK(Wi,kεcomputeMk),(42)

s.t. (28b).

iNIWi,k1,kKWi,k1,(42a)

where Wi,k is a binary variable that takes 1 when Mk is assigned to Ni and otherwise 0. From the constraints, each vehicle can only be assigned one MEC server and each MEC server can only be assigned to one vehicle. Optimization is to find the optimal W to minimize iNIkKWi,kεcomputeMk, and P5 is convex, and the optimal W can be solved by the Kuhn-Munkres (KM) algorithm.

5  Simulation

To evaluate the performance of the method proposed in this paper, detailed simulation experiments are conducted. By analyzing these experimental results, we can comprehensively understand the performance of the method in different scenarios and parameter settings, thus verifying its effectiveness and advantages. A series of specific simulation parameters during the experimental process are presented in detail in Table 1.

images

Specifically, the following aspects are considered in the experiments. All experiments are conducted in the presence of an Eve. Regarding the communication channel, this paper adopts the common V2X communication channel model to simulate the actual wireless propagation environment. Another thing is the number of IRS reflector units, which directly affects the signal quality and coverage, and this paper tests the effect of different numbers of reflector units on the system performance. There is also the number of vehicles, which evaluates the performance of the intelligent optimization method in multi-user scenarios.

According to Fig. 4, the horizontal coordinate represents the number of iterations, and the vertical coordinate represents the system’s weighted utility value. The proposed method’s approach is effective, and the system-weighted utility value gradually increases and levels off as the number of iterations increases.

images

Figure 4: System utility value

The method proposed in this paper with the power-only optimization and phase-shift-only optimization methods are compared, and the rest of the parameters are the same. The results in Fig. 5 show that the proposed method outperforms the remaining two methods. The effect of iterative optimization is followed by an increase in the weighted total utility value of the system and its eventual convergence. Moreover, our proposed method’s system weighted total utility value is maximum compared to the two methods without power optimization and phase shift optimization. This is also validating the validity of the methodology of this paper.

images

Figure 5: Different optimizations methods

The reason that the method of optimization without phase shift in Fig. 5 presents a straight line is that the optimal power value has been found in the first optimization. Without any other variables changing, the value found the first time is the optimal value, and the value presented by another iteration is the same as the previous one, that is why, it presents a straight line.

Fig. 6 compares the change in the system utility value for different numbers of IRS components. We can see that when the number of IRS components changes, the system-weighted utility value also changes. As shown in Fig. 5, when the number of IRS components is 20, the system-weighted utility is the smallest, followed by the number of IRS components is 40, the system-weighted utility value is in the middle, and when the number of IRS components is 30, the system-weighted utility value is the largest, this is because the change of the number of components affects the magnitude of the data transmission rate, which in turn is related to the secrecy rate, the time delay, and the energy consumption. This explains that it is not the more or less number of components that makes the system utility value greater, but it is necessary to find a suitable number of components that makes the system utility maximum.

images

Figure 6: Different elements of the IRS

The number of vehicles in the system is not static, and to verify whether the change in the number of vehicles affects the stabilized type of the method in this paper, different numbers of vehicles are set up for comparison. As shown in Fig. 7, the final utility value of the system changes slightly under different numbers of vehicles. This also shows that the stability of the system is not affected by the change of the number in vehicles, which proves the stable type of the method.

images

Figure 7: Different numbers of vehicles

Next, the relationship between the parameters affecting the utility of the system and the utility itself will be presented. From Fig. 8, the results show that the system-weighted utility value and the secrecy rate have the same trend and show an increasing state at the same time after applying the method of this paper. On the contrary, the energy consumption and time delay have the opposite trend to the system utility value, showing a decreasing state. Among them, it is worth noting that the time delay curve. Although the graph presents an approximate straight line. However, after optimization, the total value of delay decreases by 0.038191 s, which is a small change, and that is why it presents the state in the figure.

images

Figure 8: Link between secrecy rate, delay, and energy consumption and system utility value

Finally, to observe the effect of the Gas fee on the system, a set of comparison tests with a fee of 100 times the normal Gas fee was set up. Fig. 9a shows the difference between the weighted utility value of the system with a normal Gas fee and the weighted utility value of the system with 100 times of Gas fee for the case of the number of vehicles 5. It can be observed that the difference between the two increases significantly as the number of iterations rises, indicating that the utility value of the system with a high Gas fee is lower than that of the system with a normal Gas fee. Fig. 9b shows the difference between the normal Gas fee and the weighted system utility value of high Gas for the number of vehicles 5 as well as 20. It can be observed that the higher the number of vehicles, the more pronounced the effect of Gas.

images

Figure 9: Impact of Gas fee

From Fig. 10, it can be observed that when the UAV height is 120 m, the system utility value rises rapidly, reaches the highest value, and remains at a high level. The system utility values for UAVs at heights of 180 and 60 m are relatively low. This indicates that excessive height leads to increased signal loss, which negatively impacts utility. On the other hand, too low a height results in limited signal coverage, thus affecting the utility value. At a height of 120 m, the balance between signal coverage and path loss is achieved.

images

Figure 10: Comparison of different UAV height

6  Conclusion

This paper investigates a blockchain-enabled UAV-assisted multi-object offloading scheme in V2X systems, which enhances communication performance and system flexibility by deploying IRS on UAV while addressing the Eve problem in both ground and air channels. To address the problem of ignoring the Gas cost and MEC computation cost of computational offloading in existing computational offloading schemes, this paper designs a cost-oriented computational offloading scheme that ensures the balance between cost and resources, and achieves the optimization of energy consumption, delay, and communication secrecy rate through the alternation of phase shift optimization and power optimization, and finally achieves the maximization of the overall weighted utility of the system. The IRS-assisted computational offloading model proposed in this paper, combined with the phase-shift matrix adjustment scheme of flow shape optimization and the computational resource allocation method via two-part graph matching, significantly improves the system’s weighted total utility and resource utilization. The algorithms utilized in this study enhance the overall global optimization performance. The combination of the Alternating Optimization and KM algorithms effectively mitigates the risk of converging to unexpected local optima, while the global search capabilities of the Manifold Optimization algorithm contribute to achieving the global optimal solution. However, the KM and Manifold Optimization algorithm may require additional mechanisms to handle resource fluctuations and dynamic optimization demands in changing environments. This is an area that requires improvement in our future work. Specifically, future work aims to develop approaches to better adapt to dynamically changing environments, enhance the system’s real-time responsiveness and overall optimization performance, and achieve more robust and flexible resource management. Extensive simulation and performance evaluation results demonstrate the potential and effectiveness of the scheme in real-world telematics applications. This article considers fixed-price Gas fees, but their prices fluctuate. Therefore, future work will investigate the impact of fluctuating Gas fees on resource allocation.

Acknowledgement: The authors would like to thank editors and reviewers for their valuable work.

Funding Statement: This work is supported in part by the National Key R&D Program of China under Grant 2022YFB3104503; in part by the China Postdoctoral Science Foundation under Grant 2024M750199; in part by the National Natural Science Foundation of China under Grant 62202054, Grant 62002022 and Grant 62472251; in part by the Fundamental Research Funds for the Central Universities under Grant BLX202360.

Author Contributions: The authors confirm contribution to the paper as follows: study conception and design: Ting Chen, Xin Fan; formula derivation: Shujiao Wang; data collection: Xiujuan Zhang; analysis and interpretation of results: Chuanwen Luo, Yi Hong; draft manuscript preparation: Ting Chen, Shujiao Wang, Xin Fan. All authors reviewed the results and approved the final version of the manuscript.

Availability of Data and Materials: Readers can access the data used in this study by contacting the corresponding author.

Ethics Approval: Not applicable.

Conflicts of Interest: The authors declare no conflicts of interest to report regarding the present study.

1Gas fees are used to pay for the computational resources needed to execute a transaction or smart contract. Gas fees are incentives for miners or validators to process and validate transactions. The price of Gas is usually expressed in units of Gwei, and the unit price of Gas used in this document has been converted to units.

References

1. L. Brehon-Grataloup, R. Kacimi, and A. L. Beylot, “Mobile edge computing for V2X architectures and applications: A survey,” Comput. Netw., vol. 206, no. 4, 2022, Art. no. 108797. doi: 10.1016/j.comnet.2022.108797. [Google Scholar] [CrossRef]

2. Y. L. Cong, K. Xue, C. Wang, W. X. Sun, S. X. Sun and F. Y. Hu, “Latency-energy joint optimization for task offloading and resource allocation in mec-assisted vehicular networks,” IEEE Trans. Veh. Technol., vol. 72, no. 12, pp. 16369–16381, 2023. doi: 10.1109/TVT.2023.3289236. [Google Scholar] [CrossRef]

3. H. B. Zhang, X. Y. Liu, Y. J. Xu, D. Li, C. Yuen and Q. Xue, “Partial offloading and resource allocation for MEC-assisted vehicular networks,” IEEE Trans. Veh. Technol., vol. 73, no. 1, pp. 1276–1288, 2023. doi: 10.1109/TVT.2023.3306939. [Google Scholar] [CrossRef]

4. C. F. Liu, M. Bennis, M. Debbah, and H. V. Poor, “Dynamic task offloading and resource allocation for ultra-reliable low-latency edge computing,” IEEE Trans. Commun., vol. 67, no. 6, pp. 4132–4150, 2019. doi: 10.1109/TCOMM.2019.2898573. [Google Scholar] [CrossRef]

5. G. Li, M. Zeng, D. Mishra, L. Hao, Z. Ma and O. A. Dobre, “Latency minimization for IRS-aided NOMA MEC systems with WPT-enabled IoT devices,” IEEE Internet Things J., vol. 10, no. 14, pp. 12156–12168, 2023. doi: 10.1109/JIOT.2023.3240395. [Google Scholar] [CrossRef]

6. E. Villar-Rodriguez, M. A. Pérez, A. I. Torre-Bastida, C. R. Senderos, and J. López-de-Armentia, “Edge intelligence secure frameworks: Current state and future challenges,” Comput. Secur., vol. 130, no. 3, 2023, Art. no. 103278. doi: 10.1016/j.cose.2023.103278. [Google Scholar] [CrossRef]

7. Z. Y. Guan, H. Z. Lyu, D. W. Li, Y. M. Hei, and T. C. Wang, “Blockchain: A distributed solution to uav-enabled mobile edge computing,” IET Commun., vol. 14, no. 15, pp. 2420–2426, 2020. doi: 10.1049/iet-com.2019.1131. [Google Scholar] [CrossRef]

8. W. J. Xu, W. Wang, Z. G. Li, Q. H. Wu, and X. B. Wang, “Joint task allocation and resource optimization for blockchain enabled collaborative edge computing,” China Commun., vol. 21, no. 4, pp. 218–229, 2024. doi: 10.23919/JCC.fa.2022-0748.202404. [Google Scholar] [CrossRef]

9. L. T. Qin, H. C. Lu, Y. A. Chen, Z. J. Gu, D. Zhao and F. Wu, “Energy-efficient blockchain-enabled user-centric mobile edge computing,” IEEE Trans. Cogn. Commun. Netw., vol. 10, no. 4, pp. 1452–1466, 2024. doi: 10.1109/TCCN.2024.3373624. [Google Scholar] [CrossRef]

10. E. T. Michailidis, K. Maliatsos, D. N. Skoutas, D. Vouyioukas, and C. Skianis, “Secure UAV-aided mobile edge computing for IoT: A review,” IEEE Access, vol. 10, no. 4, pp. 86353–86383, 2022. doi: 10.1109/ACCESS.2022.3199408. [Google Scholar] [CrossRef]

11. Y. L. Wu, H. N. Dai, and H. Wang, “Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0,” IEEE Internet Things J., vol. 8, no. 4, pp. 2300–2317, 2020. doi: 10.1109/JIOT.2020.3025916. [Google Scholar] [CrossRef]

12. J. A. Alzubi, O. A. Alzubi, A. Singh, and T. M. Alzubi, “A blockchain-enabled security management framework for mobile edge computing,” Int. J. Netw. Manag., vol. 33, no. 5, 2023, Art. no. e2240. doi: 10.1002/nem.2240. [Google Scholar] [CrossRef]

13. F. Xiong, C. Xu, W. Ren, R. Y. Zheng, P. S. Gong and Y. Ren, “A blockchain-based edge collaborative detection scheme for construction internet of things,” Autom. Constr., vol. 134, no. 1, 2022, Art. no. 104066. doi: 10.1016/j.autcon.2021.104066. [Google Scholar] [CrossRef]

14. X. X. Dai, Z. Xiao, H. B. Jiang, and J. C. S. Lui, “UAV-assisted task offloading in vehicular edge computing networks,” IEEE Trans. Mob. Comput., vol. 23, no. 4, pp. 2520–2534, 2024. doi: 10.1109/TMC.2023.3259394. [Google Scholar] [CrossRef]

15. M. S. Bute, P. Z. Fan, G. Liu, F. Abbas, and Z. G. Ding, “A cluster-based cooperative computation offloading scheme for C-V2X networks,” Ad Hoc Netw., vol. 132, no. 6, 2022, Art. no. 102862. doi: 10.1016/j.adhoc.2022.102862. [Google Scholar] [CrossRef]

16. L. J. Wang et al., “Joint phase shift design and resource management for a non-orthogonal multiple access-enhanced internet of vehicle assisted by an intelligent reflecting surface-equipped unmanned aerial vehicle,” Drones, vol. 8, no. 5, 2024, Art. no. 188. doi: 10.3390/drones8050188. [Google Scholar] [CrossRef]

17. C. Chen et al., “Joint design of phase shift and transceiver beamforming for intelligent reflecting surface assisted millimeter-wave high-speed railway communications,” IEEE Trans. Veh. Technol., vol. 72, no. 5, pp. 6253–6267, 2023. doi: 10.1109/TVT.2022.3233066. [Google Scholar] [CrossRef]

18. Z. X. Huang, L. P. Zhu, and R. Zhang, “Intelligent surfaces aided high-mobility communications: Opportunities and design issues,” IEEE Commun. Mag., vol. 62, no. 6, pp. 122–128, 2024. doi: 10.1109/MCOM.003.2300213. [Google Scholar] [CrossRef]

19. D. Dampahalage, K. B. Shashika Manosha, N. Rajatheva, and M. Latva-aho, “Intelligent reflecting surface aided vehicular communications,” in Proc. 2020 IEEE Globecom Workshops, 2020, pp. 1–6. doi: 10.1109/GCWkshps50303.2020.9367569. [Google Scholar] [CrossRef]

20. M. Firdaus and K. H. Rhee, “On blockchain-enhanced secure data storage and sharing in vehicular edge computing networks,” Appl. Sci., vol. 11, no. 1, 2021, Art. no. 414. doi: 10.3390/app11010414. [Google Scholar] [CrossRef]

21. L. Vishwakarma, A. Nahar, and D. Das, “LBSV: Lightweight blockchain security protocol for secure storage and communication in SDN-enabled IoV,” IEEE Trans. Veh. Technol., vol. 71, no. 6, pp. 5983–5994, 2022. doi: 10.1109/TVT.2022.3163960. [Google Scholar] [CrossRef]

22. Z. J. Lu, Q. Wang, G. Qu, H. C. Zhang, and Z. L. Liu, “A blockchain-based privacy-preserving authentication scheme for vanets,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 27, no. 12, pp. 2792–2801, 2019. doi: 10.1109/TVLSI.2019.2929420. [Google Scholar] [CrossRef]

23. C. Lin, X. Y. Huang, and D. B. He, “EBCPA: Efficient blockchain-based conditional privacy-preserving authentication for vanets,” IEEE Trans. Dependable Secure Comput., vol. 20, no. 3, pp. 1818–1832, 2022. doi: 10.1109/TDSC.2022.3164740. [Google Scholar] [CrossRef]

24. E. T. Michailidis, N. I. Miridakis, A. Michalas, E. Skondras, D. J. Vergados and D. D. Vergados, “Energy optimization in massive mimo uav-aided mec-enabled vehicular networks,” IEEE Access, vol. 9, pp. 117388–117403, 2021. doi: 10.1109/ACCESS.2021.3106495. [Google Scholar] [CrossRef]

25. H. Wang, H. C. Ke, and W. J. Sun, “Unmanned-aerial-vehicle-assisted computation offloading for mobile edge computing based on deep reinforcement learning,” IEEE Access, vol. 8, pp. 180784–180798, 2020. doi: 10.1109/ACCESS.2020.3028553. [Google Scholar] [CrossRef]

26. P. P. Chen et al., “Secure task offloading for MEC-aided-UAV system,” IEEE Trans. Intell. Veh., vol. 8, no. 5, pp. 3444–3457, 2023. doi: 10.1109/TIV.2022.3227367. [Google Scholar] [CrossRef]

27. Z. Y. Zhai, X. H. Dai, B. Duo, X. Wang, and X. J. Yuan, “Energy-efficient UAV-mounted RIS assisted mobile edge computing,” IEEE Wirel. Commun. Lett., vol. 11, no. 12, pp. 2507–2511, 2022. doi: 10.1109/LWC.2022.3206587. [Google Scholar] [CrossRef]

28. D. W. Wang, Y. Zhao, Y. Lou, L. N. Pang, Y. X. He and D. Zhang, “Secure NOMA based RIS-UAV networks: Passive beamforming and location optimization,” presented at the 2022 IEEE Global Commun. Conf., Rio de Janeiro, Brazil, Dec. 4–8, 2022. [Google Scholar]

29. H. Hu, Z. C. Sheng, A. A. Nasir, H. W. Yu, and Y. Fang, “Computation capacity maximization for UAV and RIS cooperative MEC system with NOMA,” IEEE Commun. Lett., vol. 28, no. 3, pp. 592–596, 2024. doi: 10.1109/LCOMM.2024.3357752. [Google Scholar] [CrossRef]

30. Y. Xu, T. K. Zhang, Y. X. Zou, and Y. W. Liu, “Reconfigurable intelligence surface aided UAV-MEC systems with NOMA,” IEEE Commun. Lett., vol. 26, no. 9, pp. 2121–2125, 2022. doi: 10.1109/LCOMM.2022.3183285. [Google Scholar] [CrossRef]

31. X. K. Song, Y. L. Zhao, Z. L. Wu, Z. T. Yang, and J. Tang, “Joint trajectory and communication design for IRS-assisted UAV networks,” IEEE Wirel. Commun. Lett., vol. 11, no. 7, pp. 1538–1542, 2022. doi: 10.1109/LWC.2022.3179028. [Google Scholar] [CrossRef]

32. H. Q. Lu, Y. Zeng, S. Jin, and R. Zhang, “Aerial intelligent reflecting surface: Joint placement and passive beamforming design with 3D beam flattening,” IEEE Trans. Wirel. Commun., vol. 20, no. 7, pp. 4128–4143, 2021. doi: 10.1109/TWC.2021.3056154. [Google Scholar] [CrossRef]

33. S. Xu, J. J. Liu, and Y. R. Cao, “Intelligent reflecting surface empowered physical-layer security: Signal cancellation or jamming?” IEEE Internet Things J., vol. 9, no. 2, pp. 1265–1275, 2021. doi: 10.1109/JIOT.2021.3079325. [Google Scholar] [CrossRef]

34. K. W. Qi, Q. Wu, P. Y. Fan, N. Cheng, W. Chen and K. B. Letaief, “Reconfigurable intelligent surface aided vehicular edge computing: Joint phase-shift optimization and multi-user power allocation,” 2024, arXiv:2407.13123. [Google Scholar]

35. X. T. Qin, Z. Y. Song, T. W. Hou, W. J. Yu, J. Wang and X. Sun, “Joint optimization of resource allocation, phase shift, and UAV trajectory for energy-efficient RIs-assisted UAV-enabled MEC systems,” IEEE Trans. Green Commun. Netw., vol. 7, no. 4, pp. 1778–1792, 2023. doi: 10.1109/TGCN.2023.3287604. [Google Scholar] [CrossRef]

36. X. Z. Li, Z. Li, Z. Y. Zhu, D. W. Zhang, L. Liu and M. Atiquzzaman, “Secrecy rate maximization for intelligent reflecting surface assisted MIMO systems in vehicular networks,” IEEE Internet Things J., 2023. doi: 10.1109/JIOT.2023.3332896. [Google Scholar] [CrossRef]

37. Y. L. Liu, Z. Su, and Y. T. Wang, “Energy-efficient and physical-layer secure computation offloading in blockchain-empowered internet of things,” IEEE Internet Things J., vol. 10, no. 8, pp. 6598–6610, 2022. doi: 10.1109/JIOT.2022.3159248. [Google Scholar] [CrossRef]

38. M. Asim, M. ELAffendi, A. A. A. El-Latif, “Multi-IRS and multi-UAV-assisted MEC system for 5g/6g networks: Efficient joint trajectory optimization and passive beamforming framework,” IEEE Trans. Intell. Transp. Syst., vol. 24, no. 4, pp. 4553–4564, 2022. doi: 10.1109/TITS.2022.3178896. [Google Scholar] [CrossRef]

39. B. Duo, M. L. He, Q. Q. Wu, and Z. X. Zhang, “Joint dual-UAV trajectory and RIS design for ARIS-assisted aerial computing in IoT,” IEEE Internet Things J., vol. 10, no. 22, pp. 19584–19594, 2023. doi: 10.1109/JIOT.2023.3288213. [Google Scholar] [CrossRef]

40. X. B. Zhou, S. H. Yan, Q. Q. Wu, F. Shu, and D. W. K. Ng, “Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint,” IEEE Trans. Wirel. Commun., vol. 21, no. 1, pp. 532–547, 2021. doi: 10.1109/TWC.2021.3098099. [Google Scholar] [CrossRef]

41. Q. Tang, L. X. Liu, C. Y. Jin, J. Wang, Z. F. Liao and Y. S. Luo, “An UAV-assisted mobile edge computing offloading strategy for minimizing energy consumption,” Comput. Netw., vol. 207, no. 3, 2022, Art. no. 108857. doi: 10.1016/j.comnet.2022.108857. [Google Scholar] [CrossRef]

42. J. Sun, X. M. Yao, S. P. Wang, and Y. Wu, “Blockchain-based secure storage and access scheme for electronic medical records in IPFS,” IEEE Access, vol. 8, pp. 59389–59401, 2020. doi: 10.1109/ACCESS.2020.2982964. [Google Scholar] [CrossRef]

43. R. Kumar, R. Tripathi, N. Marchang, G. Srivastava, T. R. Gadekallu and N. N. Xiong, “A secured distributed detection system based on IPFS and blockchain for industrial image and video data security,” J. Parallel Distr. Comput., vol. 152, no. 2, pp. 128–143, 2021. doi: 10.1016/j.jpdc.2021.02.022. [Google Scholar] [CrossRef]

44. M. Naz et al., “A secure data sharing platform using blockchain and interplanetary file system,” Sustainability, vol. 11, no. 24, 2019, Art. no. 7054. doi: 10.3390/su11247054. [Google Scholar] [CrossRef]

45. X. H. Yu, D. F. Xu, and R. Schober, “Miso wireless communication systems via intelligent reflecting surfaces (invited paper),” presented at the 2019 ICCC, Changchun, China, Aug. 11–13, 2019. [Google Scholar]

46. P. A. Absil, R. Mahony, and R. Sepulchre, Optimization Algorithms on Matrix Manifolds, Princeton, New Jersey, USA: Princeton University Press, 2008. [Google Scholar]


Cite This Article

APA Style
Chen, T., Wang, S., Fan, X., Zhang, X., Luo, C. et al. (2024). UAV-Assisted Multi-Object Computing Offloading for Blockchain-Enabled Vehicle-to-Everything Systems. Computers, Materials & Continua, 81(3), 3927–3950. https://doi.org/10.32604/cmc.2024.056961
Vancouver Style
Chen T, Wang S, Fan X, Zhang X, Luo C, Hong Y. UAV-Assisted Multi-Object Computing Offloading for Blockchain-Enabled Vehicle-to-Everything Systems. Comput Mater Contin. 2024;81(3):3927–3950. https://doi.org/10.32604/cmc.2024.056961
IEEE Style
T. Chen, S. Wang, X. Fan, X. Zhang, C. Luo, and Y. Hong, “UAV-Assisted Multi-Object Computing Offloading for Blockchain-Enabled Vehicle-to-Everything Systems,” Comput. Mater. Contin., vol. 81, no. 3, pp. 3927–3950, 2024. https://doi.org/10.32604/cmc.2024.056961


cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1010

    View

  • 484

    Download

  • 0

    Like

Share Link