<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">59325</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2025.059325</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>A Task Offloading Method for Vehicular Edge Computing Based on Reputation Assessment</article-title>
<alt-title alt-title-type="left-running-head">A Task Offloading Method for Vehicular Edge Computing Based on Reputation Assessment</alt-title>
<alt-title alt-title-type="right-running-head">A Task Offloading Method for Vehicular Edge Computing Based on Reputation Assessment</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Li</surname><given-names>Jun</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><email>lijun@zut.edu.cn</email></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Dong</surname><given-names>Yawei</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Ni</surname><given-names>Liang</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Feng</surname><given-names>Guopeng</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-5" contrib-type="author">
<name name-style="western"><surname>Shan</surname><given-names>Fangfang</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<aff id="aff-1"><label>1</label><institution>School of Computer Science, Zhongyuan University of Technology</institution>, <addr-line>Zhengzhou, 450007</addr-line>, <country>China</country></aff>
<aff id="aff-2"><label>2</label><institution>Henan Key Laboratory of Cyberspace Situation Awareness</institution>, <addr-line>Zhengzhou, 450007</addr-line>, <country>China</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding author: Jun Li. Email: <email>lijun@zut.edu.cn</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2025</year>
</pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>16</day><month>04</month><year>2025</year>
</pub-date>
<volume>83</volume>
<issue>2</issue>
<fpage>3537</fpage>
<lpage>3552</lpage>
<history>
<date date-type="received">
<day>04</day>
<month>10</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>12</day>
<month>2</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2025 The Authors.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_59325.pdf"></self-uri>
<abstract>
<p>With the development of vehicle networks and the construction of roadside units, Vehicular Ad Hoc Networks (VANETs) are increasingly promoting cooperative computing patterns among vehicles. Vehicular edge computing (VEC) offers an effective solution to mitigate resource constraints by enabling task offloading to edge cloud infrastructure, thereby reducing the computational burden on connected vehicles. However, this sharing-based and distributed computing paradigm necessitates ensuring the credibility and reliability of various computation nodes. Existing vehicular edge computing platforms have not adequately considered the misbehavior of vehicles. We propose a practical task offloading algorithm based on reputation assessment to address the task offloading problem in vehicular edge computing under an unreliable environment. This approach integrates deep reinforcement learning and reputation management to address task offloading challenges. Simulation experiments conducted using Veins demonstrate the feasibility and effectiveness of the proposed method.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Vehicular edge computing</kwd>
<kwd>task offloading</kwd>
<kwd>reputation assessment</kwd>
</kwd-group>
<funding-group>
<award-group id="awg1">
<funding-source>Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness</funding-source>
<award-id>HNTS2022020</award-id>
</award-group>
<award-group id="awg2">
<funding-source>Science and Technology Research Program of Henan Province of China</funding-source>
<award-id>232102210134</award-id>
<award-id>182102210130</award-id>
</award-group>
<award-group id="awg3">
<funding-source>Key Research Projects of Henan Provincial Universities</funding-source>
<award-id>25B520005</award-id>
</award-group>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>With the advancement of Vehicular Ad Hoc Networks (VANETs), intelligent connected vehicles can access more computing resources via the Internet. Connected vehicles can access Internet services via Dedicated Short Range Communication (DSRC), such as IEEE 802.11p and C-V2X. Additionally, vehicle sensor devices such as radar and cameras enhance vehicle intelligence, necessitating more robust computing resources to support sensory computing and storage needs. Cloud computing is capable of executing complex computations. However, cloud computing is constrained by network distance and cannot offer low-latency services for vehicular tasks. Edge cloud computing is a paradigm where tasks and data are processed at the edge of the Internet whenever feasible. Vehicular edge computing, comprising vehicles, roadside units, and base stations, aims to enhance the quality of service for connected vehicles by maximizing the utilization rate of spare computing resources. In vehicular edge computing, vehicles can offload their tasks to the edge cloud for collaborative task completion. When vehicular tasks require offloading to the edge cloud, vehicles transmit task-related, location-related, and resource-related information. Decision-making units collect this data from vehicles and edge clouds, including location and resource details. Subsequently, these decision-making units resolve optimization problems related to task offloading, guiding collaborative task completion by vehicles and edge clouds.</p>
<p>Numerous optimization algorithms exist to address the task offloading optimization problem. However, few address the trust issues inherent in vehicular edge computing environments. Each vehicle is an individual in the distributed vehicular network environment, which may lead to undesirable misbehavior. Furthermore, vehicles may fail to provide accurate locations or intentionally withhold them when requesting computational resources for vehicular edge computing. For instance, a vehicle may manipulate its resource demand and task data to acquire additional resources during task offloading requests. Specifically, misbehavior primarily involves misrepresentation of location and task information. Location information misbehavior occurs when task offloading requests use falsified locations. Attackers may exploit location information misbehavior to compromise the vehicular edge cloud. Task information misbehavior occurs when vehicles request task offloading using falsified task information. Such misbehavior can degrade overall vehicle edge computing performance.</p>
<p>To address potential misbehavior during task offloading in vehicular edge computing, we propose a practical task offloading method that utilizes a behavior-based reputation mechanism to mitigate the negative impact of misbehavior. A vehicle&#x2019;s resource access is contingent upon its reputation value in the proposed vehicular edge computing system with a behavior-based reputation mechanism. Generally, a vehicle&#x2019;s reputation value can increase if it behaves appropriately during task offloading, while misbehavior will decrease reputation value. Specifically, the study addresses three problems as outlined below:
<list list-type="bullet">
<list-item>
<p>Reputation values can be assessed. The method calculates reputation values to characterize vehicle misbehavior and quantify the honesty of past behaviors using quantifiable reputation values.</p></list-item>
<list-item>
<p>Reputation values are reliable and can be trusted by most edge clouds in distributed environments.</p></list-item>
<list-item>
<p>Reputation values are compatible with the offloading algorithm and can directly influence task offloading decisions and resource allocation. Integrating reputation values into the offloading decision-making process to mitigate undesirable behavior poses a challenging goal.</p></list-item>
</list></p>
<p>This paper presents a reputation-based offloading algorithm for vehicular edge computing tasks to address the issues above. Specifically, the contributions of this research are outlined as follows:</p>
<p>(i) This study proposes a method to quantify the reputation value of connected vehicles in vehicular edge computing. The reputation value characterizes the honesty of nodes&#x2019; past behaviors in vehicular edge computing.</p>
<p>(ii) To ensure the reliability of the global reputation value, this study designs an EigenTrust-based reputation value updating method. After finishing each task offloading, the consistency between the edge cloud&#x2019;s execution and the connected vehicle&#x2019;s actions can be verified. The cloud center can then calculate the vehicle&#x2019;s global reputation value using the EigenTrust-based reputation value global calculation algorithm.</p>
<p>(iii) To enhance decision-making performance by mitigating misbehavior, this study designs a reputation value-based task offloading method that considers the reputation values of vehicles. The technique employs a deep reinforcement learning algorithm to address resource allocation issues and utilizes the EigenTrust-based reputation value to combat misbehavior.</p>
<p>(iv) This study conducts simulation experiments to validate the proposed reputation-based task offloading method. Simulation evaluations demonstrate the deep reinforcement learning-based task offloading algorithm&#x2019;s significant effectiveness for vehicular edge computing. Additionally, the reputation-based reinforcement learning task offloading algorithm effectively mitigates misbehavior&#x2019;s ability to acquire resources.</p>
<p>The rest of this paper is organized as follows: <xref ref-type="sec" rid="s2">Section 2</xref> briefly introduces the related work. <xref ref-type="sec" rid="s3">Section 3</xref> presents the system architecture model. <xref ref-type="sec" rid="s4">Section 4</xref> describes our method in detail. <xref ref-type="sec" rid="s5">Section 5</xref> explains the experimental setting and compares it with existing methods. <xref ref-type="sec" rid="s6">Section 6</xref> concludes. <xref ref-type="sec" rid="s7">Section 7</xref> discusses future work about task offloading that considers vehicle reputation.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Work</title>
<p>To improve the performance of vehicular edge computing, there are many studies devoted to solving the problems of task offloading [<xref ref-type="bibr" rid="ref-1">1</xref>&#x2013;<xref ref-type="bibr" rid="ref-3">3</xref>], resource allocation [<xref ref-type="bibr" rid="ref-4">4</xref>], joint path planning [<xref ref-type="bibr" rid="ref-5">5</xref>], and other task offloading problems. Zhang et al. [<xref ref-type="bibr" rid="ref-6">6</xref>] proposed a cloud-based hierarchical vehicular edge computing framework for offloading services. That study modeled resource allocation among vehicular edge computing services as a Stackelberg game to optimize. Bonab et al. [<xref ref-type="bibr" rid="ref-7">7</xref>] proposed a joint radio resource allocation and Mobile Edge Computing (MEC) optimization algorithm in a multi-layer NOMA HetNet, the algorithm aimed to maximize the system&#x2019;s energy efficiency. Huang et al. proposed an offloading scheme based on vehicular communication traffic control [<xref ref-type="bibr" rid="ref-8">8</xref>], which proposed a software-defined network (SDN)-based mobile edge computing architecture. Wang et al. [<xref ref-type="bibr" rid="ref-9">9</xref>] proposed a decentralized computation offloading approach to ensure fairness among edge devices in a fully decentralized environment. Feng et al. [<xref ref-type="bibr" rid="ref-4">4</xref>] proposed an autonomous vehicular edge framework to efficiently manage vehicle resources, which designed a scheduling algorithm based on ant colony optimization to solve the resource allocation problem for inter-vehicle computing workloads. Liu et al. [<xref ref-type="bibr" rid="ref-5">5</xref>] proposed a mobile edge mechanism, which deploys a vehicle-edge (V-edge) and aims to maximize V-edge tasks with sensitive deadlines. Li et al. [<xref ref-type="bibr" rid="ref-10">10</xref>] proposed a dynamic adaptive workload offloading algorithm based on Lyapunov theories and an FC-LSTM based schedule determining algorithm to balance the workload of different cloudlets and minimize the weighted average energy and time consumption of mobile devices. More artificial intelligence-based task offloading algorithms have emerged to improve task offload optimization in complex dynamic environments, especially deep reinforcement learning. Wu et al. [<xref ref-type="bibr" rid="ref-11">11</xref>] proposed a deep reinforcement learning-based online task offloading algorithm for mobile edge computing networks with variable task arrival intensity. Xu et al. [<xref ref-type="bibr" rid="ref-12">12</xref>] proposed a cooperative task offloading scheme for the UAV-enabled MEC systems based on the successive convex approximation method.</p>
<p>Security has always been a key issue in MEC, and much research has been done in academia and industry on vehicular network security and edge computing Security. Security is a decisive factor for public acceptance of MEC and commercial deployment in VANETs [<xref ref-type="bibr" rid="ref-13">13</xref>]. The issue of compromising users&#x2019; privacy leads to serious consequences. Gyawali et al. [<xref ref-type="bibr" rid="ref-14">14</xref>] conducted a comprehensive survey of state-of-the-art solutions for security and privacy in Vehicle-Assisted Networks (VANETs) and categorized security threats to VANETs. Miao et al. [<xref ref-type="bibr" rid="ref-15">15</xref>] categorized the security requirements of VANETs and proposed solutions to satisfy the security and privacy issues. Standard solutions to privacy issues in VANETs tend to utilize digital signatures such as digital signatures [<xref ref-type="bibr" rid="ref-16">16</xref>,<xref ref-type="bibr" rid="ref-17">17</xref>], group signatures [<xref ref-type="bibr" rid="ref-18">18</xref>,<xref ref-type="bibr" rid="ref-19">19</xref>], and pseudonymous authentication [<xref ref-type="bibr" rid="ref-20">20</xref>] as the basic solution. Wang et al. [<xref ref-type="bibr" rid="ref-21">21</xref>] solved the task offloading optimization problem and established a security protection model by setting different security levels for each task. Based on the proposed model, tasks are offloaded to various locations to improve data security and meet the computing requirements of other tasks. Liu et al. [<xref ref-type="bibr" rid="ref-22">22</xref>] proposed an innovative blockchain-enabled information-sharing solution in a zero-trust context to guarantee anonymity yet entity authentication in edge computing systems.</p>
<p>In summary, current vehicular edge computing is typically based on traditional centralized trust-based security techniques. Task offloading methods are lacking for handling task offload request methods in untrustworthy vehicular edge computing sharing environments.</p>
</sec>
<sec id="s3">
<label>3</label>
<title>System Architecture Model</title>
<sec id="s3_1">
<label>3.1</label>
<title>Architecture Model</title>
<p>The paper refers to the vehicular edge computing architecture for the system architecture model. The vehicular edge computing architecture is depicted as <xref ref-type="fig" rid="fig-1">Fig. 1</xref>. This architecture comprises three layers: the cloud center layer, the edge cloud layer, and the edge device layer. The top layer, the cloud center layer, is the central hub for processing and managing data. Below it lies the edge cloud layer, which consists of roadside units, base stations, and Access Points (APs) equipped with vehicular network capabilities such as IEEE 802.11p, C-V2X, and 5G. The edge cloud layer provides services to edge devices and functions as a decision center for scheduling resources for surrounding task requests. The third layer, the edge device layer, primarily consists of connected vehicles.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Vehicular edge computing architecture</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_59325-fig-1.tif"/>
</fig>
<p>This paragraph provides an abstract description of the vehicular edge computing architecture. For clarity and ease of presentation, we denote the decision center as <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mrow><mml:mi mathvariant="bold">D</mml:mi></mml:mrow></mml:math></inline-formula>, the set of edge clouds as <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:mrow><mml:mi mathvariant="bold">M</mml:mi></mml:mrow></mml:math></inline-formula>, with individual edge clouds denoted as <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:msub><mml:mi>m</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> where <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:mi>m</mml:mi></mml:mrow></mml:math></inline-formula>, and the set of connected vehicles as <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:mrow><mml:mi mathvariant="bold">N</mml:mi></mml:mrow></mml:math></inline-formula>, with individual connected vehicles denoted as <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:msub><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> where <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn><mml:mo>,</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>.</mml:mo><mml:mo>,</mml:mo><mml:mi>n</mml:mi></mml:mrow></mml:math></inline-formula>. The symbol <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mi>t</mml:mi></mml:math></inline-formula> represents time, where the time slots of neighboring moments are denoted as <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:mrow><mml:mover><mml:mi>t</mml:mi><mml:mo stretchy="false">&#x007E;</mml:mo></mml:mover></mml:mrow></mml:math></inline-formula>, and <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mrow><mml:mover><mml:mi>t</mml:mi><mml:mo stretchy="false">&#x007E;</mml:mo></mml:mover></mml:mrow></mml:math></inline-formula> is set as 1 s in this research. In this section, we utilize the symbol <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:msub><mml:mi>R</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mo>,</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:mo>,</mml:mo><mml:mi>&#x03C8;</mml:mi><mml:mo>,</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo>,</mml:mo><mml:mi>p</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mi>v</mml:mi><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mi>i</mml:mi><mml:mi>r</mml:mi><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula> to denote the offload request, where <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> denotes the CPU frequency locally used for task <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:msub><mml:mi>R</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>. <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:mi>d</mml:mi></mml:math></inline-formula> denotes the input data size of task <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:msub><mml:mi>R</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> in bytes. <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:msup><mml:mi>d</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup></mml:math></inline-formula> denotes the result data size. <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:mi>&#x03C8;</mml:mi></mml:math></inline-formula> is used to represent the workload in bytes per CPU cycle. <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:mi>d</mml:mi><mml:mi>i</mml:mi><mml:mi>r</mml:mi></mml:math></inline-formula> denotes the steering direction of the following route, with values ranging from 1 to 4 representing four directions, depending on the passing road and nearby decision unit. <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mi>p</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi></mml:math></inline-formula> denotes the position of connected vehicle <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:mi>i</mml:mi></mml:math></inline-formula> at this moment. <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:mi>v</mml:mi></mml:math></inline-formula> denotes the speed of connected vehicle <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:mi>i</mml:mi></mml:math></inline-formula> at this moment. The vehicles need to report task request information to the decision center, and the edge server also needs to report relevant information to the decision center. Specifically, this includes available resources and location, represented as <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:msub><mml:mi>R</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mi>p</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula>.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Problem Formulation</title>
<p>In vehicular edge computing, tasks can be performed in local and vehicle-edge collaborative computing. When a task is performed through local computing, the task delay for task <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:msub><mml:mi>R</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> is given by:
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:msub><mml:mi>t</mml:mi><mml:mi>l</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>d</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03C8;</mml:mi></mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mfrac></mml:math></disp-formula></p>
<p>If vehicle <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:mi>i</mml:mi></mml:math></inline-formula> offloads its task <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:msub><mml:mi>R</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> to edge cloud <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:mi>j</mml:mi></mml:math></inline-formula>, and the allocated computational resources are denoted as <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, the task <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:msub><mml:mi>R</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> delay consists of four parts: the execution time on vehicle <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:mi>i</mml:mi></mml:math></inline-formula>, denoted as <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:msubsup><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mi>e</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula>; the execution time on edge cloud <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:mi>j</mml:mi></mml:math></inline-formula>, denoted as <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>e</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula>; and the time of data transmission between vehicle <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:mi>i</mml:mi></mml:math></inline-formula> and edge cloud <inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:mi>j</mml:mi></mml:math></inline-formula>, denoted as <inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>u</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula> &#x002B; <inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>u</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula>. These four delays can be calculated as the following equation:
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>e</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>d</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mi>&#x03C8;</mml:mi></mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mfrac><mml:mo>,</mml:mo><mml:msubsup><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mi>e</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>d</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03C8;</mml:mi></mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mfrac></mml:math></disp-formula>
<disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>u</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>u</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mfrac><mml:mi>d</mml:mi><mml:mi>r</mml:mi></mml:mfrac><mml:mo>+</mml:mo><mml:mfrac><mml:msup><mml:mi>d</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:mi>r</mml:mi></mml:mfrac></mml:math></disp-formula>where <inline-formula id="ieqn-38"><mml:math id="mml-ieqn-38"><mml:mi>r</mml:mi></mml:math></inline-formula> is the transmission rate. Finally, the computation delay for the vehicle task is the maximum time between the processing time delay of the task on the vehicle and the time spent on edge cloud, expressed as:
<disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi><mml:mrow><mml:mo>{</mml:mo><mml:mtext>&#xA0;</mml:mtext><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>e</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:mtext>&#xA0;</mml:mtext><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>e</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi>u</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>u</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msubsup><mml:mo>}</mml:mo></mml:mrow></mml:math></disp-formula></p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Method</title>
<p>This section presents the proposed task offloading method based on reputation assessment. It describes the proposed method in two parts: reputation management and a deep reinforcement learning task offloading method based on reputation. The deep reinforcement learning task offloading algorithm addresses the resource allocation problem in dynamic vehicular edge computing, and reputation management addresses the trust issues of the sharing computing paradigm.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Reputation Assessment</title>
<p>To cope with the misbehavior in vehicular edge computing, we design a reputation assessment method for task offloading. The reputation method first assesses the offloading consistency and then calculates the global reputation value used in the task offloading method.</p>
<sec id="s4_1_1">
<label>4.1.1</label>
<title>Offloading Consistency Assessment</title>
<p>To assess the offloading consistency, for a given task offloading and resource allocation algorithm, its offloading decision scheduling will be followed by an evaluation of the computational results, including the task&#x2019;s delay, data transmission results, and offloading duration. The paper assumes that the offloading algorithm is accurate enough and the vehicle without misbehavior is consistent between its operation and the expected offloading. We introduce an offloading consistency <inline-formula id="ieqn-39"><mml:math id="mml-ieqn-39"><mml:msub><mml:mi>s</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> corresponding to the reputation value. The consistency assessment compares the execution status after the offloading with the prediction execution status. We can judge the reputation value by the offloading consistency. As previously analyzed, misbehavior primarily involves misrepresentation of location and task information. The location information misbehavior might affect the task offloading decision specifically regarding task offloading duration. Task information misbehavior might affect task offloading regarding calculation delay, transmission delay, and workload. Therefore, to assess the consistency, the following features are used in <xref ref-type="table" rid="table-1">Table 1</xref>.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Features of task offloading</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th></th>
<th>Features</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>Decision center</td>
<td>Calculation delay</td>
<td><inline-formula id="ieqn-40"><mml:math id="mml-ieqn-40"><mml:msup><mml:mi>t</mml:mi><mml:mi>c</mml:mi></mml:msup></mml:math></inline-formula></td>
</tr>
<tr>
<td></td>
<td>Transmission delay</td>
<td><inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:msup><mml:mi>t</mml:mi><mml:mi>u</mml:mi></mml:msup></mml:math></inline-formula></td>
</tr>
<tr>
<td></td>
<td>Transmission data size</td>
<td><inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mi>d</mml:mi><mml:mo>+</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula></td>
</tr>
<tr>
<td></td>
<td>Task offloading duration</td>
<td><inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow></mml:math></inline-formula></td>
</tr>
<tr>
<td></td>
<td>Workload</td>
<td><inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:mi>d</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03C8;</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03BB;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr>
<td>Connected vehicle and edge cloud</td>
<td>Calculation delay</td>
<td><inline-formula id="ieqn-45"><mml:math id="mml-ieqn-45"><mml:msubsup><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>c</mml:mi></mml:msubsup></mml:math></inline-formula></td>
</tr>
<tr>
<td></td>
<td>Transmission delay</td>
<td><inline-formula id="ieqn-46"><mml:math id="mml-ieqn-46"><mml:msubsup><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>u</mml:mi></mml:msubsup></mml:math></inline-formula></td>
</tr>
<tr>
<td></td>
<td>Transmission data size</td>
<td><inline-formula id="ieqn-47"><mml:math id="mml-ieqn-47"><mml:mo stretchy="false">(</mml:mo><mml:mi>d</mml:mi><mml:mo>+</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup><mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula></td>
</tr>
<tr>
<td></td>
<td>Task offloading duration</td>
<td><inline-formula id="ieqn-48"><mml:math id="mml-ieqn-48"><mml:msub><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula></td>
</tr>
<tr>
<td></td>
<td>Workload</td>
<td><inline-formula id="ieqn-49"><mml:math id="mml-ieqn-49"><mml:msub><mml:mi>&#x03D6;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The consistency parameters are assessed as follows:
<list list-type="bullet">
<list-item>
<p>Calculation delay offset <inline-formula id="ieqn-50"><mml:math id="mml-ieqn-50"><mml:msub><mml:mi>x</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>: It is the relative error between the predicted execution delay and the actual execution delay for each task, i.e., <inline-formula id="ieqn-51"><mml:math id="mml-ieqn-51"><mml:msub><mml:mi>x</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mrow><mml:mo>:</mml:mo></mml:mrow><mml:mtext>&#xA0;</mml:mtext><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:msup><mml:mi>t</mml:mi><mml:mi>e</mml:mi></mml:msup><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>u</mml:mi></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:msup><mml:mi>t</mml:mi><mml:mi>u</mml:mi></mml:msup><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mrow><mml:msup><mml:mi>t</mml:mi><mml:mi>u</mml:mi></mml:msup></mml:mrow></mml:math></inline-formula>.</p></list-item>
<list-item>
<p>Transmission delay offset <inline-formula id="ieqn-52"><mml:math id="mml-ieqn-52"><mml:msub><mml:mi>x</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>: It is the relative error between the predicted data transmission time and the actual transmission time for each task, i.e., <inline-formula id="ieqn-53"><mml:math id="mml-ieqn-53"><mml:msub><mml:mi>x</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mrow><mml:mo>:</mml:mo></mml:mrow><mml:mtext>&#xA0;</mml:mtext><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:msup><mml:mi>t</mml:mi><mml:mi>u</mml:mi></mml:msup><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msubsup><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>u</mml:mi></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:msup><mml:mi>t</mml:mi><mml:mi>u</mml:mi></mml:msup><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mrow><mml:msup><mml:mi>t</mml:mi><mml:mi>u</mml:mi></mml:msup></mml:mrow></mml:math></inline-formula>.</p></list-item>
<list-item>
<p>Data offset <inline-formula id="ieqn-54"><mml:math id="mml-ieqn-54"><mml:msub><mml:mi>x</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>: The relative error between the amount of data reported by the connected vehicle and the amount of data actually sent, i.e., <inline-formula id="ieqn-55"><mml:math id="mml-ieqn-55"><mml:msub><mml:mi>x</mml:mi><mml:mn>3</mml:mn></mml:msub><mml:mrow><mml:mo>:</mml:mo></mml:mrow><mml:mtext>&#xA0;</mml:mtext><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>d</mml:mi><mml:mo>+</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>d</mml:mi><mml:mo>+</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mi>d</mml:mi><mml:mo>+</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>d</mml:mi><mml:mo>+</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:math></inline-formula>.</p></list-item>
<list-item>
<p>Workload offset <inline-formula id="ieqn-56"><mml:math id="mml-ieqn-56"><mml:msub><mml:mi>x</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>: The relative error between the workload reported by the networked vehicles and the actual workload, i.e., <inline-formula id="ieqn-57"><mml:math id="mml-ieqn-57"><mml:msub><mml:mi>x</mml:mi><mml:mn>4</mml:mn></mml:msub><mml:mrow><mml:mo>:</mml:mo></mml:mrow><mml:mtext>&#xA0;</mml:mtext><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:mi>&#x03D6;</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>&#x03D6;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mi>d</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03C8;</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>d</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03C8;</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:math></inline-formula>.</p></list-item>
<list-item>
<p>Task offloading duration <inline-formula id="ieqn-58"><mml:math id="mml-ieqn-58"><mml:msub><mml:mi>x</mml:mi><mml:mn>5</mml:mn></mml:msub></mml:math></inline-formula>: The relative error between the predicted unloading duration and the actual duration, i.e., <inline-formula id="ieqn-59"><mml:math id="mml-ieqn-59"><mml:msub><mml:mi>x</mml:mi><mml:mn>5</mml:mn></mml:msub><mml:mrow><mml:mo>:</mml:mo></mml:mrow><mml:mtext>&#xA0;</mml:mtext><mml:mi mathvariant="normal">&#x2207;</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow></mml:mrow></mml:math></inline-formula>.</p></list-item>
</list></p>
<p>The final consistency <inline-formula id="ieqn-60"><mml:math id="mml-ieqn-60"><mml:msub><mml:mi>s</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is calculated by averaging all the consistency features.
<disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:msub><mml:mi>s</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>a</mml:mi><mml:mi>v</mml:mi><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p>Defining the local reputation value in time <inline-formula id="ieqn-61"><mml:math id="mml-ieqn-61"><mml:mi>t</mml:mi></mml:math></inline-formula> as:
<disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:msub><mml:mi>s</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo></mml:mtd><mml:mtd><mml:msub><mml:mi>s</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2264;</mml:mo><mml:mi>&#x03C4;</mml:mi></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mn>1</mml:mn><mml:mo>,</mml:mo></mml:mtd><mml:mtd><mml:msubsup><mml:mi>s</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mo>&#x2032;</mml:mo></mml:msubsup><mml:mo>&gt;</mml:mo><mml:mi>&#x03C4;</mml:mi></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>Here, <inline-formula id="ieqn-62"><mml:math id="mml-ieqn-62"><mml:mi>&#x03C4;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> represents the reputation threshold. A trust threshold is introduced in the offloading consistency calculation to mitigate feature bias resulting from systematic errors, such as suboptimal offloading decisions and inaccurate positioning systems. It is set to 1 when it exceeds <inline-formula id="ieqn-63"><mml:math id="mml-ieqn-63"><mml:mi>&#x03C4;</mml:mi></mml:math></inline-formula>.</p>
</sec>
<sec id="s4_1_2">
<label>4.1.2</label>
<title>Calculation of Reputation Value</title>
<p>This paper introduces reputation value to deter misbehavior and prevent unintended misbehavior from hindering access to edge cloud resources. Here, <inline-formula id="ieqn-64"><mml:math id="mml-ieqn-64"><mml:msub><mml:mi>&#x03F1;</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> represents this paper&#x2019;s global reputation value at time <inline-formula id="ieqn-65"><mml:math id="mml-ieqn-65"><mml:mi>t</mml:mi></mml:math></inline-formula>. A higher value of <inline-formula id="ieqn-66"><mml:math id="mml-ieqn-66"><mml:msub><mml:mi>&#x03F1;</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:math></inline-formula> indicates a higher reputation. The study presents the calculation method for the global reputation value, known as the EigenTrust-based method.</p>
<p>In the vehicular edge computing scenario, both the edge cloud and the decision center provide offloading information to a specific cloud center. Based on the offloading consistency, this center calculates a local reputation value <inline-formula id="ieqn-67"><mml:math id="mml-ieqn-67"><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, as shown in <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref>.
<disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:mrow><mml:mtext mathvariant="bold">c</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mtable columnalign="center center center center" rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>11</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>22</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>33</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x2026;</mml:mo></mml:mtd><mml:mtd><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable><mml:mo>]</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>When the decision center needs to resolve task offloading decisions, the cloud center must provide a global reputation value for vehicle <inline-formula id="ieqn-68"><mml:math id="mml-ieqn-68"><mml:mi>i</mml:mi></mml:math></inline-formula>. In line with the EigenTrust-based peer-to-peer reputation system, a plausible approach involves soliciting opinions from acquaintances of a given node to compute its global reputation. However, the local reputation matrix <xref ref-type="disp-formula" rid="eqn-7">(7)</xref> is an asymmetry in vehicular edge computing. Consequently, calculating global reputation must establish the trust relationship between a specific edge cloud <inline-formula id="ieqn-69"><mml:math id="mml-ieqn-69"><mml:mi>i</mml:mi></mml:math></inline-formula> and the relevant vehicles. Here, similarity is employed to signify the trust relationship between <inline-formula id="ieqn-70"><mml:math id="mml-ieqn-70"><mml:mi>i</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-71"><mml:math id="mml-ieqn-71"><mml:mi>j</mml:mi></mml:math></inline-formula>, as follows:
<disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo><mml:msub><mml:mrow><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mspace width="negativethinmathspace" /><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi mathvariant="bold-italic">c</mml:mi><mml:mrow><mml:mi mathvariant="bold-italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:msub><mml:mi mathvariant="bold-italic">c</mml:mi><mml:mrow><mml:mi mathvariant="bold-italic">j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo><mml:mrow><mml:mo>|</mml:mo><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mi mathvariant="bold-italic">c</mml:mi><mml:mrow><mml:mi mathvariant="bold-italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow><mml:mo>|</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:mrow></mml:mrow><mml:mo>|</mml:mo><mml:mrow></mml:mrow><mml:mrow></mml:mrow><mml:mo>|</mml:mo><mml:mrow></mml:mrow><mml:msub><mml:mi mathvariant="bold-italic">c</mml:mi><mml:mrow><mml:mi mathvariant="bold-italic">j</mml:mi></mml:mrow></mml:msub><mml:mrow></mml:mrow><mml:mo>|</mml:mo><mml:mrow></mml:mrow><mml:mo>|</mml:mo></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>Therefore, the global reputation values can be calculated as follows:
<disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:msubsup><mml:mi>&#x03F1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow><mml:mo>&#x2032;</mml:mo></mml:msubsup><mml:mo>=</mml:mo><mml:mrow><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:munder><mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo><mml:msub><mml:mrow><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mspace width="negativethinmathspace" /><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:math></disp-formula></p>
<p>By introducing the reputation value thresholds, the reputation value is represented as:
<disp-formula id="eqn-10"><label>(10)</label><mml:math id="mml-eqn-10" display="block"><mml:msub><mml:mi>&#x03F1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left" rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:msubsup><mml:mi>&#x03F1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow><mml:mo>&#x2032;</mml:mo></mml:msubsup><mml:mo>,</mml:mo><mml:mspace width="1em" /><mml:msubsup><mml:mi>&#x03F1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow><mml:mo>&#x2032;</mml:mo></mml:msubsup><mml:mo>&#x2264;</mml:mo><mml:mi>&#x03C4;</mml:mi></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mspace width="1em" /><mml:msubsup><mml:mi>&#x03F1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi></mml:mrow><mml:mo>&#x2032;</mml:mo></mml:msubsup><mml:mo>&gt;</mml:mo><mml:mi>&#x03C4;</mml:mi></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math></disp-formula></p>
</sec>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Deep Reinforcement Learning Task Offloading Method Based on Reputation</title>
<p>To illustrate the proposed deep reinforcement learning-based task offloading algorithm, we introduce the state space, action space, and reward settings. The task offloading algorithm proposed in this study is based on Double Deep Q-Network (DQN).</p>
<sec id="s4_2_1">
<label>4.2.1</label>
<title>State Space Setting</title>
<p>The decision-making unit acquires the environmental states and addresses the optimization objective. The state space includes information about vehicles <inline-formula id="ieqn-72"><mml:math id="mml-ieqn-72"><mml:msub><mml:mi>R</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mo>,</mml:mo><mml:msup><mml:mi>d</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:mo>,</mml:mo><mml:mi>&#x03C8;</mml:mi><mml:mo>,</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo>,</mml:mo><mml:mi>p</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mo>,</mml:mo><mml:mi>v</mml:mi><mml:mo>,</mml:mo><mml:mi>d</mml:mi><mml:mi>i</mml:mi><mml:mi>r</mml:mi><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula> and <inline-formula id="ieqn-73"><mml:math id="mml-ieqn-73"><mml:msub><mml:mi>R</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x27E8;</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mi>p</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mo>&#x27E9;</mml:mo></mml:mrow></mml:math></inline-formula>. The dimensions of the state space vector depend on the number of vehicles and edge clouds. The state space dimensions are set and the values of the remaining dimensions are filled with zeros when the number of vehicles and edge clouds is low.</p>
</sec>
<sec id="s4_2_2">
<label>4.2.2</label>
<title>Action Space Setting</title>
<p>The joint-optimized task offloading algorithm discretizes the action space to suit deep reinforcement learning. In this paper, we define the offloading policy for vehicle <inline-formula id="ieqn-74"><mml:math id="mml-ieqn-74"><mml:mi>i</mml:mi></mml:math></inline-formula> as <inline-formula id="ieqn-75"><mml:math id="mml-ieqn-75"><mml:mrow><mml:mi mathvariant="fraktur">c</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x27E8;</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mi mathvariant="fraktur">p</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow><mml:mo>&#x27E9;</mml:mo></mml:mrow></mml:math></inline-formula>, where <inline-formula id="ieqn-76"><mml:math id="mml-ieqn-76"><mml:mrow><mml:mi mathvariant="fraktur">p</mml:mi></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula> represents the allocation of <inline-formula id="ieqn-77"><mml:math id="mml-ieqn-77"><mml:mrow><mml:mi mathvariant="fraktur">p</mml:mi></mml:mrow></mml:math></inline-formula> of the available resources of edge cloud <inline-formula id="ieqn-78"><mml:math id="mml-ieqn-78"><mml:mi>j</mml:mi></mml:math></inline-formula> to vehicle <inline-formula id="ieqn-79"><mml:math id="mml-ieqn-79"><mml:mi>i</mml:mi></mml:math></inline-formula>, discretized in this paper into discrete values, e.g., <inline-formula id="ieqn-80"><mml:math id="mml-ieqn-80"><mml:mrow><mml:mi mathvariant="fraktur">p</mml:mi></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mn>0.2</mml:mn><mml:mo>,</mml:mo><mml:mn>0.8</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula>, and <inline-formula id="ieqn-81"><mml:math id="mml-ieqn-81"><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow></mml:math></inline-formula> can be discretized into specific time lengths, such as <inline-formula id="ieqn-82"><mml:math id="mml-ieqn-82"><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mn>4</mml:mn><mml:mo>,</mml:mo><mml:mn>10</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula>. If <inline-formula id="ieqn-83"><mml:math id="mml-ieqn-83"><mml:mo stretchy="false">&#x2225;</mml:mo><mml:mrow><mml:mi mathvariant="double-struck">M</mml:mi></mml:mrow><mml:mo>&#x2225;=</mml:mo><mml:mn>2</mml:mn></mml:math></inline-formula>, then there can be <inline-formula id="ieqn-84"><mml:math id="mml-ieqn-84"><mml:mn>2</mml:mn><mml:mo>&#x2217;</mml:mo><mml:mn>2</mml:mn><mml:mo>&#x2217;</mml:mo><mml:mn>2</mml:mn><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>=</mml:mo><mml:mn>9</mml:mn></mml:math></inline-formula> ways of offloading tasks. When &#x201C;<inline-formula id="ieqn-85"><mml:math id="mml-ieqn-85"><mml:mi>j</mml:mi></mml:math></inline-formula> &#x003D; 1&#x201D;, the task is not offloaded and is computed locally by the vehicle.</p>
</sec>
<sec id="s4_2_3">
<label>4.2.3</label>
<title>Reward Setting</title>
<p>Properly setting rewards in reinforcement learning enables deep learning networks to learn policies and converge faster. The paper aims to address the delay problem. Therefore, the reward setting is closely linked to the delay. This paper defines a fixed optimization window <inline-formula id="ieqn-86"><mml:math id="mml-ieqn-86"><mml:mrow><mml:mi mathvariant="double-struck">T</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>t</mml:mi></mml:mrow></mml:math></inline-formula>. Let <inline-formula id="ieqn-87"><mml:math id="mml-ieqn-87"><mml:msub><mml:mi>t</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:math></inline-formula> represent the delay for vehicle local computation and <inline-formula id="ieqn-88"><mml:math id="mml-ieqn-88"><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> denote the delay for vehicle-edge cloud cooperative computation. The ratio <inline-formula id="ieqn-89"><mml:math id="mml-ieqn-89"><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:msub><mml:mi>t</mml:mi><mml:mi>l</mml:mi></mml:msub><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mfrac></mml:math></inline-formula> is a crucial indicator in the proposed Double DQN-based task offloading algorithm. When the connected vehicle opts for local computation, the value is <inline-formula id="ieqn-90"><mml:math id="mml-ieqn-90"><mml:mn>1</mml:mn></mml:math></inline-formula>. In situations where the connected vehicle <inline-formula id="ieqn-91"><mml:math id="mml-ieqn-91"><mml:mi>i</mml:mi></mml:math></inline-formula> allocates resources from edge cloud <inline-formula id="ieqn-92"><mml:math id="mml-ieqn-92"><mml:mi>j</mml:mi></mml:math></inline-formula>, but the task remains entirely local during the <inline-formula id="ieqn-93"><mml:math id="mml-ieqn-93"><mml:mi>t</mml:mi></mml:math></inline-formula> time period, the indicator is set as <inline-formula id="ieqn-94"><mml:math id="mml-ieqn-94"><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>&#x03C4;</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, with subsequent experiences setting it to <inline-formula id="ieqn-95"><mml:math id="mml-ieqn-95"><mml:mn>0.8</mml:mn></mml:math></inline-formula>.
<disp-formula id="eqn-11"><label>(11)</label><mml:math id="mml-eqn-11" display="block"><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mn>1</mml:mn><mml:mo>,</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:mtext>local comuputing</mml:mtext></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mfrac><mml:msub><mml:mi>t</mml:mi><mml:mi>l</mml:mi></mml:msub><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mfrac><mml:mo>,</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:mtext>edge computing</mml:mtext></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>&#x03C4;</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:mtext>local completing with assigned resource</mml:mtext></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>The average value of <inline-formula id="ieqn-96"><mml:math id="mml-ieqn-96"><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> over optimization windows is the reward value of the proposed Double DQN-based task offloading algorithm. The reward for the offloading decision <inline-formula id="ieqn-97"><mml:math id="mml-ieqn-97"><mml:mrow><mml:mi mathvariant="fraktur">c</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mi mathvariant="fraktur">p</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula> is rewarded as:
<disp-formula id="eqn-12"><label>(12)</label><mml:math id="mml-eqn-12" display="block"><mml:msub><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi><mml:mo mathvariant="fraktur">+</mml:mo><mml:mn mathvariant="fraktur">1</mml:mn></mml:mrow></mml:mrow></mml:munderover><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></disp-formula></p>
<p>The following section describes the specific steps of the proposed algorithm, including training and decision process. The algorithm trains two networks: a deep Q-network <italic>Q</italic>. During training, the deep Q-network <italic>Q</italic> estimates the Q-value of the action. The total number of training steps for the deep Q-network <italic>Q</italic> is denoted as <inline-formula id="ieqn-98"><mml:math id="mml-ieqn-98"><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub></mml:math></inline-formula>.</p>
<p>1) Processing of state inputs. In this paragraph, we label the input states <italic>S</italic> as <inline-formula id="ieqn-99"><mml:math id="mml-ieqn-99"><mml:mi>S</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>s</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>s</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:math></inline-formula>, as previously defined. Practical training of the Q-network requires the normalization of information across all dimensions. Given that information in different dimensions may not convey the same meaning, each dimension must be processed based on its respective value range. Normalization is employed for this purpose.
<disp-formula id="eqn-13"><label>(13)</label><mml:math id="mml-eqn-13" display="block"><mml:msup><mml:mi>S</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>S</mml:mi><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>2) Definiting Q-network. The Q-network computes the values of state-action pairs to determine the action with the highest Q-value. We define the Q-network using a Multilayer Perceptron (MLP). ReLU activation functions are applied to the neurons in each layer of the Q-network to enhance the nonlinear representation of the network.</p>
<p>3) Selecting actions. The deep Q-network outputs values corresponding to each action, and the optimal action is chosen using softmax. The policy is selected using the <inline-formula id="ieqn-100"><mml:math id="mml-ieqn-100"><mml:mi>&#x03B5;</mml:mi><mml:mo>&#x2212;</mml:mo></mml:math></inline-formula>greedy algorithm. The DDQN algorithm computes the Q-values of all actions under the state <inline-formula id="ieqn-101"><mml:math id="mml-ieqn-101"><mml:msub><mml:mi>S</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:math></inline-formula> using the estimation Q-network. Then, the policy selects the optimal action with probability <inline-formula id="ieqn-102"><mml:math id="mml-ieqn-102"><mml:mi>&#x03B5;</mml:mi></mml:math></inline-formula> or randomly selects an action from the action space.
<disp-formula id="eqn-14"><label>(14)</label><mml:math id="mml-eqn-14" display="block"><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mi>arg</mml:mi><mml:mo>&#x2061;</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mrow><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:munder><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>a</mml:mi><mml:mo>,</mml:mo><mml:msub><mml:mi>w</mml:mi><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo></mml:mtd><mml:mtd><mml:mtext>&#xA0;if&#xA0;</mml:mtext><mml:mi>p</mml:mi><mml:mo>&#x003C;=</mml:mo><mml:mi>&#x03B5;</mml:mi></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mi>a</mml:mi><mml:mtext>&#xA0;</mml:mtext><mml:mo stretchy="false">(</mml:mo><mml:mtext>chosen randomly&#xA0;</mml:mtext><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo></mml:mtd><mml:mtd><mml:mtext>&#xA0;if&#xA0;</mml:mtext><mml:mi>p</mml:mi><mml:mo>&gt;</mml:mo><mml:mi>&#x03B5;</mml:mi></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>After getting action <inline-formula id="ieqn-103"><mml:math id="mml-ieqn-103"><mml:msub><mml:mi>A</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:math></inline-formula>, the algorithm can solve the task offloading decision <inline-formula id="ieqn-104"><mml:math id="mml-ieqn-104"><mml:mrow><mml:mi mathvariant="fraktur">c</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:mi mathvariant="fraktur">p</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula>. In addition, the decision-making unit gets a reputation <inline-formula id="ieqn-105"><mml:math id="mml-ieqn-105"><mml:msub><mml:mi>&#x03F1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> from the cloud center, and the final decision will be <inline-formula id="ieqn-106"><mml:math id="mml-ieqn-106"><mml:mrow><mml:mi mathvariant="fraktur">c</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03F1;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>&#x22C5;</mml:mo><mml:mrow><mml:mi mathvariant="fraktur">p</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mi mathvariant="fraktur">d</mml:mi></mml:mrow><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula></p>
<p>4) Training Q-network. After the vehicular edge computing conducts the selected action, <inline-formula id="ieqn-107"><mml:math id="mml-ieqn-107"><mml:mi>m</mml:mi></mml:math></inline-formula> samples <inline-formula id="ieqn-108"><mml:math id="mml-ieqn-108"><mml:mo fence="false" stretchy="false">{</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>A</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msubsup><mml:mi>S</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi mathvariant="normal">&#x005F;</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:msub><mml:mi>d</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula> are sampled from the replay buffer. By the Q network, the trainer calculates <inline-formula id="ieqn-109"><mml:math id="mml-ieqn-109"><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> is:
<disp-formula id="eqn-15"><label>(15)</label><mml:math id="mml-eqn-15" display="block"><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mi>&#x03B3;</mml:mi><mml:msup><mml:mi>Q</mml:mi><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>S</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:mi>arg</mml:mi><mml:mo>&#x2061;</mml:mo><mml:munder><mml:mo movablelimits="true" form="prefix">max</mml:mo><mml:mrow><mml:msup><mml:mi>a</mml:mi><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup></mml:mrow></mml:munder><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>S</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:mi>a</mml:mi><mml:mo>,</mml:mo><mml:mi>w</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:msup><mml:mi>w</mml:mi><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>After calculating the action state values, the mean squared loss function <inline-formula id="ieqn-110"><mml:math id="mml-ieqn-110"><mml:mn>1</mml:mn><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mi>m</mml:mi><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>m</mml:mi></mml:munderover><mml:mrow><mml:msup><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mi>Q</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>A</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mi>w</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:mrow></mml:math></inline-formula> is used to update all the parameters <inline-formula id="ieqn-111"><mml:math id="mml-ieqn-111"><mml:mi>w</mml:mi></mml:math></inline-formula> of deep Q-network by back propagation of loss. Then, the target network is updated by <inline-formula id="ieqn-112"><mml:math id="mml-ieqn-112"><mml:msup><mml:mi>w</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup><mml:mo>=</mml:mo><mml:mi>w</mml:mi></mml:math></inline-formula>. The training process of the Double DQN-based task offloading algorithm for VEC is described as follows Algorithm 1.</p>
<fig id="fig-9">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_59325-fig-9.tif"/>
</fig>
</sec>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Evaluation</title>
<p>Simulation experiments were designed to evaluate the proposed reputation-based task offloading method for vehicular edge computing. The evaluations verify the feasibility of the proposed reputation value-based task offloading. First, the simulation environment and parameters used in this section are described in detail. Subsequently, the experimental results are presented and analyzed.</p>
<sec id="s5_1">
<label>5.1</label>
<title>Experimental Setting</title>
<p>The impact of misbehavior in vehicular edge computing is verified through experiments conducted using the Veins [<xref ref-type="bibr" rid="ref-23">23</xref>] simulation framework, an open-source platform for telematics network simulation. Veins primarily implements vehicular networks using OMNeT&#x002B;&#x002B; [<xref ref-type="bibr" rid="ref-24">24</xref>] and simulates road trajectories using SUMO [<xref ref-type="bibr" rid="ref-25">25</xref>]. The experimental environments were executed on a Debian 11 system with an Intel(R) Core(TM) i7-6700 CPU @ 3.40 GHz.</p>
<p>We utilize the open-source map OpenStreetMap [<xref ref-type="bibr" rid="ref-26">26</xref>] as the scenario source. The area surrounding Minzhuang Road in Haidian District, Beijing, is chosen as the road scenario. The area&#x2019;s topographic map and Veins road network map are depicted in <xref ref-type="fig" rid="fig-2">Figs. 2</xref> and <xref ref-type="fig" rid="fig-3">3</xref>, respectively. For location misbehavior, this paper utilizes the VeReMi dataset. In this evaluation, a constant attack scenario is set up. As depicted in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>, the designed scenario includes one decision center and two edge clouds. There are six vehicles and three directions: <inline-formula id="ieqn-125"><mml:math id="mml-ieqn-125"><mml:mrow><mml:mo>&#x2032;</mml:mo><mml:mn>2</mml:mn><mml:mo>&#x2032;</mml:mo></mml:mrow></mml:math></inline-formula>, <inline-formula id="ieqn-126"><mml:math id="mml-ieqn-126"><mml:mo>&#x2032;</mml:mo><mml:mn>3</mml:mn><mml:mo>&#x2032;</mml:mo></mml:math></inline-formula>, and <inline-formula id="ieqn-127"><mml:math id="mml-ieqn-127"><mml:mo>&#x2032;</mml:mo><mml:mn>4</mml:mn><mml:mo>&#x2032;</mml:mo></mml:math></inline-formula>. The location <inline-formula id="ieqn-128"><mml:math id="mml-ieqn-128"><mml:mo>&#x2032;</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2032;</mml:mo></mml:math></inline-formula> in <xref ref-type="fig" rid="fig-3">Fig. 3</xref> represents the initial location of all connected vehicles. The roadblock model and network model adhere to Veins&#x2019; default parameters. Regarding the wireless transmission model parameters, the operating frequency is 5.890 GHz, and the bandwidth is 40 MHz. The maximum vehicle speed is 12 m/s. The vehicle CPU resource is 1.2 GHz, the data size <inline-formula id="ieqn-129"><mml:math id="mml-ieqn-129"><mml:mi>d</mml:mi></mml:math></inline-formula> is 40,000 Byte, the data size <inline-formula id="ieqn-130"><mml:math id="mml-ieqn-130"><mml:msup><mml:mi>d</mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup></mml:math></inline-formula> is 800 Byte, and the evaluation assumes that the vehicle and edge cloud handle the task at a rate of 500 Byte/Hz. The CPU resource is 7.0 GHz.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Simulated environment</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_59325-fig-2.tif"/>
</fig><fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Veins road network diagram</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_59325-fig-3.tif"/>
</fig>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Evaluation of Deep Reinforcement Learning-Based Task Offloading Algorithms for Vehicular Edge Computing</title>
<p>The first part of the evaluation aims to validate deep reinforcement learning-based task offloading algorithms for vehicular edge computing. The experiment evaluates four offloading methods: the proposed method, random policy selection algorithm, vehicle local computing, and a task offloading decision-making method based on the greedy algorithm. The correlation between reward and delay was depicted in the preceding section. As <xref ref-type="fig" rid="fig-4">Fig. 4</xref> shows, local computing by vehicle causes almost minimal rewards, which means there is no optimization for latency. The random policy selection algorithm would not optimize the task delay. The greedy algorithm can effectively optimize the task delay but is still inferior to the proposed algorithm. Therefore, the experimental results depicted in <xref ref-type="fig" rid="fig-4">Fig. 4</xref> demonstrate the effectiveness of the proposed method in expediting vehicle-side collaboration. It is evident that the offloading decision progressively reduces task latency with training.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Comparison diagram of task offloading algorithms based on reinforcement learning</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_59325-fig-4.tif"/>
</fig>
<p>The efficacy of different numbers of requesting vehicles is validated by performing task requests with varying total numbers of task-request vehicles. The experiment configures the number of vehicles as 1, 3, and 6. With one vehicle, a networked vehicle heads toward direction <inline-formula id="ieqn-131"><mml:math id="mml-ieqn-131"><mml:mo>&#x2032;</mml:mo><mml:mn>4</mml:mn><mml:mo>&#x2032;</mml:mo></mml:math></inline-formula> as <xref ref-type="fig" rid="fig-3">Fig. 3</xref> shows. When there are three vehicles, the vehicles head towards the <inline-formula id="ieqn-132"><mml:math id="mml-ieqn-132"><mml:mo>&#x2032;</mml:mo><mml:mn>2</mml:mn><mml:mo>&#x2032;</mml:mo><mml:mo>,</mml:mo><mml:mspace width="thinmathspace" /><mml:mo>&#x2032;</mml:mo><mml:mn>3</mml:mn><mml:mo>&#x2032;</mml:mo><mml:mo>,</mml:mo><mml:mspace width="thinmathspace" /><mml:mo>&#x2032;</mml:mo><mml:mn>4</mml:mn><mml:mo>&#x2032;</mml:mo></mml:math></inline-formula> directions, respectively. With six vehicles, each two connected vehicles heads toward the <inline-formula id="ieqn-133"><mml:math id="mml-ieqn-133"><mml:mo>&#x2032;</mml:mo><mml:mn>2</mml:mn><mml:mo>&#x2032;</mml:mo><mml:mo>,</mml:mo><mml:mspace width="thinmathspace" /><mml:mo>&#x2032;</mml:mo><mml:mn>3</mml:mn><mml:mo>&#x2032;</mml:mo><mml:mo>,</mml:mo><mml:mspace width="thinmathspace" /><mml:mo>&#x2032;</mml:mo><mml:mn>4</mml:mn><mml:mo>&#x2032;</mml:mo></mml:math></inline-formula> directions, respectively. The <xref ref-type="fig" rid="fig-5">Fig. 5</xref> demonstrates that with fewer vehicles, there is reduced competition for resources, allowing vehicles to obtain computational resources efficiently. However, with an increased number of vehicles, the proposed method effectively optimizes average delay.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>The task offload performance with the differential number of vehicles</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_59325-fig-5.tif"/>
</fig>
</sec>
<sec id="s5_3">
<label>5.3</label>
<title>Evaluation of Reputation Assessment-Based Task Offloading Algorithms for Vehicular Edge Computing</title>
<p>The second part of the evaluation aims to verify reputation-based task offloading algorithms for vehicular edge computing. As depicted in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>, the two vehicles on Minzhuang Road consistently misreport their positions to the decision center as position <inline-formula id="ieqn-134"><mml:math id="mml-ieqn-134"><mml:mo>&#x2032;</mml:mo><mml:mn>5</mml:mn><mml:mo>&#x2032;</mml:mo></mml:math></inline-formula> in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>. This behavior constitutes a standard constant attack, and the attackers request task offloading with the fake positions. The misbehavior by the vehicles, as shown in <xref ref-type="fig" rid="fig-6">Figs. 6</xref> and <xref ref-type="fig" rid="fig-7">7</xref>, increases overall task latency, thereby reducing overall performance. Setting the reputation value enables the offloading decision to inhibit such misbehavior from adversely affecting the task offloading decision. For instance, setting the reputation value to 0.6 in this experiment results in improved task latency performance. <xref ref-type="fig" rid="fig-8">Fig. 8</xref> presents the resource allocation results, demonstrating that the reputation value can limit the capabilities of vehicles engaging in misbehavior.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>The performance of the proposed DQN-based task offload algorithm</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_59325-fig-6.tif"/>
</fig><fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Task offload performance caused by misbehavior</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_59325-fig-7.tif"/>
</fig><fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Resource allocation in three modes</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_59325-fig-8.tif"/>
</fig>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Conclusion</title>
<p>This paper introduces a task offloading algorithm based on reputation assessment to address the challenge of task offloading in vehicular edge computing systems against potential misbehavior. Firstly, a deep reinforcement learning-based algorithm is proposed for vehicular edge computing task offloading. Secondly, the reputation assessment method for connected vehicles is proposed using task offloading information in vehicular edge computing scenarios. Additionally, a globally reliable reputation value is calculated using the EigenTrust algorithm. Lastly, a reputation-value based task offloading method is introduced to mitigate misbehavior effectively. To validate the proposed approach, simulation experiments based on Veins are conducted. The experimental analyses demonstrate that the proposed reputation-based task offloading algorithm for vehicular edge computing effectively curbs undesirable behaviors and enhances the efficiency of task offloading decisions.</p>
</sec>
<sec id="s7">
<label>7</label>
<title>Future Work</title>
<p>Investigating task offloading methods that incorporate distributed reputation management in the future will be interesting. In the vehicular edge computing architecture, vehicles form a distributed network. Designing a distributed reputation computation method that allows vehicles to access resources in the vehicular edge computing environment quickly is crucial. Therefore, distributed reputation management is essential to ensure the credibility of reputation. On the other hand, it is also necessary to update the reputation value of vehicles based on their behavior. We will focus on developing task offloading methods incorporating distributed reputation management for vehicular edge computing.</p>
</sec>
</body>
<back>
<ack>
<p>None.</p>
</ack>
<sec>
<title>Funding Statement</title>
<p>This paper is supported by the Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness (No. HNTS2022020), the Science and Technology Research Program of Henan Province of China (232102210134, 182102210130), and Key Research Projects of Henan Provincial Universities (25B520005).</p>
</sec>
<sec>
<title>Author Contributions</title>
<p>The authors confirmed their contributions to the papers: study conception and design: Jun Li; evaluation: Jun Li; draft manuscript preparation: Yawei Dong, Liang Ni, Guopeng Feng, and Fangfang Shan. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>Not applicable.</p>
</sec>
<sec>
<title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Subramaniam</surname> <given-names>EVD</given-names></string-name>, <string-name><surname>Krishnasamy</surname> <given-names>V</given-names></string-name></person-group>. <article-title>Hybrid optimal ensemble SVM forest classifier for task offloading in mobile cloud computing</article-title>. <source>Comput J</source>. <year>2024</year>;<volume>67</volume>(<issue>4</issue>):<fpage>1286</fpage>&#x2013;<lpage>97</lpage>. doi:<pub-id pub-id-type="doi">10.1093/comjnl/bxad059</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chu</surname> <given-names>W</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>X</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Lui</surname> <given-names>JCS</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>On incentivizing resource allocation and task offloading for cooperative edge computing</article-title>. <source>Comput Netw</source>. <year>2024</year>;<volume>246</volume>(<issue>3</issue>):<fpage>110428</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comnet.2024.110428</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Saeik</surname> <given-names>F</given-names></string-name>, <string-name><surname>Avgeris</surname> <given-names>M</given-names></string-name>, <string-name><surname>Spatharakis</surname> <given-names>D</given-names></string-name>, <string-name><surname>Santi</surname> <given-names>N</given-names></string-name>, <string-name><surname>Papavassiliou</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Task offloading in edge and cloud computing: a survey on mathematical, artificial intelligence and control theory solutions</article-title>. <source>Comput Netw</source>. <year>2021</year>;<volume>195</volume>(<issue>3</issue>):<fpage>108177</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comnet.2021.108177</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Feng</surname> <given-names>J</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>C</given-names></string-name>, <string-name><surname>Ji</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>AVE: autonomous vehicular edge computing framework with ACO-based scheduling</article-title>. <source>IEEE Trans Veh Technol</source>. <year>2017</year>;<volume>66</volume>(<issue>12</issue>):<fpage>10660</fpage>&#x2013;<lpage>75</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TVT.2017.2714704</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Niu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Jin</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Joint optimization of path planning and resource allocation in mobile edge computing</article-title>. <source>IEEE Trans Mob Comput</source>. <year>2020</year>;<volume>19</volume>(<issue>9</issue>):<fpage>2129</fpage>&#x2013;<lpage>44</lpage>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>K</given-names></string-name>, <string-name><surname>Mao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Leng</surname> <given-names>S</given-names></string-name>, <string-name><surname>Maharjan</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Optimal delay constrained offloading for vehicular edge computing networks</article-title>. In: <conf-name>2017 IEEE International Conference on Communications (ICC)</conf-name>; <publisher-loc>Paris,
France</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2017</year>. p. <fpage>1</fpage>&#x2013;<lpage>6</lpage>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bonab</surname> <given-names>MJA</given-names></string-name>, <string-name><surname>Kandovan</surname> <given-names>RS</given-names></string-name></person-group>. <article-title>Effective resource allocation and load balancing in hierarchical hetnets: toward QoS-Aware multi-access edge computing</article-title>. <source>Comput J</source>. <year>2023</year>;<volume>66</volume>(<issue>1</issue>):<fpage>229</fpage>&#x2013;<lpage>44</lpage>. doi:<pub-id pub-id-type="doi">10.1093/comjnl/bxab157</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Huang</surname> <given-names>CM</given-names></string-name>, <string-name><surname>Chiang</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Dao</surname> <given-names>DT</given-names></string-name>, <string-name><surname>Su</surname> <given-names>WL</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>H</given-names></string-name></person-group>. <article-title>V2V data offloading for cellular network based on the software defined network (SDN) inside mobile edge computing (MEC) architecture</article-title>. <source>IEEE Access</source>. <year>2018</year>;<volume>6</volume>:<fpage>17741</fpage>&#x2013;<lpage>55</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2018.2820679</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>X</given-names></string-name>, <string-name><surname>Ning</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Guo</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Multi-agent imitation learning for pervasive edge computing: a decentralized computation offloading algorithm</article-title>. <source>IEEE Trans Parallel Distrib Syst</source>. <year>2020</year>;<volume>32</volume>(<issue>2</issue>):<fpage>411</fpage>&#x2013;<lpage>425</lpage>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Li</surname> <given-names>B</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>W</given-names></string-name>, <string-name><surname>Xie</surname> <given-names>W</given-names></string-name>, <string-name><surname>Li</surname> <given-names>X</given-names></string-name></person-group>. <article-title>Energy-efficient task offloading and trajectory planning in UAV-enabled mobile edge computing networks</article-title>. <source>Comput Netw</source>. <year>2023</year>;<volume>234</volume>(<issue>1</issue>):<fpage>109940</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comnet.2023.109940</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Geng</surname> <given-names>J</given-names></string-name>, <string-name><surname>Bai</surname> <given-names>X</given-names></string-name>, <string-name><surname>Jin</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Deep reinforcement learning-based online task offloading in mobile edge computing networks</article-title>. <source>Inf Sci</source>. <year>2024</year>;<volume>654</volume>(<issue>3</issue>):<fpage>119849</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.ins.2023.119849</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Xu</surname> <given-names>D</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Cooperative task offloading and resource allocation for UAV-enabled mobile edge computing systems</article-title>. <source>Comput Netw</source>. <year>2023</year>;<volume>223</volume>(<issue>3</issue>):<fpage>109574</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comnet.2023.109574</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Goudarzi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Abdullah</surname> <given-names>AH</given-names></string-name>, <string-name><surname>Mandala</surname> <given-names>S</given-names></string-name>, <string-name><surname>Soleymani</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Baee</surname> <given-names>MAR</given-names></string-name>, <string-name><surname>Anisi</surname> <given-names>MH</given-names></string-name> <etal>et al</etal></person-group>. <article-title>A systematic review of security in vehicular ad hoc network</article-title>. In: <conf-name>Proceedings of the Second European Symposium WSCN</conf-name>; <publisher-loc>Jeddah, Saudi Arabia</publisher-loc>; <year>2013</year>. p. <fpage>1</fpage>&#x2013;<lpage>10</lpage>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gyawali</surname> <given-names>S</given-names></string-name>, <string-name><surname>Qian</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>RQ</given-names></string-name></person-group>. <article-title>Machine Learning and reputation based misbehavior detection in vehicular communication networks</article-title>. <source>IEEE Trans Vehicular Technol</source>. <year>2020</year>;<volume>69</volume>(<issue>8</issue>):<fpage>8871</fpage>&#x2013;<lpage>85</lpage>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Miao</surname> <given-names>D</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>L</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>R</given-names></string-name>, <string-name><surname>Panneerselvam</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>W</given-names></string-name></person-group>. <article-title>An efficient indexing model for the fog layer of industrial internet of things</article-title>. <source>IEEE Trans Indust Inform</source>. <year>2018</year>;<volume>14</volume>(<issue>10</issue>):<fpage>4487</fpage>&#x2013;<lpage>96</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TII.2018.2799598</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Tao</surname> <given-names>J</given-names></string-name>, <string-name><surname>Yuan</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Anonymous authentication-oriented vehicular privacy protection technology research in vanet</article-title>. In: <conf-name>2011 International Conference on Electrical and Control Engineering</conf-name>; <publisher-name>Yichang,
China</publisher-name>: <publisher-name>IEEE</publisher-name>; <year>2011</year>. p. <fpage>4365</fpage>&#x2013;<lpage>8</lpage>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wu</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Domingo-Ferrer</surname> <given-names>J</given-names></string-name>, <string-name><surname>Gonz&#x00E1;lez-Nicol&#x00E1;s</surname> <given-names>U</given-names></string-name></person-group>. <article-title>Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications</article-title>. <source>IEEE Trans Veh Technol</source>. <year>2009</year>;<volume>59</volume>(<issue>2</issue>):<fpage>559</fpage>&#x2013;<lpage>73</lpage>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Studer</surname> <given-names>A</given-names></string-name>, <string-name><surname>Shi</surname> <given-names>E</given-names></string-name>, <string-name><surname>Bai</surname> <given-names>F</given-names></string-name>, <string-name><surname>Perrig</surname> <given-names>A</given-names></string-name></person-group>. <article-title>TACKing together efficient authentication, revocation, and privacy in VANETs</article-title>. In: <conf-name>2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks</conf-name>; <publisher-loc>Rome, Italy</publisher-loc>: <publisher-name>IEEE</publisher-name>; <year>2009</year>. p. <fpage>1</fpage>&#x2013;<lpage>9</lpage>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Sampigethaya</surname> <given-names>K</given-names></string-name>, <string-name><surname>Huangy</surname> <given-names>L</given-names></string-name>, <string-name><surname>Li</surname> <given-names>M</given-names></string-name>, <string-name><surname>Poovendran</surname> <given-names>R</given-names></string-name>, <string-name><surname>Matsuuray</surname> <given-names>K</given-names></string-name>, <string-name><surname>Sezaki</surname> <given-names>K</given-names></string-name></person-group>. <article-title>CARAVAN: providing location privacy for VANET</article-title>. In: <conf-name>Proceedings of Embedded Security in Cars (ESCAR)</conf-name>; <year>2005</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sun</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>R</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>X</given-names></string-name>, <string-name><surname>Shen</surname> <given-names>X</given-names></string-name>, <string-name><surname>Su</surname> <given-names>J</given-names></string-name></person-group>. <article-title>An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications</article-title>. <source>IEEE Trans Veh Technol</source>. <year>2010</year>;<volume>59</volume>(<issue>7</issue>):<fpage>3589</fpage>&#x2013;<lpage>603</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TVT.2010.2051468</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Ding</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Jin</surname> <given-names>X</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Gao</surname> <given-names>C</given-names></string-name></person-group>. <article-title>Task offloading for edge computing in industrial Internet with joint data compression and security protection</article-title>. <source>J Supercomput</source>. <year>2023</year>;<volume>79</volume>(<issue>4</issue>):<fpage>4291</fpage>&#x2013;<lpage>317</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11227-022-04821-9</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Hao</surname> <given-names>X</given-names></string-name>, <string-name><surname>Ren</surname> <given-names>W</given-names></string-name>, <string-name><surname>Xiong</surname> <given-names>R</given-names></string-name>, <string-name><surname>Zhu</surname> <given-names>T</given-names></string-name>, <string-name><surname>Choo</surname> <given-names>KKR</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things</article-title>. <source>IEEE Trans Comput</source>. <year>2023</year>;<volume>72</volume>(<issue>2</issue>):<fpage>501</fpage>&#x2013;<lpage>12</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TC.2022.3157996</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>Veins</collab></person-group>. <year>[cited 2025 Feb 11]</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://veins.car2x.org/">https://veins.car2x.org/</ext-link>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>OMNeT&#x002B;&#x002B;</collab></person-group>. <year>[cited 2025 Feb 11]</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://omnetpp.org/">https://omnetpp.org/</ext-link>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>SUMO</collab></person-group>. <year>[cited 2025 Feb 11]</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://eclipse.dev/sumo/">https://eclipse.dev/sumo/</ext-link>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Li</surname> <given-names>J</given-names></string-name></person-group>. <year>[cited 2025 Feb 11]</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://github.com/usuallyoralways/vectaskoffload">https://github.com/usuallyoralways/vectaskoffload</ext-link>.</mixed-citation></ref>
</ref-list>
</back></article>