You are on page 1of 14

Journal of Systems Architecture

A Reputation-Based Service Provisioning Scheme in Vehicular Fog Computing


--Manuscript Draft--

Manuscript Number: JSA-D-22-00211

Article Type: VSI: ECforIoV [MGE - Shaohua Wan]

Keywords: Social internet of vehicle, Vehicular fog computing, Reputation, Computational


resources, Fog vehicles

Abstract: The startling rise in smart vehicles stimulates the rapid development of new paradigms
such as Social Internet of Vehicle (SIoV) and Vehicular Fog Computing (VFC).
Trustworthiness has been regarded as a dominating issue in all the have-to-be-
addressed issues in SIoV, and many reputation-based countermeasures have been
adopted to solve the trustiness-related issues in IoV. However, little attention has been
paid to the reputation of vehicles when they provision computational resources in VFC,
which is worthy of further investigation since some fog vehicles pursue more revenues
or fewer costs at the expense of delivering poor-quality computing services. Such
selfish behaviors should be discouraged. In this paper, we put forward a reputation-
based service provisioning scheme, and a reputation management scheme consisting
of the decentralized reputation updating and global reputation synchronization in VFC,
aiming to prevent the fog vehicles from delivering low-quality computing services by
maximizing the accumulated reputation of all the serving fog vehicles in the
optimization period. An online approach is adopted to handle the requests in a slot-by-
slot way. The simulation results show its e ff ectiveness and advantages when
compared to other existing approaches.

Powered by Editorial Manager® and ProduXion Manager® from Aries Systems Corporation
Manuscript File Click here to view linked References

A Reputation-Based Service Provisioning Scheme in Vehicular Fog Computing

Chaogang Tanga , Huaming Wub,∗


a School of Computer Science and Technology, China University of Mining and Technology, 221116, Xuzhou, China
b Center for Applied Mathematics, Tianjin University, 300072, Tianjin, China

Abstract
The startling rise in smart vehicles stimulates the rapid development of new paradigms such as Social Internet of Vehicle (SIoV) and
Vehicular Fog Computing (VFC). Trustworthiness has been regarded as a dominating issue in all the have-to-be-addressed issues in
SIoV, and many reputation-based countermeasures have been adopted to solve the trustiness-related issues in IoV. However, little
attention has been paid to the reputation of vehicles when they provision computational resources in VFC, which is worthy of further
investigation since some fog vehicles pursue more revenues or fewer costs at the expense of delivering poor-quality computing ser-
vices. Such selfish behaviors should be discouraged. In this paper, we put forward a reputation-based service provisioning scheme,
and a reputation management scheme consisting of the decentralized reputation updating and global reputation synchronization in
VFC, aiming to prevent the fog vehicles from delivering low-quality computing services by maximizing the accumulated reputation
of all the serving fog vehicles in the optimization period. An online approach is adopted to handle the requests in a slot-by-slot
way. The simulation results show its effectiveness and advantages when compared to other existing approaches.
Keywords:
Social internet of vehicle, Vehicular fog computing, Reputation, Computational resources, Fog vehicles

1. Introduction attempting to damage vehicular social networks, e.g., some ma-


licious vehicles may send bogus or improper messages uninter-
There are around 1.5 billion vehicles in the world and the ruptedly to undermine the trustiness of vehicles towards each
number of them may skyrocket to 2.8 billion by 2036 [2]. The other. Against this background, many reputation-based coun-
rapid development of Internet of Vehicles (IoV) makes vehi- termeasures have been adopted to solve the trustiness-related
cles inter-connected and interactive with each other. IoV that issues in IoV and acquired satisfactory effects such as [5, 7, 13,
integrates internal vehicle network, inter-vehicle network and 23, 25]. On the other hand, however, researchers seldom apply
mobile Internet can perceive information pertaining to vehic- reputation-based mechanisms to service provisioning in VFC.
ular state and the surroundings. In the past few years, smart The explosive growth in the Internet of Things (IoT) devices
vehicles have made up a huge part of the market in the au- has led to staggering demands for computational resources, be-
tomobile industry. Apart from sensing ability, smart vehicles cause these size-limited devices generate a huge amount of data
are further capable of storage, calculation and analysis, owing but cannot process and analyze them by themselves owing to
to various vehicle-mounted facilities. In this context, several their limited computational capabilities [21]. Vehicles with idle
newly emergent paradigms have gained widespread attention computational resources can become a tempting choice for ser-
in both industry and academia, typically exemplified by SIoV vice provisioning in this context, and such an observation also
[12] and VFC [17]. In particular, the former is devoted to the stimulates the fast development of VFC. For instance, smart ve-
development of vehicular social abilities such as social commu- hicles deploying services (e.g., related libraries and databases)
nication and low-cost infotainment service provisioning, which can respond and serve the offloading requests from IoT devices
are driven primarily by strong social instincts in people, even if (e.g., smartwatches and wearable health devices). Owing to
they become vehicle travelers on the road [16]. The latter con- the profit-driven factors, vehicles may display selfish behaviors,
centrates on computational service provisioning by leveraging e.g., to pursue more revenues or fewer costs at the expense of
the computing power of vehicles. delivering poor-quality computing services. Such irresponsi-
Among all the have-to-be-addressed issues in SIoV, trust- ble service delivery from selfish vehicles not only degrades the
worthiness is regarded as the most urgent one, because wire- Quality of Service (QoS) and Quality of Experience (QoE), but
less links for information dissemination and multimedia content also exerts a negative influence on unselfish vehicles delivering
sharing are established among unacquainted vehicles/drivers in high-quality services as consistently claimed.
vehicular social networks. Many hostile behaviors may exist, Unfortunately, current works seldom consider how to pre-
vent selfish vehicles from delivering low-quality services in VFC,
∗ Corresponding although there is extensive literature that applies blockchain-
author
Email address: whming@tju.edu.cn (Huaming Wu) based technologies to the security, privacy and trust issues that

Preprint submitted to Elsevier March 19, 2022


arise in VFC [1, 10, 22, 9]. Despite the merits of blockchain- such that different types of tasks can be allocated to the most ap-
based technologies, they do not perfectly suit the scenario of propriate vehicles for execution based on the reputation values
computation outsourcing and service provisioning in VFC, be- of the vehicles. Engoulou et al. [4] analyzed and summarized
cause the offloading requests from IoT devices usually have some locally perceived factors that can affect the behaviors of
strict delay requirements. To tackle the above issue, we put for- vehicles. Such parameters and factors usually include speed,
ward a lightweight reputation-based mechanism to prevent self- acceleration, transmission range, direction, frequency of a DoS
ish vehicles from delivering low-quality services in VFC. Par- attack, and so on. Then, they strive to construct a decentralized
ticularly, the contributions of the paper are threefold, as given reputation framework based on these parameters with the aim
below: to identify malicious vehicles and prevent them from getting
access to the internet of vehicles (IoV) network. A trust game
• We propose a reputation-based service provisioning scheme was proposed in [7], wherein investors, trustworthy trustees,
in VFC, aiming to prevent fog vehicles from delivering and untrustworthy trustees compete for assets. The assets are
low-quality computing services. The defined reputation owned and supervised by a third party. The third party has been
has considered multiple impressions which come from authorized to modify the reputation value of each participant.
both the IoT devices sending the requests and the local Indeed, there are malicious vehicles in IoV which try to un-
server that allocates the service requests. dermine the IoV network. For instance, some vehicular nodes
• A reputation management scheme with the decentralized will silently drop messages or packets. Such passive response
reputation updating and global reputation synchroniza- to the information forwarding is also called a black-hole attack.
tion is put forward, which tries to prevent the fog vehi- Despite solutions applied to handling this black-hole attack,
cles from tampering with their own reputation values to most of them are either centralized or dependent upon other
mislead the service requestors. The reputation is updated nodes’ opinions. Thus, Nabais et al. [13] put forward a decen-
based on multiple factors to ensure the fairness and ob- tralized reputation framework in the hope to detect and punish
jectivity in the paper. vehicular nodes with black-hole behaviors in the IoV network.
In addition to the black-hole attack in IoV and VANETs,
• We try to maximize the accumulated reputation of all the there are also other malicious behaviors, e.g., vehicular nodes
serving fog vehicles in the optimization period. Owing can transmit and forward useless and even wrong traffic infor-
to the feature of the sequential arrival of service requests, mation, so as to let other nodes make wrong decisions on route
it is difficult to optimally solve it in an off-line way. We planning. To tackle this issue, a reputation-based algorithm is
put forward an online approach to serve the service re- put forward in [8] to guide reliable route planning in IoV. The
quest sequentially. The simulation evaluation shows the proposed algorithm can detect suspicious information.
advantages compared to other existing approaches. Service caching has gained extensive attention recently for
its advantages in improving the QoS of requested computing
The rest of this paper is arranged as follows. The literature services hosted at vehicles and also QoE of service requestors,
review is conducted in Section 2. We give some preliminaries by caching related source codes and data beforehand at the edge
about the hierarchical end-fog-cloud system architecture where server. However, it requires incentives to motivate the first re-
the reputation-based service provisioning strategy is applied in questor offloading the tasks, since as the first one, the requestor
Section 3. The system model is introduced in Section 4 and has to offload the task and pay for the task execution. To tackle
the optimization problem is formulated in Section 5. Extensive this issue, an SDN-based cache-enabled VEC framework was
simulation is conducted in Section 6, followed by the conclu- proposed in [24]. In particular, they evaluated the contributions
sion in Section 7. of each vehicular node by its reputation value. In the mean-
while, they leveraged Stackelberg game to model the incentive
2. Related Works mechanism and proved the existence and uniqueness of Stack-
elberg equilibrium for the proposed game.
Reputation has been extensively studied in a wide range of Reputation-based mechanisms are usually important for se-
fields [6, 11, 19, 20], including computer science, sociology, curing communications in IoV networks. However, security
economics, and psychology. The study has already yielded ex- and efficiency can seldom be achieved at the same time. There-
tremely useful and fruitful results, and thus it is pretty difficult fore, Su et al. [15] proposed a centralized reputation manage-
to survey all the representative works from various fields [14], ment framework to identify malicious vehicles in IoV networks.
owing to the limitation of space. Accordingly, we only pay at- They have made a bold step in exploring the feasibility of this
tention to the recent works related to our reputation-based ser- framework as well as the potential threats to it. Simulation re-
vice provisioning in this paper. sults have shown that their scheme can take effect more quickly
Fog-enabled vehicles, which are empowered with comput- and is better than current trust management schemes.
ing capabilities, can shoulder more responsibilities in Vehicular In spite of the explosive growth in the number of vehicles
Ad Hoc Networks (VANETs), e.g., task calculation, event eval- that can participate in Vehicular Crowd-Sensing (VCS), includ-
uation and information forwarding. Atwa et al. [2] leveraged ing data analysis, information forwarding, and task calculation,
fog nodes to collect the trust evaluations from vehicles, and not all vehicles on the roads are willing to contribute to VCS
proposed a notion of Task-based Experience Reputation (TER), systems. In view of this, Yu et al. [23] put forward a reputation-
2
based incentive approach in a VCS system in which both the

Cloud Layer
utility of the cloud center and the participants are considered.
In particular, they design a reputation-based reverse combina-
tion auction incentive method. For instance, the reputation of
each participant is incorporated into the incentive approach to
avoid maliciously raising bidding prices. Offloading Feadback
In VANETs, content request and delivery have become the
norm, as the rapid development of smart vehicles. Zhu et al. [25]
categorized the entities in VANETs into Parked Vehicles (PVs), RSU

Fog Layer
Road Side Unit (RSU) and Moving Vehicles (MVs), respec-
tively. RSU is responsible for delivering the content requested
by MVs and PVs are leveraged for assisting RSU by storing Fog Server Fog Server
the content in advance. Owing to the selfishness of PVs, a
reputation-based scheme is used for identifying malicious PVs.
Meanwhile, a two-layer auction game is utilized to model the
Fog Node Fog Node
cooperation among PVs, MVs, and RSUs. This approach can
maximize the utility of RSUs as well as the throughput of con- Offloading Feadback
tent transmission to a great extent. Nevertheless, it needs to take

End Layer
a relatively long time to achieve mutually satisfactory results
and it also does not consider the privacy of vehicles. Therefore,
it is not suitable for our scenario in this paper.
The above literature does not consider how to evaluate fog
vehicles when they are contributing the computational resources Figure 1: A hierarchical end-fog-cloud system architecture
for serving the service requests. The majority of vehicles as-
sume that the services can be delivered as claimed. However,
malicious vehicles can deliver low-quality services for pursu- ment, and thus perfectly suits the time-critical service requests
ing their own profits. To the best of our knowledge, this is the that the cloud layer does not suit.
first effort to concentrate on computing service provisioning, In our system model, the two layers assume more respon-
considering the possibility of potentially malicious fog nodes sibilities, e.g., to manage the reputation scheme proposed in
delivering low-quality services in VFC. this paper. Computing services can be provisioned in a de-
centralized and centralized way, respectively. For the former,
the offloading links can be directly established after initial bea-
3. Preliminaries con exchanging between IoT devices and fog vehicles. How-
ever, this way cannot prevent selfish vehicles from delivering
A hierarchical end-fog-cloud system model is presented in
poor-quality services, and they can even tamper with their own
Fig. 1. The end layer mainly consists of size-limited and com-
reputation values to attract nearby IoT devices. On the other
puting capacity-restricted IoT devices such as smartwatches,
hand, the centralized service provisioning in this paper means
smart bracelets and wearable health devices. A great deal of
that fog vehicles only accept the service requests designated by
data is gathered and plenty of tasks from the IoT devices are
RSU covering them. This type of service provisioning may take
formed. When the IoT devices need to perform these tasks,
time to determine which vehicles are suitable for the requests,
they have to request the corresponding services from the fog
thus yielding relatively long response latency. Nevertheless, the
layer. The fog layer, as the intermediate layer between the
advantage is that the service execution at fog vehicles can be su-
cloud layer and the end layer, consists of two entities. One is
pervised by RSUs. Thus, it is difficult for fog vehicles to tamper
the road-side units (RSU) deployed with the fog servers (FS).
with their reputation values.
The other is the vehicles with idle computational resources and
Combining the merits of the two ways for service provi-
willing to contribute them in the form of service provisioning.
sioning, we put forward a reputation-based service provisioning
We thus call them fog vehicles or fog nodes. The fog vehicles
in VFC, aiming to prevent selfish fog vehicles from delivering
can directly respond to the service requests from the IoT de-
low-quality services in this architecture. Particularly, the repu-
vices. Meanwhile, they can also mitigate the pressure of the fog
tation for each fog vehicle cannot be manipulated deliberately
server when the latter is overloaded. The cloud layer consists
by themselves under the supervision of the RSUs. Each time a
of a remote cloud center residing in the core/backbone network.
fog vehicle finishes serving the service request, it will obtain a
Usually, the fog layer and cloud layer work cooperatively to
score from RSU to assess its performance during service pro-
provide computational resources. For example, the advantage
visioning. Such a score has considered multiple factors such as
of the cloud layer is that the powerful computing capabilities
the impressions from IoT devices and RSU, respectively, which
there can support even unlimited resource requests. However,
will be elaborated later. Then the score is integrated into the
it comes at the expense of a relatively long response delay. On
reputation of the fog vehicle. The reputation of the fog vehicle
the other hand, the fog layer can satisfy the strict delay require-
is updated by the covering RSU every time it serves the service

3
Smart IoT Device Fog Vehicle RSU Cloud Center

Register Unique Addresses of Fog Vehicle

Register Unique Addresses of Device


Get Access to Area
Download Reputation Information

Download Reputation
Broadcast Service Request
Respond to Request Make Allocation Decision
Send Beacon Packet
Supervise execution
Execute Service
Feedback

Leave Area
Update Deposit Reputation
Reputation

Figure 2: Sequence of interactions to display reputation management and service execution in end-fog-cloud architecture.

request. Generally, the fog vehicle delivering poor-quality com- center for each fog vehicle that gets access to its serving
puting service will be punished and one delivering high-quality area. The reputation of all the fog vehicles is maintained
computing service will be rewarded. by the local server. The local server will decide which
Note that one RSU together with the deployed fog server fog vehicle to respond to the offloading request when the
can act as a local server and manage the reputation for its cov- service request from IoT device arrives.
ering fog vehicles. We assume that two neighboring RSUs have
no overlaps, such that a fog vehicle can only be covered by at • IoT device sends the related data to the fog vehicle and
most one RSU at the same time. Owing to the high mobility waits for the execution. Meanwhile, the fog vehicle exe-
of vehicles, they may enter or leave the area one RSU serves. cutes the service upon arrival of the service request.
Thus, when one fog vehicle leaves the area, RSU stops updating • When the fog vehicle leaves the area, the local server
its reputation and sends the final value of reputation back to the writes back its reputation value immediately to the cloud
cloud center for global reputation synchronization. On the other center for global synchronization.
hand, when a fog vehicle gets access into the area, the serving
RSU will retrieve the reputation of the vehicle from the cloud The above decentralized reputation management and ser-
center and dynamically update it according to its performance. vice provisioning are feasible based on the following assump-
Specifically, Fig. 2 shows the sequence of interactions for rep- tions. First, the reputation stored in the cloud center cannot be
utation management and reputation-based service provisioning forged, which is possible since various lightweight encryption
in the end-fog-cloud architecture. The presented interactions techniques can be applied. Second, the local server (i.e., RSU
among the four entities can be sketched out as follows: with the deployed fog server) is trustworthy, which is also pos-
sible since they are usually deployed by the local government
• Each fog vehicle and IoT device register to the cloud cen-
without selfish interest driving. Third, the fog vehicles are will-
ter with unique identifications (ID) such as Ethernet ad-
ing to accept the supervisor of the local server, which means
dresses. The fog vehicle is assigned with an initial repu-
their information such as speed, destination, waiting queue, and
tation value after registration.
the amount of computational resources are known to the local
• Local server downloads the reputation value from the cloud server.
4
One pending issue during the above interaction needs to where r(t) is the transmission rate for the service-input data in
be addressed, i.e., how to schedule the service requests for the time slot t, given below:
fog vehicles to guarantee that 1) the service requests are served
Pdv (t)Hdv (t)
without violating the constraints such as the energy consump- r(t) = Bdv (t) log2 (1 + ), (2)
tion; 2) The fog vehicles are encouraged to deliver high-quality δ2 (t)
services, e.g., in terms of response latency, reliability or success where Bdv , Hdv (t) and Pdv (t) are the wireless channel band-
rate. We will expatiate upon it in what follows. width, the channel gain between the device and fog vehicle,
and the transmission power from the device, respectively. δ2 (t)
4. System Model is the noise power.

The considered model in this paper consists of m fog ve- 4.1.2. Calculation Delay
hicles and one local server. The optimization period T is di- The calculation delay dclt (t) for the requested service in time
vided into T discrete time slots, indexed by T = {0, · · · , T − 1}, slot t denotes the time taken for the fog vehicle to accomplish
and each slot has a duration ϖ. ϖ is small enough so that the calculation of the service. This delay includes the queue-
there is only one service request from IoT devices arriving at ing delay and the execution delay. we denote the two parts by
the local server within ϖ. Denote the service request in time dq (t) and de (t), respectively. To simplify the analysis, we as-
slot t by S(t) = (I(t), U(t), L(t)), where I(t) denotes the size sume that the arrival of service requests at each fog vehicle in
of service-input data (e.g., the related processing codes) to be time slot t follows a Poisson process with the arrival rate λi (t),
transmitted over the wireless channel, U(t) is the number of i ∈ {0, · · · , m − 1}. λi (t) can be easily estimated based on the
CPU cycles needed to accomplish the service, and L(t) is the historical statistics. The service rate is fi (t)/U(t), where fi (t) is
expected response delay from the perspective of the IoT de- the processing frequency of fog vehicle Vi in time slot t. Based
vice. If the real response delay is not longer than L(t), then on the M/M/1 queueing model, the average queuing delay in
the IoT device sending S(t) is satisfied. Otherwise, the QoE the waiting queue can be expressed as:
begins to decline. Assume that the fog vehicles can provide
computing services under the supervision of the local server, λi (t)U 2 (t)
dq (t) = . (3)
indexed by V = {V0 , · · · , Vm−1 }. Each Vi can be represented fi (t)( fi (t) − λi (t)U(t))
by a vector (Pi , fi,min , fi,max ), where Pi is its global reputation
value which can be downloaded from the cloud enter or the The execution delay de (t) is given as:
local server, fi,min and fi,max are the minimal and maximal pro- U(t)
cessing frequencies of Vi , respectively. Usually, the processing de (t) = . (4)
fi (t)
frequency is an important factor to indicate the amount of com-
putational resources leveraged for serving the service request. Thus, the calculation delay dclt (t) is:
For instance, a larger processing frequency means more com-
putational resources to be used for the service request, as well λi (t)U 2 (t) U(t)
dclt (t) = + . (5)
as more costs such as energy consumption. As a result, self- fi (t)( fi (t) − λi (t)U(t)) fi (t)
ish fog vehicles pursue profit maximization by reducing costs,
Meanwhile, the energy consumption ei (t) for accomplishing the
thus delivering low-quality services, e.g., in terms of response
service in time slot t at the fog node Vi is expressed as:
latency.
ei (t) = ϑςU(t) fi2 (t), (6)
4.1. Delay Model
From the perspective of IoT devices, their QoE for the re- where ϑ is the effectively switched capacitance coefficient, and
quested services mainly depends on one metric, i.e., the re- ς is the number of cycles needed to perform one service-input
sponse delay. The devices are satisfied, if the execution result bit at Vi . From this equation, it is obviously observed that the
is returned before the expected response delay. Actually, the larger the processing frequency, the more the energy consump-
shorter the response delay, the more they are satisfied. In this tion. In other words, more computational resources to be used
paper, the response delay includes three parts in this paper and bring about more costs for the fog vehicles and fewer profits.
they are the transmission delay, the calculation delay and the The returning delay denotes the time taken to send back
returning delay. the execution result to the IoT device. Similar to other works
[3, 18], we also assume that the size of the execution result is
4.1.1. Transmission Delay much smaller than that of the service-input data. Hence, we
The transmission delay dtrs (t) for the requested service in have omitted the returning delay of the execution result. The
time slot t denotes the time taken to transmit the service-input response delay drsp (t) for the service request in time slot t is:
data from the IoT device to the fog vehicle, and it can be given
as: drsp (t) = dtrs (t) + dclt (t). (7)
I(t)
dtrs (t) = , (1) To depict the quality of service that one fog vehicle delivers,
r(t)
we give the following definitions:
5
Definition 1. Utility Function. A utility function is attached Definition 4. Impression. The impression I MPi (t), which de-
to a fog vehicle to represent its value to a service requestor. notes the opinion of the IoT device that sends S(t) towards the
The corresponding utility value of fog vehicle Vi that serves the fog vehicle Vi that undertakes S(t), is equal to the utility differ-
service request in time slot t is defined as a measurable gain of ence, given as:
accomplishing the service, given as: I MPi (t) = △Fi (t). (11)
Given the above definition, several interesting observations



1 if drsp (t) ≤ L(t)

 Fi,max −δ(drsp (t)−L(t)) can be made as follows. First, I MPi (t) is a real number ranging
Fi (t) =  if L(t) < drsp (t) < L(t) + Fi,max (t)/δ


 Fi,max from -1 to 1. Second, I MPi (t) will increase if the quality of
if drsp (t) ≥ L(t) + Fi,max (t)/δ

0

delivered service becomes higher, and I MPi (t) will decrease if
(8) the quality of delivered service becomes lower. Third, I MPi (t)
is 0 if the current utility value equals the average one.
Note that Fi,max (t) > 0, and δ > 0. In particular, fog vehicle Vi
will obtain a maximum utility if the service request is accom- Definition 5. Service Offloading Decision. Service offloading
plished within its expectation L(t). Otherwise, the utility will in this paper refers to the allocation of service requests in VFC
decay linearly with a slope of δ until it equals to 0, as the re- by the local server. Let φti be a binary variable to indicate
sponse latency increases. In other words, the quality of service whether the service request in time slot t is allocated to fog
that the fog vehicle delivers declines as the value of its utility vehicle Vi , i ∈ {0, · · · , m − 1}. φti = 1, if the request is dis-
function decreases. Generally, the larger the utility value, the tributed to Vi ; and 0, otherwise. Define φi = {φ0i , · · · , φTi −1 } as
higher the quality of the delivered service. the offloading decisions of Vi for all the service requests along
the timeline T . Define φ = {φ0 , · · · , φm−1 } as the offloading
Definition 2. Expected Utility. The expected utility Ei (t) is de-
decisions of all the vehicles for the service requests along the
fined as the average utility value of the fog vehicle Vi for ac-
timeline T .
complishing the service requests coming from the last K time
slots, given as: It shall be noted that a fog vehicle may enter or leave the
t−1
1 X serving area of the local server in the middle of the optimization
Ei (t) = Fi ( j). (9)
K j=t−K period, owing to its high mobility. For instance, one fog node
V j enters the area after the time slot k. In this case, for the sake
Definition 3. Utility Difference. The utility difference of the of easy expression and discussion, we assume that the binary
fog vehicle Vi , denoted by △Fi (t), is defined as the deviation of variables of this vehicle for these nonexistent time slots still
Fi (t) from Ei (t), given as: exist, i.e., {φ0j , · · · , φkj }, and just let them equal zero instead.

△ Fi (t) = Fi (t) − Ei (t). (10) Definition 6. Single Reputation. The single reputation of a fog
vehicle V j , denoted by R j (t), is an individual impression of the
current IoT device sending the service request in time slot t:

4.2. Reputation Model R j (t) = φtj · I MP j (t). (12)


Reputation-based strategies have played an important role
in making service providers constantly provide high-quality ser- Based on the above definition, it is obvious that for an ar-
vices. For example, the reputation usually represents the ac- bitrary time slot, there is only one nonzero value of the single
countability for maintaining their service levels and can thus reputation, since we have assumed that there is only one ser-
affect the offloading decisions to a great extent in VFC. A typ- vice request within each time slot. Particularly, R j (t) ranges
cial description about reputation is that it represents an opinion from -1 to 1. The case R j (t) < 0 indicates that the current ser-
that people have towards someone or something based on the vice provisioning is worse and deviates a lot from the expected
observed behaviors or displayed character. In this paper, we utility. Each time the fog node serves the service request, the
need to think about what the opinion about a fog vehicle is like. single reputation should be updated. In addition, we have the
Generally speaking, a computing service is usually provisioned following definition.
on demand by a fog vehicle in VFC, and thus the opinion about Definition 7. Current Reputation. The current reputation of a
the fog vehicle from the outside is typically built upon its per- fog vehicle V j in time slot t, denoted by P j (t), is an overall repu-
formance during service provisioning. Particularly, if a service tation that comprehensively evaluates the performance when V j
request is served better than what it has been expected (e.g., in provision computing services so far, and it is iteratively defined
terms of response latency), it will bring more value or utility to as:
the requestors and even irrelevant ones who will in turn have a P j (t) = P j (t − 1) + βt · R j (t), (13)
better opinion about the fog vehicle. Therefore, we can actually
use utility difference to indicate the opinion about the fog vehi- where βt (0 < βt < 1) is the weight attached to the impression
cle. Then, we give the following definitions in what follows. of the IoT devices sending the service request in time slot t on
the fog vehicle V j .

6
Considering the fact that one fog node in VFC may serve tion back to the cloud center based on the following two cases.
the service requests multiple times, and at the same time, one One is that fog vehicle V j leaves the serving area of the local
IoT device may send service requests multiple times in the op- server in the middle of the optimization period. In this case,
timization period, the above weights βt (t ∈ {0, · · · , T − 1}) can the local server writes back the updated reputation value im-
be leveraged for multiple purposes. First, if one service request mediately to the cloud center for global synchronization, such
allocated to V j is not urgent enough in terms of response la- that another local server can download it when V j gets access
tency, the priority level of the service request is supposed to be to its serving area. The other case is that the optimization pe-
relatively low; on the other hand, if one service request allo- riod is over. In this case, the local server also writes back the
cated to V j is very urgent from the perspective of IoT device, updated reputation values immediately to the cloud center for
then the value earned by serving it is supposed to be more than global synchronization. For those vehicles which still want to
serving other requests which are not as urgent as it. The lo- stay and make a contribution, they still need to download their
cal server, depending upon different situations, can achieve the own reputation values again either from the local server or the
above purpose by adjusting the corresponding weight βt . Sec- cloud center.
ond, if the IoT device sending service request S(t) is malicious,
the local server can reduce the value earned by serving S(t),
5. Problem Formulation
e.g., by means of lowering the weight, although the identifica-
tion of malicious IoT devices is beyond the scope of this paper. The main goal of the reputation-based service provisioning
Last but not least, from the perspective of fog vehicles, they in VFC is to prevent fog vehicles from delivering low-quality
may show different preferences towards the service requests in computing services, when the vehicles are serving the requests.
the optimization period, and we can also adjust the weights for In the meanwhile, the constraints should be considered such
this purpose. It shall be noted that all the impressions can hy- as the energy consumption and the processing frequencies. In-
pothetically have the same weight, since it is not our focus in tuitively, the fog vehicle with a large value of current reputa-
this paper. tion can, as always, deliver high-quality computing services.
Eq. (13) can also be regarded as the update of the reputa- Therefore, we strive to maximize the reputation value of each
tion value. Usually, there are two ways to update the reputa- fog vehicle along the time slots. Specifically, the optimization
tion values of fog vehicles. One is that the reputation values of problem in this paper can be formulated as follows:
all the fog vehicles remain unchanged during the optimization
period and are updated only at the end of the optimization pe- X T −1
m−1 X

riod. Such an update avoids frequent interactions between the (Q) max Pi (t)
φ
local server and fog vehicles, thus reducing the great pressure i=0 t=0

on the front-haul links between them. However, this way cannot


prevent selfish vehicles from delivering low-quality computing m−1
X
services. In this paper, we tend to distribute the service requests s.t. φti ≤ 1 ∀t ∈ {0, · · · , T − 1} (14)
to the fog vehicles based on their reputation values which will i=0
be elaborated later. Assume that one fog vehicle V j which has
the highest reputation value gets access to the serving area of
the local server, and V j wants to pursue more profits in the in- ei (t) ≤ ei,max ∀i ∈ {0, · · · , m − 1} ∀t ∈ {0, · · · , T − 1} (15)
coming optimization period by delivering low-quality services.
Since the service requests are distributed based on their repu- fi,min ≤ fi (t) ≤ fi,max ∀i ∈ {0, · · · , m − 1}∀t ∈ {0, · · · , T − 1}
tations and the reputation values remain unchanged during the (16)
timeline, V j with the highest reputation value can easily be as-
signed with more requests than other fog vehicles. Unfortu-
nately, there are no efficient countermeasures to cope with this φti ∈ {0, 1} ∀i ∈ {0, · · · , m − 1} ∀t ∈ {0, · · · , T − 1} (17)
unfair requests distribution, let alone the measures adopted to
prevent this selfish V j . where the constraint (14) guarantees that a service request from
The other way is to update the reputation values for all the any time slot should be served by at most one fog vehicle. An
fog vehicles every time the service request S(t) is served. Al- extreme case is that none of the fog vehicles are qualified for the
though this way undoubtedly incurs frequent interactions be- service request, e.g., lack of enough computational resources.
tween the local server and vehicle fogs, it can prevent the fog In such a case, the local server will undertake the computation
vehicle say V j from delivering low-quality services. For in- of the service. Although the fog vehicles are encouraged to de-
stance, R j (t) will gradually become smaller with the increasing liver high-quality services, we allow for the case that the fog
number of time slots, since R j (t) has been nonpositive along the vehicles reserve the computational resources and energy sup-
time slots. The decreasing reputation value will hinder R j (t) ply for an emergency. We can achieve this goal by using the
from obtaining more service requests. Based on this analysis, constraints (16) and (17).
we adopt the second way to update the reputation values for all Exhaustive search over the potential solution space is pro-
the fog vehicles in the optimization period. hibitively costly, since it takes the exponential time to determine
In the meanwhile, the local server needs to write the reputa- the best allocation scheme for the service requests in the entire
7
optimization period. Even worse, to optimally solve problem
Q requires complete information including future information
about service requests, which can be only realized in an off-line
way. However, it does not suit our scenario in this paper, since
the service requests arrive sequentially, and they are supposed
to be handled right upon its arrival, instead of being handled in
batches. Meanwhile, it is pretty hard to predict service requests Algorithm 1: Procedure for Fog Node Determination
in the future time slots, which indeed necessitates an online ap- and Resource Distribution (PDD)
proach to solve the optimization problem. Input: T , K, V, ϑ, ς, St , m, δ, B dv , P dv , H dv , β
We notice that the above problem Q is equal to the following Output: The reputation sum of all the fog nodes
problem K after a straightforward transformation: 1 Gather status information from fog vehicles;
2 Download reputation values from cloud center;
T −1 X
m−1
3 Sort fog nodes in descending order of reputation
X
(K) max Pi (t). (18)
φ values;
t=0 i=0
4 Initialize a list H to store the already sorted fog nodes;
Note that we do not list the constraints any longer since they 5 S um = 0;
are the same as the problem Q. This problem indicates that we 6 for each time slot t in T do
can optimize the reputation values of all the fog vehicles within 7 Get the fog vehicle Vi from the list H in sequence;
each time slot at the beginning, and then we maximize these 8 Calculate fi∗ (t) using Eq. (20);
values along the time slots. On one hand, we have transformed 9 if fi∗ (t) > fi,max then
this optimization problem spanning the entire optimization pe- // Vi is not qualified
riod into a series of per-slot deterministic optimization subprob- 10 Repeat steps 6-7;
lems, such that the service request can be allocated in a slot-by- 11 else
slot way. On the other hand, this problem can be solved by the 12 Calculate e∗i (t) based on Eq. (6);
greedy approach. The locally optimal solutions can constitute 13 if e∗i (t) > ei,max then
the globally optimal solution in this problem, which can be eas- // Vi is not qualified
ily proven by reductio. Furthermore, it seems easy to find the 14 Repeat steps 6-7;
optimal solution to the above problem with the time complexity 15 else
of O(T M). 16 Disseminate the beacon information to Vi ;
However, this problem becomes very complicated if we take 17 Designate Vi in response to S(t);
into account the selfishness of vehicles, since we do not know, 18 Supervise the process of serving the
a priori, whether the fog vehicle will deliver a high-quality ser- requests;
vice if the service request is distributed to it. Accordingly, there 19 Calculate and update its reputation value
is a great deal of uncertainty during service provisioning. To Pi ;
tackle this issue, we put forward a two-phase-based service re- 20 end
quest allocation scheme within each time, aiming to answer the 21 if V j leave area then
following two questions: 1) which fog vehicle is the most qual- 22 Update the reputation of V j , i.e., P j ;
ified for the service request among all the fog nodes; 2) How 23 Write P j back to the cloud center;
many computational resources are allocated to the service re-
24 end
quest for the chosen fog node?
25 end
5.1. Fog Node Selection 26 Record the service offloading decision on St ;
27 Form per-slot offloading decisions {φt0 , · · · , φtm−1 } ;
Our goal in this paper is to encourage fog vehicles to always 28 S = 0;
deliver high-quality computing services, so the determination 29 for each fog vehicle Vi in V do
of fog nodes should display the advantages of those vehicles 30 Calculate Pi (t) based on Eq. (13);
which deliver high-quality services as consistently claimed. There- 31 S + = Pi (t);
fore, we tend to designate the fog node with the highest rep-
32 end
utation value to respond to the service request. One may ar-
33 S um+ = S ;
gue that it may not be fair enough, since the service requests
34 end
arriving in sequence in the optimization period may be allo-
35 Return S um;
cated to the same fog node with the highest reputation value,
thus dampening the enthusiasm of other vehicles willing to con-
tribute computational resources. We should admit that such an
extreme case indeed exists. For instance, if one fog vehicle
has the highest reputation value and much more computational
resources than other fog nodes, this fog node may earn more
service requests.
8
However, the proposed reputation-based service provision- the dwelling time and even the reputation values, provided that
ing has taken into account the fairness issue to a great extent, these vehicles have obtained their reputation somehow. Then
based on the following reasons. First, the utility attached to the the local server downloads the reputation values of these vehi-
fog vehicle is updated each time the fog node finishes serving cles from the authorized cloud center. It shall be noted that, the
the service request. Meanwhile, the reputation based on the local server can check whether the two kinds of reputation val-
utility value is recorded per time slot. If a fog vehicle with high ues are equal, so as to tag those potentially selfish vehicles. For
original reputation value has been delivering low-quality com- instance, if the reputation value gathered from one vehicle (e.g.,
puting services in the past K time slots, its reputation will in- Vi ) is higher than that from the cloud center, the local server
creasingly decline. On the other hand, if a fog vehicle with low can consider Vi as a potentially selfish vehicle. The local server
original reputation value has been delivering high-quality com- sorts the vehicles in descending order of reputation values and
puting services in the past K time slots, its reputation will in- then stores them by a list H for subsequent operations.
creasingly rise. Second, the optimization period is short enough For the service request in each time slot t, the local server
so that the reputation values of the fog vehicles can be updated gets the first fog vehicle (e.g., V0 ) in H and checks whether
timely. In this context, each fog vehicle has an opportunity to it is qualified for the request by the following several valida-
respond to the service request. Last but not least, in response tions. First, the local server calculates the critical value of the
to the issue of all the service requests that are allocated to the processing frequency f0∗ (t) based on Eq. (19). If this critical
same fog node, we admit such an extreme case, but there is value is larger than the threshold of the processing frequency
not too much to worry about. Each service request has an ex- (i.e., f0,max ), we regard this vehicle as an unqualified fog node
pected response delay. If all the services are allocated to the for the request. Otherwise, given f0∗ (t), we calculate e∗0 (t) based
same fog node, the response latency will increase for some ser- on Eq. (6) to check whether the critical energy consumption
vice requests, owing to the increasing queueing delay and the exceeds the threshold of energy consumption (i.e., e0,max ). If
uneven computational resources distribution. Thus, the utility e∗0 (t) > e0,max , this fog vehicle is still considered to be an un-
value of the vehicle may decline due to the constraint violation qualified fog node. In this case, the local server will try another
(see Eq. (8)), which eventually leads to the decline of the repu- fog vehicle by getting the vehicle just behind V0 in H and re-
tation. As a result, the above situation will give other vehicles peat the above validations.
opportunities. The fog vehicle passing the validation process will be no-
ticed by the local server, e.g., by beacon packet dissemination
5.2. Computational Resources Distribution (line 15). This vehicle will serve the request by allocating the
When the fog vehicle that serves the service request is de- computational resources to it under the supervision of the lo-
termined, another issue comes naturally, i.e., how many compu- cal server. After completing the service request, its reputation
tational resources are supposed to be distributed to the service is updated and recorded at the local server. In the meanwhile,
request such that a good reputation can be maintained as always if one vehicle, say V j , leaves the serving area, the local server
but there are no more costs incurred by service provisioning will update the reputation and write it back to the cloud center.
such as the energy consumption. Actually, this procedure can be adopted to solve the problem
Note that the utility value of one fog node only depends K. In particular, the local server records the service offloading
upon its response delay and the utility value will not increase decision in each time slot φti (i ∈ {0, · · · , m − 1}) and calculate
anymore as long as the response delay is shorter than the ex- the sum of the reputation values of all the fog nodes within this
pected response delay. In other words, it is meaningless to time slot (lines 28-32). Then, the total reputation of all the fog
shorten the response delay after the real response delay reaches nodes in the entire optimization period can be obtained (line
the expected response delay. We can thus calculate the criti- 33).
cal value of the amount of computational resources when the
response delay is equal to the expected response delay. Com-
Table 1: Parameter Settings
bining Eq. (7) and Eq. (8), it can be inferred that this critical
value for the computational resources is: Parameter Value Parameter Value
r(t)U(t) T [100,300] m [20,30]
fi∗ (t) = λi (t)U(t) + , (19)
r(t)L(t) − I(t) K [1, 100] δ [1, 5]
fi,min [1000,1500] fi,max [2000,2500]
which indicates that the best result can be achieved when the
I(t) [1,50] U(t) [40, 70]
processing frequency of the fog vehicle equals fi∗ (t) and there
are no more energy consumption incurred for extra computa- L(t) [0,1] Pi [0,1]
tional resources distribution. Accordingly, the procedure for Fi,max [0,1] βt [0,1]
fog node determination and computing resource distribution is
shown in Alg. 1. Before the optimization period begins, the al-
gorithm PDD should conduct some initializations. For instance, 6. Simulation Evaluation
the local server needs to gather the information on the fog vehi-
cles dwelling on its serving area. Such information usually in- In this section, we validate the proposed reputation-based
cludes the amount of computational resources, the destination, service provisioning scheme via extensive simulation under dif-
9
ferent scenarios. based on the reputation values of fog vehicles. If selfish vehi-
cles deliver low-quality services, the reputation will decline as
6.1. Experimental Settings the number of time slots increases. Such punishment will hin-
For the main parameters involved in the simulation, we ini- der the fog vehicles from obtaining more service requests.
tialize them as follows. The number of fog vehicles varies from We investigate the influence of the slopes defined in Eq. (8)
20 to 30, and the number of time slots ranges from 100 to 300. upon the performance of proposed strategy. The simulation re-
Each vehicle is assigned with an initial reputation value ranging sults are shown in Fig. 3(b). Based on the definition of the util-
from 0 to 1. Specifically, these parameters are listed in Tab. 1. ity function for a fog vehicle, the larger the slope, the faster the
All the simulation is run on a notebook with a 1.8 GHz Intel(R) utility value declines. As a result, it is understandable that the
Core(TM) i5-8250U CPU, 8 GB of RAM, Microsoft Windows performance of the proposed strategy is better than others when
10 Operating System, Python 3.7. the corresponding slope is smaller than others, which can be
Our simulation includes two parts. On one hand, we will easily observed from the figure. Meanwhile, we can also find
validate the efficiency and effectiveness of our approach in terms that the accumulated reputation values fluctuate a lot. For in-
of the effects of the involved parameters upon the performance, stance, when the number of time slots increases from 55 to 62,
given different scenarios. Such parameters usually include the the accumulated values decrease sharply for all the four cases.
number of fog vehicles, the slope of the utility function and so Such a fluctuation has the same reason as shown in Fig. 3(a).
on. On the other hand, we will compare our approach with the The fog vehicles assigned with service requests will be pun-
following two approaches: ished if they deliver the poor-quality services along the time
slots.
• Task-based Experience Reputation (TER) [2]: This ap- In the next, we investigate the relationships between the
proach assigns different tasks with different weights to utility values and the reputation values of the fog vehicles. The
indicate their emergency as well as importance. The rep- results are shown in Fig. 3(c). Specifically, we have taken one
utation is calculated using a weighted mean of previous from thirty vehicles as the observation object. Several conclu-
reputation values. sions can be drawn from this figure. First, the reputation of one
fog vehicle goes up and down, depending on its performance
• Iterative Reputation Management (IRM) [15]: This ap- in each time slot. Second, a sharp rise or decline in the utility
proach iteratively manages the reputation for a vehicle,
values in the current time slot does not bring about a similar
which takes into consideration the accumulated reputa-
fluctuation in the reputation values in the current time slot. The
tion at each iteration by a constant ratio.
reason is that the definition for reputation is based on the utility
difference (see definition 3), which adopts the expected utility
6.2. Parameters Evaluation (i.e., the average utility value of the fog vehicle coming from
The first set of experiments is conducted to validate the ef- the last K time slots) to prevent a sudden rise or decline in the
ficiency and effectiveness of the proposed reputation-based ser- reputation value. This countermeasure can efficiently handle
vice approach. The simulation results are shown in Fig. 3. The the situation where a fog node continuously delivering poor-
influence of the number of vehicles upon the performance is quality computing services wants to rise its reputation rapidly
depicted in Fig. 3(a). It is obvious that the number of vehicles by delivering high-quality computing services several times.
affects the performance of PDD greatly in terms of the accu- We have conducted another set of experiments to validate
mulated reputation. Particularly, given the number of service the relationships between the reputations and the quality of de-
requests, the accumulated reputation values for all the fog vehi- livered computing services. The simulation results are shown
cles will become larger generally. For instance, when the num- in Fig. 3(d). In the simulation, we assume that one vehicle with
ber of fog vehicles is 30, the overall reputation values are much a good reputation will provide high-quality services along the
better than the two cases when the number of fog vehicles is 20 time slots with the probabilities of 30%, 60%, and 90%, re-
and 25. spectively. All the settings are the same except the probability
It is interesting that the performance of the case when the of provisioning high-quality computing services. Obviously,
number of fog vehicles is 20 is better than the case when the the higher the probability that the fog vehicle provisions high-
number of fog vehicles is 25 most of the time. It is mainly due quality services, the larger the reputation, and vice versa.
to the fact that all the data including the service requests and fog
vehicles in the simulation is generated randomly. Although the 6.3. Performance Comparison
service requests are the same, the fog vehicles are all different We first evaluate our approach compared to the approach
in the three cases. As a result, the above situation may occur proposed in [2]. Herein, we call the approach TER directly
in the simulation. On another hand, as far as one case (e.g.,
for the sake of easy discussion and reference. As mentioned at
m = 20, 25, or 30) is concerned, the reputation values may de-
the beginning, TER incorporates the emergency and importance
crease as the number of time slots increases. For instance, the
into the reputation of the tasks, e.g., by assigning them with dif-
reputation values decrease when the number of time slots is 20
ferent weights. The reputation is a weighted mean of previous
for the case with m = 20 and 25 for the case with m = 30. reputation values. Actually, we also consider the emergency
Recall that our purpose is to prevent the fog vehicles from de- and importance of the tasks in our reputation model by using
livering low-quality services by distributing the service requests

10

 
$FFXPXODWHG5HSXWDWLRQ9DOXHV

$FFXPXODWHG5HSXWDWLRQ9DOXHV




 


  3'' VORSH
3'' P 3'' VORSH
3'' P  3'' VORSH
 3'' P 3'' VORSH

                   
1XPEHURI7LPH6ORWV 1XPEHURI7LPH6ORWV

(a) The influence of the number of vehicles (b) The influence of slopes


 
7KH5HSXWDWLRQ9DOXHVDORQJ7LPH6ORWV
8WLOLW\9DOXHV
8WLOLW\9DOXHVDORQJ7LPH6ORWV

5HSXWDWLRQ9DOXHV 
$FFXPXODWHG5HSXWDWLRQ9DOXHV
  7.0

  6.5

  6.0


  20 25 30 35

  9HKLFOH 3
 9HKLFOH 3
  9HKLFOH 3
               
1XPEHURI7LPH6ORWV 1XPEHURI7LPH6ORWV

(c) The utility values versus the reputation values (d) Reputation versus the service provisioning

Figure 3: The validation of the influence of involved parameters upon the performance of the approach

the weights βt , (t ∈ {0, · · · , T − 1}). Furthermore, we adopt util- above, it can prevent selfish vehicles which continuously de-
ity difference-based impressions to define the reputation instead liver poor-quality computing services from rising their reputa-
of a simple weighted mean of previous reputation values. The tion rapidly by delivering high-quality computing services sev-
simulation results are shown in Fig. 4 and Fig. 5, respectively. eral times. On the other hand, it can also prevent some vehicles
with good reputations from lowering their reputation rapidly by
3'' delivering poor-quality computing services several times. In
 7(5 contrast, TER is unable to achieve such a purpose. Hence, our
approach is better than TER with regards to (w.r.t.) the achieved

reputation values.
 In addition, we have evaluated how they respectively func-
5HSXWDWLRQ

tion in preventing selfish vehicles from delivering low-quality



services. The results are shown in Fig. 5, where the y-coordinate
 represents the long-term average response delay. In this simu-

lation, we vary the number of time slots from 100 to 300, which
means that there are hundreds of service requests waiting to be
 handled. From the figure, we can observe that our approach
         
1XPEHURI7LPH6ORWV is much better than TER in terms of the long-term average
response delay. In other words, our reputation-based service
Figure 4: Performance comparison with TER w.r.t. reputation provisioning can better prevent selfish vehicles and encourage
them to deliver the claimed computing service so as to maintain
Fig. 4 indicates that our reputation values are generally higher a good reputation.
than TER along the time slots. The following reason can ac- In the next, we have conducted another set of experiments
count for this result. The definition for reputation in this paper to evaluate our approach compared to the approach proposed
is relatively smooth and steady compared to TER. As illustrated
11

 3'' 3''
7(5 ,50
 
/RQJWHUP$YHUDJH5HVSRQVH'HOD\

/RQJWHUP$YHUDJH5HVSRQVH'HOD\
 








 

                   
1XPEHURI7LPH6ORWV 1XPEHURI7LPH6ORWV

Figure 5: Performance comparison with TER w.r.t. the long-term average re- Figure 7: Performance comparison with IRM w.r.t. the long-term average re-
sponse delay sponse delay

in [15]. Similarly, we call the approach IRM directly for the IRM and PDD w.r.t. the reputation values. The two different
sake of easy discussion and reference. IRM iteratively updates ways to update the reputation make their reputation values re-
the reputation for a vehicle, which considers not only the accu- spectively fluctuate a lot. Furthermore, the reputation values of
mulated reputation but also the impression from other vehicles. TER sometimes are larger than those of PDD, and sometimes
To suit our scenario, we need to tailor the reputation update as aren’t. However, as far as the long-term average response de-
follows. lay is concerned, our approach is obviously better than IRM,
P j (t) = P j (t − 1) + R j (t)ρ j (t)x j (t), (20) which can be easily observed from Fig. 7. As the data on ser-
vice requests is generated randomly in each optimize period,
where ρ j (t) is the validated result of vehicle V j in time slot t,
the resulting reputation values often go up and down, which is
and x j (t) denotes the trustworthiness of the local server towards
acceptable in our opinion.
the fog vehicle V j and the trustworthiness can be regarded as a
probability ranging from 0 to 1. ρ j (t) is a binary variable. As
mentioned earlier, the local server will check the two reputation  3''
7(5
values of which one is downloaded from the cloud center, and
1XPEHURI7LPHVIRU6HUYLQJ5HTXHVWV

 ,50
the other comes from the vehicle during the beacon packet dis-
semination. ρ j (t) = 1, if the two values equal; and 0, otherwise. 


3''
,50 



5HSXWDWLRQ


      
1XPEHURI7LPH6ORWV


Figure 8: Performance comparison with selfish vehicle delivering poor-quality


 services

We have conducted the last set of experiments to evaluate


          the performance of our approach in comparison with TER and
1XPEHURI7LPH6ORWV
IRM. The goal is to check their performance in preventing fog
Figure 6: Performance comparison with IRM w.r.t. reputation vehicles from delivering the low-quality services. In particular,
we still choose one from thirty fog vehicles as the observation
The simulation results are shown in Fig. 6 and Fig. 7, re- object. Along the time slots, the probability that this fog vehi-
spectively. The evaluation is similar to the evaluation of TER. cle delivers low-quality services increasingly rises in a random
Note that we have compared our approach with TER and IRM, way. Intuitively, the higher the probability that the fog vehicle
separately in the simulation, because during the comparison be- delivers low-quality services, the lower the reputation values.
tween TER and PDD, we have assigned different weights to However, due to the difference in reputation updates, the repu-
the impression of the IoT devices sending the service request tation values cannot be compared directly. We then evaluate the
in each time slot, and for the comparison between IRM and number of times that this fog vehicle serves the service requests
PDD, all the weights are assumed to be the same. From Fig. 6, in each optimization period. Generally, the selfish vehicle will
we can observe that there are no obvious relationships between obtain gradually reduced service requests as time goes by. The
12
corresponding simulation results are shown in Fig. 8, where the [7] Hu, Z., Li, X., Wang, J., Xia, C., Wang, Z., & Perc, M. (2021). Adaptive
y-coordinate represents the number of times for the fog vehi- reputation promotes trust in social networks. IEEE Trans. Netw. Sci. Eng.,
8, 3087–3098.
cle serving the service requests. The results have validated our [8] Javed, M. A., & Zeadally, S. (2018). Repguide: Reputation-based route
expectations. Moreover, our approach can achieve better per- guidance using internet of vehicles. IEEE Commun. Stand. Mag., 2, 81–
formance than the other two approaches in terms of the decline. 87.
[9] Li, M., Weng, J., Yang, A., Liu, J., & Lin, X. (2019). Toward blockchain-
based fair and anonymous ad dissemination in vehicular networks. IEEE
7. Conclusion Trans. Veh. Technol., 68, 11248–11259.
[10] Liao, H., Mu, Y., Zhou, Z., Sun, M., Wang, Z., & Pan, C. (2021).
Trustworthiness has attracted extensive attention in SIoV, Blockchain and learning-based secure and intelligent task offloading for
vehicular fog computing. IEEE Trans. Intell. Transp. Syst., 22, 4051–
and many reputation-based approaches are applied to solving 4063.
trustworthiness-related issues. Nevertheless, existing works sel- [11] Liu, A., Li, Q., Huang, L., Wen, S., Tang, C., & Xiao, M. (2010).
dom adopt reputation-based mechanisms to handle the trust- Reputation-driven recommendation of services with uncertain qos. In
5th IEEE Asia-Pacific Services Computing Conference, APSCC 2010, 6-
worthiness related issues that arise in VFC. The fog vehicles in 10 December 2010, Hangzhou, China, Proceedings (pp. 115–122). IEEE
VFC may pursue improper revenues by delivering poor-quality Computer Society.
computing services. Unfortunately, most of the existing works [12] Luan, T. H., Lu, R., Shen, X., & Bai, F. (2015). Social on the road:
just assume that vehicles are unselfish and deliver their com- enabling secure and efficient social networking on highways. IEEE Wirel.
Commun., 22, 44–51.
puting services as claimed. Such an assumption does not al- [13] Nabais, C., Pereira, P. R., & Magaia, N. (2021). Birep: A reputation
ways hold in reality. Considering the selfishness of vehicles, scheme to mitigate the effects of black-hole nodes in delay-tolerant inter-
a reputation-based service provisioning scheme is proposed to net of vehicles. Sensors, 21, 835.
prevent fog vehicles from delivering low-quality computing ser- [14] de Siqueira Braga, D., Niemann, M., Hellingrath, B., & de Lima Neto,
F. B. (2019). Survey on computational trust and reputation models. ACM
vices. In the meanwhile, a reputation management scheme is Comput. Surv., 51, 101:1–101:40.
adopted, which consists of the decentralized reputation updat- [15] Su, S., Tian, Z., Liang, S., Li, S., Du, S., & Guizani, N. (2020). A rep-
ing and global reputation synchronization in VFC. We have utation management scheme for efficient malicious vehicle identification
formulated the optimization problem to maximize the accumu- over 5g networks. IEEE Wirel. Commun., 27, 46–52.
[16] Tang, C., Wei, X., Liu, C., Jiang, H., Wu, H., & Li, Q. (2020). Uav-
lated reputation of all the serving fog nodes in the optimiza- enabled social internet of vehicles: Roles, security issues and use cases.
tion period. We have also carried out extensive simulation and In Y. Xiang, Z. Liu, & J. Li (Eds.), Security and Privacy in Social Net-
the results reveal that our approach outstands other existing ap- works and Big Data - 6th International Symposium, SocialSec 2020, Tian-
proaches. jin, China, September 26-27, 2020, Proceedings (pp. 153–163). Springer
volume 1298 of Communications in Computer and Information Science.
[17] Tang, C., Wei, X., Zhu, C., Wang, Y., & Jia, W. (2020). Mobile vehicles
as fog nodes for latency optimization in smart cities. IEEE Trans. Veh.
Acknowledgment Technol., 69, 9364–9375.
[18] Tang, C., Zhu, C., Wu, H., Li, Q., & Rodrigues, J. J. P. C. (2021). Towards
This work was supported by the Fundamental Research Funds response time minimization considering energy consumption in caching
for the Central Universities under Grant 2019XKQYMS46 and assisted vehicular edge computing. IEEE Internet of Things Journal, (pp.
the National Natural Science Foundation of China under Grant 1–1). doi:10.1109/JIOT.2021.3108902.
[19] Wei, X., Chen, M., Tang, C., Bai, H., Zhang, G., & Wang, Z. (2013).
Number 62071327. irep: indirect reciprocity reputation based efficient content delivery in bt-
like systems. Telecommun. Syst., 54, 47–60.
[20] Wen, S., Li, Q., Yue, L., Liu, A., Tang, C., & Zhong, F. (2012). CRP:
References context-based reputation propagation in services composition. Serv. Ori-
ented Comput. Appl., 6, 231–248.
[1] Aitzhan, N. Z., & Svetinovic, D. (2018). Security and privacy in decen- [21] Wu, H., Zhang, Z., Guan, C., Wolter, K., & Xu, M. (2020). Collaborate
tralized energy trading through multi-signatures, blockchain and anony- edge and cloud computing with distributed deep learning for smart city
mous messaging streams. IEEE Trans. Dependable Secur. Comput., 15, internet of things. IEEE Internet of Things Journal, 7, 8099–8110.
840–852. [22] Xu, X., Zhang, X., Gao, H., Xue, Y., Qi, L., & Dou, W. (2020). Be-
[2] Atwa, R. J., Flocchini, P., & Nayak, A. (2021). A fog-based reputation come: Blockchain-enabled computation offloading for iot in mobile edge
evaluation model for vanets. In International Symposium on Networks, computing. IEEE Trans. Ind. Informatics, 16, 4187–4195.
Computers and Communications, ISNCC 2021, Dubai, United Arab Emi- [23] Yu, H., Yang, Y., Zhang, H., Liu, R., & Ren, Y. (2021). Reputation-based
rates, October 31 - November 2, 2021 (pp. 1–7). IEEE. reverse combination auction incentive method to encourage vehicles to
[3] Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user com- participate in the VCS system. IEEE Trans. Netw. Sci. Eng., 8, 2469–
putation offloading for mobile-edge cloud computing. IEEE/ACM Trans. 2481.
Netw., 24, 2795–2808. [24] Zeng, F., Chen, Y., Yao, L., & Wu, J. (2021). A novel reputation incen-
[4] Engoulou, R. G., Bellaı̈che, M., Halabi, T., & Pierre, S. (2019). A de- tive mechanism and game theory analysis for service caching in software-
centralized reputation management system for securing the internet of defined vehicle edge computing. Peer-to-Peer Netw. Appl., 14, 467–481.
vehicles. In International Conference on Computing, Networking and [25] Zhu, Z., Xu, Y., & Su, Z. (2021). A reputation-based cooperative content
Communications, ICNC 2019, Honolulu, HI, USA, February 18-21, 2019 delivery with parking vehicles in vehicular ad-hoc networks. Peer-to-Peer
(pp. 900–904). IEEE. Netw. Appl., 14, 1531–1547.
[5] Fortino, G., Fotia, L., Messina, F., Rosaci, D., & Sarné, G. M. L. (2021).
A blockchain-based group formation strategy for optimizing the social
reputation capital of an iot scenario. Simul. Model. Pract. Theory, 108,
102261.
[6] Hu, Q., Cheng, H., Zhang, X., & Lin, C. (2022). Trusted resource allo-
cation based on proof-of-reputation consensus mechanism for edge com-
puting. Peer-to-Peer Netw. Appl., 15, 444–460.

13

You might also like