A Review on IoT Based Vehicular Edge Computing
DOI:
https://doi.org/10.61841/sapp4509Keywords:
QoS, IoT, Fog computing, Cloud Computing, Internet of Vehicle, Vehicular Edge Computing (VEC).Abstract
Vehicular Edge Computing (VEC), a brand new network paradigm, has recently been introduced in the brand new system to further strengthen its storage for computing. The obstacle to compliance with certain computational and communications specifications is prominent along with the beginning of modern vehicular applications. With all the success of VEC, the sponsoring services of the service provider close to both smart automobiles, such as lowering latency and improving the high-level quality of service (QoS). The VEC structure combined with every notion of software, its own services and the automobile, is exemplified by this paper. This paper have assessed and described all the most recent and relevant solutions. This paper nail forward research problems and discard slightly. This paper enables readers to gain a better understanding of the field, but it also provides guidance for one area of research within the VEC.
Downloads
References
[1] M. Aazam, S. Zeadally, and K. A. Harras, “Offloading in fog computing for IoT: Review, enabling
technologies, and research opportunities,” Futur. Gener. Comput. Syst., 2018.
[2] J. Ni, K. Zhang, X. Lin, and X. S. Shen, “Securing Fog Computing for Internet of Things Applications:
Challenges and Solutions,” IEEE Commun. Surv. Tutorials, 2018.
[3] C. Perera, Y. Qin, J. C. Estrella, S. Reiff-Marganiec, and A. V. Vasilakos, “Fog computing for sustainable
smart cities: A survey,” ACM Comput. Surv., 2017.
[4] M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Futur. Gener.
Comput. Syst., 2018.
[5] M. U.Farooq, M. Waseem, S. Mazhar, A. Khairi, and T. Kamal, “A Review on Internet of Things (IoT),” Int.
J. Comput. Appl., 2015.
[6] M. R. Palattella et al., “Internet of Things in the 5G Era: Enablers, Architecture, and Business Models,” IEEE
J. Sel. Areas Commun., 2016.
[7] A. Lele, “Cloud computing,” in Smart Innovation, Systems and Technologies, 2019.
[8] T. Dillon, C. Wu, and E. Chang, “Cloud computing: Issues and challenges,” in Proceedings - International
Conference on Advanced Information Networking and Applications, AINA, 2010.
[9] M. M. Alani, “Security threats in cloud computing,” in SpringerBriefs in Computer Science, 2016.
[10] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A Survey on Internet of Things: Architecture,
Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet Things J., 2017.
[11] I. Stojmenovic and S. Wen, “The Fog computing paradigm: Scenarios and security issues,” in 2014 Federated
Conference on Computer Science and Information Systems, FedCSIS 2014, 2014.
[12] O. Kaiwartya et al., “Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and
Future Aspects,” IEEE Access, 2016.
[13] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in
MCC’12 - Proceedings of the 1st ACM Mobile Cloud Computing Workshop, 2012.
[14] C. Wu, H. Mohsenian-Rad, and J. Huang, “Vehicle-to-aggregator interaction game,” IEEE Trans. Smart Grid,
2012.
[15] X. Zhang et al., “Towards a smart energy network: The roles of fuel/electrolysis cells and technological
perspectives,” International Journal of Hydrogen Energy. 2015.
[16] G. J. L. Naus, R. P. A. Vugts, J. Ploeg, M. J. G. Van De Molengraft, and M. Steinbuch, “String-stable CACC
design and experimental validation: A frequency-domain approach,” IEEE Trans. Veh. Technol., 2010.
[17] F. Petrosino, M. De Stefano Fumo, G. Pezzella, and P. Catalano, “Evolution of aerodynamic shape for a
concept of autonomus re-entry vehicle,” in 31st AIAA Applied Aerodynamics Conference, 2013.
[18] A. Mukherjee, S. Bhaumik, and S. Kanti Bhattacharya, “EXTREMITY OF INDIAN AUTONOMUS
UNDERWATER VEHICLE: A SURVEY,” 2016.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.