Secure service offloading for internet of vehicles in SDN-enabled mobile edge computing

Xiaolong Xu, Qihe Huang, Haibin Zhu, Suraj Sharma, Xuyun Zhang, Lianyong Qi*, Md Zakirul Alam Bhuiyan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

78 Citations (Scopus)


Currently, Edge computing (EC) paradigm is adopted to provision the low-latency resources for the massive real-time services in Internet of vehicles (IoV). To alleviate the QoE (Quality of Experience) degradation of the vehicular users due to the uncertainties (e.g., resource conflicts and communicating interruption), software-defined network (SDN) is involved in the EC-enabled IoV to manage the cooperative operation of distributed edge nodes (ENs). However, the increasing privacy leakage for the IoV service offloading causes the disclosure of the sensitive information, including driving location, personal information of the driver, etc. Moreover, the regulation of SDN is practically insufficient, as the general control is incompetent to maintain balanced operation with the premise of efficient service utility. In view of these challenges, a secure service offloading method, named SOME, is designed to promote IoV service utility and edge utility, meanwhile ensuring privacy security, in SDN-enabled EC. Specifically, an SDN-based framework for IoV service management is developed to address the inherent uncertainty of edge network by SDN controllers. Besides, the locality-sensitive-hash (LSH) is leveraged to realize utility- and privacy-aware service selection. Eventually, comparative experiments are implemented to verify the effectiveness of SOME.

Original languageEnglish
Pages (from-to)3720-3729
Number of pages10
JournalIEEE Transactions on Intelligent Transportation Systems
Issue number6
Publication statusPublished - Jun 2021


  • SDN
  • IoV
  • edge computing
  • LSH
  • privacy preservation
  • IOV


Dive into the research topics of 'Secure service offloading for internet of vehicles in SDN-enabled mobile edge computing'. Together they form a unique fingerprint.

Cite this