307 research outputs found
Mobile Edge Computing
This is an open access book. It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks. The book starts with the basic concepts, key techniques and network architectures of MEC. Then, we present the wide applications of MEC, including edge caching, 6G networks, Internet of Vehicles, and UAVs. In the last part, we present new opportunities when MEC meets blockchain, Artificial Intelligence, and distributed machine learning (e.g., federated learning). We also identify the emerging applications of MEC in pandemic, industrial Internet of Things and disaster management. The book allows an easy cross-reference owing to the broad coverage on both the principle and applications of MEC. The book is written for people interested in communications and computer networks at all levels. The primary audience includes senior undergraduates, postgraduates, educators, scientists, researchers, developers, engineers, innovators and research strategists
Service Provisioning in Edge-Cloud Continuum Emerging Applications for Mobile Devices
Disruptive applications for mobile devices can be enhanced by Edge computing facilities. In this context, Edge Computing (EC) is a proposed architecture to meet the mobility requirements imposed by these applications in a wide range of domains, such as the Internet of Things, Immersive Media, and Connected and Autonomous Vehicles. EC architecture aims to introduce computing capabilities in the path between the user and the Cloud to execute tasks closer to where they are consumed, thus mitigating issues related to latency, context awareness, and mobility support. In this survey, we describe which are the leading technologies to support the deployment of EC infrastructure. Thereafter, we discuss the applications that can take advantage of EC and how they were proposed in the literature. Finally, after examining enabling technologies and related applications, we identify some open challenges to fully achieve the potential of EC, and also research opportunities on upcoming paradigms for service provisioning. This survey is a guide to comprehend the recent advances on the provisioning of mobile applications, as well as foresee the expected next stages of evolution for these applications
Vehicle as a Service (VaaS): Leverage Vehicles to Build Service Networks and Capabilities for Smart Cities
Smart cities demand resources for rich immersive sensing, ubiquitous
communications, powerful computing, large storage, and high intelligence
(SCCSI) to support various kinds of applications, such as public safety,
connected and autonomous driving, smart and connected health, and smart living.
At the same time, it is widely recognized that vehicles such as autonomous
cars, equipped with significantly powerful SCCSI capabilities, will become
ubiquitous in future smart cities. By observing the convergence of these two
trends, this article advocates the use of vehicles to build a cost-effective
service network, called the Vehicle as a Service (VaaS) paradigm, where
vehicles empowered with SCCSI capability form a web of mobile servers and
communicators to provide SCCSI services in smart cities. Towards this
direction, we first examine the potential use cases in smart cities and
possible upgrades required for the transition from traditional vehicular ad hoc
networks (VANETs) to VaaS. Then, we will introduce the system architecture of
the VaaS paradigm and discuss how it can provide SCCSI services in future smart
cities, respectively. At last, we identify the open problems of this paradigm
and future research directions, including architectural design, service
provisioning, incentive design, and security & privacy. We expect that this
paper paves the way towards developing a cost-effective and sustainable
approach for building smart cities.Comment: 32 pages, 11 figure
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy
Edge Computing Research Survey
In this paper, we present a survey in edge computing research
Pushing AI to Wireless Network Edge: An Overview on Integrated Sensing, Communication, and Computation towards 6G
Pushing artificial intelligence (AI) from central cloud to network edge has
reached board consensus in both industry and academia for materializing the
vision of artificial intelligence of things (AIoT) in the sixth-generation (6G)
era. This gives rise to an emerging research area known as edge intelligence,
which concerns the distillation of human-like intelligence from the huge amount
of data scattered at wireless network edge. In general, realizing edge
intelligence corresponds to the process of sensing, communication, and
computation, which are coupled ingredients for data generation, exchanging, and
processing, respectively. However, conventional wireless networks design the
sensing, communication, and computation separately in a task-agnostic manner,
which encounters difficulties in accommodating the stringent demands of
ultra-low latency, ultra-high reliability, and high capacity in emerging AI
applications such as auto-driving. This thus prompts a new design paradigm of
seamless integrated sensing, communication, and computation (ISCC) in a
task-oriented manner, which comprehensively accounts for the use of the data in
the downstream AI applications. In view of its growing interest, this article
provides a timely overview of ISCC for edge intelligence by introducing its
basic concept, design challenges, and enabling techniques, surveying the
state-of-the-art development, and shedding light on the road ahead
A Survey on UAV-enabled Edge Computing: Resource Management Perspective
Edge computing facilitates low-latency services at the network's edge by
distributing computation, communication, and storage resources within the
geographic proximity of mobile and Internet-of-Things (IoT) devices. The recent
advancement in Unmanned Aerial Vehicles (UAVs) technologies has opened new
opportunities for edge computing in military operations, disaster response, or
remote areas where traditional terrestrial networks are limited or unavailable.
In such environments, UAVs can be deployed as aerial edge servers or relays to
facilitate edge computing services. This form of computing is also known as
UAV-enabled Edge Computing (UEC), which offers several unique benefits such as
mobility, line-of-sight, flexibility, computational capability, and
cost-efficiency. However, the resources on UAVs, edge servers, and IoT devices
are typically very limited in the context of UEC. Efficient resource management
is, therefore, a critical research challenge in UEC. In this article, we
present a survey on the existing research in UEC from the resource management
perspective. We identify a conceptual architecture, different types of
collaborations, wireless communication models, research directions, key
techniques and performance indicators for resource management in UEC. We also
present a taxonomy of resource management in UEC. Finally, we identify and
discuss some open research challenges that can stimulate future research
directions for resource management in UEC.Comment: 36 pages, Accepted to ACM CSU
Edge Intelligence : Empowering Intelligence to the Edge of Network
Edge intelligence refers to a set of connected systems and devices for data collection, caching, processing, and analysis proximity to where data are captured based on artificial intelligence. Edge intelligence aims at enhancing data processing and protects the privacy and security of the data and users. Although recently emerged, spanning the period from 2011 to now, this field of research has shown explosive growth over the past five years. In this article, we present a thorough and comprehensive survey of the literature surrounding edge intelligence. We first identify four fundamental components of edge intelligence, i.e., edge caching, edge training, edge inference, and edge offloading based on theoretical and practical results pertaining to proposed and deployed systems. We then aim for a systematic classification of the state of the solutions by examining research results and observations for each of the four components and present a taxonomy that includes practical problems, adopted techniques, and application goals. For each category, we elaborate, compare, and analyze the literature from the perspectives of adopted techniques, objectives, performance, advantages and drawbacks, and so on. This article provides a comprehensive survey of edge intelligence and its application areas. In addition, we summarize the development of the emerging research fields and the current state of the art and discuss the important open issues and possible theoretical and technical directions.Peer reviewe
- …