13,179 research outputs found
UAV-Empowered Disaster-Resilient Edge Architecture for Delay-Sensitive Communication
The fifth-generation (5G) communication systems will enable enhanced mobile
broadband, ultra-reliable low latency, and massive connectivity services. The
broadband and low-latency services are indispensable to public safety (PS)
communication during natural or man-made disasters. Recently, the third
generation partnership project long term evolution (3GPPLTE) has emerged as a
promising candidate to enable broadband PS communications. In this article,
first we present six major PS-LTE enabling services and the current status of
PS-LTE in 3GPP releases. Then, we discuss the spectrum bands allocated for
PS-LTE in major countries by international telecommunication union (ITU).
Finally, we propose a disaster resilient three-layered architecture for PS-LTE
(DR-PSLTE). This architecture consists of a software-defined network (SDN)
layer to provide centralized control, an unmanned air vehicle (UAV) cloudlet
layer to facilitate edge computing or to enable emergency communication link,
and a radio access layer. The proposed architecture is flexible and combines
the benefits of SDNs and edge computing to efficiently meet the delay
requirements of various PS-LTE services. Numerical results verified that under
the proposed DR-PSLTE architecture, delay is reduced by 20% as compared with
the conventional centralized computing architecture.Comment: 9,
Wearable Communications in 5G: Challenges and Enabling Technologies
As wearable devices become more ingrained in our daily lives, traditional
communication networks primarily designed for human being-oriented applications
are facing tremendous challenges. The upcoming 5G wireless system aims to
support unprecedented high capacity, low latency, and massive connectivity. In
this article, we evaluate key challenges in wearable communications. A
cloud/edge communication architecture that integrates the cloud radio access
network, software defined network, device to device communications, and
cloud/edge technologies is presented. Computation offloading enabled by this
multi-layer communications architecture can offload computation-excessive and
latency-stringent applications to nearby devices through device to device
communications or to nearby edge nodes through cellular or other wireless
technologies. Critical issues faced by wearable communications such as short
battery life, limited computing capability, and stringent latency can be
greatly alleviated by this cloud/edge architecture. Together with the presented
architecture, current transmission and networking technologies, including
non-orthogonal multiple access, mobile edge computing, and energy harvesting,
can greatly enhance the performance of wearable communication in terms of
spectral efficiency, energy efficiency, latency, and connectivity.Comment: This work has been accepted by IEEE Vehicular Technology Magazin
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy
- …