Edge Computing for IoT: Challenges and Solutions
Abstract
Full Text:
PDFReferences
D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing,†IEEE Internet of Things Journal, 2019.
W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, “Edge computing: A survey,†Future Generation Computer Systems, vol. 97, pp. 219–235, 2019.
M. Chiang, S. Ha, C.L. I, F. Risso, and T. Zhang, “Clarifying fog computing and networking: 10 questions and answersâ€, IEEE Communications Magazine, Vol. 55. No. 4, 2017.
W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, “Edge computing: A survey,†Future Generation Computer Systems, vol. 97, pp. 219–235, 2019.
C. Patel and N. Doshi, “Security Challenges in IoT Cyber World,†in Security in Smart Cities: Models, Applications, and Challenges, Springer, 2019, pp. 171–191.
X. He, J. Liu, R. Jin, and H. Dai, “Privacy-Aware Offloading in Mobile-Edge Computing,†p. 6.
S. Maheshwari, S. Choudhury, I. Seskar, and D. Raychaudhuri, “Traffic-aware dynamic container migration for real-time support in mobile edge clouds,†in 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 2018, pp. 1–6.
P. Porambage, J. Okwuibe, M. Liyanage, M. Ylianttila, and T. Taleb, “Survey on multi-access edge computing for internet of things realization,†IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 2961–2991, 2018.
S. Yi, Z. Hao, Q. Zhang, Q. Zhang, W. Shi, and Q. Li, “LAVEA: latency-aware video analytics on edge computing platform,†in Proceedings of the Second ACM/IEEE Symposium on Edge Computing - SEC ’17, San Jose, California, 2017, pp. 1–13.
[W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge Computing: Vision and Challenges,†IEEE Internet Things J., vol. 3, no. 5, pp. 637–646, Oct. 2016.
[S. Bi and Y. J. Zhang, “Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading,†IEEE Transactions on Wireless Communications, vol. 17, no. 6, pp. 4177–4190, 2018.
F. Li, Y. Shi, A. Shinde, J. Ye, and W. Z. Song, “Enhanced Cyber-Physical Security in Internet of Things through Energy Auditing,†IEEE Internet of Things Journal, 2019.
K. Gai, K.-K. R. Choo, M. Qiu, and L. Zhu, “Privacy-preserving content-oriented wireless communication in internet-of-things,†IEEE Internet of Things Journal, vol. 5, no. 4, pp. 3059–3067, 2018.
P. Pace, G. Aloi, R. Gravina, G. Caliciuri, G. Fortino, and A. Liotta, “An edge-based architecture to support efficient applications for healthcare industry 4.0,†IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 481–489, 2019.
D. He, S. Chan, and M. Guizani, “Security in the Internet of Things Supported by Mobile Edge Computing,†IEEE Commun. Mag., vol. 56, no. 8, pp. 56–61, Aug. 2018.
J. Zhang, B. Chen, Y. Zhao, X. Cheng, and F. Hu, “Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues,†IEEE Access, vol. 6, pp. 18209–18237, 2018.
B. Han, S. Wong, C. Mannweiler, M. R. Crippa, and H. D. Schotten, “Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability,†IEEE Access, vol. 7, pp. 21290–21299, 2019.
P. Corcoran and S. K. Datta, “Mobile-edge computing and the Internet of Things for consumers: Extending cloud computing and services to the edge of the network,†IEEE Consumer Electronics Magazine, vol. 5, no. 4, pp. 73–74, 2016.
J. Mass, C. Chang, and S. N. Srirama, “Edge Process Management: A case study on adaptive task scheduling in mobile IoT,†Internet of Things, vol. 6, p. 100051, 2019.
P. C. Diniz and M. C. Rinard, “Synchronization transformations for parallel computing,†Concurrency: Practice and Experience, vol. 11, no. 13, pp. 773–802, 1999.
R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges,†Future Generation Computer Systems, vol. 78, pp. 680–698, 2018.
M. Satyanarayanan, “The emergence of edge computing,†Computer, vol. 50, no. 1, pp. 30–39, 2017.
S. Adamović, M. SaraÄ, T. Radojević, D. Radovanović, and T. Dabić, “Security analysis and economic feasibility for virtualization usage in University datacenters,†ZBORNIK RADOVA UNIVERZITETA SINERGIJA, vol. 18, no. 3, 2019.
DOI: http://dx.doi.org/10.22385/jctecs.v25i0.293