Edge Computing for IoT: Challenges and Solutions

Seyedakbar Mostafavi, Mohamad Asif Dawlatnazar, Fahimeh Paydar

Abstract


Edge computing is a promising paradigm where resource processing is close to the edge of the Internet. Due to an increasing number of devices forming an interconnected network of devices in the Internet of Things (IoT) leading a huge amounts of data are produced and internet traffic usage has been significantly increased over the years. In this paper, we examine the current edge computing architectures, their challenge associativity availing respective current state-of-the-art solutions. Formerly, we state the enabling features of edge computing in IoT development and some edge computing challenges with respect to their IoT applications. We conclude the paper by summarizing solutions in both IoT and edge computing in the tables, regarding the identified challenges.

Full Text:

PDF

References


D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, “A Survey on Secure Data Analytics in Edge Computing,†IEEE Internet of Things Journal, 2019.

W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, “Edge computing: A survey,†Future Generation Computer Systems, vol. 97, pp. 219–235, 2019.

M. Chiang, S. Ha, C.L. I, F. Risso, and T. Zhang, “Clarifying fog computing and networking: 10 questions and answersâ€, IEEE Communications Magazine, Vol. 55. No. 4, 2017.

W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, “Edge computing: A survey,†Future Generation Computer Systems, vol. 97, pp. 219–235, 2019.

C. Patel and N. Doshi, “Security Challenges in IoT Cyber World,†in Security in Smart Cities: Models, Applications, and Challenges, Springer, 2019, pp. 171–191.

X. He, J. Liu, R. Jin, and H. Dai, “Privacy-Aware Offloading in Mobile-Edge Computing,†p. 6.

S. Maheshwari, S. Choudhury, I. Seskar, and D. Raychaudhuri, “Traffic-aware dynamic container migration for real-time support in mobile edge clouds,†in 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 2018, pp. 1–6.

P. Porambage, J. Okwuibe, M. Liyanage, M. Ylianttila, and T. Taleb, “Survey on multi-access edge computing for internet of things realization,†IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 2961–2991, 2018.

S. Yi, Z. Hao, Q. Zhang, Q. Zhang, W. Shi, and Q. Li, “LAVEA: latency-aware video analytics on edge computing platform,†in Proceedings of the Second ACM/IEEE Symposium on Edge Computing - SEC ’17, San Jose, California, 2017, pp. 1–13.

[W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge Computing: Vision and Challenges,†IEEE Internet Things J., vol. 3, no. 5, pp. 637–646, Oct. 2016.

[S. Bi and Y. J. Zhang, “Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading,†IEEE Transactions on Wireless Communications, vol. 17, no. 6, pp. 4177–4190, 2018.

F. Li, Y. Shi, A. Shinde, J. Ye, and W. Z. Song, “Enhanced Cyber-Physical Security in Internet of Things through Energy Auditing,†IEEE Internet of Things Journal, 2019.

K. Gai, K.-K. R. Choo, M. Qiu, and L. Zhu, “Privacy-preserving content-oriented wireless communication in internet-of-things,†IEEE Internet of Things Journal, vol. 5, no. 4, pp. 3059–3067, 2018.

P. Pace, G. Aloi, R. Gravina, G. Caliciuri, G. Fortino, and A. Liotta, “An edge-based architecture to support efficient applications for healthcare industry 4.0,†IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 481–489, 2019.

D. He, S. Chan, and M. Guizani, “Security in the Internet of Things Supported by Mobile Edge Computing,†IEEE Commun. Mag., vol. 56, no. 8, pp. 56–61, Aug. 2018.

J. Zhang, B. Chen, Y. Zhao, X. Cheng, and F. Hu, “Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues,†IEEE Access, vol. 6, pp. 18209–18237, 2018.

B. Han, S. Wong, C. Mannweiler, M. R. Crippa, and H. D. Schotten, “Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability,†IEEE Access, vol. 7, pp. 21290–21299, 2019.

P. Corcoran and S. K. Datta, “Mobile-edge computing and the Internet of Things for consumers: Extending cloud computing and services to the edge of the network,†IEEE Consumer Electronics Magazine, vol. 5, no. 4, pp. 73–74, 2016.

J. Mass, C. Chang, and S. N. Srirama, “Edge Process Management: A case study on adaptive task scheduling in mobile IoT,†Internet of Things, vol. 6, p. 100051, 2019.

P. C. Diniz and M. C. Rinard, “Synchronization transformations for parallel computing,†Concurrency: Practice and Experience, vol. 11, no. 13, pp. 773–802, 1999.

R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges,†Future Generation Computer Systems, vol. 78, pp. 680–698, 2018.

M. Satyanarayanan, “The emergence of edge computing,†Computer, vol. 50, no. 1, pp. 30–39, 2017.

S. Adamović, M. SaraÄ, T. Radojević, D. Radovanović, and T. Dabić, “Security analysis and economic feasibility for virtualization usage in University datacenters,†ZBORNIK RADOVA UNIVERZITETA SINERGIJA, vol. 18, no. 3, 2019.




DOI: http://dx.doi.org/10.22385/jctecs.v25i0.293