skip to main content
survey

Edge-computing-driven Internet of Things: A Survey

Published: 23 December 2022 Publication History

Abstract

The Internet of Things (IoT) is impacting the world’s connectivity landscape. More and more IoT devices are connected, bringing many benefits to our daily lives. However, the influx of IoT devices poses non-trivial challenges for the existing cloud-based computing paradigm. In the cloud-based architecture, a large amount of IoT data is transferred to the cloud for data management, analysis, and decision making. It could not only cause a heavy workload on the cloud but also result in unacceptable network latency, ultimately undermining the benefits of cloud-based computing. To address these challenges, researchers are looking for new computing models for the IoT. Edge computing, a new decentralized computing model, is valued by more and more researchers in academia and industry. The main idea of edge computing is placing data processing in near-edge devices instead of remote cloud servers. It is promising to build more scalable, low-latency IoT systems. Many studies have been proposed on edge computing and IoT, but a comprehensive survey of this crossover area is still lacking.
In this survey, we first introduce the impact of edge computing on the development of IoT and point out why edge computing is more suitable for IoT than other computing paradigms. Then, we analyze the necessity of systematical investigation on the edge-computing-driven IoT (ECDriven-IoT) and summarize new challenges occurring in ECDriven-IoT. We categorize recent advances from bottom to top, covering six aspects of ECDriven-IoT. Finally, we conclude lessons learned and propose some challenging

References

[1]
Mohammad Aazam and Eui-Nam Huh. 2014. Fog computing and smart gateway-based communication for cloud of things. In Proceedings of the International Conference on Future Internet of Things and Cloud. IEEE, 464–470.
[2]
Nasir Abbas, Yan Zhang, Amir Taherkordi, and Tor Skeie. 2018. Mobile edge computing: A survey. IEEE Internet Things J. 5, 1 (2018), 450–465.
[3]
Stefano Abbate, Marco Avvenuti, Daniel Cesarini, and Alessio Vecchio. 2012. Estimation of energy consumption for TinyOS 2.x-based applications. Procedia Comput. Sci. 10 (2012), 1166–1171.
[4]
Utku Günay Acer, Aidan Boran, Claudio Forlivesi, Werner Liekens, Fernando Pérez-cruz, and Fahim Kawsar. 2015. Sensing WiFi network for personal IoT analytics. In Proceedings of the International Conference on the Internet of Things (IOT’15). IEEE, 104–111.
[5]
Ansuman Adhikary, Xingqin Lin, and Y.-P. Eric Wang. 2016. Performance evaluation of NB-IoT coverage. In Proceedings of the IEEE Vehicular Technology Society (VTC’16). IEEE, 1–5.
[6]
Bilal Afzal, Muhammad Umair, Ghalib Asadullah Shah, and Ejaz Ahmed. 2019. Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges. Future Gen. Comput. Syst. 92 (2019), 718–731.
[7]
Yuan Ai, Mugen Peng, and Kecheng Zhang. 2018. Edge computing technologies for internet of things: A primer. Dig. Commun. Netw. 4, 2 (2018), 77–86.
[8]
G. R. Aiello and G. D. Rogerson. 2003. Ultra-wideband wireless systems. IEEE Microwave Mag. 4, 2 (2003), 36–47.
[9]
K. Akkaya and M. Younis. 2003. An energy-aware QoS routing protocol for wireless sensor networks. In Proceedings of the International Conference on Distributed Computing Systems Workshops. IEEE, 710–715.
[10]
Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim Abaker Targio Hashem, and Faiz Alotaibi. 2017. Internet of things security: A survey. J. Netw. Comput. Appl. 88 (2017), 10–28.
[11]
Thamer A. Alghamdi, Aboubaker Lasebae, and Mahdi Aiash. 2013. Security analysis of the constrained application protocol in the Internet of Things. In Proceedings of the International Conference on Future Generation Communication Technologies. IEEE, 163–168.
[12]
Abdulmalik Alwarafy, Khaled A. Al-Thelaya, Mohamed Abdallah, Jens Schneider, and Mounir Hamdi. 2021. A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet Things J. 8, 6 (2021), 4004–4022.
[13]
Mahdi Amiri-Kordestani and Hadj Bourdoucen. 2017. A survey on embedded open source system software for the internet of things. In Proceedings of the Free and Open Source Software Conference. 6.
[14]
Jeffrey G. Andrews, Stefano Buzzi, Wan Choi, Stephen V. Hanly, Angel Lozano, Anthony C. K. Soong, and Jianzhong Charlie Zhang. 2014. What will 5G be? IEEE J. Select. Areas Commun. 32, 6 (2014), 1065–1082.
[15]
Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The internet of things: A survey. Comput. Netw. 54, 15 (2010), 2787–2805.
[16]
Israr Iqbal Awan, Nadir Shah, Muhammad Imran, Muhammad Shoaib, and Nasir Saeed. 2019. An improved mechanism for flow rule installation in-band SDN. J. Syst. Architect. 96 (2019), 1–19.
[17]
Ahmet Cihat Baktir, Atay Ozgovde, and Cem Ersoy. 2017. How can edge computing benefit from software-defined networking: A survey, use cases, and future directions. IEEE Commun. Surveys Tutor. 19, 4 (2017), 2359–2391.
[18]
Luciano Baresi, Danilo Filgueira Mendonça, and Martin Garriga. 2017. Empowering low-latency applications through a serverless edge computing architecture. In Service-Oriented and Cloud Computing. Springer International Publishing, Cham, 196–210.
[19]
Ejder Bastug, Mehdi Bennis, Muriel Medard, and Merouane Debbah. 2017. Toward interconnected virtual reality: Opportunities, challenges, and enablers. IEEE Commun. Mag. 55, 6 (2017), 110–117.
[20]
Michael Till Beck, Martin Werner, Sebastian Feld, and S. Schimper. 2014. Mobile edge computing: A taxonomy. In Proceedings of the International Conference on Advances in Future Internet. Citeseer, 48–55.
[21]
A. Bekasiewicz and S. Koziel. 2016. Compact UWB monopole antenna for internet of things applications. Electron. Lett. 52, 7 (2016), 492–494.
[22]
Yihenew Dagne Beyene, Riku Jantti, Olav Tirkkonen, Kalle Ruttik, Sassan Iraji, Anna Larmo, Tuomas Tirronen, and Johan Torsner. 2017. NB-IoT technology overview and experience from cloud-RAN implementation. IEEE Wireless Commun. 24, 3 (2017), 26–32.
[23]
Flavio Bonomi, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. 2014. Fog computing: A platform for internet of things and analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments. Springer International Publishing, Cham, 169–186.
[24]
Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the internet of things. In Proceedings of the 1st MCC Workshop on Mobile Cloud Computing. ACM, New York, NY, 13–16.
[25]
Martin C. Bor, Utz Roedig, Thiemo Voigt, and Juan M. Alonso. 2016. Do LoRa low-power wide-area networks scale? In Proceedings of the ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. ACM, New York, NY, 59–67.
[26]
Alessio Botta, Walter de Donato, Valerio Persico, and Antonio Pescapé. 2016. Integration of cloud computing and internet of things: A survey. Future Gen. Comput. Syst. 56 (2016), 684–700.
[27]
Fangbo Cai, Nafei Zhu, Jingsha He, Pengyu Mu, Wenxin Li, and Yi Yu. 2019. Survey of access control models and technologies for cloud computing. Cluster Comput. 22, 3 (2019), 6111–6122.
[28]
Qing Cao, Tarek Abdelzaher, John Stankovic, and Tian He. 2008. The LiteOS operating system: Towards unix-like abstractions for wireless sensor networks. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN’08). IEEE, 233–244.
[29]
Juan José Martínez Castillo and Karina Aviles Rodriguez. 2012. Security architecture for Ad hoc NOMOHi networks: Development of a project based on emergency rural telecommunications. In Proceedings of the World Congress on Internet Security (WorldCIS’12). IEEE, 183–187.
[30]
Korhan Cengiz and Tamer Dag. 2015. A review on the recent energy-efficient approaches for the internet protocol stack. EURASIP J. Wireless Commun. Netw. 2015, 1 (2015), 1–22.
[31]
Hojung Cha, Sukwon Choi, Inuk Jung, Hyoseung Kim, Hyojeong Shin, Jaehyun Yoo, and Chanmin Yoon. 2007. RETOS: Resilient, expandable, and threaded operating system for wireless sensor networks. In Proceedings of the International Symposium on Information Processing in Sensor Networks. IEEE, 148–157.
[32]
Tej Bahadur Chandra, Pushpak Verma, and A. K. Dwivedi. 2016. Operating systems for internet of things: A comparative study. In Proceedings of the International Conference on Information and Communication Technology for Competitive Strategies (ICTCS’16). ACM, New York, NY, Article 47, 6 pages.
[33]
Hyunseok Chang, Adiseshu Hari, Sarit Mukherjee, and T. V. Lakshman. 2014. Bringing the cloud to the edge. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM’14). IEEE, 346–351.
[34]
Kai Chih Chang, Razieh Nokhbeh Zaeem, and K. Suzanne Barber. 2018. Enhancing and evaluating identity privacy and authentication strength by utilizing the identity ecosystem. In Proceedings of the Workshop on Privacy in the Electronic Society. ACM, New York, NY, 114–120.
[35]
Mingzhe Chen, Walid Saad, and Changchuan Yin. 2018. Virtual reality over wireless networks: Quality-of-service model and learning-based resource management. IEEE Trans. Commun. 66, 11 (2018), 5621–5635.
[36]
Songlin Chen, Yixin Jiang, Hong Wen, Wenjie Liu, Jie Chen, Wenxin Lei, and Aidong Xu. 2018. A novel terminal security access method based on edge computing for IoT. In Proceedings of the International Conference on Networking and Network Applications (NaNA’18). IEEE, 394–398.
[37]
Xu Chen. 2014. Decentralized computation offloading game for mobile cloud computing. IEEE Trans. Parallel Distrib. Syst. 26, 4 (2014), 974–983.
[38]
Xu Chen, Lei Jiao, Wenzhong Li, and Xiaoming Fu. 2015. Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans. Netw. 24, 5 (2015), 2795–2808.
[39]
Zhipeng Cheng, Minghui Min, Zhibin Gao, and Lianfen Huang. 2020. Joint task offloading and resource allocation for mobile edge computing in ultra-dense network. In Proceedings of the IEEE Global Communications Conference. IEEE, 1–6.
[40]
Shao-Yi Chien, Wei-Kai Chan, Yu-Hsiang Tseng, Chia-Han Lee, V. Srinivasa Somayazulu, and Yen-Kuang Chen. 2015. Distributed computing in IoT: System-on-a-chip for smart cameras as an example. In Proceedings of the 20th Asia and South Pacific Design Automation Conference. IEEE, 130–135.
[41]
Supratim Das, Amarjeet Singh, Surinder Pal Singh, and Amit Kumar. 2015. A low overhead dynamic memory management system for constrained memory embedded systems. In Proceedings of the International Conference on Computing for Sustainable Global Development (INDIACom’15). IEEE, 809–815.
[42]
A. Dastjerdi and R. Buyya. 2016. Fog computing: Helping the internet of things realize its potential. Computer 49, 8 (2016), 112–116.
[43]
Rustem Dautov and Salvatore Distefano. 2017. Three-level hierarchical data fusion through the IoT, edge, and cloud computing. In Proceedings of the International Conference on Internet of Things and Machine Learning. ACM, New York, NY, Article 1, 5 pages.
[44]
Josep Domingo-Ferrer, Oriol Farrás, Jordi Ribes-González, and David Sánchez. 2019. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Comput. Commun. 140–141 (2019), 38–60.
[45]
Jianbo Du, Liqiang Zhao, Jie Feng, Xiaoli Chu, and F. Richard Yu. 2018. Economical revenue maximization in cache enhanced mobile edge computing. In Proceedings of the IEEE International Conference on Communications (ICC’18). IEEE, 1–6.
[46]
Adam Dunkels. 2007. Rime-a lightweight layered communication stack for sensor networks. In Proceedings of the European Conference on Wireless Sensor Networks, Vol. 44. Citeseer, 2.
[47]
EdgeX. 2018. EdgeX Foundry. Retrieved from https://www.edgexfoundry.org/get-started/.
[48]
Hesham El-Sayed, Sharmi Sankar, Mukesh Prasad, Deepak Puthal, Akshansh Gupta, Manoranjan Mohanty, and Chin-Teng Lin. 2018. Edge of things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access 6 (2018), 1706–1717.
[49]
Hanan Elazhary. 2019. Internet of things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. J. Netw. Comput. Applications 128 (2019), 105–140.
[50]
Sinem Coleri Ergen. 2004. ZigBee/IEEE 802.15. 4 summary. UC Berkeley (Sept. 10,2004).
[51]
Ericsson. 2010. CEO to shareholders: 50 billion connections 2020. Retrieved from https://www.ericsson.com/en/press-releases/2010/4/ceo-to-shareholders-50-billion-connections-2020.
[52]
Mohamed Fahim, Brahim Ouchao, Abdeslam Jakimi, and Lahcen El Bermi. 2019. Application of a non-immersive VR, IoT based approach to help moroccan students carry out practical activities in a personal learning style. Future Internet 11, 1 (2019), 15.
[53]
S. Farah, A. Benachenhou, G. Neveux, D. Barataud, G. Andrieu, and T. Fredon. 2015. Real-time microwave remote laboratory architecture. In Proceedings of the European Microwave Conference (EuMC). IEEE, 1315–1318.
[54]
Yuxiang Feng, Wenhao Wang, Yukai Weng, and Huanming Zhang. 2017. A replay-attack resistant authentication scheme for the internet of things. In Proceedings of the IEEE International Conference on Computational Science and Engineering (CSE’17) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC’17), Vol. 1. IEEE, 541–547.
[55]
Hiro Gabriel Cerqueira Ferreira, Edna Dias Canedo, and Rafael Timóteo de Sousa. 2013. IoT architecture to enable intercommunication through REST API and UPnP using IP, ZigBee and arduino. In Proceedings of the IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’13). IEEE, 53–60.
[56]
EdgeX Foundry. 2021. Why EdgeX. Retrieved from https://www.edgexfoundry.org/why_edgex/why-edgex/.
[57]
Khusanbek Gafurov and Tai-Myoung Chung. 2019. Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions. J. Info. Process. Syst. 15 (2019), 797–819.
[58]
Padmini Gaur and Mohit P. Tahiliani. 2015. Operating systems for IoT devices: A critical survey. In Proceedings of the IEEE Region 10 Symposium. IEEE, 33–36.
[59]
Amitabha Ghosh, Andreas Maeder, Matthew Baker, and Devaki Chandramouli. 2019. 5G evolution: A view on 5G cellular technology beyond 3GPP release 15. IEEE Access 7 (2019), 127639–127651.
[60]
Tuan Nguyen Gia, Mingzhe Jiang, Amir-Mohammad Rahmani, Tomi Westerlund, Pasi Liljeberg, and Hannu Tenhunen. 2015. Fog computing in healthcare internet of things: A case study on ECG feature extraction. In IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, 356–363.
[61]
Dimitrios Glaroudis, Athanasios Iossifides, and Periklis Chatzimisios. 2020. Survey, comparison and research challenges of IoT application protocols for smart farming. Comput. Netw. 168, C (2020), 14.
[62]
Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, and Trent Jaeger. 2017. Trustshadow: Secure execution of unmodified applications with arm trustzone. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM, New York, NY, 488–501.
[63]
Shaoyong Guo, Xing Hu, Song Guo, Xuesong Qiu, and Feng Qi. 2020. Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Trans. Industr. Inform. 16, 3 (2020), 1972–1983.
[64]
Xiuzhen Guo, Yuan He, Jia Zhang, and Haotian Jiang. 2019. WIDE: Physical-level CTC via digital emulation. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN’19). IEEE, 49–60.
[65]
Harshit Gupta, Amir Vahid Dastjerdi, Soumya K. Ghosh, and Rajkumar Buyya. 2017. iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Software: Pract. Exper. 47, 9 (2017), 1275–1296.
[66]
J. C. Haartsen. 2000. The bluetooth radio system. IEEE Person. Commun. 7, 1 (2000), 28–36.
[67]
Oliver Hahm, Emmanuel Baccelli, Hauke Petersen, and Nicolas Tsiftes. 2016. Operating systems for low-end devices in the internet of things: A survey. IEEE Internet Things J. 3, 5 (2016), 720–734.
[68]
K. Eric Harper, Thijmen de Gooijer, Johannes O. Schmitt, and David Cox. 2016. Microdatabases for the industrial Internet. Retrieved from https://arxiv.org/abs/1601.04036.
[69]
Albert F. Harris III, Vansh Khanna, Guliz Tuncay, Roy Want, and Robin Kravets. 2016. Bluetooth low energy in dense IoT environments. IEEE Commun. Mag. 54, 12 (2016), 30–36.
[70]
Brian Hayes. 2008. Cloud computing. Commun. ACM 51, 7 (2008), 9–11.
[71]
John L. Hennessy and David A. Patterson. 2011. Computer Architecture: A Quantitative Approach. Elsevier.
[72]
P. S. Henry and Hui Luo. 2002. WiFi: What’s next? IEEE Commun. Mag. 40, 12 (2002), 66–72.
[73]
M. Shamim Hossain and Ghulam Muhammad. 2016. Cloud-assisted industrial internet of things (IIoT)—Enabled framework for health monitoring. Comput. Netw. 101 (2016), 192–202.
[74]
Farhoud Hosseinpour, Payam Amoli, Juha Plosila, Timo Hämäläinen, and Hannu Tenhunen. 2016. An intrusion detection system for Fog computing and IoT based logistic systems using a smart data approach. Int. J. Dig. Content Technol. Appl. 10 (122016), 34–46.
[75]
Junqin Huang, Linghe Kong, Guihai Chen, Min-You Wu, Xue Liu, and Peng Zeng. 2019. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans. Industr. Inform. 15, 6 (2019), 3680–3689.
[76]
Jonathan Hui and Pascal Thubert. 2011. Compression format for IPv6 datagrams over IEEE 802.15. 4-based networks. Technical Report 6282. Internet Engineering Task Force (IETF), 1–23. Retrieved from https://www.rfc-editor.org/rfc/rfc6282.txt.
[77]
Yaser Jararweh, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Mladen Vouk, Andy Rindos, et al. 2015. SDIoT: A software defined based internet of things framework. J. Ambient Intell. Human. Comput. 6, 4 (2015), 453–461.
[78]
Yaser Jararweh, Mohammad Alsmirat, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Ala’ Darabseh, Brij Gupta, and Ahmad Doulat. 2017. Software-defined system support for enabling ubiquitous mobile edge computing. Comput. J. 60, 10 (2017), 1443–1457.
[79]
Yaser Jararweh, Ahmad Doulat, Omar AlQudah, Ejaz Ahmed, Mahmoud Al-Ayyoub, and Elhadj Benkhelifa. 2016. The future of mobile cloud computing: Integrating cloudlets and mobile edge computing. In Proceedings of the 23rd International Conference on Telecommunications (ICT’16). IEEE, 1–5.
[80]
Farhana Javed, Muhamamd Khalil Afzal, Muhammad Sharif, and Byung-Seo Kim. 2018. Internet of things (IoT) operating systems support, networking technologies, applications, and challenges: A comparative review. IEEE Commun. Surveys Tutor. 20, 3 (2018), 2062–2100.
[81]
Fatma Ben Jemaa, Guy Pujolle, and Michel Pariente. 2016. Cloudlet-and NFV-based carrier Wi-Fi architecture for a wider range of services. Ann. Telecommun. 71, 11 (2016), 617–624.
[82]
Sunmi Jun, Yoohwa Kang, Jaeho Kim, and Changki Kim. 2020. Ultra-low-latency services in 5G systems: A perspective from 3GPP standards. ETRI J. 42, 5 (2020), 721–733.
[83]
Ajay Kakkar. 2020. A survey on secure communication techniques for 5G wireless heterogeneous networks. Info. Fusion 62 (2020), 89–109.
[84]
Jiawen Kang, Rong Yu, Xumin Huang, Maoqiang Wu, Sabita Maharjan, Shengli Xie, and Yan Zhang. 2019. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6, 3 (2019), 4660–4670.
[85]
Hajime Kanzaki, Kevin Schubert, and Nicholas Bambos. 2017. Video streaming schemes for industrial IoT. In Proceedings of the International Conference on Computer Communication and Networks (ICCCN’17). IEEE, 1–7.
[86]
Wazir Zada Khan, Ejaz Ahmed, Saqib Hakak, Ibrar Yaqoob, and Arif Ahmed. 2019. Edge computing: A survey. Future Gen. Comput. Syst. 97 (2019), 219–235.
[87]
Song Min Kim and Tian He. 2015. FreeBee: Cross-technology communication via free side-channel. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom’15). ACM, New York, NY, 317–330.
[88]
Shinji Kitagami, Tadashi Ogino, Takuo Suganuma, and Norio Shiratori. 2017. Proposal of a multi-agent based flexible IoT edge computing architecture harmonizing its control with cloud computing. In Proceedings of the International Symposium on Computing and Networking (CANDAR’17). IEEE, 223–229.
[89]
Diego Kreutz, Fernando M. V. Ramos, Paulo Esteves Veríssimo, Christian Esteve Rothenberg, Siamak Azodolmolky, and Steve Uhlig. 2015. Software-defined networking: A comprehensive survey. Proc. IEEE 103, 1 (2015), 14–76.
[90]
Karthik Kumar, Jibang Liu, Yung-Hsiang Lu, and Bharat Bhargava. 2013. A survey of computation offloading for mobile systems. Mobile Netw. Appl. 18, 1 (2013), 129–140.
[91]
Vijay Kumar, George Oikonomou, Theo Tryfonas, Dan Page, and Iain Phillips. 2014. Digital investigations for IPv6-based wireless sensor networks. Dig. Invest. 11, S2 (2014), S66–S75.
[92]
Patrick Kurp. 2008. Green computing. Commun. ACM 51, 10 (2008), 11–13.
[93]
O. Landsiedel, K. Wehrle, and S. Gotz. 2005. Accurate prediction of power consumption in sensor networks. In Proceedings of the IEEE Workshop on Embedded Networked Sensors. IEEE, 37–44.
[94]
Erik G. Larsson, Ove Edfors, Fredrik Tufvesson, and Thomas L. Marzetta. 2014. Massive MIMO for next generation wireless systems. IEEE Commun. Mag. 52, 2 (2014), 186–195.
[95]
Heiner Lasi, Peter Fettke, Hans-Georg Kemper, Thomas Feld, and Michael Hoffmann. 2014. Industry 4.0. Bus. Info. Syst. Eng. 6, 4 (2014), 239–242.
[96]
Bo Li, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, and Yun Yang. 2020. Auditing cache data integrity in the edge computing environment. IEEE Trans. Parallel Distrib. Syst. 32, 5 (2020), 1210–1223.
[97]
Jiliang Li, Zhou Su, Deke Guo, Kim-Kwang Raymond Choo, Yusheng Ji, and Huayan Pu. 2021. Secure data deduplication protocol for edge-assisted mobile CrowdSensing services. IEEE Trans. Vehic. Technol. 70, 1 (2021), 742–753.
[98]
Shichao Li, Ning Zhang, Siyu Lin, Linghe Kong, Ajay Katangur, Muhammad Khurram Khan, Minming Ni, and Gang Zhu. 2018. Joint admission control and resource allocation in edge computing for internet of things. IEEE Netw. 32, 1 (2018), 72–79.
[99]
Fuhong Lin, Yutong Zhou, Xingsuo An, Ilsun You, and Kim-Kwang Raymond Choo. 2018. Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of internet of things devices. IEEE Consum. Electron. Mag. 7, 6 (2018), 45–50.
[100]
Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, and Wei Zhao. 2017. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4, 5 (2017), 1125–1142.
[101]
Dan Liu, Zheng Yan, Wenxiu Ding, and Mohammed Atiquzzaman. 2019. A survey on secure data analytics in edge computing. IEEE Internet Things J. 6, 3 (2019), 4946–4967.
[102]
Yang Lu and Li Da Xu. 2018. Internet of things (IoT) cybersecurity research: A review of current research topics. IEEE Internet Things J. 6, 2 (2018), 2103–2115.
[103]
Xin Ma and Wei Luo. 2008. The analysis of 6LowPAN technology. In Proceedings of the IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Vol. 1. IEEE, 963–966.
[104]
Pavel Mach and Zdenek Becvar. 2017. Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun. Surveys Tutor. 19, 3 (2017), 1628–1656.
[105]
Shahid Mahmood, Amin Ullah, and Anas Khalid Kayani. 2019. Fog computing trust based architecture for internet of things devices. Int. J. Comput. Commun. Netw. 1, 1 (2019), 18–25.
[106]
Luca Mainetti, Luigi Patrono, and Antonio Vilei. 2011. Evolution of wireless sensor networks towards the internet of things: A survey. In Proceedings of the International Conference on Software, Telecommunications and Computer Networks. IEEE, 1–6.
[107]
Nitin Mangalvedhe, Rapeepat Ratasuk, and Amitava Ghosh. 2016. NB-IoT deployment study for low power wide area cellular IoT. In Proceedings of the IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC’16). IEEE, 1–6.
[108]
Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. A survey on mobile edge computing: The communication perspective. IEEE Commun. Surveys Tutor. 19, 4 (2017), 2322–2358.
[109]
Yuyi Mao, Jun Zhang, and Khaled B. Letaief. 2016. Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J. Select. Areas Commun. 34, 12 (2016), 3590–3605.
[110]
Diego Mendez Mena, Ioannis Papapanagiotou, and Baijian Yang. 2018. Internet of things: Survey on security. Info. Secur. J.: Global Perspect. 27, 3 (2018), 162–182.
[111]
Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, Niels Bouten, Filip De Turck, and Raouf Boutaba. 2016. Network function virtualization: State-of-the-art and research challenges. IEEE Commun. Surveys Tutor. 18, 1 (2016), 236–262.
[112]
Takuho Mitsunaga, Yoshifumi Manabe, and Tatsuaki Okamoto. 2010. Efficient secure auction protocols based on the Boneh-Goh-Nissim encryption. In Advances in Information and Computer Security. Springer, Berlin, 149–163.
[113]
Muhammad Baqer Mollah, Md. Abul Kalam Azad, and Athanasios Vasilakos. 2017. Secure data sharing and searching at the edge of cloud-assisted internet of things. IEEE Cloud Comput. 4, 1 (2017), 34–42.
[114]
N. Montavont and T. Noel. 2002. Handover management for mobile nodes in IPv6 networks. IEEE Commun. Mag. 40, 8 (2002), 38–43.
[115]
Roberto Morabito, Vittorio Cozzolino, Aaron Yi Ding, Nicklas Beijar, and Jorg Ott. 2018. Consolidate IoT edge computing with lightweight virtualization. IEEE Netw. 32, 1 (2018), 102–111.
[116]
Vladimir Moravcevic, Milan Tucic, Roman Pavlovic, and Aleksandar Majdak. 2015. An approach for uniform representation and control of ZigBee devices in home automation software. In Proceedings of the IEEE 5th International Conference on Consumer Electronics (ICCE’15). IEEE, 237–239.
[117]
Arsalan Mosenia and Niraj K. Jha. 2017. A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5, 4 (2017), 586–602.
[118]
Carla Mouradian, Diala Naboulsi, Sami Yangui, Roch H. Glitho, Monique J. Morrow, and Paul A. Polakos. 2018. A comprehensive survey on Fog computing: State-of-the-art and research challenges. IEEE Commun. Surveys Tutor. 20, 1 (2018), 416–464.
[119]
Geoff Mulligan. 2007. The 6LoWPAN architecture. In Proceedings of the 4th Workshop on Embedded Networked Sensors. ACM, New York, NY, 78–82.
[120]
Arslan Munir, Prasanna Kansakar, and Samee U. Khan. 2017. IFCIoT: Integrated Fog cloud IoT: A novel architectural paradigm for the future Internet of Things. IEEE Consum. Electron. Mag. 6, 3 (2017), 74–82.
[121]
Arslan Musaddiq, Yousaf Bin Zikria, Oliver Hahm, Heejung Yu, Ali Kashif Bashir, and Sung Won Kim. 2018. A survey on resource management in IoT operating systems. IEEE Access 6 (2018), 8459–8482.
[122]
Karan Nair, Janhavi Kulkarni, Mansi Warde, Zalak Dave, Vedashree Rawalgaonkar, Ganesh Gore, and Jonathan Joshi. 2015. Optimizing power consumption in IoT based wireless sensor networks using bluetooth low energy. In Proceedings of the International Conference on Green Computing and Internet of Things (ICGCIoT’15). IEEE, 589–593.
[123]
Rick Nelson. 2017. Smart factories leverage cloud, edge computing. Eval. Eng. 56, 6 (2017), 14.
[124]
Kim Thuat Nguyen, Maryline Laurent, and Nouha Oualha. 2015. Survey on secure communication protocols for the internet of things. Ad Hoc Netw. 32 (2015), 17–31.
[125]
Dennis Kengo Oka, Takahiro Furue, Lennart Langenhop, and Tomohiro Nishimura. 2014. Survey of vehicle IoT bluetooth devices. In Proceedings of the IEEE 7th International Conference on Service-Oriented Computing and Applications. IEEE, 260–264.
[126]
Babatunji Omoniwa, Riaz Hussain, Muhammad Awais Javed, Safdar Hussain Bouk, and Shahzad A. Malik. 2019. Fog/Edge computing-based IoT (FECIoT): Architecture, applications, and research issues. IEEE Internet Things J. 6, 3 (2019), 4118–4149.
[127]
Jose A. Onieva, Ruben Rios, Rodrigo Roman, and Javier Lopez. 2019. Edge-assisted vehicular networks security. IEEE Internet Things J. 6, 5 (2019), 8038–8045.
[128]
Pouya Ostovari, Abdallah Khreishah, and Jie Wu. 2013. Cache content placement using triangular network coding. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’13). IEEE, 1375–1380.
[129]
Michael O’Keeffe. 2008. The paillier cryptosystem. Math. Dept. 18 (Apr. 2008), 1–16.
[130]
Jianli Pan and James McElhannon. 2018. Future edge cloud and edge computing for internet of things applications. IEEE Internet Things J. 5, 1 (2018), 439–449.
[131]
Heejin Park, Shuang Zhai, Long Lu, and Felix Xiaozhu Lin. 2019. StreamBox-TZ: Secure stream analytics at the edge with TrustZone. In Proceedings of the USENIX Annual Technical Conference (ATC’19). 537–554.
[132]
Yao Peng, Longfei Shangguan, Yue Hu, Yujie Qian, Xianshang Lin, Xiaojiang Chen, Dingyi Fang, and Kyle Jamieson. 2018. PLoRa: A passive long-range data network from ambient LoRa transmissions. In Proceedings of the ACM Special Interest Group on Data Communications (SIGCOMM’18). ACM, New York, NY, 147–160.
[133]
Charith Perera, Chi Harold Liu, Srimal Jayawardena, and Min Chen. 2014. A survey on internet of things from industrial market perspective. IEEE Access 2 (2014), 1660–1679.
[134]
Charith Perera, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2014. Context aware computing for the internet of things: A survey. IEEE Commun. Surveys Tutor. 16, 1 (2014), 414–454.
[135]
Tara Petrić, Mathieu Goessens, Loutfi Nuaymi, Laurent Toutain, and Alexander Pelov. 2016. Measurements, performance and analysis of LoRa FABIAN, a real-world implementation of LPWAN. In Proceedings of the IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC’16). IEEE, 1–7.
[136]
Vitaly Petrov, Andrey Samuylov, Vyacheslav Begishev, Dmitri Moltchanov, Sergey Andreev, Konstantin Samouylov, and Yevgeni Koucheryavy. 2018. Vehicle-based relay assistance for opportunistic crowdsensing over narrowband IoT (NB-IoT). IEEE Internet Things J. 5, 5 (2018), 3710–3723.
[137]
Juha Petäjäjärvi, Konstantin Mikhaylov, Marko Pettissalo, Janne Janhunen, and Jari Iinatti. 2017. Performance of a low-power wide-area network based on LoRa technology: Doppler robustness, scalability, and coverage. Int. J. Distrib. Sensor Netw. 13, 3 (2017), 1550147717699412.
[138]
Pawani Porambage, Jude Okwuibe, Madhusanka Liyanage, Mika Ylianttila, and Tarik Taleb. 2018. Survey on multi-access edge computing for internet of things realization. IEEE Commun. Surveys Tutor. 20, 4 (2018), 2961–2991.
[139]
Zane D. Purvis and Alexander G. Dean. 2008. TOSSTI: Saving time and energy in TinyOS with software thread integration. In Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium. IEEE, 354–363.
[140]
Zhijing Qin, Grit Denker, Carlo Giannelli, Paolo Bellavista, and Nalini Venkatasubramanian. 2014. A software defined networking architecture for the internet-of-things. In Proceedings of the IEEE Network Operations and Management Symposium (NOMS’14). IEEE, 1–9.
[141]
Meikang Qiu, Sun-Yuan Kung, and Keke Gai. 2020. Intelligent security and optimization in Edge/Fog Computing. Future Generation Computer Systems 107 (2020), 1140–1142. DOI:
[142]
Wajid Rafique, Lianyong Qi, Ibrar Yaqoob, Muhammad Imran, Raihan Ur Rasool, and Wanchun Dou. 2020. Complementing IoT services through software defined networking and edge computing: A comprehensive survey. IEEE Commun. Surveys Tutor. 22, 3 (2020), 1761–1804.
[143]
Amir M. Rahmani, Tuan Nguyen Gia, Behailu Negash, Arman Anzanpour, Iman Azimi, Mingzhe Jiang, and Pasi Liljeberg. 2018. Exploiting smart e-health gateways at the edge of healthcare internet-of-things: A Fog computing approach. Future Gen. Comput. Syst. 78 (2018), 641–658.
[144]
Muhammad Raheel Raza, Asaf Varol, and Nurhayat Varol. 2020. Cloud and Fog computing: A survey to the concept and challenges. In Proceedings of the International Symposium on Digital Forensics and Security (ISDFS’20). IEEE, 1–6.
[145]
Biljana L. Risteska Stojkoska and Kire V. Trivodaliev. 2017. A review of internet of things for smart home: Challenges and solutions. J. Cleaner Prod. 140 (2017), 1454–1464.
[146]
Rodrigo Roman, Javier Lopez, and Masahiro Mambo. 2018. Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Gen. Comput. Syst. 78 (2018), 680–698.
[147]
Eyal Ronen, Adi Shamir, Achi-Or Weingarten, and Colin O’Flynn. 2017. IoT goes nuclear: Creating a ZigBee chain reaction. In Proceedings of the IEEE Symposium on Security and Privacy (S&P’17). IEEE, 195–212.
[148]
Dario Sabella, Alessandro Vaillant, Pekka Kuure, Uwe Rauschenbach, and Fabio Giust. 2016. Mobile-edge computing architecture: The role of MEC in the internet of things. IEEE Consum. Electron. Mag. 5, 4 (2016), 84–91.
[149]
Ahmad-Reza Sadeghi, Christian Wachsmann, and Michael Waidner. 2015. Security and privacy challenges in industrial internet of things. In Proceedings of the ACM/EDAC/IEEE Design Automation Conference (DAC’15). IEEE, 1–6.
[150]
Yuvraj Sahni, Jiannong Cao, and Lei Yang. 2019. Data-aware task allocation for achieving low latency in collaborative edge computing. IEEE Internet Things J. 6, 2 (2019), 3512–3524.
[151]
Ahsan Saleem, Abid Khan, Saif Ur Rehman Malik, Haris Pervaiz, Hassan Malik, Masoom Alam, and Anish Jindal. 2020. FESDA: Fog-enabled secure data aggregation in smart grid IoT network. IEEE Internet Things J. 7, 7 (2020), 6132–6142.
[152]
Ola Salman, Imad Elhajj, Ali Chehab, and Ayman Kayssi. 2018. IoT survey: An SDN and Fog computing perspective. Comput. Netw. 143 (2018), 221–246.
[153]
Ola Salman, Imad Elhajj, Ayman Kayssi, and Ali Chehab. 2015. Edge computing enabling the internet of things. In Proceedings of the IEEE 2nd World Forum on Internet of Things (WF-IoT’15). IEEE, 603–608.
[154]
Zihao Sang, Songtao Guo, Quyuan Wang, and Ying Wang. 2021. GCS: Collaborative video cache management strategy in multi-access edge computing. Ad Hoc Netw. 117 (2021), 102516.
[155]
Subhadeep Sarkar, Subarna Chatterjee, and Sudip Misra. 2018. Assessment of the suitability of Fog computing in the context of internet of things. IEEE Trans. Cloud Comput. 6, 1 (2018), 46–59.
[156]
Mahadev Satyanarayanan, Pieter Simoens, Yu Xiao, Padmanabhan Pillai, Zhuo Chen, Kiryong Ha, Wenlu Hu, and Brandon Amos. 2015. Edge analytics in the internet of things. IEEE Pervas. Comput. 14, 2 (2015), 24–31.
[157]
Pallavi Sethi and Smruti R. Sarangi. 2017. Internet of things: Architectures, protocols, and applications. J. Electric. Comput. Eng. 2017 (2017), 9324035.
[158]
Mansoor Shafi, Andreas F. Molisch, Peter J. Smith, Thomas Haustein, Peiying Zhu, Prasan De Silva, Fredrik Tufvesson, Anass Benjebbour, and Gerhard Wunder. 2017. 5G: A tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J. Select. Areas Commun. 35, 6 (2017), 1201–1221.
[159]
Sajjad Hussain Shah and Ilyas Yaqoob. 2016. A survey: Internet of things (IOT) technologies, applications and challenges. In Proceedings of the IEEE Smart Energy Grid Engineering (SEGE’16). IEEE, 381–385.
[160]
Majlesi Shahrbanoo, Mehrpour Ali, and Mehran Mohsenzadeh. 2012. An approach for agile SOA development using agile principals. Retrieved from https://arxiv.org/abs/1204.0368.
[161]
Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In Proceedings of the ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (Mobihoc’17). ACM, New York, NY, Article 5, 10 pages.
[162]
Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. 2016. Edge computing: Vision and challenges. IEEE Internet Things J. 3, 5 (2016), 637–646.
[163]
Kyung-Ah Shim. 2019. Universal forgery attacks on remote authentication schemes for wireless body area networks based on internet of things. IEEE Internet Things J. 6, 5 (2019), 9211–9212.
[164]
Jose Costa Sapalo Sicato, Sushil Kumar Singh, Shailendra Rathore, and Jong Hyuk Park. 2020. A comprehensive analyses of intrusion detection system for IoT environment. J. Info. Process. Syst. 16, 4 (2020), 975–990.
[165]
Rashmi Sharan Sinha, Yiqiao Wei, and Seung-Hoon Hwang. 2017. A survey on LPWA technology: LoRa and NB-IoT. ICT Express 3, 1 (2017), 14–21.
[166]
S. Smys, B. Abul, and W. Haoxiang. 2020. Hybrid intrusion detection system for internet of things (IoT). J. ISMAC 2, 4 (2020), 190–199.
[167]
Alexandru Stanciu. 2017. Blockchain based distributed control system for edge computing. In Proceedings of the International Conference on Control Systems and Computer Science (CSCS’17). IEEE, 667–671.
[168]
Mark W. Storer, Kevin Greenan, Darrell D. E. Long, and Ethan L. Miller. 2008. Secure data deduplication. In Proceedings of the ACM International Workshop on Storage Security and Survivability. ACM, New York, NY, 1–10.
[169]
Hung-Min Sun, Shih-Pu Hsu, and Chien-Ming Chen. 2007. Mobile jamming attack and its countermeasure in wireless sensor networks. In Proceedings of the International Conference on Advanced Information Networking and Applications Workshops (AINAW’07), Vol. 1. IEEE, 457–462.
[170]
Xiang Sun and Nirwan Ansari. 2016. EdgeIoT: Mobile edge computing for the internet of things. IEEE Commun. Mag. 54, 12 (2016), 22–29.
[171]
Tarik Taleb, Sunny Dutta, Adlen Ksentini, Muddesar Iqbal, and Hannu Flinck. 2017. Mobile edge computing potential in making cities smarter. IEEE Commun. Mag. 55, 3 (2017), 38–43.
[172]
Tuyen X. Tran, Abolfazl Hajisami, Parul Pandey, and Dario Pompili. 2017. Collaborative mobile edge computing in 5G networks: New paradigms, scenarios, and challenges. IEEE Commun. Mag. 55, 4 (2017), 54–61.
[173]
Fan-Hsun Tseng, Li-Der Chou, and Han-Chieh Chao. 2011. A survey of black hole attacks in wireless mobile ad hoc networks. Hum.-centric Comput. Info. Sci. 1, 1 (2011), 4.
[174]
Carlo Vallati, Antonio Virdis, Enzo Mingozzi, and Giovanni Stea. 2016. Mobile-edge computing come home connecting things in future smart homes using LTE device-to-device communications. IEEE Consum. Electr. Mag. 5, 4 (2016), 77–83.
[175]
M. Vellanki, S. P. R. Kandukuri, and A. Razaque. 2016. Node level energy efficiency protocol for internet of things. J. Theoret. Comput. Sci. 3 (2016), 5.
[176]
Prabal Verma and Sandeep K. Sood. 2018. Fog assisted-IoT enabled patient health monitoring in smart homes. IEEE Internet Things J. 5, 3 (2018), 1789–1796.
[177]
Massimo Villari, Maria Fazio, Schahram Dustdar, Omer Rana, and Rajiv Ranjan. 2016. Osmotic computing: A new paradigm for edge/cloud integration. IEEE Cloud Comput. 3, 6 (2016), 76–83.
[178]
G. V. Vivek and M. P. Sunil. 2015. Enabling IOT services using WIFI-ZigBee gateway for a home automation system. In Proceedings of the IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN’15). IEEE, 77–80.
[179]
Haoqin Wang, Zhen Chen, Guanping Xiao, and Zheng Zheng. 2016. Network of networks in Linux operating system. Physica A: Stat. Mech. Appl. 447 (2016), 520–526.
[180]
Tian Wang, Guangxue Zhang, Anfeng Liu, Md Zakirul Alam Bhuiyan, and Qun Jin. 2019. A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet Things J. 6, 3 (2019), 4831–4843.
[181]
Xiaoding Wang, Sahil Garg, Hui Lin, Georges Kaddoum, Jia Hu, and M. Shamim Hossain. 2020. A secure data aggregation strategy in edge computing and blockchain empowered internet of things. IEEE Internet Things J. (2020), 1–1.
[182]
Mohammad Wazid, Poonam Reshma Dsouza, Ashok Kumar Das, Vivekananda Bhat K.Neeraj Kumar, and Joel J. P. C. Rodrigues. 2019. RAD-EI: A routing attack detection scheme for edge-based internet of things environment. Int. J. Commun. Syst. 32, 15 (2019), e4024.
[183]
Hua Wei, Hong Luo, Yan Sun, and Mohammad S. Obaidat. 2020. Cache-aware computation offloading in IoT systems. IEEE Syst. J. 14, 1 (2020), 61–72.
[184]
Juan Wen, Kaibin Huang, Sheng Yang, and Victor O. K. Li. 2017. Cache-enabled heterogeneous cellular networks: Optimal tier-level content placement. IEEE Trans. Wireless Commun. 16, 9 (2017), 5939–5952.
[185]
Bernd W. Wirtz, Jan C. Weyerer, and Franziska T. Schichtel. 2019. An integrative public IoT framework for smart government. Govern. Info. Quart. 36, 2 (2019), 333–345.
[186]
Junjuan Xia, Chao Li, Xiazhi Lai, Shiwei Lai, Fusheng Zhu, Dan Deng, and Liseng Fan. 2020. Cache-aided mobile edge computing for B5G wireless communication networks. EURASIP J. Wireless Commun. Netw. 2020, 1 (2020), 1–10.
[187]
Chenhan Xu, Kun Wang, Peng Li, Song Guo, Jiangtao Luo, Baoliu Ye, and Minyi Guo. 2018. Making big data open in edges: A resource-efficient blockchain-based approach. IEEE Trans. Parallel Distrib. Syst. 30, 4 (2018), 870–882.
[188]
Li Da Xu, Wu He, and Shancang Li. 2014. Internet of things in industries: A survey. IEEE Trans. Industr. Inform. 10, 4 (2014), 2233–2243.
[189]
Xiaolong Xu, Qingxiang Liu, Yun Luo, Kai Peng, Xuyun Zhang, Shunmei Meng, and Lianyong Qi. 2019. A computation offloading method over big data for IoT-enabled cloud-edge computing. Future Gen. Comput. Syst. 95 (2019), 522–533.
[190]
Zhiwei Xu, Lu Chao, and Xiaohui Peng. 2019. T-REST: An open-enabled architectural style for the internet of things. IEEE Internet Things J. 6, 3 (2019), 4019–4034.
[191]
Dylan Yaga, Peter Mell, Nik Roby, and Karen Scarfone. 2018. Blockchain Technology Overview. NIST Interagency/Internal Report (NISTIR), National Institute of Standards and Technology, Gaithersburg, MD. DOI:
[192]
Shanhe Yi, Cheng Li, and Qun Li. 2015. A survey of Fog computing: Concepts, applications and issues. In Proceedings of the Workshop on Mobile Big Data. ACM, New York, NY, 37–42.
[193]
Changsheng You, Kaibin Huang, Hyukjin Chae, and Byoung-Hoon Kim. 2016. Energy-efficient resource allocation for mobile-edge computation offloading. IEEE Trans. Wireless Commun. 16, 3 (2016), 1397–1411.
[194]
Wei Yu, Fan Liang, Xiaofei He, William Grant Hatcher, Chao Lu, Jie Lin, and Xinyu Yang. 2018. A survey on the edge computing for the internet of things. IEEE Access 6 (2018), 6900–6919.
[195]
Faisal A. Zaman, Abdallah Jarray, and Ahmed Karmouch. 2019. Software defined network-based edge cloud resource allocation framework. IEEE Access 7 (2019), 10672–10690.
[196]
John K. Zao, Tchin Tze Gan, Chun Kai You, Sergio José Rodríguez Méndez, Cheng En Chung, Yu Te Wang, Tim Mullen, and Tzyy Ping Jung. 2014. Augmented brain computer interaction based on Fog computing and linked data. In Proceedings of the International Conference on Intelligent Environments. IEEE, 374–377.
[197]
Jiale Zhang, Bing Chen, Yanchao Zhao, Xiang Cheng, and Feng Hu. 2018. Data security and privacy-preserving in edge computing paradigm: Survey and open issues. IEEE Access 6 (2018), 18209–18237.
[198]
Ma Zhaofeng, Wang Xiaochang, Deepak Kumar Jain, Haneef Khan, Gao Hongmin, and Wang Zhen. 2019. A blockchain-based trusted data management scheme in edge computing. IEEE Trans. Industr. Inform. 16, 3 (2019), 2013–2021.
[199]
Jiehan Zhou, Teemu Leppanen, Erkki Harjula, Mika Ylianttila, Timo Ojala, Chen Yu, Hai Jin, and Laurence Tianruo Yang. 2013. CloudThings: A common architecture for integrating the internet of things with cloud computing. In Proceedings of the IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD’13). IEEE, 651–657.
[200]
Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin Sun, and Jian Ma. 2010. ZiFi: Wireless LAN discovery via ZigBee interference signatures. In Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MobiCom’10). ACM, New York, NY, 49–60.

Cited By

View all
  • (2025)Cooperative Digital Healthcare Task Scheduling and Resource Management in Edge Intelligence SystemsTsinghua Science and Technology10.26599/TST.2024.901014030:2(926-945)Online publication date: Apr-2025
  • (2024)Edge Computing Empowering Distributed Computing at the EdgeEmerging Trends in Cloud Computing Analytics, Scalability, and Service Models10.4018/979-8-3693-0900-1.ch003(67-83)Online publication date: 25-Jan-2024
  • (2024)Downlink Non-Orthogonal Multiple Access Power Allocation Algorithm Based on Double Deep Q Network for Ensuring User’s Quality of ServiceSymmetry10.3390/sym1612161316:12(1613)Online publication date: 5-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 55, Issue 8
August 2023
789 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3567473
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 December 2022
Online AM: 13 August 2022
Accepted: 02 August 2022
Revised: 22 July 2022
Received: 02 May 2021
Published in CSUR Volume 55, Issue 8

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Edge computing
  2. Internet of Things

Qualifiers

  • Survey
  • Refereed

Funding Sources

  • NSFC
  • Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning, and Open Research Projects of Zhejiang

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,819
  • Downloads (Last 6 weeks)269
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Cooperative Digital Healthcare Task Scheduling and Resource Management in Edge Intelligence SystemsTsinghua Science and Technology10.26599/TST.2024.901014030:2(926-945)Online publication date: Apr-2025
  • (2024)Edge Computing Empowering Distributed Computing at the EdgeEmerging Trends in Cloud Computing Analytics, Scalability, and Service Models10.4018/979-8-3693-0900-1.ch003(67-83)Online publication date: 25-Jan-2024
  • (2024)Downlink Non-Orthogonal Multiple Access Power Allocation Algorithm Based on Double Deep Q Network for Ensuring User’s Quality of ServiceSymmetry10.3390/sym1612161316:12(1613)Online publication date: 5-Dec-2024
  • (2024)Industrial IoT-Based Energy Monitoring System: Using Data Processing at EdgeIoT10.3390/iot50400275:4(608-633)Online publication date: 28-Sep-2024
  • (2024)Flexible Hyper-Distributed IoT–Edge–Cloud Platform for Real-Time Digital Twin Applications on 6G-Intended Testbeds for Logistics and IndustryFuture Internet10.3390/fi1611043116:11(431)Online publication date: 20-Nov-2024
  • (2024)Optimizing Data Processing: A Comparative Study of Big Data Platforms in Edge, Fog, and Cloud LayersApplied Sciences10.3390/app1401045214:1(452)Online publication date: 4-Jan-2024
  • (2024)Workload Prediction for Efficient Node Management in Mobile Edge Computing2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619775(461-467)Online publication date: 3-Jun-2024
  • (2024)Optimizing IoT Performance Through Edge Computing: Reducing Latency, Enhancing Bandwidth Efficiency, and Strengthening Security for 2025 Applications2024 36th Conference of Open Innovations Association (FRUCT)10.23919/FRUCT64283.2024.10749858(145-158)Online publication date: 30-Oct-2024
  • (2024)PairwiseHist: Fast, Accurate and Space-Efficient Approximate Query Processing with Data CompressionProceedings of the VLDB Endowment10.14778/3648160.364818117:6(1432-1445)Online publication date: 3-May-2024
  • (2024)A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matchingJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-023-00584-713:1Online publication date: 3-Feb-2024
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media