5G, IoT, and edge computing convergence—Systems, services, and security
نویسندگان
چکیده
The 5th Generation Networks (5g), the Internet of Things (IoT), and Edge Computing are essential infrastructure enablers for a range new business technology developments, often termed Industry 4.0, that cover areas like autonomous vehicles, smart city grids, e-health, automated factories, mobile content streaming, data analytics. This marks significant step on journey to genuine digital transformation. special issue is intended foster state-of-the-art research in area systems, service, security integrating into 5G Computing, along with IoT platforms, including topics collaboration environment, implementation, execution real-world architecture novel applications associated this paradigm. main covered by or methodologies, modeling, analysis, newly introduced applications. Besides latest achievements, also deals innovative commercial management ever-growing 5G, IoT, edge interoperability experience applying recent advances problem. response community has been significant; 49 original contributions have submitted consideration. Among those, total seven papers were accepted after going through rigorous review process. All elements novelty, it adds reasonable existing works domain. They not only provide ideas techniques field but stimulate future sustainable AIoT systems. Most scientific workflow consist large number short runtime tasks involve amount transfer among dependent tasks, provides an opportunity clustering minimize virtual machine overhead cost. paper1 Alaa Q. Raheema Hiba A. Tarish, entitled “Secure aware grouping technique cloud- assisted things applications,” aims at reducing using technique, which takes consideration transferred obtain cluster reduces network optimizing rate. overall objective proposed algorithm reduce completion time cost executing application high reliability CIoT platform. system implemented, result analysis shows outperforms other related works. Searchable encryption considered important as both confidentiality searchability stored semitrusted environments such cloud. paper2 Shen-Ming Chung, Ming-Der Shieh, Tzi-Cker Chiueh, “FETCH: A cloud-native searchable scheme enabling efficient pattern search encrypted within cloud services,” presented called Frequency-Eliminated Trapdoor-Character Hopping (FETCH) that, based common-conditioned-subsequence-preserving (CCSP) techniques, able work natively off-the-shelf databases supports wildcard-based thereof. With CCSP study transforms problem wildcard searching subsequence searching, solved fast most thus fits well services general. FETCH does adequate protection fares much better than SE schemes terms query performance, storage overhead, deployment complexity. emerged paradigm where multiple embedded devices, known things, connected via collect, share, analyze from environment. In order overcome limited processing capacity constraint now possible integrate them servers resource pools. paper3 Mahdi Nikooghadam Haleh Amintoosi, communication CloudIoT design lightweight authentication session key agreement scheme,” protocol secure devices servers. proved requirements mutual authentication, device anonymity, perfect forward secrecy robust against attacks. authors formally verify protocol. evaluate computation costs demonstrate incurs minimum compared schemes, making suitable low capacity. Network virtualization (NV) ubiquitously indispensable attribute enable success forthcoming virtualized networks. paper4 Qiao Lu, Khoa Nguyen, Changcheng Huang, “Distributed parallel algorithms online embedding two distributed genetic algorithms, versions crossover mutation NV link problems latency efficiency. conducted independently computing machines details. validates scalability identical predefined machines. Extensive simulations shown can achieve performance integer linear programming-based solutions while meeting stringent yield superior running popular algorithms. Additionally, theoretical indicates be reduced logarithmic times evolution networks technology, aspirations users on-demand continue grow. Thus, subscribers require bandwidth latency. paper5 Bouchaib Assila, Abdellatif Kobbane, Jalel Ben-Othman, “Improving caching management: pricing economic approach Cournot, Bertrand, Stackelberg game models,” address issues wireless limitations throughput, latency, reliability. consider oligopolistic multimarket deducted Stackelberg, Bertrand models. For simulation purpose, considers routing AODV (Ad-hoc On-Demand Distance Vector) commonly used network. uses NS2 package, results End-to-End delay representing packet delivery ratio, normalized load. Smart communities emerging potential improve human life. paper6 Ghani ur Rehman, Anwar Ghani, Muhammad Zubair, Imran Saeed, Dhananjay Singh, “SOS: Socially omitting selfishness communities,” resolve selfish behaviors communities. mechanism, socially selfishness, manage oriented election An extended version Dempster Shafer model discourage behavior scheme. mathematical developed aforementioned aspects simulated environment framework. outperform contemporary average delay, energy. computing, service migration access users. paper7 Hongman Wang, Yingxue Li, Ao Zhou, Yan Guo, Shangguang “Service computing: deep reinforcement learning approach,” dynamic technique. hosted one more nodes each node resources. To optimize size Markov decision process space, paper devises make decision. implemented evaluated stability approaches. adapt different patterns. above either technical technologies Cyber Security propose models various Social fields. trigger further improvements Cloud Mobile Computing. Honorably, serves land-mark source education, information, reference professors, researchers, graduate students interested updating their knowledge Security, cyber-physical-system, information journal covers problem, practical sides. guest editors would express sincere gratitude Prof. Mohammad S. Obaidat giving prepare Special Issue. addition, we deeply indebted numerous reviewers professional effort, insight, hard put commenting selected articles reflect essence issue. We grateful all undertaking two-cycle revisions manuscripts, without could produced.
منابع مشابه
Reconfigurable Security: Edge Computing-based Framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security. We then introduce a new reconfigurable security framework based on edge computing, which utilizes a near-us...
متن کاملEdge Computing Aware NOMA for 5G Networks
With the fast development of Internet of things (IoT), the fifth generation (5G) wireless networks need to provide massive connectivity of IoT devices and meet the demand for low latency. To satisfy these requirements, Non-Orthogonal Multiple Access (NOMA) has been recognized as a promising solution for 5G networks to significantly improve the network capacity. In parallel with the development ...
متن کاملComplex Systems Science meets 5G and IoT
We propose a new paradigm for telecommunications, and develop a framework drawing on concepts from information (i.e., different metrics of complexity) and computational (i.e., agent based modeling) theory, adapted from complex system science. We proceed in a systematic fashion by dividing network complexity understanding and analysis into different layers. Modelling layer forms the foundation o...
متن کاملEnergy-Efficient Caching for Mobile Edge Computing in 5G Networks
Mobile Edge Computing (MEC), which is considered a promising and emerging paradigm to provide caching capabilities in proximity to mobile devices in 5G networks, enables fast, popular content delivery of delay-sensitive applications at the backhaul capacity of limited mobile networks. Most existing studies focus on cache allocation, mechanism design and coding design for caching. However, grid ...
متن کاملQoE-aware Edge Computing for Complex IoT Event Processing
Computing offloading is a promising technique for Internet of Things (IoT) to handle complex IoT events processing, e.g., voice recognition. Existing work mainly focuses on offloading in mobile networks, while little addresses the problems of heterogeneity and quality of experience (QoE) on resource constrained devices in edge networks. In this paper, we present a framework of QoE-aware edge co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communication Systems
سال: 2022
ISSN: ['1074-5351', '1099-1131']
DOI: https://doi.org/10.1002/dac.5373