Transactions on Emerging Telecommunications Technologies,
Journal Year:
2019,
Volume and Issue:
33(3)
Published: Aug. 2, 2019
Abstract
Today,
patients
are
demanding
a
newer
and
more
sophisticated
health
care
system,
one
that
is
personalized
matches
the
speed
of
modern
life.
For
latency
energy
efficiency
requirements
to
be
met
for
real‐time
collection
analysis
data,
an
edge
computing
environment
answer,
combined
with
5G
speeds
techniques.
Previous
surveys
have
focused
on
new
fog
architecture
sensor
types,
which
leaves
untouched
aspect
optimal
techniques,
such
as
encryption,
authentication,
classification
used
devices
deployed
in
architecture.
This
paper
aims
first
survey
current
emerging
architectures
techniques
applications,
well
identify
challenges
various
use
cases.
Edge
application
primarily
focuses
data
involving
vital
sign
monitoring
fall
detection.
Other
low‐latency
applications
perform
specific
symptom
diseases,
gait
abnormalities
Parkinson's
disease
patients.
We
also
present
our
exhaustive
review
operations
include
transmission,
classification,
reduction,
prediction.
Even
these
advantages,
has
some
associated
challenges,
including
privacy
reduction
methods
allow
comparable
performance
their
Cloud‐based
counterparts,
but
lower
computational
complexity.
Future
research
directions
been
identified
offer
higher
quality
life
users
if
addressed.
IEEE Access,
Journal Year:
2019,
Volume and Issue:
7, P. 82721 - 82743
Published: Jan. 1, 2019
The
Internet
of
Things
(IoT)
is
the
next
era
communication.
Using
IoT,
physical
objects
can
be
empowered
to
create,
receive,
and
exchange
data
in
a
seamless
manner.
Various
IoT
applications
focus
on
automating
different
tasks
are
trying
empower
inanimate
act
without
any
human
intervention.
existing
upcoming
highly
promising
increase
level
comfort,
efficiency,
automation
for
users.
To
able
implement
such
world
an
ever-growing
fashion
requires
high
security,
privacy,
authentication,
recovery
from
attacks.
In
this
regard,
it
imperative
make
required
changes
architecture
achieving
end-to-end
secure
environments.
paper,
detailed
review
security-related
challenges
sources
threat
presented.
After
discussing
security
issues,
various
emerging
technologies
focused
degree
trust
discussed.
Four
technologies,
blockchain,
fog
computing,
edge
machine
learning,
IEEE Access,
Journal Year:
2020,
Volume and Issue:
8, P. 116974 - 117017
Published: Jan. 1, 2020
Driven
by
the
emergence
of
new
compute-intensive
applications
and
vision
Internet
Things
(IoT),
it
is
foreseen
that
emerging
5G
network
will
face
an
unprecedented
increase
in
traffic
volume
computation
demands.
However,
end
users
mostly
have
limited
storage
capacities
finite
processing
capabilities,
thus
how
to
run
on
resource-constrained
has
recently
become
a
natural
concern.
Mobile
edge
computing
(MEC),
key
technology
fifth
generation
(5G)
network,
can
optimize
mobile
resources
hosting
applications,
process
large
data
before
sending
cloud,
provide
cloud-computing
capabilities
within
radio
access
(RAN)
close
proximity
users,
offer
context-aware
services
with
help
RAN
information.
Therefore,
MEC
enables
wide
variety
where
real-time
response
strictly
required,
e.g.,
driverless
vehicles,
augmented
reality,
robotics,
immerse
media.
Indeed,
paradigm
shift
from
4G
could
reality
advent
technological
concepts.
The
successful
realization
still
its
infancy
demands
for
constant
efforts
both
academic
industry
communities.
In
this
survey,
we
first
holistic
overview
potential
use
cases
applications.
Then,
outline
up-to-date
researches
integration
technologies
be
deployed
beyond.
We
also
summarize
testbeds
experimental
evaluations,
open
source
activities,
computing.
further
lessons
learned
state-of-the-art
research
works
as
well
discuss
challenges
future
directions
research.
IEEE Communications Surveys & Tutorials,
Journal Year:
2019,
Volume and Issue:
21(2), P. 1508 - 1532
Published: Jan. 1, 2019
Blockchain,
as
the
underlying
technology
of
crypto-currencies,
has
attracted
significant
attention.
It
been
adopted
in
numerous
applications,
such
smart
grid
and
Internet-of-Things.
However,
there
is
a
scalability
barrier
for
blockchain,
which
limits
its
ability
to
support
services
with
frequent
transactions.
On
other
side,
edge
computing
introduced
extend
cloud
resources
be
distributed
at
network,
but
currently
faces
challenges
decentralized
management
security.
The
integration
blockchain
into
one
system
can
enable
reliable
access
control
storage,
computation
edges,
hence
providing
large
scale
network
servers,
data
validity
near
end
secure
manner.
Despite
prospect
integrated
systems,
enhancement,
self
organization,
functions
integration,
resource
management,
new
security
issues
remain
addressed
before
widespread
deployment.
In
this
survey,
we
investigate
some
work
that
done
discuss
research
challenges.
We
identify
several
vital
aspects
computing:
motivations,
frameworks,
enabling
functionalities,
Finally,
broader
perspectives
are
explored.
IEEE Access,
Journal Year:
2018,
Volume and Issue:
6, P. 24411 - 24432
Published: Jan. 1, 2018
Deep
learning
has
exploded
in
the
public
consciousness,
primarily
as
predictive
and
analytical
products
suffuse
our
world,
form
of
numerous
human-centered
smart-world
systems,
including
targeted
advertisements,
natural
language
assistants
interpreters,
prototype
self-driving
vehicle
systems.
Yet
to
most,
underlying
mechanisms
that
enable
such
smart
remain
obscure.
In
contrast,
researchers
across
disciplines
have
been
incorporating
deep
into
their
research
solve
problems
could
not
approached
before.
this
paper,
we
seek
provide
a
thorough
investigation
its
applications
mechanisms.
Specifically,
categorical
collection
state
art
research,
hope
broad
reference
for
those
seeking
primer
on
various
implementations,
platforms,
algorithms,
uses
variety
Furthermore,
outline
recent
key
advancements
technology,
insight
areas,
which
can
improve
investigation,
well
highlight
new
areas
yet
see
application
learning,
but
nonetheless
benefit
immensely.
We
survey
provides
valuable
practitioners,
innovate
learning.
IEEE Access,
Journal Year:
2018,
Volume and Issue:
6, P. 78238 - 78259
Published: Jan. 1, 2018
The
vision
of
Industry
4.0,
otherwise
known
as
the
fourth
industrial
revolution,
is
integration
massively
deployed
smart
computing
and
network
technologies
in
production
manufacturing
settings
for
purposes
automation,
reliability,
control,
implicating
development
an
Industrial
Internet
Things
(I-IoT).
Specifically,
I-IoT
devoted
to
adopting
(IoT)
enable
interconnection
anything,
anywhere,
at
anytime
system
context
improve
productivity,
efficiency,
safety
intelligence.
As
emerging
technology,
has
distinct
properties
requirements
that
distinguish
it
from
consumer
IoT,
including
unique
types
devices
incorporated,
quality
service
requirements,
strict
needs
command
control.
To
more
clearly
understand
complexities
its
needs,
present
a
unified
assessment
technology
systems
perspective,
this
paper
we
comprehensively
survey
body
existing
research
on
I-IoT.
Particularly,
first
architecture,
applications
(i.e.,
factory
automation
(FA)
process
(PA))
their
characteristics.
We
then
consider
efforts
three
key
aspects
networking
computing.
Regarding
categorize
control
recent
relevant
efforts.
Next,
considering
networking,
propose
three-dimensional
framework
explore
space,
investigate
adoption
some
representative
technologies,
5G,
machine-to-machine
(M2M)
communication,
software
defined
(SDN).
Similarly,
concerning
computing,
again
second
explores
problem
space
I-IoT,
cloud,
edge,
hybrid
cloud
edge
platforms.
Finally,
outline
particular
challenges
future
systems,
well
machine
learning,
context.
IEEE Communications Surveys & Tutorials,
Journal Year:
2022,
Volume and Issue:
25(1), P. 656 - 700
Published: Nov. 10, 2022
Dubbed
"the
successor
to
the
mobile
Internet,"
concept
of
Metaverse
has
grown
in
popularity.
While
there
exist
lite
versions
today,
they
are
still
far
from
realizing
full
vision
an
immersive,
embodied,
and
interoperable
Metaverse.
Without
addressing
issues
implementation
communication
networking,
as
well
computation
perspectives,
is
difficult
succeed
Internet,
especially
terms
its
accessibility
billions
users
today.
In
this
survey,
we
focus
on
edge-enabled
realize
ultimate
vision.
We
first
provide
readers
with
a
succinct
tutorial
Metaverse,
introduction
architecture,
current
developments.
To
enable
ubiquitous,
seamless,
embodied
access
discuss
networking
challenges
survey
cutting-edge
solutions
concepts
that
leverage
next-generation
systems
for
immerse
interact
avatars
Moreover,
given
high
costs
required,
e.g.,
render
3D
virtual
worlds
run
data-hungry
artificial
intelligence-driven
avatars,
cloud-edge-end
framework-driven
resource-constrained
edge
devices.
Next,
explore
how
blockchain
technologies
can
aid
development
not
just
empowering
economic
circulation
user-generated
content
but
also
manage
physical
resources
decentralized,
transparent,
immutable
manner.
Finally,
future
research
directions
towards
true
IEEE Internet of Things Journal,
Journal Year:
2020,
Volume and Issue:
7(10), P. 10200 - 10232
Published: April 10, 2020
Recent
years
have
disclosed
a
remarkable
proliferation
of
compute-intensive
applications
in
smart
cities.
Such
continuously
generate
enormous
amounts
data
which
demand
strict
latency-aware
computational
processing
capabilities.
Although
edge
computing
is
an
appealing
technology
to
compensate
for
stringent
latency-related
issues,
its
deployment
engenders
new
challenges.
In
this
article,
we
highlight
the
role
realizing
vision
First,
analyze
evolution
paradigms.
Subsequently,
critically
review
state-of-the-art
literature
focusing
on
Later,
categorize
and
classify
by
devising
comprehensive
meticulous
taxonomy.
Furthermore,
identify
discuss
key
requirements,
enumerate
recently
reported
synergies
computing-enabled
Finally,
several
indispensable
open
challenges
along
with
their
causes
guidelines
are
discussed,
serving
as
future
research
directions.
IEEE Transactions on Vehicular Technology,
Journal Year:
2019,
Volume and Issue:
68(4), P. 3061 - 3074
Published: April 1, 2019
The
vehicular
edge
computing
system
integrates
the
resources
of
vehicles,
and
provides
services
for
other
vehicles
pedestrians
with
task
offloading.
However,
offloading
environment
is
dynamic
uncertain,
fast
varying
network
topologies,
wireless
channel
states,
workloads.
These
uncertainties
bring
extra
challenges
to
In
this
paper,
we
consider
among
propose
a
solution
that
enables
learn
delay
performance
their
neighboring
while
computation
tasks.
We
design
an
adaptive
learning
based
(ALTO)
algorithm
on
multi-armed
bandit
theory,
in
order
minimize
average
delay.
ALTO
works
distributed
manner
without
requiring
frequent
state
exchange,
augmented
input-awareness
occurrence-awareness
adapt
environment.
proposed
proved
have
sublinear
regret.
Extensive
simulations
are
carried
out
under
both
synthetic
scenario
realistic
highway
scenario,
results
illustrate
achieves
low
performance,
decreases
up
30%
compared
existing
upper
confidence
bound
algorithm.
IEEE Communications Surveys & Tutorials,
Journal Year:
2020,
Volume and Issue:
22(3), P. 1761 - 1804
Published: Jan. 1, 2020
Millions
of
sensors
continuously
produce
and
transmit
data
to
control
real-world
infrastructures
using
complex
networks
in
the
Internet
Things
(IoT).
However,
IoT
devices
are
limited
computational
power,
including
storage,
processing,
communication
resources,
effectively
perform
compute-intensive
tasks
locally.
Edge
computing
resolves
resource
limitation
problems
by
bringing
computation
closer
edge
devices.
Providing
distributed
nodes
across
network
reduces
stress
centralized
overcomes
latency
challenges
IoT.
Therefore,
presents
low-cost
solutions
for
tasks.
Software-Defined
Networking
(SDN)
enables
effective
management
presenting
a
global
perspective
network.
While
SDN
was
not
explicitly
developed
challenges,
it
can,
however,
provide
impetus
solve
complexity
issues
help
efficient
service
orchestration.
The
current
paradigm
massive
generation,
infrastructures,
security
vulnerabilities,
requirements
from
newly
technologies
make
realization
challenging
issue.
In
this
research,
we
an
extensive
survey
on
ecosystem
challenge
management.
We
present
latest
research
orchestration
(SDIoT-Edge)
highlight
key
standardization
efforts
integrating
these
diverse
architectures.
An
discussion
different
case
studies
SDIoT-Edge
is
presented
envision
underlying
concept.
Furthermore,
classify
state-of-the-art
based
multiple
performance
parameters.
comprehensively
privacy
vulnerabilities
detailed
taxonomies
attack
possibilities
paradigm.
lessons
learned
our
findings
at
end
each
section.
Finally,
discuss
critical
insights
toward
issues,
further
directions
efficiently
services