Edge computing in smart health care systems: Review, challenges, and research directions DOI
Morghan Hartmann, Umair Sajid Hashmi, Muhammad Ali Imran

et al.

Transactions on Emerging Telecommunications Technologies, Journal Year: 2019, Volume and Issue: 33(3)

Published: Aug. 2, 2019

Abstract Today, patients are demanding a newer and more sophisticated health care system, one that is personalized matches the speed of modern life. For latency energy efficiency requirements to be met for real‐time collection analysis data, an edge computing environment answer, combined with 5G speeds techniques. Previous surveys have focused on new fog architecture sensor types, which leaves untouched aspect optimal techniques, such as encryption, authentication, classification used devices deployed in architecture. This paper aims first survey current emerging architectures techniques applications, well identify challenges various use cases. Edge application primarily focuses data involving vital sign monitoring fall detection. Other low‐latency applications perform specific symptom diseases, gait abnormalities Parkinson's disease patients. We also present our exhaustive review operations include transmission, classification, reduction, prediction. Even these advantages, has some associated challenges, including privacy reduction methods allow comparable performance their Cloud‐based counterparts, but lower computational complexity. Future research directions been identified offer higher quality life users if addressed.

Language: Английский

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures DOI Creative Commons
Vikas Hassija, Vinay Chamola, Vikas Saxena

et al.

IEEE Access, Journal Year: 2019, Volume and Issue: 7, P. 82721 - 82743

Published: Jan. 1, 2019

The Internet of Things (IoT) is the next era communication. Using IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks are trying empower inanimate act without any human intervention. existing upcoming highly promising increase level comfort, efficiency, automation for users. To able implement such world an ever-growing fashion requires high security, privacy, authentication, recovery from attacks. In this regard, it imperative make required changes architecture achieving end-to-end secure environments. paper, detailed review security-related challenges sources threat presented. After discussing security issues, various emerging technologies focused degree trust discussed. Four technologies, blockchain, fog computing, edge machine learning,

Language: Английский

Citations

1154

A Survey of Multi-Access Edge Computing in 5G and Beyond: Fundamentals, Technology Integration, and State-of-the-Art DOI Creative Commons
Quoc‐Viet Pham, Fang Fang, Vu Nguyen Ha

et al.

IEEE Access, Journal Year: 2020, Volume and Issue: 8, P. 116974 - 117017

Published: Jan. 1, 2020

Driven by the emergence of new compute-intensive applications and vision Internet Things (IoT), it is foreseen that emerging 5G network will face an unprecedented increase in traffic volume computation demands. However, end users mostly have limited storage capacities finite processing capabilities, thus how to run on resource-constrained has recently become a natural concern. Mobile edge computing (MEC), key technology fifth generation (5G) network, can optimize mobile resources hosting applications, process large data before sending cloud, provide cloud-computing capabilities within radio access (RAN) close proximity users, offer context-aware services with help RAN information. Therefore, MEC enables wide variety where real-time response strictly required, e.g., driverless vehicles, augmented reality, robotics, immerse media. Indeed, paradigm shift from 4G could reality advent technological concepts. The successful realization still its infancy demands for constant efforts both academic industry communities. In this survey, we first holistic overview potential use cases applications. Then, outline up-to-date researches integration technologies be deployed beyond. We also summarize testbeds experimental evaluations, open source activities, computing. further lessons learned state-of-the-art research works as well discuss challenges future directions research.

Language: Английский

Citations

744

Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges DOI
Ruizhe Yang, F. Richard Yu, Pengbo Si

et al.

IEEE Communications Surveys & Tutorials, Journal Year: 2019, Volume and Issue: 21(2), P. 1508 - 1532

Published: Jan. 1, 2019

Blockchain, as the underlying technology of crypto-currencies, has attracted significant attention. It been adopted in numerous applications, such smart grid and Internet-of-Things. However, there is a scalability barrier for blockchain, which limits its ability to support services with frequent transactions. On other side, edge computing introduced extend cloud resources be distributed at network, but currently faces challenges decentralized management security. The integration blockchain into one system can enable reliable access control storage, computation edges, hence providing large scale network servers, data validity near end secure manner. Despite prospect integrated systems, enhancement, self organization, functions integration, resource management, new security issues remain addressed before widespread deployment. In this survey, we investigate some work that done discuss research challenges. We identify several vital aspects computing: motivations, frameworks, enabling functionalities, Finally, broader perspectives are explored.

Language: Английский

Citations

619

A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends DOI Creative Commons
William G. Hatcher, Wei Yu

IEEE Access, Journal Year: 2018, Volume and Issue: 6, P. 24411 - 24432

Published: Jan. 1, 2018

Deep learning has exploded in the public consciousness, primarily as predictive and analytical products suffuse our world, form of numerous human-centered smart-world systems, including targeted advertisements, natural language assistants interpreters, prototype self-driving vehicle systems. Yet to most, underlying mechanisms that enable such smart remain obscure. In contrast, researchers across disciplines have been incorporating deep into their research solve problems could not approached before. this paper, we seek provide a thorough investigation its applications mechanisms. Specifically, categorical collection state art research, hope broad reference for those seeking primer on various implementations, platforms, algorithms, uses variety Furthermore, outline recent key advancements technology, insight areas, which can improve investigation, well highlight new areas yet see application learning, but nonetheless benefit immensely. We survey provides valuable practitioners, innovate learning.

Language: Английский

Citations

562

A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective DOI Creative Commons
Hansong Xu, Wei Yu, David Griffith

et al.

IEEE Access, Journal Year: 2018, Volume and Issue: 6, P. 78238 - 78259

Published: Jan. 1, 2018

The vision of Industry 4.0, otherwise known as the fourth industrial revolution, is integration massively deployed smart computing and network technologies in production manufacturing settings for purposes automation, reliability, control, implicating development an Industrial Internet Things (I-IoT). Specifically, I-IoT devoted to adopting (IoT) enable interconnection anything, anywhere, at anytime system context improve productivity, efficiency, safety intelligence. As emerging technology, has distinct properties requirements that distinguish it from consumer IoT, including unique types devices incorporated, quality service requirements, strict needs command control. To more clearly understand complexities its needs, present a unified assessment technology systems perspective, this paper we comprehensively survey body existing research on I-IoT. Particularly, first architecture, applications (i.e., factory automation (FA) process (PA)) their characteristics. We then consider efforts three key aspects networking computing. Regarding categorize control recent relevant efforts. Next, considering networking, propose three-dimensional framework explore space, investigate adoption some representative technologies, 5G, machine-to-machine (M2M) communication, software defined (SDN). Similarly, concerning computing, again second explores problem space I-IoT, cloud, edge, hybrid cloud edge platforms. Finally, outline particular challenges future systems, well machine learning, context.

Language: Английский

Citations

521

AI for next generation computing: Emerging trends and future directions DOI
Sukhpal Singh Gill, Minxian Xu, Carlo Ottaviani

et al.

Internet of Things, Journal Year: 2022, Volume and Issue: 19, P. 100514 - 100514

Published: March 5, 2022

Language: Английский

Citations

459

A Full Dive Into Realizing the Edge-Enabled Metaverse: Visions, Enabling Technologies, and Challenges DOI
Minrui Xu, Wei Chong Ng, Wei Yang Bryan Lim

et al.

IEEE Communications Surveys & Tutorials, Journal Year: 2022, Volume and Issue: 25(1), P. 656 - 700

Published: Nov. 10, 2022

Dubbed "the successor to the mobile Internet," concept of Metaverse has grown in popularity. While there exist lite versions today, they are still far from realizing full vision an immersive, embodied, and interoperable Metaverse. Without addressing issues implementation communication networking, as well computation perspectives, is difficult succeed Internet, especially terms its accessibility billions users today. In this survey, we focus on edge-enabled realize ultimate vision. We first provide readers with a succinct tutorial Metaverse, introduction architecture, current developments. To enable ubiquitous, seamless, embodied access discuss networking challenges survey cutting-edge solutions concepts that leverage next-generation systems for immerse interact avatars Moreover, given high costs required, e.g., render 3D virtual worlds run data-hungry artificial intelligence-driven avatars, cloud-edge-end framework-driven resource-constrained edge devices. Next, explore how blockchain technologies can aid development not just empowering economic circulation user-generated content but also manage physical resources decentralized, transparent, immutable manner. Finally, future research directions towards true

Language: Английский

Citations

372

Edge-Computing-Enabled Smart Cities: A Comprehensive Survey DOI
Latif U. Khan, Ibrar Yaqoob, Nguyen H. Tran

et al.

IEEE Internet of Things Journal, Journal Year: 2020, Volume and Issue: 7(10), P. 10200 - 10232

Published: April 10, 2020

Recent years have disclosed a remarkable proliferation of compute-intensive applications in smart cities. Such continuously generate enormous amounts data which demand strict latency-aware computational processing capabilities. Although edge computing is an appealing technology to compensate for stringent latency-related issues, its deployment engenders new challenges. In this article, we highlight the role realizing vision First, analyze evolution paradigms. Subsequently, critically review state-of-the-art literature focusing on Later, categorize and classify by devising comprehensive meticulous taxonomy. Furthermore, identify discuss key requirements, enumerate recently reported synergies computing-enabled Finally, several indispensable open challenges along with their causes guidelines are discussed, serving as future research directions.

Language: Английский

Citations

328

Adaptive Learning-Based Task Offloading for Vehicular Edge Computing Systems DOI Creative Commons
Yuxuan Sun, Xueying Guo, Jinhui Song

et al.

IEEE Transactions on Vehicular Technology, Journal Year: 2019, Volume and Issue: 68(4), P. 3061 - 3074

Published: April 1, 2019

The vehicular edge computing system integrates the resources of vehicles, and provides services for other vehicles pedestrians with task offloading. However, offloading environment is dynamic uncertain, fast varying network topologies, wireless channel states, workloads. These uncertainties bring extra challenges to In this paper, we consider among propose a solution that enables learn delay performance their neighboring while computation tasks. We design an adaptive learning based (ALTO) algorithm on multi-armed bandit theory, in order minimize average delay. ALTO works distributed manner without requiring frequent state exchange, augmented input-awareness occurrence-awareness adapt environment. proposed proved have sublinear regret. Extensive simulations are carried out under both synthetic scenario realistic highway scenario, results illustrate achieves low performance, decreases up 30% compared existing upper confidence bound algorithm.

Language: Английский

Citations

307

Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey DOI
Wajid Rafique, Lianyong Qi, Ibrar Yaqoob

et al.

IEEE Communications Surveys & Tutorials, Journal Year: 2020, Volume and Issue: 22(3), P. 1761 - 1804

Published: Jan. 1, 2020

Millions of sensors continuously produce and transmit data to control real-world infrastructures using complex networks in the Internet Things (IoT). However, IoT devices are limited computational power, including storage, processing, communication resources, effectively perform compute-intensive tasks locally. Edge computing resolves resource limitation problems by bringing computation closer edge devices. Providing distributed nodes across network reduces stress centralized overcomes latency challenges IoT. Therefore, presents low-cost solutions for tasks. Software-Defined Networking (SDN) enables effective management presenting a global perspective network. While SDN was not explicitly developed challenges, it can, however, provide impetus solve complexity issues help efficient service orchestration. The current paradigm massive generation, infrastructures, security vulnerabilities, requirements from newly technologies make realization challenging issue. In this research, we an extensive survey on ecosystem challenge management. We present latest research orchestration (SDIoT-Edge) highlight key standardization efforts integrating these diverse architectures. An discussion different case studies SDIoT-Edge is presented envision underlying concept. Furthermore, classify state-of-the-art based multiple performance parameters. comprehensively privacy vulnerabilities detailed taxonomies attack possibilities paradigm. lessons learned our findings at end each section. Finally, discuss critical insights toward issues, further directions efficiently services

Language: Английский

Citations

298