sensors-logo

Journal Browser

Journal Browser

Edge/Fog/Cloud Computing in the Internet of Things

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (31 December 2019) | Viewed by 85719

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Architecture, Universitat Politecnica de Catalunya (UPC), Barcelona, Spain
Interests: optical networks; in-operation planning; autonomic networking; monitoring; data analytics; big data for networking; data visualization; network slicing

E-Mail Website1 Website2
Guest Editor
Barcelona Supercomputing Center, Barcelona, Spain
Interests: big data frameworks; data-centric architectures; data-center optimization; applied learning methods; deep learning and AI with supercomputing; neural networks for data-streams

E-Mail Website1 Website2
Guest Editor
Universidad Autónoma de Madrid, Madrid, Spain
Interests: secure communications; secure devices; authentications; data privacy; policy-based security
CCABA - Advanced Broadband Communications Center, Universitat Politècnica de Catalunya, 08034 Barcelona, Spain
Interests: network architecture design; autonomic network operation; AI/ML-empowered network control; intent-based networking
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) is leading a revolution by redesigning classical devices, ranging from domestic electrical appliances to industrial robots, to integrate both programmability and network connectivity, thus, resulting in smart things. This comes with the unprecedent deployment of a variety of sensors and actuators in urban and even rural areas, as well as an almost ubiquitous connectivity.

The availability of edge and fog computing starts being supported by networking infrastructures, where computing and storage resources are located not only in the cloud, but also at the edges. The flexibility of hierarchical edge/fog/cloud computing infrastructures makes possible to decide whether artificial intelligence (AI)—including data analysis, machine learning (ML) training, and decision making—applied to data coming from sensors is carried out at the edge or uploaded to the fog and cloud infrastructures, with higher computation capabilities but far from actuators and applications running in-place. Therefore, advanced edge–fog–cloud computing architectures can provide the kind of support that IoT applications need to deploy AI methods in an efficient and scalable way. This special issue will provide special focus on applications, techniques, protocols, policies and architectures for edge and fog analytics, distributing computation on the edge/fog, and interaction between fog analytics and cloud analytics.

In addition, as a result of the distributed nature of IoT and the hierarchical edge/fog/cloud computing infrastructure, multiple challenges need to be faced to prevent or mitigate security holes, including attacks like Distributed Deny of Service (DDoS) and Man-in-the-Middle (MitM) that would lead to critical/confidential information eavesdropping, stealing algorithms/software and originating blackouts in IoT-based services, and provide acceptable level of security in their operation.

To address these challenges, this Special Issue will comprise a set of original contributions focusing on some of the key challenges in the context of edge/fog/cloud computing for IoT and will provide an overview of the current technical challenges.

Some topics of interest include, but are not limited to:

  • IoT applications taking advantage from edge/fog/cloud distributed computing
  • Distributed architectures in support of IoT applications
  • Network protocols and communication issues
  • Distributed data analytics, data processing, modeling and training
  • Edge and Fog management protocols and policies for workload communication and distribution
  • Privacy issues to prevent non-authorized data access
  • Security issues including secure communications and strategies to detect and mitigate attacks.
  • Securing the firmware, upgrade procedure and bootstrapping of devices.

Prof. Dr. Luis Velasco
Dr. Marc Ruiz
Guest Editors

Dr. Lluís Gifre
Dr. Josep Lluís Berral
Assistant Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Edge/fog/cloud distributed computing for IoT
  • Security in IoT edge to cloud
  • IoT data privacy
  • Distributed IoT data analytics

Published Papers (15 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 829 KiB  
Article
Microservice Security Agent Based On API Gateway in Edge Computing
by Rongxu Xu, Wenquan Jin and Dohyeun Kim
Sensors 2019, 19(22), 4905; https://doi.org/10.3390/s19224905 - 10 Nov 2019
Cited by 28 | Viewed by 8632
Abstract
Internet of Things (IoT) devices are embedded with software, electronics, and sensors, and feature connectivity with constrained resources. They require the edge computing paradigm, with modular characteristics relying on microservices, to provide an extensible and lightweight computing framework at the edge of the [...] Read more.
Internet of Things (IoT) devices are embedded with software, electronics, and sensors, and feature connectivity with constrained resources. They require the edge computing paradigm, with modular characteristics relying on microservices, to provide an extensible and lightweight computing framework at the edge of the network. Edge computing can relieve the burden of centralized cloud computing by performing certain operations, such as data storage and task computation, at the edge of the network. Despite the benefits of edge computing, it can lead to many challenges in terms of security and privacy issues. Thus, services that protect privacy and secure data are essential functions in edge computing. For example, the end user’s ownership and privacy information and control are separated, which can easily lead to data leakage, unauthorized data manipulation, and other data security concerns. Thus, the confidentiality and integrity of the data cannot be guaranteed and, so, more secure authentication and access mechanisms are required to ensure that the microservices are exposed only to authorized users. In this paper, we propose a microservice security agent to integrate the edge computing platform with the API gateway technology for presenting a secure authentication mechanism. The aim of this platform is to afford edge computing clients a practical application which provides user authentication and allows JSON Web Token (JWT)-based secure access to the services of edge computing. To integrate the edge computing platform with the API gateway, we implement a microservice security agent based on the open-source Kong in the EdgeX Foundry framework. Also to provide an easy-to-use approach with Kong, we implement REST APIs for generating new consumers, registering services, configuring access controls. Finally, the usability of the proposed approach is demonstrated by evaluating the round trip time (RTT). The results demonstrate the efficiency of the system and its suitability for real-world applications. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

29 pages, 7783 KiB  
Article
A Smart Autonomous Time- and Frequency-Domain Analysis Current Sensor-Based Power Meter Prototype Developed over Fog-Cloud Analytics for Demand-Side Management
by Yung-Yao Chen and Yu-Hsiu Lin
Sensors 2019, 19(20), 4443; https://doi.org/10.3390/s19204443 - 14 Oct 2019
Cited by 13 | Viewed by 3803
Abstract
Electrical energy management, or demand-side management (DSM), in a smart grid is very important for electrical energy savings. With the high penetration rate of the Internet of Things (IoT) paradigm in modern society, IoT-oriented electrical energy management systems (EMSs) in DSM are capable [...] Read more.
Electrical energy management, or demand-side management (DSM), in a smart grid is very important for electrical energy savings. With the high penetration rate of the Internet of Things (IoT) paradigm in modern society, IoT-oriented electrical energy management systems (EMSs) in DSM are capable of skillfully monitoring the energy consumption of electrical appliances. While many of today’s IoT devices used in EMSs take advantage of cloud analytics, IoT manufacturers and application developers are devoting themselves to novel IoT devices developed at the edge of the Internet. In this study, a smart autonomous time and frequency analysis current sensor-based power meter prototype, a novel IoT end device, in an edge analytics-based artificial intelligence (AI) across IoT (AIoT) architecture launched with cloud analytics is developed. The prototype has assembled hardware and software to be developed over fog-cloud analytics for DSM in a smart grid. Advanced AI well trained offline in cloud analytics is autonomously and automatically deployed onsite on the prototype as edge analytics at the edge of the Internet for online load identification in DSM. In this study, auto-labeling, or online load identification, of electrical appliances monitored by the developed prototype in the launched edge analytics-based AIoT architecture is experimentally demonstrated. As the proof-of-concept demonstration of the prototype shows, the methodology in this study is feasible and workable. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

24 pages, 1962 KiB  
Article
Online Workload Allocation via Fog-Fog-Cloud Cooperation to Reduce IoT Task Service Delay
by Lei Li, Mian Guo, Lihong Ma, Huiyun Mao and Quansheng Guan
Sensors 2019, 19(18), 3830; https://doi.org/10.3390/s19183830 - 04 Sep 2019
Cited by 27 | Viewed by 4126
Abstract
Fog computing has recently emerged as an extension of cloud computing in providing high-performance computing services for delay-sensitive Internet of Things (IoT) applications. By offloading tasks to a geographically proximal fog computing server instead of a remote cloud, the delay performance can be [...] Read more.
Fog computing has recently emerged as an extension of cloud computing in providing high-performance computing services for delay-sensitive Internet of Things (IoT) applications. By offloading tasks to a geographically proximal fog computing server instead of a remote cloud, the delay performance can be greatly improved. However, some IoT applications may still experience considerable delays, including queuing and computation delays, when huge amounts of tasks instantaneously feed into a resource-limited fog node. Accordingly, the cooperation among geographically close fog nodes and the cloud center is desired in fog computing with the ever-increasing computational demands from IoT applications. This paper investigates a workload allocation scheme in an IoT–fog–cloud cooperation system for reducing task service delay, aiming at satisfying as many as possible delay-sensitive IoT applications’ quality of service (QoS) requirements. To this end, we first formulate the workload allocation problem in an IoT-edge-cloud cooperation system, which suggests optimal workload allocation among local fog node, neighboring fog node, and the cloud center to minimize task service delay. Then, the stability of the IoT-fog-cloud queueing system is theoretically analyzed with Lyapunov drift plus penalty theory. Based on the analytical results, we propose a delay-aware online workload allocation and scheduling (DAOWA) algorithm to achieve the goal of reducing long-term average task serve delay. Theoretical analysis and simulations have been conducted to demonstrate the efficiency of the proposal in task serve delay reduction and IoT-fog-cloud queueing system stability. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

16 pages, 5191 KiB  
Article
An Industrial Digitalization Platform for Condition Monitoring and Predictive Maintenance of Pumping Equipment
by Michael Short and John Twiddle
Sensors 2019, 19(17), 3781; https://doi.org/10.3390/s19173781 - 31 Aug 2019
Cited by 38 | Viewed by 5720
Abstract
This paper is concerned with the implementation and field-testing of an edge device for real-time condition monitoring and fault detection for large-scale rotating equipment in the UK water industry. The edge device implements a local digital twin, processing information from low-cost transducers mounted [...] Read more.
This paper is concerned with the implementation and field-testing of an edge device for real-time condition monitoring and fault detection for large-scale rotating equipment in the UK water industry. The edge device implements a local digital twin, processing information from low-cost transducers mounted on the equipment in real-time. Condition monitoring is achieved with sliding-mode observers employed as soft sensors to estimate critical internal pump parameters to help detect equipment wear before damage occurs. The paper describes the implementation of the edge system on a prototype microcontroller-based embedded platform, which supports the Modbus protocol; IP/GSM communication gateways provide remote connectivity to the network core, allowing further detailed analytics for predictive maintenance to take place. The paper first describes validation testing of the edge device using Hardware-In-The-Loop techniques, followed by trials on large-scale pumping equipment in the field. The paper concludes that the proposed system potentially delivers a flexible and low-cost industrial digitalization platform for condition monitoring and predictive maintenance applications in the water industry. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

32 pages, 7827 KiB  
Article
An Edge-Fog-Cloud Architecture of Streaming Analytics for Internet of Things Applications
by Hung Cao and Monica Wachowicz
Sensors 2019, 19(16), 3594; https://doi.org/10.3390/s19163594 - 18 Aug 2019
Cited by 24 | Viewed by 5815
Abstract
Exploring Internet of Things (IoT) data streams generated by smart cities means not only transforming data into better business decisions in a timely way but also generating long-term location intelligence for developing new forms of urban governance and organization policies. This paper proposes [...] Read more.
Exploring Internet of Things (IoT) data streams generated by smart cities means not only transforming data into better business decisions in a timely way but also generating long-term location intelligence for developing new forms of urban governance and organization policies. This paper proposes a new architecture based on the edge-fog-cloud continuum to analyze IoT data streams for delivering data-driven insights in a smart parking scenario. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

24 pages, 9592 KiB  
Article
IoT Solution for Smart Cities’ Pollution Monitoring and the Security Challenges
by Cristian Toma, Andrei Alexandru, Marius Popa and Alin Zamfiroiu
Sensors 2019, 19(15), 3401; https://doi.org/10.3390/s19153401 - 02 Aug 2019
Cited by 69 | Viewed by 15111
Abstract
Air pollution is a major factor in global heating and an increasing focus is centered on solving this problem. Urban communities take advantage of Information Technology (IT) and communications technologies in order to improve the control of environmental emissions and sound pollution. The [...] Read more.
Air pollution is a major factor in global heating and an increasing focus is centered on solving this problem. Urban communities take advantage of Information Technology (IT) and communications technologies in order to improve the control of environmental emissions and sound pollution. The aim is to mitigate health threatening risks and to raise awareness in relation to the effects of air pollution exposure. This paper investigates the key issues of a real-time pollution monitoring system, including the sensors, Internet of Things (IoT) communication protocols, and acquisition and transmission of data through communication channels, as well as data security and consistency. Security is a major focus in the proposed IoT solution. All other components of the system revolve around security. The bill of the materials and communications protocols necessary for the designing, development, and deployment of the IoT solution are part of this paper, as well as the security challenges. The paper’s proof of concept (PoC) addresses IoT security challenges within the communication channels between IoT gateways and the cloud infrastructure where data are transmitted to. The security implementations adhere to existing guidelines, best practices, and standards, ensuring a reliable and robust solution. In addition, the solution is able to interpret and analyze the collected data by using predictive analytics to create pollution maps. Those maps are used to implement real-time countermeasures, such as traffic diversion in a major city, to reduce concentrations of air pollutants by using existing data collected over a year. Once integrated with traffic management systems—cameras monitoring and traffic lights—this solution would reduce vehicle pollution by dynamically offering alternate routes or even enforcing re-routing when pollution thresholds are reached. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

20 pages, 7865 KiB  
Article
Design and Implementation of High-Availability Architecture for IoT-Cloud Services
by Hyunsik Yang and Younghan Kim
Sensors 2019, 19(15), 3276; https://doi.org/10.3390/s19153276 - 25 Jul 2019
Cited by 30 | Viewed by 5115
Abstract
For many vertical Internet of Things (IoT) applications, the high availability is very important. In traditional cloud systems, services are usually implemented with the same level of availability in which the fault detection and fault recovery mechanisms are not aware of service characteristics. [...] Read more.
For many vertical Internet of Things (IoT) applications, the high availability is very important. In traditional cloud systems, services are usually implemented with the same level of availability in which the fault detection and fault recovery mechanisms are not aware of service characteristics. In IoT-cloud, various services are provided with different service characteristics and availability requirements. Therefore, the existing cloud system is inefficient to optimize the availability method and resources to meet service requirements. To address this issue, this paper proposes a high availability architecture that is capable of dynamically optimizing the availability method based on service characteristics. The proposed architecture was verified through an implementation system based on OpenStack, and it was demonstrated that the system was able to achieve the target availability while optimizing resources, in contrast with existing architectures that use predefined availability methods. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

20 pages, 1937 KiB  
Article
A Heterogeneous IoT Data Analysis Framework with Collaboration of Edge-Cloud Computing: Focusing on Indoor PM10 and PM2.5 Status Prediction
by Jaewon Moon, Seungwoo Kum and Sangwon Lee
Sensors 2019, 19(14), 3038; https://doi.org/10.3390/s19143038 - 10 Jul 2019
Cited by 19 | Viewed by 5233
Abstract
The edge platform has evolved to become a part of a distributed computing environment. While typical edges do not have enough processing power to train machine learning models in real time, it is common to generate models in the cloud for use on [...] Read more.
The edge platform has evolved to become a part of a distributed computing environment. While typical edges do not have enough processing power to train machine learning models in real time, it is common to generate models in the cloud for use on the edge. The pattern of heterogeneous Internet of Things (IoT) data is dependent on individual circumstances. It is not easy to guarantee prediction performance when a monolithic model is used without considering the spatial characteristics of the space generating those data. In this paper, we propose a collaborative framework using a new method to select the best model for the edge from candidate models of cloud based on sample data correlation. This method lets the edge use the most suitable model without any training tasks on the edge side, and it also minimizes privacy issues. We apply the proposed method to predict future fine particulate matter concentration in an individual space. The results suggest that our method can provide better performance than the previous method. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

16 pages, 1672 KiB  
Article
Server Consolidation Based on Culture Multiple-Ant-Colony Algorithm in Cloud Computing
by Chunmiao Yuan and Xuemei Sun
Sensors 2019, 19(12), 2724; https://doi.org/10.3390/s19122724 - 17 Jun 2019
Cited by 9 | Viewed by 2773
Abstract
High-energy consumption in data centers has become a critical issue. The dynamic server consolidation has significant effects on saving energy of a data center. An effective way to consolidate virtual machines is to migrate virtual machines in real time so that some light [...] Read more.
High-energy consumption in data centers has become a critical issue. The dynamic server consolidation has significant effects on saving energy of a data center. An effective way to consolidate virtual machines is to migrate virtual machines in real time so that some light load physical machines can be turned off or switched to low-power mode. The present challenge is to reduce the energy consumption of cloud data centers. In this paper, for the first time, a server consolidation algorithm based on the culture multiple-ant-colony algorithm was proposed for dynamic execution of virtual machine migration, thus reducing the energy consumption of cloud data centers. The server consolidation algorithm based on the culture multiple-ant-colony algorithm (CMACA) finds an approximate optimal solution through a specific target function. The simulation results show that the proposed algorithm not only reduces the energy consumption but also reduces the number of virtual machine migration. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

21 pages, 351 KiB  
Article
Multi-Location-Aware Joint Optimization of Content Caching and Delivery for Backhaul-Constrained UDN
by Wenpeng Jing, Xiangming Wen, Zhaoming Lu and Haijun Zhang
Sensors 2019, 19(11), 2449; https://doi.org/10.3390/s19112449 - 29 May 2019
Cited by 2 | Viewed by 2363
Abstract
Mobile edge caching is regarded as a promising way to reduce the backhaul load of the base stations (BSs). However, the capacity of BSs’ cache tends to be small, while mobile users’ content preferences are diverse. Furthermore, both the locations of users and [...] Read more.
Mobile edge caching is regarded as a promising way to reduce the backhaul load of the base stations (BSs). However, the capacity of BSs’ cache tends to be small, while mobile users’ content preferences are diverse. Furthermore, both the locations of users and user-BS association are uncertain in wireless networks. All of these pose great challenges on the content caching and content delivery. This paper studies the joint optimization of the content placement and content delivery schemes in the cache-enabled ultra-dense small-cell network (UDN) with constrained-backhaul link. Considering the differences in decision time-scales, the content placement and content delivery are investigated separately, but their interplay is taken into consideration. Firstly, a content placement problem is formulated, where the uncertainty of user-BS association is considered. Specifically, different from the existing works, the specific multi-location request pattern is considered that users tend to send content requests from more than one but limited locations during one day. Secondly, a user-BS association and wireless resources allocation problem is formulated, with the objective of maximizing users’ data rates under the backhaul bandwidth constraint. Due to the non-convex nature of these two problems, the problem transformation and variables relaxation are adopted, which convert the original problems into more tractable forms. Then, based on the convex optimization methods, a content placement algorithm, and a cache-aware user association and resources allocation algorithm are proposed, respectively. Finally, simulation results are given, which validate that the proposed algorithms have obvious performance advantages in terms of the network utility, the hit ratio of the cache, and the quality of service guarantee, and are suitable for the cache-enabled UDN with constrained-backhaul link. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

25 pages, 3183 KiB  
Article
Resource Provisioning in Fog Computing: From Theory to Practice
by José Santos, Tim Wauters, Bruno Volckaert and Filip De Turck
Sensors 2019, 19(10), 2238; https://doi.org/10.3390/s19102238 - 14 May 2019
Cited by 54 | Viewed by 4825
Abstract
The Internet-of-Things (IoT) and Smart Cities continue to expand at enormous rates. Centralized Cloud architectures cannot sustain the requirements imposed by IoT services. Enormous traffic demands and low latency constraints are among the strictest requirements, making cloud solutions impractical. As an answer, Fog [...] Read more.
The Internet-of-Things (IoT) and Smart Cities continue to expand at enormous rates. Centralized Cloud architectures cannot sustain the requirements imposed by IoT services. Enormous traffic demands and low latency constraints are among the strictest requirements, making cloud solutions impractical. As an answer, Fog Computing has been introduced to tackle this trend. However, only theoretical foundations have been established and the acceptance of its concepts is still in its early stages. Intelligent allocation decisions would provide proper resource provisioning in Fog environments. In this article, a Fog architecture based on Kubernetes, an open source container orchestration platform, is proposed to solve this challenge. Additionally, a network-aware scheduling approach for container-based applications in Smart City deployments has been implemented as an extension to the default scheduling mechanism available in Kubernetes. Last but not least, an optimization formulation for the IoT service problem has been validated as a container-based application in Kubernetes showing the full applicability of theoretical approaches in practical service deployments. Evaluations have been performed to compare the proposed approaches with the Kubernetes standard scheduling feature. Results show that the proposed approaches achieve reductions of 70% in terms of network latency when compared to the default scheduling mechanism. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

17 pages, 3035 KiB  
Article
Offloading and Transmission Strategies for IoT Edge Devices and Networks
by Jiheon Kang and Doo-Seop Eom
Sensors 2019, 19(4), 835; https://doi.org/10.3390/s19040835 - 18 Feb 2019
Cited by 25 | Viewed by 4791
Abstract
We present a machine and deep learning method to offload trained deep learning model and transmit packets efficiently on resource-constrained internet of things (IoT) edge devices and networks. Recently, the types of IoT devices have become diverse and the volume of data has [...] Read more.
We present a machine and deep learning method to offload trained deep learning model and transmit packets efficiently on resource-constrained internet of things (IoT) edge devices and networks. Recently, the types of IoT devices have become diverse and the volume of data has been increasing, such as images, voice, and time-series sensory signals generated by various devices. However, transmitting large amounts of data to a server or cloud becomes expensive owing to limited bandwidth, and leads to latency for time-sensitive operations. Therefore, we propose a novel offloading and transmission policy considering energy-efficiency, execution time, and the number of generated packets for resource-constrained IoT edge devices that run a deep learning model and a reinforcement learning method to find an optimal contention window size for effective channel access using a contention-based medium access control (MAC) protocol. A Reinforcement learning is used to improve the performance of the applied MAC protocol. Our proposed method determines the offload and transmission strategies that are better to directly send fragmented packets of raw data or to send the extracted feature vector or the final output of deep learning networks, considering the operation performance and power consumption of the resource-constrained microprocessor, as well as the power consumption of the radio transceiver and latency for transmitting the all the generated packets. In the performance evaluation, we measured the performance parameters of ARM Cortex-M4 and Cortex-M7 processors for the network simulation. The evaluation results show that our proposed adaptive channel access and learning-based offload and transmission methods outperform conventional role-based channel access schemes. They transmit packets of raw data and are effective for IoT edge devices and network protocols. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

18 pages, 1467 KiB  
Article
PPCS: A Progressive Popularity-Aware Caching Scheme for Edge-Based Cache Redundancy Avoidance in Information-Centric Networks
by Quang Ngoc Nguyen, Jiang Liu, Zhenni Pan, Ilias Benkacem, Toshitaka Tsuda, Tarik Taleb, Shigeru Shimamoto and Takuro Sato
Sensors 2019, 19(3), 694; https://doi.org/10.3390/s19030694 - 08 Feb 2019
Cited by 35 | Viewed by 5709
Abstract
This article proposes a novel chunk-based caching scheme known as the Progressive Popularity-Aware Caching Scheme (PPCS) to improve content availability and eliminate the cache redundancy issue of Information-Centric Networking (ICN). Particularly, the proposal considers both entire-object caching and partial-progressive caching for popular and [...] Read more.
This article proposes a novel chunk-based caching scheme known as the Progressive Popularity-Aware Caching Scheme (PPCS) to improve content availability and eliminate the cache redundancy issue of Information-Centric Networking (ICN). Particularly, the proposal considers both entire-object caching and partial-progressive caching for popular and non-popular content objects, respectively. In the case that the content is not popular enough, PPCS first caches initial chunks of the content at the edge node and then progressively continues caching subsequent chunks at upstream Content Nodes (CNs) along the delivery path over time, according to the content popularity and each CN position. Therefore, PPCS efficiently avoids wasting cache space for storing on-path content duplicates and improves cache diversity by allowing no more than one replica of a specified content to be cached. To enable a complete ICN caching solution for communication networks, we also propose an autonomous replacement policy to optimize the cache utilization by maximizing the utility of each CN from caching content items. By simulation, we show that PPCS, utilizing edge-computing for the joint optimization of caching decision and replacement policies, considerably outperforms relevant existing ICN caching strategies in terms of latency (number of hops), cache redundancy, and content availability (hit rate), especially when the CN’s cache size is small. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

21 pages, 946 KiB  
Article
Cost-Effective Edge Server Placement in Wireless Metropolitan Area Networks
by Feng Zeng, Yongzheng Ren, Xiaoheng Deng and Wenjia Li
Sensors 2019, 19(1), 32; https://doi.org/10.3390/s19010032 - 21 Dec 2018
Cited by 67 | Viewed by 5477
Abstract
Remote clouds are gradually unable to achieve ultra-low latency to meet the requirements of mobile users because of the intolerable long distance between remote clouds and mobile users and the network congestion caused by the tremendous number of users. Mobile edge computing, a [...] Read more.
Remote clouds are gradually unable to achieve ultra-low latency to meet the requirements of mobile users because of the intolerable long distance between remote clouds and mobile users and the network congestion caused by the tremendous number of users. Mobile edge computing, a new paradigm, has been proposed to mitigate aforementioned effects. Existing studies mostly assume the edge servers have been deployed properly and they just pay attention to how to minimize the delay between edge servers and mobile users. In this paper, considering the practical environment, we investigate how to deploy edge servers effectively and economically in wireless metropolitan area networks. Thus, we address the problem of minimizing the number of edge servers while ensuring some QoS requirements. Aiming at more consistence with a generalized condition, we extend the definition of the dominating set, and transform the addressed problem into the minimum dominating set problem in graph theory. In addition, two conditions are considered for the capacities of edge servers: one is that the capacities of edge servers can be configured on demand, and the other is that all the edge servers have the same capacities. For the on-demand condition, a greedy based algorithm is proposed to find the solution, and the key idea is to iteratively choose nodes that can connect as many other nodes as possible under the delay, degree and cluster size constraints. Furthermore, a simulated annealing based approach is given for global optimization. For the second condition, a greedy based algorithm is also proposed to satisfy the capacity constraint of edge servers and minimize the number of edge servers simultaneously. The simulation results show that the proposed algorithms are feasible. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

23 pages, 1429 KiB  
Article
Energy-Efficient Online Resource Management and Allocation Optimization in Multi-User Multi-Task Mobile-Edge Computing Systems with Hybrid Energy Harvesting
by Heng Zhang, Zhigang Chen, Jia Wu, Yiqing Deng, Yutong Xiao, Kanghuai Liu and Mingxuan Li
Sensors 2018, 18(9), 3140; https://doi.org/10.3390/s18093140 - 17 Sep 2018
Cited by 18 | Viewed by 4114
Abstract
Mobile Edge Computing (MEC) has evolved into a promising technology that can relieve computing pressure on wireless devices (WDs) in the Internet of Things (IoT) by offloading computation tasks to the MEC server. Resource management and allocation are challenging because of the unpredictability [...] Read more.
Mobile Edge Computing (MEC) has evolved into a promising technology that can relieve computing pressure on wireless devices (WDs) in the Internet of Things (IoT) by offloading computation tasks to the MEC server. Resource management and allocation are challenging because of the unpredictability of task arrival, wireless channel status and energy consumption. To address such a challenge, in this paper, we provide an energy-efficient joint resource management and allocation (ECM-RMA) policy to reduce time-averaged energy consumption in a multi-user multi-task MEC system with hybrid energy harvested WDs. We first formulate the time-averaged energy consumption minimization problem while the MEC system satisfied both the data queue stability constraint and energy queue stability constraint. To solve the stochastic optimization problem, we turn the problem into two deterministic sub-problems, which can be easily solved by convex optimization technique and linear programming technique. Correspondingly, we propose the ECM-RMA algorithm that does not require priori knowledge of stochastic processes such as channel states, data arrivals and green energy harvesting. Most importantly, the proposed algorithm achieves the energy consumption-delay trade-off as [ O ( 1 / V ) , O ( V ) ] . V, as a non-negative weight, which can effectively control the energy consumption-delay performance. Finally, simulation results verify the correctness of the theoretical analysis and the effectiveness of the proposed algorithm. Full article
(This article belongs to the Special Issue Edge/Fog/Cloud Computing in the Internet of Things)
Show Figures

Figure 1

Back to TopTop