scispace - formally typeset
Open AccessJournal ArticleDOI

Mobile Edge Computing: A Survey

TLDR
The definition of MEC, its advantages, architectures, and application areas are provided; where the security and privacy issues and related existing solutions are also discussed.
Abstract
Mobile edge computing (MEC) is an emergent architecture where cloud computing services are extended to the edge of networks leveraging mobile base stations. As a promising edge technology, it can be applied to mobile, wireless, and wireline scenarios, using software and hardware platforms, located at the network edge in the vicinity of end-users. MEC provides seamless integration of multiple application service providers and vendors toward mobile subscribers, enterprises, and other vertical segments. It is an important component in the 5G architecture which supports variety of innovative applications and services where ultralow latency is required. This paper is aimed to present a comprehensive survey of relevant research and technological developments in the area of MEC. It provides the definition of MEC, its advantages, architectures, and application areas; where we in particular highlight related research and future directions. Finally, security and privacy issues and related existing solutions are also discussed.

read more

Content maybe subject to copyright    Report

Mobile Edge Computing: A
Survey
architecture, applications, approaches and challenges
Nasir Abbas
Master’s Thesis Autumn 2016


Mobile Edge Computing: A Survey
Nasir Abbas
December 12, 2016

ii

Abstract
Mobile edge computing (MEC) is an emergent architecture where cloud
computing services are extended to the edge of networks into the mobile
base stations. As a promising edge technology, it can be applied to mobile,
wireless and wireline scenarios, using software and hardware platforms,
located at the network edge in the vicinity of end users. MEC provides
seamless integration of multiple application service providers and vendors
towards mobile subscribers, enterprises and other vertical segments. It is
an important component in the proposed 5G architecture that supports
variety of innovative applications and services where ultra low latency
is required. However, there are some challenges exists in the MEC eco
system. To address these challenges, first off need to understand the
network infrastructure of MEC, cloud and cellular network.
Some questions and problems are addressed in this thesis that outlines
the importance and challenges of MEC deployment. Impact of MEC
integration with the traditional mobile and cloud network appears in
this paper. A survey has been presented that contributes in general
understanding of mobile edge computing (MEC). Readers will have
an overview of MEC, such as definition, advantages, architectures and
applications. Moreover, related research and future directions are pointed
out in this thesis. Finally, security and privacy issues and their possible
solutions are also discussed.
iii

Citations
More filters
Journal ArticleDOI

Online Proactive Caching in Mobile Edge Computing Using Bidirectional Deep Recurrent Neural Network

TL;DR: This paper proposes an online proactive caching scheme based on bidirectional deep recurrent neural network (BRNN) model to predict time-series content requests and update edge caching accordingly and demonstrates that the proposed approach can achieve considerably high prediction accuracy and significantly improve content hit rate of end devices.
Journal ArticleDOI

Efficient Computing Resource Sharing for Mobile Edge-Cloud Computing Networks

TL;DR: An efficient framework for mobile edge-cloud computing networks, which enables the edge and the cloud to share their computing resources in the form of wholesale and buyback and an optimal cloud computing resource management to maximize the social welfare is proposed.
Journal ArticleDOI

Dependency-Aware Task Scheduling in Vehicular Edge Computing

TL;DR: An efficient task scheduling algorithm is developed to prioritize multiple applications and prioritize multiple tasks so as to guarantee the completion time constraints of applications and the processing dependency requirements of tasks.
Journal ArticleDOI

Survey on Multi-Access Edge Computing Security and Privacy

TL;DR: A thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture is introduced and the vulnerabilities leading to the identified threat vectors are analyzed and potential security solutions to overcome these vulnerabilities are proposed.
Journal ArticleDOI

Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting

TL;DR: This scheme enables a healthcare IoT device to choose the offloading rate that improves the computation performance, protects user privacy, and saves the energy of the IoT device without being aware of the privacy leakage, IoT energy consumption, and edge computation model.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI

Recent advances in augmented reality

TL;DR: This work refers one to the original survey for descriptions of potential applications, summaries of AR system characteristics, and an introduction to the crucial problem of registration, including sources of registration error and error-reduction strategies.
Journal ArticleDOI

The Case for VM-Based Cloudlets in Mobile Computing

TL;DR: The results from a proof-of-concept prototype suggest that VM technology can indeed help meet the need for rapid customization of infrastructure for diverse applications, and this article discusses the technical obstacles to these transformations and proposes a new architecture for overcoming them.
Related Papers (5)