scispace - formally typeset
Open AccessJournal ArticleDOI

Mobile Edge Computing: A Survey

TLDR
The definition of MEC, its advantages, architectures, and application areas are provided; where the security and privacy issues and related existing solutions are also discussed.
Abstract
Mobile edge computing (MEC) is an emergent architecture where cloud computing services are extended to the edge of networks leveraging mobile base stations. As a promising edge technology, it can be applied to mobile, wireless, and wireline scenarios, using software and hardware platforms, located at the network edge in the vicinity of end-users. MEC provides seamless integration of multiple application service providers and vendors toward mobile subscribers, enterprises, and other vertical segments. It is an important component in the 5G architecture which supports variety of innovative applications and services where ultralow latency is required. This paper is aimed to present a comprehensive survey of relevant research and technological developments in the area of MEC. It provides the definition of MEC, its advantages, architectures, and application areas; where we in particular highlight related research and future directions. Finally, security and privacy issues and related existing solutions are also discussed.

read more

Content maybe subject to copyright    Report

Mobile Edge Computing: A
Survey
architecture, applications, approaches and challenges
Nasir Abbas
Master’s Thesis Autumn 2016


Mobile Edge Computing: A Survey
Nasir Abbas
December 12, 2016

ii

Abstract
Mobile edge computing (MEC) is an emergent architecture where cloud
computing services are extended to the edge of networks into the mobile
base stations. As a promising edge technology, it can be applied to mobile,
wireless and wireline scenarios, using software and hardware platforms,
located at the network edge in the vicinity of end users. MEC provides
seamless integration of multiple application service providers and vendors
towards mobile subscribers, enterprises and other vertical segments. It is
an important component in the proposed 5G architecture that supports
variety of innovative applications and services where ultra low latency
is required. However, there are some challenges exists in the MEC eco
system. To address these challenges, first off need to understand the
network infrastructure of MEC, cloud and cellular network.
Some questions and problems are addressed in this thesis that outlines
the importance and challenges of MEC deployment. Impact of MEC
integration with the traditional mobile and cloud network appears in
this paper. A survey has been presented that contributes in general
understanding of mobile edge computing (MEC). Readers will have
an overview of MEC, such as definition, advantages, architectures and
applications. Moreover, related research and future directions are pointed
out in this thesis. Finally, security and privacy issues and their possible
solutions are also discussed.
iii

Citations
More filters
Journal ArticleDOI

Open Security Issues for Edge Named Function Environments

TL;DR: An exemplary use case from the autonomous automotive IoT area, namely, localized sensing is presented, and security challenges are identified, discuss the different options to tackle these challenges, and provide directions for future work.
Journal ArticleDOI

A low-cost privacy preserving user access in mobile edge computing framework

TL;DR: In this article , a two-factor biometric authentication protocol for mobile edge computing (MEC) was proposed, which combines Physically Unclonable Functions (PUFs) with user-oriented biometrics employing fuzzy extractor-based procedures.
Peer Review

Towards Human Stress and Activity Recognition: A Review and a First Approach Based on Low-Cost Wearables

TL;DR: A comprehensive review and the design of a low-cost body area network (BAN) made of a set of wearables that allow physiological signals and human movements to be captured simultaneously, with a focus on stress.
Journal ArticleDOI

A Review of Research on Intersection Control Based on Connected Vehicles and Data-Driven Intelligent Approaches

TL;DR: This paper reviews the intersection control strategies from many perspectives, including intelligent data-driven control, conventional timing control, induction control and model-based traffic control, giving a clear view of the data- driven intelligent control theory and its application for intelligent transportation systems.
Proceedings ArticleDOI

Task Execution Latency Minimization-based Joint Computation Offloading and Cell Selection for MEC-Enabled HetNets

TL;DR: This paper deduces the problem of computation offloading and cell selection strategies in MEC-enabled HetNets into two subproblems and proposes extensive search method and Khun-Munkres algorithm respectively to obtain the optimal solution.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI

Recent advances in augmented reality

TL;DR: This work refers one to the original survey for descriptions of potential applications, summaries of AR system characteristics, and an introduction to the crucial problem of registration, including sources of registration error and error-reduction strategies.
Journal ArticleDOI

The Case for VM-Based Cloudlets in Mobile Computing

TL;DR: The results from a proof-of-concept prototype suggest that VM technology can indeed help meet the need for rapid customization of infrastructure for diverse applications, and this article discusses the technical obstacles to these transformations and proposes a new architecture for overcoming them.
Related Papers (5)