scispace - formally typeset
Open AccessJournal ArticleDOI

Mobile Edge Computing: A Survey

TLDR
The definition of MEC, its advantages, architectures, and application areas are provided; where the security and privacy issues and related existing solutions are also discussed.
Abstract
Mobile edge computing (MEC) is an emergent architecture where cloud computing services are extended to the edge of networks leveraging mobile base stations. As a promising edge technology, it can be applied to mobile, wireless, and wireline scenarios, using software and hardware platforms, located at the network edge in the vicinity of end-users. MEC provides seamless integration of multiple application service providers and vendors toward mobile subscribers, enterprises, and other vertical segments. It is an important component in the 5G architecture which supports variety of innovative applications and services where ultralow latency is required. This paper is aimed to present a comprehensive survey of relevant research and technological developments in the area of MEC. It provides the definition of MEC, its advantages, architectures, and application areas; where we in particular highlight related research and future directions. Finally, security and privacy issues and related existing solutions are also discussed.

read more

Content maybe subject to copyright    Report

Mobile Edge Computing: A
Survey
architecture, applications, approaches and challenges
Nasir Abbas
Master’s Thesis Autumn 2016


Mobile Edge Computing: A Survey
Nasir Abbas
December 12, 2016

ii

Abstract
Mobile edge computing (MEC) is an emergent architecture where cloud
computing services are extended to the edge of networks into the mobile
base stations. As a promising edge technology, it can be applied to mobile,
wireless and wireline scenarios, using software and hardware platforms,
located at the network edge in the vicinity of end users. MEC provides
seamless integration of multiple application service providers and vendors
towards mobile subscribers, enterprises and other vertical segments. It is
an important component in the proposed 5G architecture that supports
variety of innovative applications and services where ultra low latency
is required. However, there are some challenges exists in the MEC eco
system. To address these challenges, first off need to understand the
network infrastructure of MEC, cloud and cellular network.
Some questions and problems are addressed in this thesis that outlines
the importance and challenges of MEC deployment. Impact of MEC
integration with the traditional mobile and cloud network appears in
this paper. A survey has been presented that contributes in general
understanding of mobile edge computing (MEC). Readers will have
an overview of MEC, such as definition, advantages, architectures and
applications. Moreover, related research and future directions are pointed
out in this thesis. Finally, security and privacy issues and their possible
solutions are also discussed.
iii

Citations
More filters
Journal ArticleDOI

POTAM: A Parallel Optimal Task Allocation Mechanism for Large-Scale Delay Sensitive Mobile Edge Computing

TL;DR: An efficient combination of conjugate gradient, Newton and linear search techniques based algorithm with Logarithmic Smoothing and Cyclic Block coordinate Gradient Projection methods, which can guarantee convergence and reduce computational complexity with a good scalability is developed.
Journal ArticleDOI

Joint Resource Dimensioning and Placement for Dependable Virtualized Services in Mobile Edge Clouds

TL;DR: This paper considers the joint resource dimensioning and placement problem for VSs with diverse reliability requirements, with the objective of minimizing the energy consumption, and proposes a two-step approximation algorithm with bounded approximation ratio based on Lagrangian relaxation.
Proceedings ArticleDOI

Deep Reinforcement Learning based Path Planning for UAV-assisted Edge Computing Networks

TL;DR: In this article, the authors studied the path planning problem of a UAV-assisted edge computing network, where an UAV is deployed with an edge server to execute the computing tasks offloaded from multiple devices.
Journal ArticleDOI

Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey

TL;DR: In this article , a survey analyzes the application of blockchain in MEC-IoT systems and mainly focuses on approaches and technologies to manage the security and forensics issues for IoT.
Posted Content

Scheduling for Mobile Edge Computing with Random User Arrivals: An Approximate MDP and Reinforcement Learning Approach

TL;DR: This work investigates the scheduling design of a mobile edge computing (MEC) system, where active mobile devices with computation tasks randomly appear in a cell, and introduces a baseline scheduling policy, whose value function can be derived analytically with the statistics of random mobile device arrivals.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI

Recent advances in augmented reality

TL;DR: This work refers one to the original survey for descriptions of potential applications, summaries of AR system characteristics, and an introduction to the crucial problem of registration, including sources of registration error and error-reduction strategies.
Journal ArticleDOI

The Case for VM-Based Cloudlets in Mobile Computing

TL;DR: The results from a proof-of-concept prototype suggest that VM technology can indeed help meet the need for rapid customization of infrastructure for diverse applications, and this article discusses the technical obstacles to these transformations and proposes a new architecture for overcoming them.
Related Papers (5)