scispace - formally typeset
Open AccessJournal ArticleDOI

Mobile Edge Computing: A Survey

TLDR
The definition of MEC, its advantages, architectures, and application areas are provided; where the security and privacy issues and related existing solutions are also discussed.
Abstract
Mobile edge computing (MEC) is an emergent architecture where cloud computing services are extended to the edge of networks leveraging mobile base stations. As a promising edge technology, it can be applied to mobile, wireless, and wireline scenarios, using software and hardware platforms, located at the network edge in the vicinity of end-users. MEC provides seamless integration of multiple application service providers and vendors toward mobile subscribers, enterprises, and other vertical segments. It is an important component in the 5G architecture which supports variety of innovative applications and services where ultralow latency is required. This paper is aimed to present a comprehensive survey of relevant research and technological developments in the area of MEC. It provides the definition of MEC, its advantages, architectures, and application areas; where we in particular highlight related research and future directions. Finally, security and privacy issues and related existing solutions are also discussed.

read more

Content maybe subject to copyright    Report

Mobile Edge Computing: A
Survey
architecture, applications, approaches and challenges
Nasir Abbas
Master’s Thesis Autumn 2016


Mobile Edge Computing: A Survey
Nasir Abbas
December 12, 2016

ii

Abstract
Mobile edge computing (MEC) is an emergent architecture where cloud
computing services are extended to the edge of networks into the mobile
base stations. As a promising edge technology, it can be applied to mobile,
wireless and wireline scenarios, using software and hardware platforms,
located at the network edge in the vicinity of end users. MEC provides
seamless integration of multiple application service providers and vendors
towards mobile subscribers, enterprises and other vertical segments. It is
an important component in the proposed 5G architecture that supports
variety of innovative applications and services where ultra low latency
is required. However, there are some challenges exists in the MEC eco
system. To address these challenges, first off need to understand the
network infrastructure of MEC, cloud and cellular network.
Some questions and problems are addressed in this thesis that outlines
the importance and challenges of MEC deployment. Impact of MEC
integration with the traditional mobile and cloud network appears in
this paper. A survey has been presented that contributes in general
understanding of mobile edge computing (MEC). Readers will have
an overview of MEC, such as definition, advantages, architectures and
applications. Moreover, related research and future directions are pointed
out in this thesis. Finally, security and privacy issues and their possible
solutions are also discussed.
iii

Citations
More filters
Posted Content

Improving Device-Edge Cooperative Inference of Deep Learning via 2-Step Pruning

TL;DR: In this paper, a 2-step pruning framework for DNN partition between mobile devices and edge servers is proposed, where the DNN model only needs to be pruned once in the training phase where unimportant convolutional filters are removed iteratively.
Posted Content

Deep Reinforcement Learning for Backscatter-Aided Data Offloading in Mobile Edge Computing

TL;DR: A novel hybrid offloading model that exploits the complementary operations of active RF communications and low-power backscatter communications is proposed that can improve the energy efficiency over 20 percent compared to existing schemes.
Journal ArticleDOI

A trusted recommendation scheme for privacy protection based on federated learning

TL;DR: A collaborative filtering algorithm recommendation system based on federated learning on end-edge-cloud based on protection of data privacy and the training model and recommendation information is stored to the blockchain network to provide permanent storage, evidence chain and real-time traceability services.
Proceedings ArticleDOI

SEE: Scheduling Early Exit for Mobile DNN Inference during Service Outage

TL;DR: The Ordered Scheduling structure is proved, indicating that a frame arrived earlier must be scheduled earlier, and the Scheduling Early Exit (SEE) algorithm based on dynamic programming is proposed, to solve the problem optimally with polynomial computational complexity.
Journal ArticleDOI

Energy-efficient offloading and resource allocation for mobile edge computing enabled mission-critical internet-of-things systems

TL;DR: In this article, the authors investigated the energy cost minimization for mission-critical internet-of-things (IoT) in mobile edge computing (MEC) system, where short data packets are transmitted between the IoT devices and the access points (APs) to reduce transmission latency and prolong the battery life of the devices.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI

Recent advances in augmented reality

TL;DR: This work refers one to the original survey for descriptions of potential applications, summaries of AR system characteristics, and an introduction to the crucial problem of registration, including sources of registration error and error-reduction strategies.
Journal ArticleDOI

The Case for VM-Based Cloudlets in Mobile Computing

TL;DR: The results from a proof-of-concept prototype suggest that VM technology can indeed help meet the need for rapid customization of infrastructure for diverse applications, and this article discusses the technical obstacles to these transformations and proposes a new architecture for overcoming them.
Related Papers (5)