scispace - formally typeset
Journal ArticleDOI

Mobile-Edge Computing Architecture: The role of MEC in the Internet of Things.

Reads0
Chats0
TLDR
It can be said that MEC has definitely a window of opportunity to contribute to the creation of a common layer of integration for the IoT world and could pave the way and be natively integrated in the network of tomorrow.
Abstract
Mobile-Edge computing (MEC) is an emerging technology currently recognized as a key enabler for 5G networks. Compatible with current 4G networks, MEC will address many key uses of the 5G system, motivated by the massive diffusion of the Internet of Things (IoT). This article aims to provide a tutorial on MEC technology and an overview of the MEC framework and architecture recently defined by the European Telecommunications Standards Institute (ETSI) MEC Industry Specification Group (ISG) standardization organization. We provide some examples of MEC deployment, with special reference to IoT cases, since IoT is recognized as a main driver for 5G. Finally, we discuss the main benefits and challenges for MEC moving toward 5G.

read more

Citations
More filters
Journal ArticleDOI

A survey on computation offloading modeling for edge computing

TL;DR: This work presents some important edge computing architectures and classify the previous works on computation offloading into different categories, and discusses some basic models such as channel model, computation and communication model, and energy harvesting model that have been proposed in offloading modeling.
Journal ArticleDOI

Resource Allocation Based on Deep Reinforcement Learning in IoT Edge Computing

TL;DR: An improved deep Q-network (DQN) algorithm is proposed to learn the resource allocation policy for the IoT edge computing system to improve the efficiency of resource utilization and has a better convergence performance than the original DQN algorithm.
Journal ArticleDOI

Incentive mechanism for computation offloading using edge computing

TL;DR: This paper designs two computation offloading algorithms that can quantify their efficiencies in terms of low delay and reduced complexity and formulate the interactions among cloud service operator and edge server owners as a Stackelberg game to maximize the utilities of cloud service operators and edgeServer owners by obtaining the optimal payment and computation offload strategies.
Journal ArticleDOI

Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices

TL;DR: This article studies IDS architecture and resource allocation in edge computing, and a multilayer resource allocation scheme is used to cope with the multiple resources fair allocation in multiple layers.
Journal ArticleDOI

Survey on Multi-Access Edge Computing Security and Privacy

TL;DR: A thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture is introduced and the vulnerabilities leading to the identified threat vectors are analyzed and potential security solutions to overcome these vulnerabilities are proposed.
Related Papers (5)
Trending Questions (1)
Can we take MEC for software engineering?

After having also discussed benefits and challenges for MEC toward 5G, we can say that MEC has definitely a window of opportunity to contribute to the creation of a common layer of integration for the IoT world.