scispace - formally typeset
Search or ask a question
Topic

Edge computing

About: Edge computing is a research topic. Over the lifetime, 11657 publications have been published within this topic receiving 148533 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes a peer-to-peer (P2P) knowledge market to make knowledge tradable in edge-AI enabled IoT, and develops a knowledge consortium blockchain for secure and efficient knowledge management and trading for the market.
Abstract: Nowadays, benefit from more powerful edge computing devices and edge artificial intelligence (edge-AI) could be introduced into Internet of Things (IoT) to find the knowledge derived from massive sensory data, such as cyber results or models of classification, and detection and prediction from physical environments. Heterogeneous edge-AI devices in IoT will generate isolated and distributed knowledge slices, thus knowledge collaboration and exchange are required to complete complex tasks in IoT intelligent applications with numerous selfish nodes. Therefore, knowledge trading is needed for paid sharing in edge-AI enabled IoT. Most existing works only focus on knowledge generation rather than trading in IoT. To address this issue, in this paper, we propose a peer-to-peer (P2P) knowledge market to make knowledge tradable in edge-AI enabled IoT. We first propose an implementation architecture of the knowledge market. Moreover, we develop a knowledge consortium blockchain for secure and efficient knowledge management and trading for the market, which includes a new cryptographic currency knowledge coin, smart contracts, and a new consensus mechanism proof of trading. Besides, a noncooperative game based knowledge pricing strategy with incentives for the market is also proposed. The security analysis and performance simulation show the security and efficiency of our knowledge market and incentive effects of knowledge pricing strategy. To the best of our knowledge, it is the first time to propose an efficient and incentive P2P knowledge market in edge-AI enabled IoT.

142 citations

Posted Content
TL;DR: In this paper, the authors present a survey of the state of the art on stream processing engines and mechanisms for exploiting resource elasticity features of cloud computing in stream processing and discuss solutions proposed in the literature to address them.
Abstract: Under several emerging application scenarios, such as in smart cities, operational monitoring of large infrastructure, wearable assistance, and Internet of Things, continuous data streams must be processed under very short delays. Several solutions, including multiple software engines, have been developed for processing unbounded data streams in a scalable and efficient manner. More recently, architecture has been proposed to use edge computing for data stream processing. This paper surveys state of the art on stream processing engines and mechanisms for exploiting resource elasticity features of cloud computing in stream processing. Resource elasticity allows for an application or service to scale out/in according to fluctuating demands. Although such features have been extensively investigated for enterprise applications, stream processing poses challenges on achieving elastic systems that can make efficient resource management decisions based on current load. Elasticity becomes even more challenging in highly distributed environments comprising edge and cloud computing resources. This work examines some of these challenges and discusses solutions proposed in the literature to address them.

142 citations

Journal ArticleDOI
TL;DR: This work proposes a load balancing scheme in a fog network to minimize the latency of data flows in the communications and processing procedures by associating IoT devices to suitable BSs and proves the convergence and the optimality of the proposed workload balancing scheme.
Abstract: As latency is the key performance metric for IoT applications, fog nodes co-located with cellular base stations can move the computing resources close to IoT devices Therefore, data flows of IoT devices can be offloaded to fog nodes in their proximity, instead of the remote cloud, for processing However, the latency of data flows in IoT devices consist of both the communications latency and computing latency Owing to the spatial and temporal dynamics of IoT device distributions, some BSs and fog nodes are lightly loaded, while others, which may be overloaded, may incur congestion Thus, the traffic load allocation among base stations (BSs) and computing load allocation among fog nodes affect the communications latency and computing latency of data flows, respectively To solve this problem, we propose a workload balancing scheme in a fog network to minimize the latency of data flows in the communications and processing procedures by associating IoT devices to suitable BSs We further prove the convergence and the optimality of the proposed workload balancing scheme Through extensive simulations, we have compared the performance of the proposed load balancing scheme with other schemes and verified its advantages for fog networking

142 citations

Journal ArticleDOI
TL;DR: A two-phase offloading optimization strategy is put forward for joint optimization of offloading utility and privacy in EC enabled IoT, devised first to obtain the goal of maximizing the resource utilization of ECUs and minimizing the implementation time cost.
Abstract: Currently, edge computing (EC), emerging as a burgeoning paradigm, is powerful in handling real-time resource provision for Internet of Things (IoT) applications. However, due to the spatial distribution of geographically sparse IoT devices and the resource limitations of EC units (ECUs), the resource utilization of corresponding edge servers is relatively insufficient and the execution performance is ineffective to some extent. A privacy leakage, including personal information, location, media data, etc., during the transmission process from IoT devices to edge servers severely restricts the application of ECUs in IoT. To address these challenges, a two-phase offloading optimization strategy is put forward for joint optimization of offloading utility and privacy in EC enabled IoT. Technically, a utility-aware task offloading method, named UTO, is devised first to obtain the goal of maximizing the resource utilization of ECUs and minimizing the implementation time cost. Then a joint optimization method, named JOM, for utility and privacy tradeoffs is designed to balance the privacy preservation and execution performance. Eventually, the experimental evaluations are designed to illustrate the efficiency and reliability of UTO and JOM.

141 citations

Journal ArticleDOI
TL;DR: A modular and scalable architecture based on lightweight virtualization that simplifies management and enables distributed deployments, creating a highly dynamic system with characteristics such as fault tolerance and system availability.
Abstract: The world of connected devices has led to the rise of the Internet of Things paradigm, where applications rely on multiple devices, gathering and sharing data across highly heterogeneous networks The variety of possible mechanisms, protocols, and hardware has become a hindrance in the development of architectures capable of addressing the most common IoT use cases, while abstracting services from the underlying communication subsystem Moreover, the world is moving toward new strict requirements in terms of timeliness and low latency in combination with ultra-high availability and reliability Thus, future IoT architectures will also have to support the requirements of these cyber-physical applications In this regard, edge computing has been presented as one of the most promising solutions, relying on the cooperation of nodes by moving services directly to end devices and caching information locally Therefore, in this article, we propose a modular and scalable architecture based on lightweight virtualization The provided modularity, combined with the orchestration supplied by Docker, simplifies management and enables distributed deployments, creating a highly dynamic system Moreover, characteristics such as fault tolerance and system availability are achieved by distributing the application logic across different layers, where failures of devices and micro-services can be masked by this natively redundant architecture, with minimal impact on the overall system performance Experimental results have validated the implementation of the proposed architecture for on-demand services deployment across different architecture layers

141 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
93% related
Network packet
159.7K papers, 2.2M citations
93% related
Wireless network
122.5K papers, 2.1M citations
93% related
Server
79.5K papers, 1.4M citations
93% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
92% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,471
20223,274
20212,978
20203,397
20192,698
20181,649