diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc9556.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc9556.txt')
-rw-r--r-- | doc/rfc/rfc9556.txt | 1751 |
1 files changed, 1751 insertions, 0 deletions
diff --git a/doc/rfc/rfc9556.txt b/doc/rfc/rfc9556.txt new file mode 100644 index 0000000..5aa6c1f --- /dev/null +++ b/doc/rfc/rfc9556.txt @@ -0,0 +1,1751 @@ + + + + +Internet Research Task Force (IRTF) J. Hong +Request for Comments: 9556 ETRI +Category: Informational Y-G. Hong +ISSN: 2070-1721 Daejeon University + X. de Foy + InterDigital Communications, LLC + M. Kovatsch + Huawei Technologies Duesseldorf GmbH + E. Schooler + University of Oxford + D. Kutscher + HKUST(GZ) + April 2024 + + + Internet of Things (IoT) Edge Challenges and Functions + +Abstract + + Many Internet of Things (IoT) applications have requirements that + cannot be satisfied by centralized cloud-based systems (i.e., cloud + computing). These include time sensitivity, data volume, + connectivity cost, operation in the face of intermittent services, + privacy, and security. As a result, IoT is driving the Internet + toward edge computing. This document outlines the requirements of + the emerging IoT edge and its challenges. It presents a general + model and major components of the IoT edge to provide a common basis + for future discussions in the Thing-to-Thing Research Group (T2TRG) + and other IRTF and IETF groups. This document is a product of the + IRTF T2TRG. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Research Task Force + (IRTF). The IRTF publishes the results of Internet-related research + and development activities. These results might not be suitable for + deployment. This RFC represents the consensus of the Thing-to-Thing + Research Group of the Internet Research Task Force (IRTF). Documents + approved for publication by the IRSG are not candidates for any level + of Internet Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc9556. + +Copyright Notice + + Copyright (c) 2024 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. + +Table of Contents + + 1. Introduction + 2. Background + 2.1. Internet of Things (IoT) + 2.2. Cloud Computing + 2.3. Edge Computing + 2.4. Examples of IoT Edge Computing Use Cases + 3. IoT Challenges Leading toward Edge Computing + 3.1. Time Sensitivity + 3.2. Connectivity Cost + 3.3. Resilience to Intermittent Services + 3.4. Privacy and Security + 4. IoT Edge Computing Functions + 4.1. Overview of IoT Edge Computing + 4.2. General Model + 4.3. OAM Components + 4.3.1. Resource Discovery and Authentication + 4.3.2. Edge Organization and Federation + 4.3.3. Multi-Tenancy and Isolation + 4.4. Functional Components + 4.4.1. In-Network Computation + 4.4.2. Edge Storage and Caching + 4.4.3. Communication + 4.5. Application Components + 4.5.1. IoT Device Management + 4.5.2. Data Management and Analytics + 4.6. Simulation and Emulation Environments + 5. Security Considerations + 6. Conclusion + 7. IANA Considerations + 8. Informative References + Acknowledgements + Authors' Addresses + +1. Introduction + + At the time of writing, many IoT services leverage cloud computing + platforms because they provide virtually unlimited storage and + processing power. The reliance of IoT on back-end cloud computing + provides additional advantages, such as scalability and efficiency. + At the time of writing, IoT systems are fairly static with respect to + integrating and supporting computation. It is not that there is no + computation, but that systems are often limited to static + configurations (edge gateways and cloud services). + + However, IoT devices generate large amounts of data at the edges of + the network. To meet IoT use case requirements, data is increasingly + being stored, processed, analyzed, and acted upon close to the data + sources. These requirements include time sensitivity, data volume, + connectivity cost, and resiliency in the presence of intermittent + connectivity, privacy, and security, which cannot be addressed by + centralized cloud computing. A more flexible approach is necessary + to address these needs effectively. This involves distributing + computing (and storage) and seamlessly integrating it into the edge- + cloud continuum. We refer to this integration of edge computing and + IoT as "IoT edge computing". This document describes the related + background, use cases, challenges, system models, and functional + components. + + Owing to the dynamic nature of the IoT edge computing landscape, this + document does not list existing projects in this field. Section 4.1 + presents a high-level overview of the field based on a limited review + of standards, research, and open-source and proprietary products in + [EDGE-COMPUTING-BACKGROUND]. + + This document represents the consensus of the Thing-to-Thing Research + Group (T2TRG). It has been reviewed extensively by the research + group members who are actively involved in the research and + development of the technology covered by this document. It is not an + IETF product and is not a standard. + +2. Background + +2.1. Internet of Things (IoT) + + Since the term "Internet of Things" was coined by Kevin Ashton in + 1999 while working on Radio-Frequency Identification (RFID) + technology [Ashton], the concept of IoT has evolved. At the time of + writing, it reflects a vision of connecting the physical world to the + virtual world of computers using (often wireless) networks over which + things can send and receive information without human intervention. + Recently, the term has become more literal by connecting things to + the Internet and converging on Internet and web technologies. + + A "Thing" is a physical item made available in the IoT, thereby + enabling digital interaction with the physical world for humans, + services, and/or other Things [REST-IOT]. In this document, we will + use the term "IoT device" to designate the embedded system attached + to the Thing. + + Resource-constrained Things, such as sensors, home appliances, and + wearable devices, often have limited storage and processing power, + which can create challenges with respect to reliability, performance, + energy consumption, security, and privacy [Lin]. Some, less- + resource-constrained Things, can generate a voluminous amount of + data. This range of factors led to IoT designs that integrate Things + into larger distributed systems, for example, edge or cloud computing + systems. + +2.2. Cloud Computing + + Cloud computing has been defined in [NIST]: + + | Cloud computing is a model for enabling ubiquitous, convenient, + | on-demand network access to a shared pool of configurable + | computing resources (e.g., networks, servers, storage, + | applications, and services) that can be rapidly provisioned and + | released with minimal management effort or service provider + | interaction. + + The low cost and massive availability of storage and processing power + enabled the realization of another computing model in which + virtualized resources can be leased in an on-demand fashion and + provided as general utilities. Platform-as-a-Service (PaaS) and + cloud computing platforms widely adopted this paradigm for delivering + services over the Internet, gaining both economical and technical + benefits [Botta]. + + At the time of writing, an unprecedented volume and variety of data + is generated by Things, and applications deployed at the network edge + consume this data. In this context, cloud-based service models are + not suitable for some classes of applications that require very short + response times, require access to local personal data, or generate + vast amounts of data. These applications may instead leverage edge + computing. + +2.3. Edge Computing + + Edge computing, also referred to as "fog computing" in some settings, + is a new paradigm in which substantial computing and storage + resources are placed at the edge of the Internet, close to mobile + devices, sensors, actuators, or machines. Edge computing happens + near data sources [Mahadev] as well as close to where decisions are + made or where interactions with the physical world take place + ("close" here can refer to a distance that is topological, physical, + latency-based, etc.). It processes both downstream data (originating + from cloud services) and upstream data (originating from end devices + or network elements). The term "fog computing" usually represents + the notion of multi-tiered edge computing, that is, several layers of + compute infrastructure between end devices and cloud services. + + An edge device is any computing or networking resource residing + between end-device data sources and cloud-based data centers. In + edge computing, end devices consume and produce data. At the network + edge, devices not only request services and information from the + cloud but also handle computing tasks including processing, storing, + caching, and load balancing on data sent to and from the cloud [Shi]. + This does not preclude end devices from hosting computation + themselves, when possible, independently or as part of a distributed + edge computing platform. + + Several Standards Developing Organizations (SDOs) and industry forums + have provided definitions of edge and fog computing: + + * ISO defines edge computing as a "form of distributed computing in + which significant processing and data storage takes place on nodes + which are at the edge of the network" [ISO_TR]. + + * ETSI defines multi-access edge computing as a "system which + provides an IT service environment and cloud-computing + capabilities at the edge of an access network which contains one + or more type of access technology, and in close proximity to its + users" [ETSI_MEC_01]. + + * The Industry IoT Consortium (IIC) (now incorporating what was + formerly OpenFog) defines fog computing as "a horizontal, system- + level architecture that distributes computing, storage, control + and networking functions closer to the users along a cloud-to- + thing continuum" [OpenFog]. + + Based on these definitions, we can summarize a general philosophy of + edge computing as distributing the required functions close to users + and data, while the difference to classic local systems is the usage + of management and orchestration features adopted from cloud + computing. + + Actors from various industries approach edge computing using + different terms and reference models, although, in practice, these + approaches are not incompatible and may integrate with each other: + + * The telecommunication industry tends to use a model where edge + computing services are deployed over a Network Function + Virtualization (NFV) infrastructure, at aggregation points, or in + proximity to the user equipment (e.g., gNodeBs) [ETSI_MEC_03]. + + * Enterprise and campus solutions often interpret edge computing as + an "edge cloud", that is, a smaller data center directly connected + to the local network (often referred to as "on-premise"). + + * The automation industry defines the edge as the connection point + between IT and Operational Technology (OT). Hence, edge computing + sometimes refers to applying IT solutions to OT problems, such as + analytics, more-flexible user interfaces, or simply having more + computing power than an automation controller. + +2.4. Examples of IoT Edge Computing Use Cases + + IoT edge computing can be used in home, industry, grid, healthcare, + city, transportation, agriculture, and/or educational scenarios. + Here, we discuss only a few examples of such use cases to identify + differentiating requirements, providing references to other use + cases. + + *Smart Factory* + As part of the Fourth Industrial Revolution, smart factories run + real-time processes based on IT technologies, such as artificial + intelligence and big data. Even a very small environmental change + in a smart factory can lead to a situation in which production + efficiency decreases or product quality problems occur. + Therefore, simple but time-sensitive processing can be performed + at the edge, for example, controlling the temperature and humidity + in the factory or operating machines based on the real-time + collection of the operational status of each machine. However, + data requiring highly precise analysis, such as machine life-cycle + management or accident risk prediction, can be transferred to a + central data center for processing. + + The use of edge computing in a smart factory [Argungu] can reduce + the cost of network and storage resources by reducing the + communication load to the central data center or server. It is + also possible to improve process efficiency and facility asset + productivity through real-time prediction of failures and to + reduce the cost of failure through preliminary measures. In the + existing manufacturing field, production facilities are manually + run according to a program entered in advance; however, edge + computing in a smart factory enables tailoring solutions by + analyzing data at each production facility and machine level. + Digital twins [Jones] of IoT devices have been jointly used with + edge computing in industrial IoT scenarios [Chen]. + + *Smart Grid* + In future smart-city scenarios, the smart grid will be critical in + ensuring highly available and efficient energy control in city- + wide electricity management [Mehmood]. Edge computing is expected + to play a significant role in these systems to improve the + transmission efficiency of electricity, to react to and restore + power after a disturbance, to reduce operation costs, and to reuse + energy effectively since these operations involve local decision- + making. In addition, edge computing can help monitor power + generation and power demand and make local electrical energy + storage decisions in smart grid systems. + + *Smart Agriculture* + Smart agriculture integrates information and communication + technologies with farming technology. Intelligent farms use IoT + technology to measure and analyze parameters, such as the + temperature, humidity, sunlight, carbon dioxide, and soil quality, + in crop cultivation facilities. Depending on the analysis + results, control devices are used to set the environmental + parameters to an appropriate state. Remote management is also + possible through mobile devices, such as smartphones. + + In existing farms, simple systems, such as management according to + temperature and humidity, can be easily and inexpensively + implemented using IoT technology [Tanveer]. Field sensors gather + data on field and crop condition. This data is then transmitted + to cloud servers that process data and recommend actions. The use + of edge computing can reduce the volume of back-and-forth data + transmissions significantly, resulting in cost and bandwidth + savings. Locally generated data can be processed at the edge, and + local computing and analytics can drive local actions. With edge + computing, it is easy for farmers to select large amounts of data + for processing, and data can be analyzed even in remote areas with + poor access conditions. Other applications include enabling + dashboarding, for example, to visualize the farm status, as well + as enhancing Extended Reality (XR) applications that require edge + audio and/or video processing. As the number of people working on + farming has been decreasing over time, increasing automation + enabled by edge computing can be a driving force for future smart + agriculture [OGrady]. + + *Smart Construction* + Safety is critical at construction sites. Every year, many + construction workers lose their lives because of falls, + collisions, electric shocks, and other accidents [BigRentz]. + Therefore, solutions have been developed to improve construction + site safety, including the real-time identification of workers, + monitoring of equipment location, and predictive accident + prevention. To deploy these solutions, many cameras and IoT + sensors have been installed on construction sites to measure + noise, vibration, gas concentration, etc. Typically, the data + generated from these measurements is collected in on-site gateways + and sent to remote cloud servers for storage and analysis. Thus, + an inspector can check the information stored on the cloud server + to investigate an incident. However, this approach can be + expensive because of transmission costs (for example, of video + streams over a mobile network connection) and because usage fees + of private cloud services. + + Using edge computing [Yue], data generated at the construction + site can be processed and analyzed on an edge server located + within or near the site. Only the result of this processing needs + to be transferred to a cloud server, thus reducing transmission + costs. It is also possible to locally generate warnings to + prevent accidents in real time. + + *Self-Driving Car* + Edge computing plays a crucial role in safety-focused self-driving + car systems [Badjie]. With a multitude of sensors, such as high- + resolution cameras, radars, Light Detection and Ranging (LiDAR) + systems, sonar sensors, and GPS systems, autonomous vehicles + generate vast amounts of real-time data. Local processing + utilizing edge computing nodes allows for efficient collection and + analysis of this data to monitor vehicle distances and road + conditions and respond promptly to unexpected situations. + Roadside computing nodes can also be leveraged to offload tasks + when necessary, for example, when the local processing capacity of + the car is insufficient because of hardware constraints or a large + data volume. + + For instance, when the car ahead slows, a self-driving car adjusts + its speed to maintain a safe distance, or when a roadside signal + changes, it adapts its behavior accordingly. In another example, + cars equipped with self-parking features utilize local processing + to analyze sensor data, determine suitable parking spots, and + execute precise parking maneuvers without relying on external + processing or connectivity. It is also possible to use in-cabin + cameras coupled with local processing to monitor the driver's + attention level and detect signs of drowsiness or distraction. + The system can issue warnings or implement preventive measures to + ensure driver safety. + + Edge computing empowers self-driving cars by enabling real-time + processing, reducing latency, enhancing data privacy, and + optimizing bandwidth usage. By leveraging local processing + capabilities, self-driving cars can make rapid decisions, adapt to + changing environments, and ensure safer and more efficient + autonomous driving experiences. + + *Digital Twin* + A digital twin can simulate different scenarios and predict + outcomes based on real-time data collected from the physical + environment. This simulation capability empowers proactive + maintenance, optimization of operations, and the prediction of + potential issues or failures. Decision makers can use digital + twins to test and validate different strategies, identify + inefficiencies, and optimize performance [CertMagic]. + + With edge computing, real-time data is collected, processed, and + analyzed directly at the edge, allowing for the accurate + monitoring and simulation of physical assets. Moreover, edge + computing effectively minimizes latency, enabling rapid responses + to dynamic conditions as computational resources are brought + closer to the physical object. Running digital twin processing at + the edge enables organizations to obtain timely insights and make + informed decisions that maximize efficiency and performance. + + *Other Use Cases* + Artificial intelligence (AI) and machine learning (ML) systems at + the edge empower real-time analysis, faster decision-making, + reduced latency, improved operational efficiency, and personalized + experiences across various industries by bringing AI and ML + capabilities closer to edge devices. + + In addition, oneM2M has studied several IoT edge computing use + cases, which are documented in [oneM2M-TR0001], [oneM2M-TR0018], + and [oneM2M-TR0026]. The edge-computing-related requirements + raised through the analysis of these use cases are captured in + [oneM2M-TS0002]. + +3. IoT Challenges Leading toward Edge Computing + + This section describes the challenges faced by the IoT that are + motivating the adoption of edge computing. These are distinct from + the research challenges applicable to IoT edge computing, some of + which are mentioned in Section 4. + + IoT technology is used with increasingly demanding applications in + domains such as industrial, automotive, and healthcare, which leads + to new challenges. For example, industrial machines, such as laser + cutters, produce over 1 terabyte of data per hour, and similar + amounts can be generated in autonomous cars [NVIDIA]. 90% of IoT + data is expected to be stored, processed, analyzed, and acted upon + close to the source [Kelly], as cloud computing models alone cannot + address these new challenges [Chiang]. + + Below, we discuss IoT use case requirements that are moving cloud + capabilities to be more proximate, distributed, and disaggregated. + +3.1. Time Sensitivity + + Often, many industrial control systems, such as manufacturing + systems, smart grids, and oil and gas systems, require stringent end- + to-end latency between the sensor and control nodes. While some IoT + applications may require latency below a few tens of milliseconds + [Weiner], industrial robots and motion control systems have use cases + for cycle times in the order of microseconds [IEC_IEEE_60802]. In + some cases, speed-of-light limitations may simply prevent cloud-based + solutions; however, this is not the only challenge relative to time + sensitivity. Guarantees for bounded latency and jitter ([RFC8578], + Section 7) are also important for industrial IoT applications. This + means that control packets must arrive with as little variation as + possible and within a strict deadline. Given the best-effort + characteristics of the Internet, this challenge is virtually + impossible to address without using end-to-end guarantees for + individual message delivery and continuous data flows. + +3.2. Connectivity Cost + + Some IoT deployments may not face bandwidth constraints when + uploading data to the cloud. Theoretically, both 5G and Wi-Fi 6 + networks top out at 10 gigabits per second (i.e., 4.5 terabytes per + hour), allowing the transfer of large amounts of uplink data. + However, the cost of maintaining continuous high-bandwidth + connectivity for such usage is unjustifiable and impractical for most + IoT applications. In some settings, for example, in aeronautical + communication, higher communication costs reduce the amount of data + that can be practically uploaded even further. Therefore, minimizing + reliance on high-bandwidth connectivity is a requirement; this can be + done, for example, by processing data at the edge and deriving + summarized or actionable insights that can be transmitted to the + cloud. + +3.3. Resilience to Intermittent Services + + Many IoT devices, such as sensors, actuators, and controllers, have + very limited hardware resources and cannot rely solely on their own + resources to meet their computing and/or storage needs. They require + reliable, uninterrupted, or resilient services to augment their + capabilities to fulfill their application tasks. This is difficult + and partly impossible to achieve using cloud services for systems + such as vehicles, drones, or oil rigs that have intermittent network + connectivity. Conversely, a cloud backend might want to access + device data even if the device is currently asleep. + +3.4. Privacy and Security + + When IoT services are deployed at home, personal information can be + learned from detected usage data. For example, one can extract + information about employment, family status, age, and income by + analyzing smart meter data [ENERGY]. Policy makers have begun to + provide frameworks that limit the usage of personal data and impose + strict requirements on data controllers and processors. Data stored + indefinitely in the cloud also increases the risk of data leakage, + for instance, through attacks on rich targets. + + It is often argued that industrial systems do not provide privacy + implications, as no personal data is gathered. However, data from + such systems is often highly sensitive, as one might be able to infer + trade secrets, such as the setup of production lines. Hence, owners + of these systems are generally reluctant to upload IoT data to the + cloud. + + Furthermore, passive observers can perform traffic analysis on + device-to-cloud paths. Therefore, hiding traffic patterns associated + with sensor networks can be another requirement for edge computing. + +4. IoT Edge Computing Functions + + We first look at the current state of IoT edge computing + (Section 4.1) and then define a general system model (Section 4.2). + This provides a context for IoT edge computing functions, which are + listed in Sections 4.3, 4.4, and 4.5. + +4.1. Overview of IoT Edge Computing + + This section provides an overview of the current (at the time of + writing) IoT edge computing field based on a limited review of + standards, research, and open-source and proprietary products in + [EDGE-COMPUTING-BACKGROUND]. + + IoT gateways, both open-source (such as EdgeX Foundry or Home Edge) + and proprietary products, represent a common class of IoT edge + computing products, where the gateway provides a local service on + customer premises and is remotely managed through a cloud service. + IoT communication protocols are typically used between IoT devices + and the gateway, including a Constrained Application Protocol (CoAP) + [RFC7252], Message Queuing Telemetry Transport (MQTT) [MQTT5], and + many specialized IoT protocols (such as Open Platform Communications + Unified Architecture (OPC UA) and Data Distribution Service (DDS) in + the industrial IoT space), while the gateway communicates with the + distant cloud typically using HTTPS. Virtualization platforms enable + the deployment of virtual edge computing functions (using Virtual + Machines (VMs) and application containers), including IoT gateway + software, on servers in the mobile network infrastructure (at base + stations and concentration points), edge data centers (in central + offices), and regional data centers located near central offices. + End devices are envisioned to become computing devices in forward- + looking projects but are not commonly used at the time of writing. + + In addition to open-source and proprietary solutions, a horizontal + IoT service layer is standardized by the oneM2M standards body to + reduce fragmentation, increase interoperability, and promote reuse in + the IoT ecosystem. Furthermore, ETSI Multi-access Edge Computing + (MEC) developed an IoT API [ETSI_MEC_33] that enables the deployment + of heterogeneous IoT platforms and provides a means to configure the + various components of an IoT system. + + Physical or virtual IoT gateways can host application programs that + are typically built using an SDK to access local services through a + programmatic API. Edge cloud system operators host their customers' + application VMs or containers on servers located in or near access + networks that can implement local edge services. For example, mobile + networks can provide edge services for radio network information, + location, and bandwidth management. + + Resilience in the IoT can entail the ability to operate autonomously + in periods of disconnectedness to preserve the integrity and safety + of the controlled system, possibly in a degraded mode. IoT devices + and gateways are often expected to operate in always-on and + unattended modes, using fault detection and unassisted recovery + functions. + + The life-cycle management of services and applications on physical + IoT gateways is generally cloud based. Edge cloud management + platforms and products (such as StarlingX, Akraino Edge Stack, or + proprietary products from major cloud providers) adapt cloud + management technologies (e.g., Kubernetes) to the edge cloud, that + is, to smaller, distributed computing devices running outside a + controlled data center. Typically, the service and application life + cycle is using an NFV-like management and orchestration model. + + The platform generally enables advertising or consuming services + hosted on the platform (e.g., the Mp1 interface in ETSI MEC supports + service discovery and communication), and enables communication with + local and remote endpoints (e.g., message routing function in IoT + gateways). The platform is usually extensible to edge applications + because it can advertise a service that other edge applications can + consume. The IoT communication services include protocol + translation, analytics, and transcoding. Communication between edge + computing devices is enabled in tiered or distributed deployments. + + An edge cloud platform may enable pass-through without storage or + local storage (e.g., on IoT gateways). Some edge cloud platforms use + distributed storage such as that provided by a distributed storage + platform (e.g., EdgeFS and Ceph) or, in more experimental settings, + by an Information-Centric Networking (ICN) network, for example, + systems such as Chipmunk [Chipmunk] and Kua [Kua] have been proposed + as distributed information-centric objects stores. External storage, + for example, on databases in a distant or local IT cloud, is + typically used for filtered data deemed worthy of long-term storage; + although, in some cases, it may be for all data, for example, when + required for regulatory reasons. + + Stateful computing is the default on most systems, VMs, and + containers. Stateless computing is supported on platforms providing + a "serverless computing" service (also known as function-as- + a-service, e.g., using stateless containers) or on systems based on + named function networking. + + In many IoT use cases, a typical network usage pattern is a high- + volume uplink with some form of traffic reduction enabled by + processing over edge computing devices. Alternatives to traffic + reduction include deferred transmission (to off-peak hours or using + physical shipping). Downlink traffic includes application control + and software updates. Downlink-heavy traffic patterns are not + excluded but are more often associated with non-IoT usage (e.g., + video Content Delivery Networks (CDNs)). + +4.2. General Model + + Edge computing is expected to play an important role in deploying new + IoT services integrated with big data and AI enabled by flexible in- + network computing platforms. Although there are many approaches to + edge computing, this section lays out an attempt at a general model + and lists associated logical functions. In practice, this model can + be mapped to different architectures, such as: + + * A single IoT gateway, or a hierarchy of IoT gateways, typically + connected to the cloud (e.g., to extend the centralized cloud- + based management of IoT devices and data to the edge). The IoT + gateway plays a common role in providing access to a heterogeneous + set of IoT devices and sensors, handling IoT data, and delivering + IoT data to its final destination in a cloud network. An IoT + gateway requires interactions with the cloud; however, it can also + operate independently in a disconnected mode. + + * A set of distributed computing nodes, for example, embedded in + switches, routers, edge cloud servers, or mobile devices. Some + IoT devices have sufficient computing capabilities to participate + in such distributed systems owing to advances in hardware + technology. In this model, edge computing nodes can collaborate + to share resources. + + * A hybrid system involving both IoT gateways and supporting + functions in distributed computing nodes. + + In the general model described in Figure 1, the edge computing domain + is interconnected with IoT devices (southbound connectivity), + possibly with a remote (e.g., cloud) network (northbound + connectivity), and with a service operator's system. Edge computing + nodes provide multiple logical functions or components that may not + be present in a given system. They may be implemented in a + centralized or distributed fashion, at the network edge, or through + interworking between the edge network and remote cloud networks. + + +---------------------+ + | Remote Network | +---------------+ + |(e.g., cloud network)| | Service | + +-----------+---------+ | Operator | + | +------+--------+ + | | + +--------------+-------------------+-----------+ + | Edge Computing Domain | + | | + | One or more computing nodes | + | (IoT gateway, end devices, switches, | + | routers, mini/micro-data centers, etc.) | + | | + | OAM Components | + | - Resource Discovery and Authentication | + | - Edge Organization and Federation | + | - Multi-Tenancy and Isolation | + | - ... | + | | + | Functional Components | + | - In-Network Computation | + | - Edge Caching | + | - Communication | + | - Other Services | + | - ... | + | | + | Application Components | + | - IoT Devices Management | + | - Data Management and Analytics | + | - ... | + | | + +------+--------------+-------- - - - -+- - - -+ + | | | | | + | | +-----+--+ + +----+---+ +-----+--+ | |Compute | | + | End | | End | ... |Node/End| + |Device 1| |Device 2| ...| |Device n| | + +--------+ +--------+ +--------+ + + - - - - - - - -+ + + Figure 1: Model of IoT Edge Computing + + In the distributed model described in Figure 2, the edge computing + domain is composed of IoT edge gateways and IoT devices that are also + used as computing nodes. Edge computing domains are connected to a + remote (e.g., cloud) network and their respective service operator's + system. The computing nodes provide logical functions, for example, + as part of distributed machine learning or distributed image + processing applications. The processing capabilities in IoT devices + are limited; they require the support of other nodes. In a + distributed machine learning application, the training process for AI + services can be executed at IoT edge gateways or cloud networks, and + the prediction (inference) service is executed in the IoT devices. + Similarly, in a distributed image processing application, some image + processing functions can be executed at the edge or in the cloud. To + limit the amount of data to be uploaded to central cloud functions, + IoT edge devices may pre-process data. + + +----------------------------------------------+ + | Edge Computing Domain | + | | + | +--------+ +--------+ +--------+ | + | |Compute | |Compute | |Compute | | + | |Node/End| |Node/End| .... |Node/End| | + | |Device 1| |Device 2| .... |Device m| | + | +----+---+ +----+---+ +----+---+ | + | | | | | + | +---+-------------+-----------------+--+ | + | | IoT Edge Gateway | | + | +-----------+-------------------+------+ | + | | | | + +--------------+-------------------+-----------+ + | | + +-----------+---------+ +------+-------+ + | Remote Network | | Service | + |(e.g., cloud network)| | Operator(s) | + +-----------+---------+ +------+-------+ + | | + +--------------+-------------------+-----------+ + | | | | + | +-----------+-------------------+------+ | + | | IoT Edge Gateway | | + | +---+-------------+-----------------+--+ | + | | | | | + | +----+---+ +----+---+ +----+---+ | + | |Compute | |Compute | |Compute | | + | |Node/End| |Node/End| .... |Node/End| | + | |Device 1| |Device 2| .... |Device n| | + | +--------+ +--------+ +--------+ | + | | + | Edge Computing Domain | + +----------------------------------------------+ + + Figure 2: Example of Machine Learning over a Distributed IoT Edge + Computing System + + In the following, we enumerate major edge computing domain + components. Here, they are loosely organized into Operations, + Administration, and Maintenance (OAM); functional; and application + components, with the understanding that the distinction between these + classes may not always be clear, depending on actual system + architectures. Some representative research challenges are + associated with those functions. We used input from coauthors, + participants of T2TRG meetings, and some comprehensive reviews of the + field ([Yousefpour], [Zhang2], and [Khan]). + +4.3. OAM Components + + Edge computing OAM extends beyond the network-related OAM functions + listed in [RFC6291]. In addition to infrastructure (network, + storage, and computing resources), edge computing systems can also + include computing environments (for VMs, software containers, and + functions), IoT devices, data, and code. + + Operation-related functions include performance monitoring for + Service Level Agreement (SLA) measurements, fault management, and + provisioning for links, nodes, compute and storage resources, + platforms, and services. Administration covers network/compute/ + storage resources, platform and service discovery, configuration, and + planning. Discovery during normal operation (e.g., discovery of + compute or storage nodes by endpoints) is typically not included in + OAM; however, in this document, we do not address it separately. + Management covers the monitoring and diagnostics of failures, as well + as means to minimize their occurrence and take corrective actions. + This may include software update management and high service + availability through redundancy and multipath communication. + Centralized (e.g., Software-Defined Networking (SDN)) and + decentralized management systems can be used. Finally, we + arbitrarily chose to address data management as an application + component; however, in some systems, data management may be + considered similar to a network management function. + + We further detail a few relevant OAM components. + +4.3.1. Resource Discovery and Authentication + + Discovery and authentication may target platforms and infrastructure + resources, such as computing, networking, and storage, as well as + other resources, such as IoT devices, sensors, data, code units, + services, applications, and users interacting with the system. In a + broker-based system, an IoT gateway can act as a broker to discover + IoT resources. More decentralized solutions can also be used in + replacement of or in complement to the broker-based solutions; for + example, CoAP enables multicast discovery of an IoT device and CoAP + service discovery enables one to obtain a list of resources made + available by this device [RFC7252]. For device authentication, + current centralized gateway-based systems rely on the installation of + a secret on IoT devices and computing devices (e.g., a device + certificate stored in a hardware security module or a combination of + code and data stored in a trusted execution environment). + + Related challenges include: + + * Discovery, authentication, and trust establishment between IoT + devices, compute nodes, and platforms, with regard to concerns + such as mobility, heterogeneous devices and networks, scale, + multiple trust domains, constrained devices, anonymity, and + traceability. + + * Intermittent connectivity to the Internet, removing the need to + rely on a third-party authority [Echeverria]. + + * Resiliency to failure [Harchol], denial-of-service attacks, and + easier physical access for attackers. + +4.3.2. Edge Organization and Federation + + In a distributed system context, once edge devices have discovered + and authenticated each other, they can be organized or self-organized + into hierarchies or clusters. The organizational structure may range + from centralized to peer-to-peer, or it may be closely tied to other + systems. Such groups can also form federations with other edges or + with remote clouds. + + Related challenges include: + + * Support for scaling and enabling fault tolerance or self-healing + [Jeong]. In addition to using a hierarchical organization to cope + with scaling, another available and possibly complementary + mechanism is multicast [RFC7390] [CORE-GROUPCOMM-BIS]. Other + approaches include relying on blockchains [Ali]. + + * Integration of edge computing with virtualized Radio Access + Networks (Fog RAN) [SFC-FOG-RAN] and 5G access networks. + + * Sharing resources in multi-vendor and multi-operator scenarios to + optimize criteria such as profit [Anglano], resource usage, + latency, and energy consumption. + + * Capacity planning, placement of infrastructure nodes to minimize + delay [Fan], cost, energy, etc. + + * Incentives for participation, for example, in peer-to-peer + federation schemes. + + * Design of federated AI over IoT edge computing systems [Brecko], + for example, for anomaly detection. + +4.3.3. Multi-Tenancy and Isolation + + Some IoT edge computing systems make use of virtualized (compute, + storage, and networking) resources to address the need for secure + multi-tenancy at the edge. This leads to "edge clouds" that share + properties with remote clouds and can reuse some of their ecosystems. + Virtualization function management is largely covered by ETSI NFV and + MEC standards and recommendations. Projects such as [LFEDGE-EVE] + further cover virtualization and its management in distributed edge + computing settings. + + Related challenges include: + + * Adapting cloud management platforms to the edge to account for its + distributed nature, heterogeneity, need for customization, and + limited resources (for example, using Conflict-free Replicated + Data Types (CRDTs) [Jeffery] or intent-based management mechanisms + [Cao]). + + * Minimizing virtual function instantiation time and resource usage. + +4.4. Functional Components + +4.4.1. In-Network Computation + + A core function of IoT edge computing is to enable local computation + on a node at the network edge, typically for application-layer + processing, such as processing input data from sensors, making local + decisions, preprocessing data, and offloading computation on behalf + of a device, service, or user. Related functions include + orchestrating computation (in a centralized or distributed manner) + and managing application life cycles. Support for in-network + computation may vary in terms of capability; for example, computing + nodes can host virtual machines, software containers, software + actors, unikernels running stateful or stateless code, or a rule + engine providing an API to register actions in response to conditions + (such as an IoT device ID, sensor values to check, thresholds, etc.). + + Edge offloading includes offloading to and from an IoT device and to + and from a network node. [Cloudlets] describes an example of + offloading computation from an end device to a network node. In + contrast, oneM2M is an example of a system that allows a cloud-based + IoT platform to transfer resources and tasks to a target edge node + [oneM2M-TR0052]. Once transferred, the edge node can directly + support IoT devices that it serves with the service offloaded by the + cloud (e.g., group management, location management, etc.). + + QoS can be provided in some systems through the combination of + network QoS (e.g., traffic engineering or wireless resource + scheduling) and compute and storage resource allocations. For + example, in some systems, a bandwidth manager service can be exposed + to enable allocation of the bandwidth to or from an edge computing + application instance. + + In-network computation can leverage the underlying services provided + using data generated by IoT devices and access networks. Such + services include IoT device location, radio network information, + bandwidth management, and congestion management (e.g., the congestion + management feature of oneM2M [oneM2M-TR0052]). + + Related challenges include: + + * Computation placement: in a centralized or distributed (e.g., + peer-to-peer) manner, selecting an appropriate compute device. + The selection is based on available resources, location of data + input and data sinks, compute node properties, etc. with varying + goals. These goals include end-to-end latency, privacy, high + availability, energy conservation, or network efficiency (for + example, using load-balancing techniques to avoid congestion). + + * Onboarding code on a platform or computing device and invoking + remote code execution, possibly as part of a distributed + programming model and with respect to similar concerns of latency, + privacy, etc. For example, offloading can be included in a + vehicular scenario [Grewe]. These operations should deal with + heterogeneous compute nodes [Schafer] and may also support end + devices, including IoT devices, as compute nodes [Larrea]. + + * Adapting Quality of Results (QoR) for applications where a perfect + result is not necessary [Li]. + + * Assisted or automatic partitioning of code. For example, for + application programs [COIN-APPCENTRES] or network programs + [REQS-P4COMP]. + + * Supporting computation across trust domains. For example, + verifying computation results. + + * Supporting computation mobility: relocating an instance from one + compute node to another while maintaining a given service level; + session continuity when communicating with end devices that are + mobile, possibly at high speed (e.g., in vehicular scenarios); + defining lightweight execution environments for secure code + mobility, for example, using WebAssembly [Nieke]. + + * Defining, managing, and verifying SLAs for edge computing systems; + pricing is a challenging task. + +4.4.2. Edge Storage and Caching + + Local storage or caching enables local data processing (e.g., + preprocessing or analysis) as well as delayed data transfer to the + cloud or delayed physical shipping. An edge node may offer local + data storage (in which persistence is subject to retention policies), + caching, or both. Generally, "caching" refers to temporary storage + to improve performance without persistence guarantees. An edge- + caching component manages data persistence; for example, it schedules + the removal of data when it is no longer needed. Other related + aspects include the authentication and encryption of data. Edge + storage and caching can take the form of a distributed storage + system. + + Related challenges include: + + * Cache and data placement: using cache positioning and data + placement strategies to minimize data retrieval delay [Liu] and + energy consumption. Caches may be positioned in the access- + network infrastructure or on end devices. + + * Maintaining consistency, freshness, reliability, and privacy of + data stored or cached in systems that are distributed, + constrained, and dynamic (e.g., due to node mobility, energy- + saving regimes, and disruptions) and which can have additional + data governance constraints on data storage location. For + example, [Mortazavi] describes leveraging a hierarchical storage + organization. Freshness-related metrics include the age of + information [Yates] that captures the timeliness of information + received from a sender (e.g., an IoT device). + +4.4.3. Communication + + An edge cloud may provide a northbound data plane or management plane + interface to a remote network, such as a cloud, home, or enterprise + network. This interface does not exist in stand-alone (local-only) + scenarios. To support such an interface when it exists, an edge + computing component needs to expose an API, deal with authentication + and authorization, and support secure communication. + + An edge cloud may provide an API or interface to local or mobile + users, for example, to provide access to services and applications or + to manage data published by local or mobile devices. + + Edge computing nodes communicate with IoT devices over a southbound + interface, typically for data acquisition and IoT device management. + + Communication brokering is a typical function of IoT edge computing + that facilitates communication with IoT devices, enables clients to + register as recipients for data from devices, forwards traffic to or + from IoT devices, enables various data discovery and redistribution + patterns (for example, north-south with clouds and east-west with + other edge devices [EDGE-DATA-DISCOVERY-OVERVIEW]). Another related + aspect is dispatching alerts and notifications to interested + consumers both inside and outside the edge computing domain. + Protocol translation, analytics, and video transcoding can also be + performed when necessary. Communication brokering may be centralized + in some systems, for example, using a hub-and-spoke message broker or + distributed with message buses, possibly in a layered bus approach. + Distributed systems can leverage direct communication between end + devices over device-to-device links. A broker can ensure + communication reliability and traceability and, in some cases, + transaction management. + + Related challenges include: + + * Defining edge computing abstractions, such as PaaS [Yangui], + suitable for users and cloud systems to interact with edge + computing systems and dealing with interoperability issues, such + as data-model heterogeneity. + + * Enabling secure and resilient communication between IoT devices + and a remote cloud, for example, through multipath support. + +4.5. Application Components + + IoT edge computing can host applications, such as those mentioned in + Section 2.4. While describing the components of individual + applications is out of our scope, some of those applications share + similar functions, such as IoT device management and data management, + as described below. + +4.5.1. IoT Device Management + + IoT device management includes managing information regarding IoT + devices, including their sensors and how to communicate with them. + Edge computing addresses the scalability challenges of a large number + of IoT devices by separating the scalability domain into local (e.g., + edge) networks and remote networks. For example, in the context of + the oneM2M standard, a device management functionality (called + "software campaign" in oneM2M) enables the installation, deletion, + activation, and deactivation of software functions and services on a + potentially large number of edge nodes [oneM2M-TR0052]. Using a + dashboard or management software, a service provider issues these + requests through an IoT cloud platform supporting the software + campaign functionality. + + The challenges listed in Section 4.3.1 may be applicable to IoT + device management as well. + +4.5.2. Data Management and Analytics + + Data storage and processing at the edge are major aspects of IoT edge + computing, directly addressing the high-level IoT challenges listed + in Section 3. Data analysis, for example, through AI/ML tasks + performed at the edge, may benefit from specialized hardware support + on the computing nodes. + + Related challenges include: + + * Addressing concerns regarding resource usage, security, and + privacy when sharing, processing, discovering, or managing data: + for example, presenting data in views composed of an aggregation + of related data [Zhang], protecting data communication between + authenticated peers [Basudan], classifying data (e.g., in terms of + privacy, importance, and validity), and compressing and encrypting + data, for example, using homomorphic encryption to directly + process encrypted data [Stanciu]. + + * Other concerns regarding edge data discovery (e.g., streaming + data, metadata, and events) include siloization and lack of + standards in edge environments that can be dynamic (e.g., + vehicular networks) and heterogeneous + [EDGE-DATA-DISCOVERY-OVERVIEW]. + + * Data-driven programming models [Renart], for example, those that + are event based, including handling naming and data abstractions. + + * Data integration in an environment without data standardization or + where different sources use different ontologies + [Farnbauer-Schmidt]. + + * Addressing concerns such as limited resources, privacy, and + dynamic and heterogeneous environments to deploy machine learning + at the edge: for example, making machine learning more lightweight + and distributed (e.g., enabling distributed inference at the + edge), supporting shorter training times and simplified models, + and supporting models that can be compressed for efficient + communication [Murshed]. + + * Although edge computing can support IoT services independently of + cloud computing, it can also be connected to cloud computing. + Thus, the relationship between IoT edge computing and cloud + computing, with regard to data management, is another potential + challenge [ISO_TR]. + +4.6. Simulation and Emulation Environments + + IoT edge computing introduces new challenges to the simulation and + emulation tools used by researchers and developers. A varied set of + applications, networks, and computing technologies can coexist in a + distributed system, making modeling difficult. Scale, mobility, and + resource management are additional challenges [SimulatingFog]. + + Tools include simulators, where simplified application logic runs on + top of a fog network model, and emulators, where actual applications + can be deployed, typically in software containers, over a cloud + infrastructure (e.g., Docker and Kubernetes) running over a network + emulating network edge conditions, such as variable delays, + throughput, and mobility events. To gain in scale, emulated and + simulated systems can be used together in hybrid federation-based + approaches [PseudoDynamicTesting]; whereas to gain in realism, + physical devices can be interconnected with emulated systems. + Examples of related work and platforms include the publicly + accessible MEC sandbox work recently initiated in ETSI [ETSI_Sandbox] + and open-source simulators and emulators ([AdvantEDGE] emulator and + tools cited in [SimulatingFog]). EdgeNet [Senel] is a globally + distributed edge cloud for Internet researchers, which uses nodes + contributed by institutions and which is based on Docker for + containerization and Kubernetes for deployment and node management. + + Digital twins are virtual instances of a physical system (twin) that + are continually updated with the latter's performance, maintenance, + and health status data throughout the life cycle of the physical + system [Madni]. In contrast to an emulation or simulated + environment, digital twins, once generated, are maintained in sync by + their physical twin, which can be, among many other instances, an IoT + device, edge device, or an edge network. The benefits of digital + twins go beyond those of emulation and include accelerated business + processes, enhanced productivity, and faster innovation with reduced + costs [NETWORK-DIGITAL-TWIN-ARCH]. + +5. Security Considerations + + Privacy and security are drivers of the adoption of edge computing + for the IoT (Section 3.4). As discussed in Section 4.3.1, + authentication and trust (among computing nodes, management nodes, + and end devices) can be challenging as scale, mobility, and + heterogeneity increase. The sometimes disconnected nature of edge + resources can avoid reliance on third-party authorities. Distributed + edge computing is exposed to reliability and denial-of-service + attacks. A personal or proprietary IoT data leakage is also a major + threat, particularly because of the distributed nature of the systems + (Section 4.5.2). Furthermore, blockchain-based distributed IoT edge + computing must be designed for privacy, since public blockchain + addressing does not guarantee absolute anonymity [Ali]. + + However, edge computing also offers solutions in the security space: + maintaining privacy by computing sensitive data closer to data + generators is a major use case for IoT edge computing. An edge cloud + can be used to perform actions based on sensitive data or to + anonymize or aggregate data prior to transmission to a remote cloud + server. Edge computing communication brokering functions can also be + used to secure communication between edge and cloud networks. + +6. Conclusion + + IoT edge computing plays an essential role, complementary to the + cloud, in enabling IoT systems in certain situations. In this + document, we presented use cases and listed the core challenges faced + by the IoT that drive the need for IoT edge computing. Therefore, + the first part of this document may help focus future research + efforts on the aspects of IoT edge computing where it is most useful. + The second part of this document presents a general system model and + structured overview of the associated research challenges and related + work. The structure, based on the system model, is not meant to be + restrictive and exists for the purpose of having a link between + individual research areas and where they are applicable in an IoT + edge computing system. + +7. IANA Considerations + + This document has no IANA actions. + +8. Informative References + + [AdvantEDGE] + "AdvantEDGE, Mobile Edge Emulation Platform", commit + 8f6edbe, May 2023, + <https://github.com/InterDigitalInc/AdvantEDGE>. + + [Ali] Ali, M., Vecchio, M., and F. Antonelli, "Enabling a + Blockchain-Based IoT Edge", IEEE Internet of Things + Magazine, vol. 1, no.2, pp. 24-29, + DOI 10.1109/IOTM.2019.1800024, December 2018, + <https://doi.org/10.1109/IOTM.2019.1800024>. + + [Anglano] Anglano, C., Canonico, M., Castagno, P., Guazzone, M., and + M. Sereno, "A game-theoretic approach to coalition + formation in fog provider federations", 2018 Third + International Conference on Fog and Mobile Edge Computing + (FMEC), DOI 10.1109/fmec.2018.8364054, April 2018, + <https://doi.org/10.1109/fmec.2018.8364054>. + + [Argungu] Argungu, J., Idina, M., Chalawa, U., Ummar, M., Bello, S., + Arzika, I., and B. Mala, "A Survey of Edge Computing + Approaches in Smart Factory", International Journal of + Advanced Research in Computer and Communication + Engineering, Vol. 12, Issue 9, September 2023. + + [Ashton] Ashton, K., "That 'Internet of Things' Thing", RFID + Journal, vol. 22, no. 7, pp. 97-114, June 2009, + <http://www.itrco.jp/libraries/RFIDjournal- + That%20Internet%20of%20Things%20Thing.pdf>. + + [Badjie] Badjie, B., "The Future of Autonomous Driving Systems with + Edge Computing", September 2023, + <https://medium.com/@bakarykumba1996/the-future-of- + autonomous-driving-systems-with-edge-computing- + 8c919597c4ee>. + + [Basudan] Basudan, S., Lin, X., and K. Sankaranarayanan, "A Privacy- + Preserving Vehicular Crowdsensing-Based Road Surface + Condition Monitoring System Using Fog Computing", IEEE + Internet of Things Journal, vol. 4, no. 3, pp. 772-782, + DOI 10.1109/jiot.2017.2666783, June 2017, + <https://doi.org/10.1109/jiot.2017.2666783>. + + [BigRentz] BigRentz, "41 Construction Safety Statistics for 2024", + February 2024, <https://www.bigrentz.com/blog/ + construction-safety-statistics>. + + [Botta] Botta, A., de Donato, W., Persico, V., and A. Pescapé, + "Integration of Cloud computing and Internet of Things: A + survey", Future Generation Computer Systems, vol. 56, pp. + 684-700, DOI 10.1016/j.future.2015.09.021, March 2016, + <https://doi.org/10.1016/j.future.2015.09.021>. + + [Brecko] Brecko, A., Kajáti, E., Koziorek, J., and I. Zolotová, + "Federated Learning for Edge Computing: A Survey", Applied + Sciences 12(18):9124, DOI 10.3390/app12189124, September + 2022, <https://doi.org/10.3390/app12189124>. + + [Cao] Cao, L., Merican, A., Tootaghaj, D., Ahmed, F., Sharma, + P., and V. Saxena, "eCaaS: A Management Framework of Edge + Container as a Service for Business Workload", Proceedings + of the 4th International Workshop on Edge Systems, + Analytics and Networking, DOI 10.1145/3434770.3459741, + April 2021, <https://doi.org/10.1145/3434770.3459741>. + + [CertMagic] + CertMagic, "Digital Twin Technology: Simulating Real-World + Scenarios for Enhanced Decision Making", May 2023, + <https://certmagic.medium.com/digital-twin-technology- + simulating-real-world-scenarios-for-enhanced-decision- + making-8844c51e856d>. + + [Chen] Chen, B., Wan, J., Celesti, A., Li, D., Abbas, H., and Q. + Zhang, "Edge Computing in IoT-Based Manufacturing", IEEE + Communications Magazine, vol. 56, no. 9, pp. 103-109, + DOI 10.1109/mcom.2018.1701231, September 2018, + <https://doi.org/10.1109/mcom.2018.1701231>. + + [Chiang] Chiang, M. and T. Zhang, "Fog and IoT: An Overview of + Research Opportunities", IEEE Internet of Things Journal, + vol. 3, no. 6, pp. 854-864, DOI 10.1109/jiot.2016.2584538, + December 2016, + <https://doi.org/10.1109/jiot.2016.2584538>. + + [Chipmunk] Shin, Y., Park, S., Ko, N., and A. Jeong, "Chipmunk: + Distributed Object Storage for NDN", Proceedings of the + 7th ACM Conference on Information-Centric Networking, ACM, + DOI 10.1145/3405656.3420231, September 2020, + <https://doi.org/10.1145/3405656.3420231>. + + [Cloudlets] + Satyanarayanan, M., Bahl, P., Caceres, R., and N. Davies, + "The Case for VM-Based Cloudlets in Mobile Computing", + IEEE Pervasive Computing, vol. 8, no. 4, pp. 14-23, + DOI 10.1109/mprv.2009.82, October 2009, + <https://doi.org/10.1109/mprv.2009.82>. + + [COIN-APPCENTRES] + Trossen, D., Sarathchandra, C., and M. Boniface, "In- + Network Computing for App-Centric Micro-Services", Work in + Progress, Internet-Draft, draft-sarathchandra-coin- + appcentres-04, 26 January 2021, + <https://datatracker.ietf.org/doc/html/draft- + sarathchandra-coin-appcentres-04>. + + [CORE-GROUPCOMM-BIS] + Dijk, E., Wang, C., and M. Tiloca, "Group Communication + for the Constrained Application Protocol (CoAP)", Work in + Progress, Internet-Draft, draft-ietf-core-groupcomm-bis- + 10, 23 October 2023, + <https://datatracker.ietf.org/doc/html/draft-ietf-core- + groupcomm-bis-10>. + + [Echeverria] + Echeverría, S., Klinedinst, D., Williams, K., and G. + Lewis, "Establishing Trusted Identities in Disconnected + Edge Environments", 2016 IEEE/ACM Symposium on Edge + Computing (SEC), DOI 10.1109/sec.2016.27, October 2016, + <https://doi.org/10.1109/sec.2016.27>. + + [EDGE-COMPUTING-BACKGROUND] + de Foy, X., Hong, J., Hong, Y., Kovatsch, M., Schooler, + E., and D. Kutscher, "IoT Edge Computing: Initiatives, + Projects and Products", Work in Progress, Internet-Draft, + draft-defoy-t2trg-iot-edge-computing-background-00, 25 May + 2020, <https://datatracker.ietf.org/doc/html/draft-defoy- + t2trg-iot-edge-computing-background-00>. + + [EDGE-DATA-DISCOVERY-OVERVIEW] + McBride, M., Kutscher, D., Schooler, E., Bernardos, C. J., + Lopez, D., and X. de Foy, "Edge Data Discovery for COIN", + Work in Progress, Internet-Draft, draft-mcbride-edge-data- + discovery-overview-05, 1 November 2020, + <https://datatracker.ietf.org/doc/html/draft-mcbride-edge- + data-discovery-overview-05>. + + [ENERGY] Beckel, C., Sadamori, L., Staake, T., and S. Santini, + "Revealing household characteristics from smart meter + data", Energy, vol. 78, pp. 397-410, + DOI 10.1016/j.energy.2014.10.025, December 2014, + <https://doi.org/10.1016/j.energy.2014.10.025>. + + [ETSI_MEC_01] + ETSI, "Multi-access Edge Computing (MEC); Terminology", + V2.1.1, ETSI GS MEC 001, January 2019, + <https://www.etsi.org/deliver/etsi_gs/ + MEC/001_099/001/02.01.01_60/gs_MEC001v020101p.pdf>. + + [ETSI_MEC_03] + ETSI, "Multi-access Edge Computing (MEC); Framework and + Reference Architecture", V2.1.1, ETSI GS MEC 003, January + 2019, <https://www.etsi.org/deliver/etsi_gs/ + MEC/001_099/003/02.01.01_60/gs_MEC003v020101p.pdf>. + + [ETSI_MEC_33] + ETSI, "Multi-access Edge Computing (MEC); IoT API", + V3.1.1, ETSI GS MEC 033, December 2022, + <https://www.etsi.org/deliver/etsi_gs/ + MEC/001_099/033/03.01.01_60/gs_MEC033v030101p.pdf>. + + [ETSI_Sandbox] + ETSI, "Multi-access Edge Computing (MEC) MEC Sandbox", + Portal, September 2023, + <https://portal.etsi.org/webapp/WorkProgram/ + Report_WorkItem.asp?WKI_ID=57671>. + + [Fan] Fan, Q. and N. Ansari, "Cost Aware cloudlet Placement for + big data processing at the edge", 2017 IEEE International + Conference on Communications (ICC), + DOI 10.1109/icc.2017.7996722, May 2017, + <https://doi.org/10.1109/icc.2017.7996722>. + + [Farnbauer-Schmidt] + Farnbauer-Schmidt, M., Lindner, J., Kaffenberger, C., and + J. Albrecht, "Combining the Concepts of Semantic Data + Integration and Edge Computing", INFORMATIK 2019: 50 Jahre + Gesellschaft für Informatik - Informatik für Gesellschaf, + pp. 139-152, DOI 10.18420/inf2019_19, September 2019, + <https://doi.org/10.18420/inf2019_19>. + + [Grewe] Grewe, D., Wagner, M., Arumaithurai, M., Psaras, I., and + D. Kutscher, "Information-Centric Mobile Edge Computing + for Connected Vehicle Environments: Challenges and + Research Directions", Proceedings of the Workshop on + Mobile Edge Communications, pp. 7-12, + DOI 10.1145/3098208.3098210, August 2017, + <https://doi.org/10.1145/3098208.3098210>. + + [Harchol] Harchol, Y., Mushtaq, A., McCauley, J., Panda, A., and S. + Shenker, "CESSNA: Resilient Edge-Computing", Proceedings + of the 2018 Workshop on Mobile Edge Communications, + DOI 10.1145/3229556.3229558, August 2018, + <https://doi.org/10.1145/3229556.3229558>. + + [IEC_IEEE_60802] + IEC/IEEE, "Use Cases IEC/IEEE 60802", V1.3, IEC/ + IEEE 60802, September 2018, + <https://grouper.ieee.org/groups/802/1/files/public/ + docs2018/60802-industrial-use-cases-0918-v13.pdf>. + + [ISO_TR] "Internet of things (IoT) - Edge computing", ISO/IEC TR + 30164:2020, April 2020, + <https://www.iso.org/standard/53284.html>. + + [Jeffery] Jeffery, A., Howard, H., and R. Mortier, "Rearchitecting + Kubernetes for the Edge", Proceedings of the 4th + International Workshop on Edge Systems, Analytics and + Networking, DOI 10.1145/3434770.3459730, April 2021, + <https://doi.org/10.1145/3434770.3459730>. + + [Jeong] Jeong, T., Chung, J., Hong, J., and S. Ha, "Towards a + distributed computing framework for Fog", 2017 IEEE Fog + World Congress (FWC), DOI 10.1109/fwc.2017.8368528, + October 2017, <https://doi.org/10.1109/fwc.2017.8368528>. + + [Jones] Jones, D., Snider, C., Nassehi, A., Yon, J., and B. Hicks, + "Characterising the Digital Twin: A systematic literature + review", CIRP Journal of Manufacturing Science and + Technology, vol. 29, pp. 36-52, + DOI 10.1016/j.cirpj.2020.02.002, May 2020, + <https://doi.org/10.1016/j.cirpj.2020.02.002>. + + [Kelly] Kelly, R., "Internet of Things Data to Top 1.6 Zettabytes + by 2020", April 2015, + <https://campustechnology.com/articles/2015/04/15/ + internet-of-things-data-to-top-1-6-zettabytes-by- + 2020.aspx>. Retrieved on 2022-05-24. + + [Khan] Khan, L., Yaqoob, I., Tran, N., Kazmi, S., Dang, T., and + C. Hong, "Edge-Computing-Enabled Smart Cities: A + Comprehensive Survey", IEEE Internet of Things Journal, + vol. 7, no. 10, pp. 10200-10232, + DOI 10.1109/jiot.2020.2987070, October 2020, + <https://doi.org/10.1109/jiot.2020.2987070>. + + [Kua] Patil, V., Desai, H., and L. Zhang, "Kua: a distributed + object store over named data networking", Proceedings of + the 9th ACM Conference on Information-Centric Networking, + DOI 10.1145/3517212.3558083, September 2022, + <https://doi.org/10.1145/3517212.3558083>. + + [Larrea] Larrea, J. and A. Barbalace, "The serverkernel operating + system", Proceedings of the Third ACM International + Workshop on Edge Systems, Analytics and Networking, + DOI 10.1145/3378679.3394537, May 2020, + <https://doi.org/10.1145/3378679.3394537>. + + [LFEDGE-EVE] + Linux Foundation, "Project Edge Virtualization Engine + (EVE)", Portal, <https://www.lfedge.org/projects/eve>. + Retrieved on 2022-05-24. + + [Li] Li, Y., Chen, Y., Lan, T., and G. Venkataramani, "MobiQoR: + Pushing the Envelope of Mobile Edge Computing Via Quality- + of-Result Optimization", 2017 IEEE 37th International + Conference on Distributed Computing Systems (ICDCS), + DOI 10.1109/icdcs.2017.54, June 2017, + <https://doi.org/10.1109/icdcs.2017.54>. + + [Lin] Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and W. + Zhao, "A Survey on Internet of Things: Architecture, + Enabling Technologies, Security and Privacy, and + Applications", IEEE Internet of Things Journal, vol. 4, + no. 5, pp. 1125-1142, DOI 10.1109/jiot.2017.2683200, + October 2017, <https://doi.org/10.1109/jiot.2017.2683200>. + + [Liu] Liu, J., Bai, B., Zhang, J., and K. Letaief, "Cache + Placement in Fog-RANs: From Centralized to Distributed + Algorithms", IEEE Transactions on Wireless Communications, + vol. 16, no. 11, pp. 7039-7051, + DOI 10.1109/twc.2017.2737015, November 2017, + <https://doi.org/10.1109/twc.2017.2737015>. + + [Madni] Madni, A., Madni, C., and S. Lucero, "Leveraging Digital + Twin Technology in Model-Based Systems Engineering", + Systems 7(1):7, DOI 10.3390/systems7010007, January 2019, + <https://doi.org/10.3390/systems7010007>. + + [Mahadev] Satyanarayanan, M., "The Emergence of Edge Computing", + Computer, vol. 50, no. 1, pp. 30-39, + DOI 10.1109/mc.2017.9, January 2017, + <https://doi.org/10.1109/mc.2017.9>. + + [Mehmood] Mehmood, M., Oad, A., Abrar, M., Munir, H., Hasan, S., + Muqeet, H., and N. Golilarz, "Edge Computing for IoT- + Enabled Smart Grid", Security and Communication Networks, + Vol. 2021, Article ID 5524025, DOI 10.1155/2021/5524025, + July 2021, <https://doi.org/10.1155/2021/5524025>. + + [Mortazavi] + Mortazavi, S., Balasubramanian, B., de Lara, E., and S. + Narayanan, "Toward Session Consistency for the Edge", + USENIX Workshop on Hot Topics in Edge Computing (HotEdge + 18), 2018, + <https://www.usenix.org/conference/hotedge18/presentation/ + mortazavi>. + + [MQTT5] Banks, A., Ed., Briggs, E., Ed., Borgendale, K., Ed., and + R. Gupta, Ed., "MQTT Version 5.0", OASIS Standard, March + 2019, <https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt- + v5.0.html>. + + [Murshed] Murshed, M., Murphy, C., Hou, D., Khan, N., + Ananthanarayanan, G., and F. Hussain, "Machine Learning at + the Network Edge: A Survey", ACM Computing Surveys, vol. + 54, no. 8, pp. 1-37, DOI 10.1145/3469029, October 2021, + <https://doi.org/10.1145/3469029>. + + [NETWORK-DIGITAL-TWIN-ARCH] + Zhou, C., Yang, H., Duan, X., Lopez, D., Pastor, A., Wu, + Q., Boucadair, M., and C. Jacquenet, "Network Digital + Twin: Concepts and Reference Architecture", Work in + Progress, Internet-Draft, draft-irtf-nmrg-network-digital- + twin-arch-05, 4 March 2024, + <https://datatracker.ietf.org/doc/html/draft-irtf-nmrg- + network-digital-twin-arch-05>. + + [Nieke] Nieke, M., Almstedt, L., and R. Kapitza, "Edgedancer: + Secure Mobile WebAssembly Services on the Edge", + Proceedings of the 4th International Workshop on Edge + Systems, Analytics and Networking, + DOI 10.1145/3434770.3459731, April 2021, + <https://doi.org/10.1145/3434770.3459731>. + + [NIST] Mell, P. and T. Grance, "The NIST Definition of Cloud + Computing", NIST Special Publication 800-145, + DOI 10.6028/nist.sp.800-145, September 2011, + <https://doi.org/10.6028/nist.sp.800-145>. + + [NVIDIA] Grzywaczewski, A., "Training AI for Self-Driving Vehicles: + the Challenge of Scale", NVIDIA Developer Blog, October + 2017, <https://devblogs.nvidia.com/training-self-driving- + vehicles-challenge-scale/>. Retrieved on 2022-05-24. + + [OGrady] O'Grady, M., Langton, D., and G. O'Hare, "Edge computing: + A tractable model for smart agriculture?", Artificial + Intelligence in Agriculture, Vol. 3, Pages 42-51, + DOI 10.1016/j.aiia.2019.12.001, September 2019, + <https://doi.org/10.1016/j.aiia.2019.12.001>. + + [oneM2M-TR0001] + Mladin, C., "Use Cases Collection", oneM2M, v4.2.0, + TR 0001, October 2018, + <https://member.onem2m.org/Application/documentapp/ + downloadLatestRevision/default.aspx?docID=28153>. + + [oneM2M-TR0018] + Lu, C. and M. Jiang, "Industrial Domain Enablement", + oneM2M, v2.5.2, TR 0018, February 2019, + <https://member.onem2m.org/Application/documentapp/ + downloadLatestRevision/default.aspx?docID=29334>. + + [oneM2M-TR0026] + Yamamoto, K., Mladin, C., and V. Kueh, "Vehicular Domain + Enablement", oneM2M, TR 0026, January 2020, + <https://member.onem2m.org/Application/documentapp/ + downloadLatestRevision/default.aspx?docID=31410>. + + [oneM2M-TR0052] + Yamamoto, K. and C. Mladin, "Study on Edge and Fog + Computing in oneM2M systems", oneM2M, TR 0052, September + 2020, <https://member.onem2m.org/Application/documentapp/ + downloadLatestRevision/default.aspx?docID=32633>. + + [oneM2M-TS0002] + He, S., "TS 0002, Requirements", oneM2M, TS 0002, February + 2019, <https://member.onem2m.org/Application/documentapp/ + downloadLatestRevision/default.aspx?docID=29274>. + + [OpenFog] OpenFog Consortium, "OpenFog Reference Architecture for + Fog Computing", February 2017, + <https://iiconsortium.org/pdf/ + OpenFog_Reference_Architecture_2_09_17.pdf>. + + [PseudoDynamicTesting] + Ficco, M., Esposito, C., Xiang, Y., and F. Palmieri, + "Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud + Ecosystems", IEEE Communications Magazine, vol. 55, no. + 11, pp. 98-104, DOI 10.1109/mcom.2017.1700328, November + 2017, <https://doi.org/10.1109/mcom.2017.1700328>. + + [Renart] Renart, E., Diaz-Montes, J., and M. Parashar, "Data-Driven + Stream Processing at the Edge", 2017 IEEE 1st + International Conference on Fog and Edge Computing + (ICFEC), DOI 10.1109/icfec.2017.18, May 2017, + <https://doi.org/10.1109/icfec.2017.18>. + + [REQS-P4COMP] + Singh, H. and M. Montpetit, "Requirements for P4 Program + Splitting for Heterogeneous Network Nodes", Work in + Progress, Internet-Draft, draft-hsingh-coinrg-reqs-p4comp- + 03, 18 February 2021, + <https://datatracker.ietf.org/doc/html/draft-hsingh- + coinrg-reqs-p4comp-03>. + + [REST-IOT] Keränen, A., Kovatsch, M., and K. Hartke, "Guidance on + RESTful Design for Internet of Things Systems", Work in + Progress, Internet-Draft, draft-irtf-t2trg-rest-iot-13, 25 + January 2024, <https://datatracker.ietf.org/doc/html/ + draft-irtf-t2trg-rest-iot-13>. + + [RFC6291] Andersson, L., van Helvoort, H., Bonica, R., Romascanu, + D., and S. Mansfield, "Guidelines for the Use of the "OAM" + Acronym in the IETF", BCP 161, RFC 6291, + DOI 10.17487/RFC6291, June 2011, + <https://www.rfc-editor.org/info/rfc6291>. + + [RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained + Application Protocol (CoAP)", RFC 7252, + DOI 10.17487/RFC7252, June 2014, + <https://www.rfc-editor.org/info/rfc7252>. + + [RFC7390] Rahman, A., Ed. and E. Dijk, Ed., "Group Communication for + the Constrained Application Protocol (CoAP)", RFC 7390, + DOI 10.17487/RFC7390, October 2014, + <https://www.rfc-editor.org/info/rfc7390>. + + [RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases", + RFC 8578, DOI 10.17487/RFC8578, May 2019, + <https://www.rfc-editor.org/info/rfc8578>. + + [Schafer] Schäfer, D., Edinger, J., VanSyckel, S., Paluska, J., and + C. Becker, "Tasklets: Overcoming Heterogeneity in + Distributed Computing Systems", 2016 IEEE 36th + International Conference on Distributed Computing Systems + Workshops (ICDCSW), DOI 10.1109/icdcsw.2016.22, June 2016, + <https://doi.org/10.1109/icdcsw.2016.22>. + + [Senel] Şenel, B., Mouchet, M., Cappos, J., Fourmaux, O., + Friedman, T., and R. McGeer, "EdgeNet: A Multi-Tenant and + Multi-Provider Edge Cloud", Proceedings of the 4th + International Workshop on Edge Systems, Analytics and + Networking, DOI 10.1145/3434770.3459737, April 2021, + <https://doi.org/10.1145/3434770.3459737>. + + [SFC-FOG-RAN] + Bernardos, C. J. and A. Mourad, "Service Function Chaining + Use Cases in Fog RAN", Work in Progress, Internet-Draft, + draft-bernardos-sfc-fog-ran-10, 22 October 2021, + <https://datatracker.ietf.org/doc/html/draft-bernardos- + sfc-fog-ran-10>. + + [Shi] Shi, W., Cao, J., Zhang, Q., Li, Y., and L. Xu, "Edge + Computing: Vision and Challenges", IEEE Internet of Things + Journal, vol. 3, no. 5, pp. 637-646, + DOI 10.1109/jiot.2016.2579198, October 2016, + <https://doi.org/10.1109/jiot.2016.2579198>. + + [SimulatingFog] + Svorobej, S., Takako Endo, P., Bendechache, M., Filelis- + Papadopoulos, C., Giannoutakis, K., Gravvanis, G., + Tzovaras, D., Byrne, J., and T. Lynn, "Simulating Fog and + Edge Computing Scenarios: An Overview and Research + Challenges", Future Internet, vol. 11, no. 3, pp. 55, + DOI 10.3390/fi11030055, February 2019, + <https://doi.org/10.3390/fi11030055>. + + [Stanciu] Stanciu, V., Steen, M., Dobre, C., and A. Peter, "Privacy- + Preserving Crowd-Monitoring Using Bloom Filters and + Homomorphic Encryption", Proceedings of the 4th + International Workshop on Edge Systems, Analytics and + Networking, DOI 10.1145/3434770.3459735, April 2021, + <https://doi.org/10.1145/3434770.3459735>. + + [Tanveer] Tanveer, S., Sree, N., Bhavana, B., and D. Varsha, "Smart + Agriculture System using IoT", 2022 IEEE World Conference + on Applied Intelligence and Computing (AIC), Sonbhadra, + India, pp. 482-486, DOI 10.1109/AIC55036.2022.9848948, + August 2022, + <https://doi.org/10.1109/AIC55036.2022.9848948>. + + [Weiner] Weiner, M., Jorgovanovic, M., Sahai, A., and B. Nikolie, + "Design of a low-latency, high-reliability wireless + communication system for control applications", 2014 IEEE + International Conference on Communications (ICC), + DOI 10.1109/icc.2014.6883918, June 2014, + <https://doi.org/10.1109/icc.2014.6883918>. + + [Yangui] Yangui, S., Ravindran, P., Bibani, O., Glitho, R., Ben + Hadj-Alouane, N., Morrow, M., and P. Polakos, "A platform + as-a-service for hybrid cloud/fog environments", 2016 IEEE + International Symposium on Local and Metropolitan Area + Networks (LANMAN), DOI 10.1109/lanman.2016.7548853, June + 2016, <https://doi.org/10.1109/lanman.2016.7548853>. + + [Yates] Yates, R. and S. Kaul, "The Age of Information: Real-Time + Status Updating by Multiple Sources", IEEE Transactions on + Information Theory, vol. 65, no. 3, pp. 1807-1827, + DOI 10.1109/tit.2018.2871079, March 2019, + <https://doi.org/10.1109/tit.2018.2871079>. + + [Yousefpour] + Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., + Jalali, F., Niakanlahiji, A., Kong, J., and J. Jue, "All + one needs to know about fog computing and related edge + computing paradigms: A complete survey", Journal of + Systems Architecture, vol. 98, pp. 289-330, + DOI 10.1016/j.sysarc.2019.02.009, September 2019, + <https://doi.org/10.1016/j.sysarc.2019.02.009>. + + [Yue] Yue, Q., Mu, S., Zhang, L., Wang, Z., Zhang, Z., Zhang, + X., Wang, Y., and Z. Miao, "Assisting Smart Construction + With Reliable Edge Computing Technology", Frontiers in + Energy Research, Sec. Smart Grids, Vol. 10, + DOI 10.3389/fenrg.2022.900298, May 2022, + <https://doi.org/10.3389/fenrg.2022.900298>. + + [Zhang] Zhang, Q., Zhang, X., Zhang, Q., Shi, W., and H. Zhong, + "Firework: Big Data Sharing and Processing in + Collaborative Edge Environment", 2016 Fourth IEEE Workshop + on Hot Topics in Web Systems and Technologies (HotWeb), + DOI 10.1109/hotweb.2016.12, October 2016, + <https://doi.org/10.1109/hotweb.2016.12>. + + [Zhang2] Zhang, J., Chen, B., Zhao, Y., Cheng, X., and F. Hu, "Data + Security and Privacy-Preserving in Edge Computing + Paradigm: Survey and Open Issues", IEEE Access, vol. 6, + pp. 18209-18237, DOI 10.1109/access.2018.2820162, March + 2018, <https://doi.org/10.1109/access.2018.2820162>. + +Acknowledgements + + The authors would like to thank Joo-Sang Youn, Akbar Rahman, Michel + Roy, Robert Gazda, Rute Sofia, Thomas Fossati, Chonggang Wang, Marie- + José Montpetit, Carlos J. Bernardos, Milan Milenkovic, Dale Seed, + JaeSeung Song, Roberto Morabito, Carsten Bormann, and Ari Keränen for + their valuable comments and suggestions on this document. + +Authors' Addresses + + Jungha Hong + ETRI + 218 Gajeong-ro, Yuseung-Gu + Daejeon + 34129 + Republic of Korea + Email: jhong@etri.re.kr + + + Yong-Geun Hong + Daejeon University + 62 Daehak-ro, Dong-gu + Daejeon + 300716 + Republic of Korea + Email: yonggeun.hong@gmail.com + + + Xavier de Foy + InterDigital Communications, LLC + 1000 Sherbrooke West + Montreal H3A 3G4 + Canada + Email: xavier.defoy@interdigital.com + + + Matthias Kovatsch + Huawei Technologies Duesseldorf GmbH + Riesstr. 25 C // 3.OG + 80992 Munich + Germany + Email: ietf@kovatsch.net + + + Eve Schooler + University of Oxford + Parks Road + Oxford + OX1 3PJ + United Kingdom + Email: eve.schooler@gmail.com + + + Dirk Kutscher + Hong Kong University of Science and Technology (Guangzhou) + No.1 Du Xue Rd + Guangzhou + China + Email: ietf@dkutscher.net |