summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9556.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc9556.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc9556.txt')
-rw-r--r--doc/rfc/rfc9556.txt1751
1 files changed, 1751 insertions, 0 deletions
diff --git a/doc/rfc/rfc9556.txt b/doc/rfc/rfc9556.txt
new file mode 100644
index 0000000..5aa6c1f
--- /dev/null
+++ b/doc/rfc/rfc9556.txt
@@ -0,0 +1,1751 @@
+
+
+
+
+Internet Research Task Force (IRTF) J. Hong
+Request for Comments: 9556 ETRI
+Category: Informational Y-G. Hong
+ISSN: 2070-1721 Daejeon University
+ X. de Foy
+ InterDigital Communications, LLC
+ M. Kovatsch
+ Huawei Technologies Duesseldorf GmbH
+ E. Schooler
+ University of Oxford
+ D. Kutscher
+ HKUST(GZ)
+ April 2024
+
+
+ Internet of Things (IoT) Edge Challenges and Functions
+
+Abstract
+
+ Many Internet of Things (IoT) applications have requirements that
+ cannot be satisfied by centralized cloud-based systems (i.e., cloud
+ computing). These include time sensitivity, data volume,
+ connectivity cost, operation in the face of intermittent services,
+ privacy, and security. As a result, IoT is driving the Internet
+ toward edge computing. This document outlines the requirements of
+ the emerging IoT edge and its challenges. It presents a general
+ model and major components of the IoT edge to provide a common basis
+ for future discussions in the Thing-to-Thing Research Group (T2TRG)
+ and other IRTF and IETF groups. This document is a product of the
+ IRTF T2TRG.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Research Task Force
+ (IRTF). The IRTF publishes the results of Internet-related research
+ and development activities. These results might not be suitable for
+ deployment. This RFC represents the consensus of the Thing-to-Thing
+ Research Group of the Internet Research Task Force (IRTF). Documents
+ approved for publication by the IRSG are not candidates for any level
+ of Internet Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9556.
+
+Copyright Notice
+
+ Copyright (c) 2024 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document.
+
+Table of Contents
+
+ 1. Introduction
+ 2. Background
+ 2.1. Internet of Things (IoT)
+ 2.2. Cloud Computing
+ 2.3. Edge Computing
+ 2.4. Examples of IoT Edge Computing Use Cases
+ 3. IoT Challenges Leading toward Edge Computing
+ 3.1. Time Sensitivity
+ 3.2. Connectivity Cost
+ 3.3. Resilience to Intermittent Services
+ 3.4. Privacy and Security
+ 4. IoT Edge Computing Functions
+ 4.1. Overview of IoT Edge Computing
+ 4.2. General Model
+ 4.3. OAM Components
+ 4.3.1. Resource Discovery and Authentication
+ 4.3.2. Edge Organization and Federation
+ 4.3.3. Multi-Tenancy and Isolation
+ 4.4. Functional Components
+ 4.4.1. In-Network Computation
+ 4.4.2. Edge Storage and Caching
+ 4.4.3. Communication
+ 4.5. Application Components
+ 4.5.1. IoT Device Management
+ 4.5.2. Data Management and Analytics
+ 4.6. Simulation and Emulation Environments
+ 5. Security Considerations
+ 6. Conclusion
+ 7. IANA Considerations
+ 8. Informative References
+ Acknowledgements
+ Authors' Addresses
+
+1. Introduction
+
+ At the time of writing, many IoT services leverage cloud computing
+ platforms because they provide virtually unlimited storage and
+ processing power. The reliance of IoT on back-end cloud computing
+ provides additional advantages, such as scalability and efficiency.
+ At the time of writing, IoT systems are fairly static with respect to
+ integrating and supporting computation. It is not that there is no
+ computation, but that systems are often limited to static
+ configurations (edge gateways and cloud services).
+
+ However, IoT devices generate large amounts of data at the edges of
+ the network. To meet IoT use case requirements, data is increasingly
+ being stored, processed, analyzed, and acted upon close to the data
+ sources. These requirements include time sensitivity, data volume,
+ connectivity cost, and resiliency in the presence of intermittent
+ connectivity, privacy, and security, which cannot be addressed by
+ centralized cloud computing. A more flexible approach is necessary
+ to address these needs effectively. This involves distributing
+ computing (and storage) and seamlessly integrating it into the edge-
+ cloud continuum. We refer to this integration of edge computing and
+ IoT as "IoT edge computing". This document describes the related
+ background, use cases, challenges, system models, and functional
+ components.
+
+ Owing to the dynamic nature of the IoT edge computing landscape, this
+ document does not list existing projects in this field. Section 4.1
+ presents a high-level overview of the field based on a limited review
+ of standards, research, and open-source and proprietary products in
+ [EDGE-COMPUTING-BACKGROUND].
+
+ This document represents the consensus of the Thing-to-Thing Research
+ Group (T2TRG). It has been reviewed extensively by the research
+ group members who are actively involved in the research and
+ development of the technology covered by this document. It is not an
+ IETF product and is not a standard.
+
+2. Background
+
+2.1. Internet of Things (IoT)
+
+ Since the term "Internet of Things" was coined by Kevin Ashton in
+ 1999 while working on Radio-Frequency Identification (RFID)
+ technology [Ashton], the concept of IoT has evolved. At the time of
+ writing, it reflects a vision of connecting the physical world to the
+ virtual world of computers using (often wireless) networks over which
+ things can send and receive information without human intervention.
+ Recently, the term has become more literal by connecting things to
+ the Internet and converging on Internet and web technologies.
+
+ A "Thing" is a physical item made available in the IoT, thereby
+ enabling digital interaction with the physical world for humans,
+ services, and/or other Things [REST-IOT]. In this document, we will
+ use the term "IoT device" to designate the embedded system attached
+ to the Thing.
+
+ Resource-constrained Things, such as sensors, home appliances, and
+ wearable devices, often have limited storage and processing power,
+ which can create challenges with respect to reliability, performance,
+ energy consumption, security, and privacy [Lin]. Some, less-
+ resource-constrained Things, can generate a voluminous amount of
+ data. This range of factors led to IoT designs that integrate Things
+ into larger distributed systems, for example, edge or cloud computing
+ systems.
+
+2.2. Cloud Computing
+
+ Cloud computing has been defined in [NIST]:
+
+ | Cloud computing is a model for enabling ubiquitous, convenient,
+ | on-demand network access to a shared pool of configurable
+ | computing resources (e.g., networks, servers, storage,
+ | applications, and services) that can be rapidly provisioned and
+ | released with minimal management effort or service provider
+ | interaction.
+
+ The low cost and massive availability of storage and processing power
+ enabled the realization of another computing model in which
+ virtualized resources can be leased in an on-demand fashion and
+ provided as general utilities. Platform-as-a-Service (PaaS) and
+ cloud computing platforms widely adopted this paradigm for delivering
+ services over the Internet, gaining both economical and technical
+ benefits [Botta].
+
+ At the time of writing, an unprecedented volume and variety of data
+ is generated by Things, and applications deployed at the network edge
+ consume this data. In this context, cloud-based service models are
+ not suitable for some classes of applications that require very short
+ response times, require access to local personal data, or generate
+ vast amounts of data. These applications may instead leverage edge
+ computing.
+
+2.3. Edge Computing
+
+ Edge computing, also referred to as "fog computing" in some settings,
+ is a new paradigm in which substantial computing and storage
+ resources are placed at the edge of the Internet, close to mobile
+ devices, sensors, actuators, or machines. Edge computing happens
+ near data sources [Mahadev] as well as close to where decisions are
+ made or where interactions with the physical world take place
+ ("close" here can refer to a distance that is topological, physical,
+ latency-based, etc.). It processes both downstream data (originating
+ from cloud services) and upstream data (originating from end devices
+ or network elements). The term "fog computing" usually represents
+ the notion of multi-tiered edge computing, that is, several layers of
+ compute infrastructure between end devices and cloud services.
+
+ An edge device is any computing or networking resource residing
+ between end-device data sources and cloud-based data centers. In
+ edge computing, end devices consume and produce data. At the network
+ edge, devices not only request services and information from the
+ cloud but also handle computing tasks including processing, storing,
+ caching, and load balancing on data sent to and from the cloud [Shi].
+ This does not preclude end devices from hosting computation
+ themselves, when possible, independently or as part of a distributed
+ edge computing platform.
+
+ Several Standards Developing Organizations (SDOs) and industry forums
+ have provided definitions of edge and fog computing:
+
+ * ISO defines edge computing as a "form of distributed computing in
+ which significant processing and data storage takes place on nodes
+ which are at the edge of the network" [ISO_TR].
+
+ * ETSI defines multi-access edge computing as a "system which
+ provides an IT service environment and cloud-computing
+ capabilities at the edge of an access network which contains one
+ or more type of access technology, and in close proximity to its
+ users" [ETSI_MEC_01].
+
+ * The Industry IoT Consortium (IIC) (now incorporating what was
+ formerly OpenFog) defines fog computing as "a horizontal, system-
+ level architecture that distributes computing, storage, control
+ and networking functions closer to the users along a cloud-to-
+ thing continuum" [OpenFog].
+
+ Based on these definitions, we can summarize a general philosophy of
+ edge computing as distributing the required functions close to users
+ and data, while the difference to classic local systems is the usage
+ of management and orchestration features adopted from cloud
+ computing.
+
+ Actors from various industries approach edge computing using
+ different terms and reference models, although, in practice, these
+ approaches are not incompatible and may integrate with each other:
+
+ * The telecommunication industry tends to use a model where edge
+ computing services are deployed over a Network Function
+ Virtualization (NFV) infrastructure, at aggregation points, or in
+ proximity to the user equipment (e.g., gNodeBs) [ETSI_MEC_03].
+
+ * Enterprise and campus solutions often interpret edge computing as
+ an "edge cloud", that is, a smaller data center directly connected
+ to the local network (often referred to as "on-premise").
+
+ * The automation industry defines the edge as the connection point
+ between IT and Operational Technology (OT). Hence, edge computing
+ sometimes refers to applying IT solutions to OT problems, such as
+ analytics, more-flexible user interfaces, or simply having more
+ computing power than an automation controller.
+
+2.4. Examples of IoT Edge Computing Use Cases
+
+ IoT edge computing can be used in home, industry, grid, healthcare,
+ city, transportation, agriculture, and/or educational scenarios.
+ Here, we discuss only a few examples of such use cases to identify
+ differentiating requirements, providing references to other use
+ cases.
+
+ *Smart Factory*
+ As part of the Fourth Industrial Revolution, smart factories run
+ real-time processes based on IT technologies, such as artificial
+ intelligence and big data. Even a very small environmental change
+ in a smart factory can lead to a situation in which production
+ efficiency decreases or product quality problems occur.
+ Therefore, simple but time-sensitive processing can be performed
+ at the edge, for example, controlling the temperature and humidity
+ in the factory or operating machines based on the real-time
+ collection of the operational status of each machine. However,
+ data requiring highly precise analysis, such as machine life-cycle
+ management or accident risk prediction, can be transferred to a
+ central data center for processing.
+
+ The use of edge computing in a smart factory [Argungu] can reduce
+ the cost of network and storage resources by reducing the
+ communication load to the central data center or server. It is
+ also possible to improve process efficiency and facility asset
+ productivity through real-time prediction of failures and to
+ reduce the cost of failure through preliminary measures. In the
+ existing manufacturing field, production facilities are manually
+ run according to a program entered in advance; however, edge
+ computing in a smart factory enables tailoring solutions by
+ analyzing data at each production facility and machine level.
+ Digital twins [Jones] of IoT devices have been jointly used with
+ edge computing in industrial IoT scenarios [Chen].
+
+ *Smart Grid*
+ In future smart-city scenarios, the smart grid will be critical in
+ ensuring highly available and efficient energy control in city-
+ wide electricity management [Mehmood]. Edge computing is expected
+ to play a significant role in these systems to improve the
+ transmission efficiency of electricity, to react to and restore
+ power after a disturbance, to reduce operation costs, and to reuse
+ energy effectively since these operations involve local decision-
+ making. In addition, edge computing can help monitor power
+ generation and power demand and make local electrical energy
+ storage decisions in smart grid systems.
+
+ *Smart Agriculture*
+ Smart agriculture integrates information and communication
+ technologies with farming technology. Intelligent farms use IoT
+ technology to measure and analyze parameters, such as the
+ temperature, humidity, sunlight, carbon dioxide, and soil quality,
+ in crop cultivation facilities. Depending on the analysis
+ results, control devices are used to set the environmental
+ parameters to an appropriate state. Remote management is also
+ possible through mobile devices, such as smartphones.
+
+ In existing farms, simple systems, such as management according to
+ temperature and humidity, can be easily and inexpensively
+ implemented using IoT technology [Tanveer]. Field sensors gather
+ data on field and crop condition. This data is then transmitted
+ to cloud servers that process data and recommend actions. The use
+ of edge computing can reduce the volume of back-and-forth data
+ transmissions significantly, resulting in cost and bandwidth
+ savings. Locally generated data can be processed at the edge, and
+ local computing and analytics can drive local actions. With edge
+ computing, it is easy for farmers to select large amounts of data
+ for processing, and data can be analyzed even in remote areas with
+ poor access conditions. Other applications include enabling
+ dashboarding, for example, to visualize the farm status, as well
+ as enhancing Extended Reality (XR) applications that require edge
+ audio and/or video processing. As the number of people working on
+ farming has been decreasing over time, increasing automation
+ enabled by edge computing can be a driving force for future smart
+ agriculture [OGrady].
+
+ *Smart Construction*
+ Safety is critical at construction sites. Every year, many
+ construction workers lose their lives because of falls,
+ collisions, electric shocks, and other accidents [BigRentz].
+ Therefore, solutions have been developed to improve construction
+ site safety, including the real-time identification of workers,
+ monitoring of equipment location, and predictive accident
+ prevention. To deploy these solutions, many cameras and IoT
+ sensors have been installed on construction sites to measure
+ noise, vibration, gas concentration, etc. Typically, the data
+ generated from these measurements is collected in on-site gateways
+ and sent to remote cloud servers for storage and analysis. Thus,
+ an inspector can check the information stored on the cloud server
+ to investigate an incident. However, this approach can be
+ expensive because of transmission costs (for example, of video
+ streams over a mobile network connection) and because usage fees
+ of private cloud services.
+
+ Using edge computing [Yue], data generated at the construction
+ site can be processed and analyzed on an edge server located
+ within or near the site. Only the result of this processing needs
+ to be transferred to a cloud server, thus reducing transmission
+ costs. It is also possible to locally generate warnings to
+ prevent accidents in real time.
+
+ *Self-Driving Car*
+ Edge computing plays a crucial role in safety-focused self-driving
+ car systems [Badjie]. With a multitude of sensors, such as high-
+ resolution cameras, radars, Light Detection and Ranging (LiDAR)
+ systems, sonar sensors, and GPS systems, autonomous vehicles
+ generate vast amounts of real-time data. Local processing
+ utilizing edge computing nodes allows for efficient collection and
+ analysis of this data to monitor vehicle distances and road
+ conditions and respond promptly to unexpected situations.
+ Roadside computing nodes can also be leveraged to offload tasks
+ when necessary, for example, when the local processing capacity of
+ the car is insufficient because of hardware constraints or a large
+ data volume.
+
+ For instance, when the car ahead slows, a self-driving car adjusts
+ its speed to maintain a safe distance, or when a roadside signal
+ changes, it adapts its behavior accordingly. In another example,
+ cars equipped with self-parking features utilize local processing
+ to analyze sensor data, determine suitable parking spots, and
+ execute precise parking maneuvers without relying on external
+ processing or connectivity. It is also possible to use in-cabin
+ cameras coupled with local processing to monitor the driver's
+ attention level and detect signs of drowsiness or distraction.
+ The system can issue warnings or implement preventive measures to
+ ensure driver safety.
+
+ Edge computing empowers self-driving cars by enabling real-time
+ processing, reducing latency, enhancing data privacy, and
+ optimizing bandwidth usage. By leveraging local processing
+ capabilities, self-driving cars can make rapid decisions, adapt to
+ changing environments, and ensure safer and more efficient
+ autonomous driving experiences.
+
+ *Digital Twin*
+ A digital twin can simulate different scenarios and predict
+ outcomes based on real-time data collected from the physical
+ environment. This simulation capability empowers proactive
+ maintenance, optimization of operations, and the prediction of
+ potential issues or failures. Decision makers can use digital
+ twins to test and validate different strategies, identify
+ inefficiencies, and optimize performance [CertMagic].
+
+ With edge computing, real-time data is collected, processed, and
+ analyzed directly at the edge, allowing for the accurate
+ monitoring and simulation of physical assets. Moreover, edge
+ computing effectively minimizes latency, enabling rapid responses
+ to dynamic conditions as computational resources are brought
+ closer to the physical object. Running digital twin processing at
+ the edge enables organizations to obtain timely insights and make
+ informed decisions that maximize efficiency and performance.
+
+ *Other Use Cases*
+ Artificial intelligence (AI) and machine learning (ML) systems at
+ the edge empower real-time analysis, faster decision-making,
+ reduced latency, improved operational efficiency, and personalized
+ experiences across various industries by bringing AI and ML
+ capabilities closer to edge devices.
+
+ In addition, oneM2M has studied several IoT edge computing use
+ cases, which are documented in [oneM2M-TR0001], [oneM2M-TR0018],
+ and [oneM2M-TR0026]. The edge-computing-related requirements
+ raised through the analysis of these use cases are captured in
+ [oneM2M-TS0002].
+
+3. IoT Challenges Leading toward Edge Computing
+
+ This section describes the challenges faced by the IoT that are
+ motivating the adoption of edge computing. These are distinct from
+ the research challenges applicable to IoT edge computing, some of
+ which are mentioned in Section 4.
+
+ IoT technology is used with increasingly demanding applications in
+ domains such as industrial, automotive, and healthcare, which leads
+ to new challenges. For example, industrial machines, such as laser
+ cutters, produce over 1 terabyte of data per hour, and similar
+ amounts can be generated in autonomous cars [NVIDIA]. 90% of IoT
+ data is expected to be stored, processed, analyzed, and acted upon
+ close to the source [Kelly], as cloud computing models alone cannot
+ address these new challenges [Chiang].
+
+ Below, we discuss IoT use case requirements that are moving cloud
+ capabilities to be more proximate, distributed, and disaggregated.
+
+3.1. Time Sensitivity
+
+ Often, many industrial control systems, such as manufacturing
+ systems, smart grids, and oil and gas systems, require stringent end-
+ to-end latency between the sensor and control nodes. While some IoT
+ applications may require latency below a few tens of milliseconds
+ [Weiner], industrial robots and motion control systems have use cases
+ for cycle times in the order of microseconds [IEC_IEEE_60802]. In
+ some cases, speed-of-light limitations may simply prevent cloud-based
+ solutions; however, this is not the only challenge relative to time
+ sensitivity. Guarantees for bounded latency and jitter ([RFC8578],
+ Section 7) are also important for industrial IoT applications. This
+ means that control packets must arrive with as little variation as
+ possible and within a strict deadline. Given the best-effort
+ characteristics of the Internet, this challenge is virtually
+ impossible to address without using end-to-end guarantees for
+ individual message delivery and continuous data flows.
+
+3.2. Connectivity Cost
+
+ Some IoT deployments may not face bandwidth constraints when
+ uploading data to the cloud. Theoretically, both 5G and Wi-Fi 6
+ networks top out at 10 gigabits per second (i.e., 4.5 terabytes per
+ hour), allowing the transfer of large amounts of uplink data.
+ However, the cost of maintaining continuous high-bandwidth
+ connectivity for such usage is unjustifiable and impractical for most
+ IoT applications. In some settings, for example, in aeronautical
+ communication, higher communication costs reduce the amount of data
+ that can be practically uploaded even further. Therefore, minimizing
+ reliance on high-bandwidth connectivity is a requirement; this can be
+ done, for example, by processing data at the edge and deriving
+ summarized or actionable insights that can be transmitted to the
+ cloud.
+
+3.3. Resilience to Intermittent Services
+
+ Many IoT devices, such as sensors, actuators, and controllers, have
+ very limited hardware resources and cannot rely solely on their own
+ resources to meet their computing and/or storage needs. They require
+ reliable, uninterrupted, or resilient services to augment their
+ capabilities to fulfill their application tasks. This is difficult
+ and partly impossible to achieve using cloud services for systems
+ such as vehicles, drones, or oil rigs that have intermittent network
+ connectivity. Conversely, a cloud backend might want to access
+ device data even if the device is currently asleep.
+
+3.4. Privacy and Security
+
+ When IoT services are deployed at home, personal information can be
+ learned from detected usage data. For example, one can extract
+ information about employment, family status, age, and income by
+ analyzing smart meter data [ENERGY]. Policy makers have begun to
+ provide frameworks that limit the usage of personal data and impose
+ strict requirements on data controllers and processors. Data stored
+ indefinitely in the cloud also increases the risk of data leakage,
+ for instance, through attacks on rich targets.
+
+ It is often argued that industrial systems do not provide privacy
+ implications, as no personal data is gathered. However, data from
+ such systems is often highly sensitive, as one might be able to infer
+ trade secrets, such as the setup of production lines. Hence, owners
+ of these systems are generally reluctant to upload IoT data to the
+ cloud.
+
+ Furthermore, passive observers can perform traffic analysis on
+ device-to-cloud paths. Therefore, hiding traffic patterns associated
+ with sensor networks can be another requirement for edge computing.
+
+4. IoT Edge Computing Functions
+
+ We first look at the current state of IoT edge computing
+ (Section 4.1) and then define a general system model (Section 4.2).
+ This provides a context for IoT edge computing functions, which are
+ listed in Sections 4.3, 4.4, and 4.5.
+
+4.1. Overview of IoT Edge Computing
+
+ This section provides an overview of the current (at the time of
+ writing) IoT edge computing field based on a limited review of
+ standards, research, and open-source and proprietary products in
+ [EDGE-COMPUTING-BACKGROUND].
+
+ IoT gateways, both open-source (such as EdgeX Foundry or Home Edge)
+ and proprietary products, represent a common class of IoT edge
+ computing products, where the gateway provides a local service on
+ customer premises and is remotely managed through a cloud service.
+ IoT communication protocols are typically used between IoT devices
+ and the gateway, including a Constrained Application Protocol (CoAP)
+ [RFC7252], Message Queuing Telemetry Transport (MQTT) [MQTT5], and
+ many specialized IoT protocols (such as Open Platform Communications
+ Unified Architecture (OPC UA) and Data Distribution Service (DDS) in
+ the industrial IoT space), while the gateway communicates with the
+ distant cloud typically using HTTPS. Virtualization platforms enable
+ the deployment of virtual edge computing functions (using Virtual
+ Machines (VMs) and application containers), including IoT gateway
+ software, on servers in the mobile network infrastructure (at base
+ stations and concentration points), edge data centers (in central
+ offices), and regional data centers located near central offices.
+ End devices are envisioned to become computing devices in forward-
+ looking projects but are not commonly used at the time of writing.
+
+ In addition to open-source and proprietary solutions, a horizontal
+ IoT service layer is standardized by the oneM2M standards body to
+ reduce fragmentation, increase interoperability, and promote reuse in
+ the IoT ecosystem. Furthermore, ETSI Multi-access Edge Computing
+ (MEC) developed an IoT API [ETSI_MEC_33] that enables the deployment
+ of heterogeneous IoT platforms and provides a means to configure the
+ various components of an IoT system.
+
+ Physical or virtual IoT gateways can host application programs that
+ are typically built using an SDK to access local services through a
+ programmatic API. Edge cloud system operators host their customers'
+ application VMs or containers on servers located in or near access
+ networks that can implement local edge services. For example, mobile
+ networks can provide edge services for radio network information,
+ location, and bandwidth management.
+
+ Resilience in the IoT can entail the ability to operate autonomously
+ in periods of disconnectedness to preserve the integrity and safety
+ of the controlled system, possibly in a degraded mode. IoT devices
+ and gateways are often expected to operate in always-on and
+ unattended modes, using fault detection and unassisted recovery
+ functions.
+
+ The life-cycle management of services and applications on physical
+ IoT gateways is generally cloud based. Edge cloud management
+ platforms and products (such as StarlingX, Akraino Edge Stack, or
+ proprietary products from major cloud providers) adapt cloud
+ management technologies (e.g., Kubernetes) to the edge cloud, that
+ is, to smaller, distributed computing devices running outside a
+ controlled data center. Typically, the service and application life
+ cycle is using an NFV-like management and orchestration model.
+
+ The platform generally enables advertising or consuming services
+ hosted on the platform (e.g., the Mp1 interface in ETSI MEC supports
+ service discovery and communication), and enables communication with
+ local and remote endpoints (e.g., message routing function in IoT
+ gateways). The platform is usually extensible to edge applications
+ because it can advertise a service that other edge applications can
+ consume. The IoT communication services include protocol
+ translation, analytics, and transcoding. Communication between edge
+ computing devices is enabled in tiered or distributed deployments.
+
+ An edge cloud platform may enable pass-through without storage or
+ local storage (e.g., on IoT gateways). Some edge cloud platforms use
+ distributed storage such as that provided by a distributed storage
+ platform (e.g., EdgeFS and Ceph) or, in more experimental settings,
+ by an Information-Centric Networking (ICN) network, for example,
+ systems such as Chipmunk [Chipmunk] and Kua [Kua] have been proposed
+ as distributed information-centric objects stores. External storage,
+ for example, on databases in a distant or local IT cloud, is
+ typically used for filtered data deemed worthy of long-term storage;
+ although, in some cases, it may be for all data, for example, when
+ required for regulatory reasons.
+
+ Stateful computing is the default on most systems, VMs, and
+ containers. Stateless computing is supported on platforms providing
+ a "serverless computing" service (also known as function-as-
+ a-service, e.g., using stateless containers) or on systems based on
+ named function networking.
+
+ In many IoT use cases, a typical network usage pattern is a high-
+ volume uplink with some form of traffic reduction enabled by
+ processing over edge computing devices. Alternatives to traffic
+ reduction include deferred transmission (to off-peak hours or using
+ physical shipping). Downlink traffic includes application control
+ and software updates. Downlink-heavy traffic patterns are not
+ excluded but are more often associated with non-IoT usage (e.g.,
+ video Content Delivery Networks (CDNs)).
+
+4.2. General Model
+
+ Edge computing is expected to play an important role in deploying new
+ IoT services integrated with big data and AI enabled by flexible in-
+ network computing platforms. Although there are many approaches to
+ edge computing, this section lays out an attempt at a general model
+ and lists associated logical functions. In practice, this model can
+ be mapped to different architectures, such as:
+
+ * A single IoT gateway, or a hierarchy of IoT gateways, typically
+ connected to the cloud (e.g., to extend the centralized cloud-
+ based management of IoT devices and data to the edge). The IoT
+ gateway plays a common role in providing access to a heterogeneous
+ set of IoT devices and sensors, handling IoT data, and delivering
+ IoT data to its final destination in a cloud network. An IoT
+ gateway requires interactions with the cloud; however, it can also
+ operate independently in a disconnected mode.
+
+ * A set of distributed computing nodes, for example, embedded in
+ switches, routers, edge cloud servers, or mobile devices. Some
+ IoT devices have sufficient computing capabilities to participate
+ in such distributed systems owing to advances in hardware
+ technology. In this model, edge computing nodes can collaborate
+ to share resources.
+
+ * A hybrid system involving both IoT gateways and supporting
+ functions in distributed computing nodes.
+
+ In the general model described in Figure 1, the edge computing domain
+ is interconnected with IoT devices (southbound connectivity),
+ possibly with a remote (e.g., cloud) network (northbound
+ connectivity), and with a service operator's system. Edge computing
+ nodes provide multiple logical functions or components that may not
+ be present in a given system. They may be implemented in a
+ centralized or distributed fashion, at the network edge, or through
+ interworking between the edge network and remote cloud networks.
+
+ +---------------------+
+ | Remote Network | +---------------+
+ |(e.g., cloud network)| | Service |
+ +-----------+---------+ | Operator |
+ | +------+--------+
+ | |
+ +--------------+-------------------+-----------+
+ | Edge Computing Domain |
+ | |
+ | One or more computing nodes |
+ | (IoT gateway, end devices, switches, |
+ | routers, mini/micro-data centers, etc.) |
+ | |
+ | OAM Components |
+ | - Resource Discovery and Authentication |
+ | - Edge Organization and Federation |
+ | - Multi-Tenancy and Isolation |
+ | - ... |
+ | |
+ | Functional Components |
+ | - In-Network Computation |
+ | - Edge Caching |
+ | - Communication |
+ | - Other Services |
+ | - ... |
+ | |
+ | Application Components |
+ | - IoT Devices Management |
+ | - Data Management and Analytics |
+ | - ... |
+ | |
+ +------+--------------+-------- - - - -+- - - -+
+ | | | | |
+ | | +-----+--+
+ +----+---+ +-----+--+ | |Compute | |
+ | End | | End | ... |Node/End|
+ |Device 1| |Device 2| ...| |Device n| |
+ +--------+ +--------+ +--------+
+ + - - - - - - - -+
+
+ Figure 1: Model of IoT Edge Computing
+
+ In the distributed model described in Figure 2, the edge computing
+ domain is composed of IoT edge gateways and IoT devices that are also
+ used as computing nodes. Edge computing domains are connected to a
+ remote (e.g., cloud) network and their respective service operator's
+ system. The computing nodes provide logical functions, for example,
+ as part of distributed machine learning or distributed image
+ processing applications. The processing capabilities in IoT devices
+ are limited; they require the support of other nodes. In a
+ distributed machine learning application, the training process for AI
+ services can be executed at IoT edge gateways or cloud networks, and
+ the prediction (inference) service is executed in the IoT devices.
+ Similarly, in a distributed image processing application, some image
+ processing functions can be executed at the edge or in the cloud. To
+ limit the amount of data to be uploaded to central cloud functions,
+ IoT edge devices may pre-process data.
+
+ +----------------------------------------------+
+ | Edge Computing Domain |
+ | |
+ | +--------+ +--------+ +--------+ |
+ | |Compute | |Compute | |Compute | |
+ | |Node/End| |Node/End| .... |Node/End| |
+ | |Device 1| |Device 2| .... |Device m| |
+ | +----+---+ +----+---+ +----+---+ |
+ | | | | |
+ | +---+-------------+-----------------+--+ |
+ | | IoT Edge Gateway | |
+ | +-----------+-------------------+------+ |
+ | | | |
+ +--------------+-------------------+-----------+
+ | |
+ +-----------+---------+ +------+-------+
+ | Remote Network | | Service |
+ |(e.g., cloud network)| | Operator(s) |
+ +-----------+---------+ +------+-------+
+ | |
+ +--------------+-------------------+-----------+
+ | | | |
+ | +-----------+-------------------+------+ |
+ | | IoT Edge Gateway | |
+ | +---+-------------+-----------------+--+ |
+ | | | | |
+ | +----+---+ +----+---+ +----+---+ |
+ | |Compute | |Compute | |Compute | |
+ | |Node/End| |Node/End| .... |Node/End| |
+ | |Device 1| |Device 2| .... |Device n| |
+ | +--------+ +--------+ +--------+ |
+ | |
+ | Edge Computing Domain |
+ +----------------------------------------------+
+
+ Figure 2: Example of Machine Learning over a Distributed IoT Edge
+ Computing System
+
+ In the following, we enumerate major edge computing domain
+ components. Here, they are loosely organized into Operations,
+ Administration, and Maintenance (OAM); functional; and application
+ components, with the understanding that the distinction between these
+ classes may not always be clear, depending on actual system
+ architectures. Some representative research challenges are
+ associated with those functions. We used input from coauthors,
+ participants of T2TRG meetings, and some comprehensive reviews of the
+ field ([Yousefpour], [Zhang2], and [Khan]).
+
+4.3. OAM Components
+
+ Edge computing OAM extends beyond the network-related OAM functions
+ listed in [RFC6291]. In addition to infrastructure (network,
+ storage, and computing resources), edge computing systems can also
+ include computing environments (for VMs, software containers, and
+ functions), IoT devices, data, and code.
+
+ Operation-related functions include performance monitoring for
+ Service Level Agreement (SLA) measurements, fault management, and
+ provisioning for links, nodes, compute and storage resources,
+ platforms, and services. Administration covers network/compute/
+ storage resources, platform and service discovery, configuration, and
+ planning. Discovery during normal operation (e.g., discovery of
+ compute or storage nodes by endpoints) is typically not included in
+ OAM; however, in this document, we do not address it separately.
+ Management covers the monitoring and diagnostics of failures, as well
+ as means to minimize their occurrence and take corrective actions.
+ This may include software update management and high service
+ availability through redundancy and multipath communication.
+ Centralized (e.g., Software-Defined Networking (SDN)) and
+ decentralized management systems can be used. Finally, we
+ arbitrarily chose to address data management as an application
+ component; however, in some systems, data management may be
+ considered similar to a network management function.
+
+ We further detail a few relevant OAM components.
+
+4.3.1. Resource Discovery and Authentication
+
+ Discovery and authentication may target platforms and infrastructure
+ resources, such as computing, networking, and storage, as well as
+ other resources, such as IoT devices, sensors, data, code units,
+ services, applications, and users interacting with the system. In a
+ broker-based system, an IoT gateway can act as a broker to discover
+ IoT resources. More decentralized solutions can also be used in
+ replacement of or in complement to the broker-based solutions; for
+ example, CoAP enables multicast discovery of an IoT device and CoAP
+ service discovery enables one to obtain a list of resources made
+ available by this device [RFC7252]. For device authentication,
+ current centralized gateway-based systems rely on the installation of
+ a secret on IoT devices and computing devices (e.g., a device
+ certificate stored in a hardware security module or a combination of
+ code and data stored in a trusted execution environment).
+
+ Related challenges include:
+
+ * Discovery, authentication, and trust establishment between IoT
+ devices, compute nodes, and platforms, with regard to concerns
+ such as mobility, heterogeneous devices and networks, scale,
+ multiple trust domains, constrained devices, anonymity, and
+ traceability.
+
+ * Intermittent connectivity to the Internet, removing the need to
+ rely on a third-party authority [Echeverria].
+
+ * Resiliency to failure [Harchol], denial-of-service attacks, and
+ easier physical access for attackers.
+
+4.3.2. Edge Organization and Federation
+
+ In a distributed system context, once edge devices have discovered
+ and authenticated each other, they can be organized or self-organized
+ into hierarchies or clusters. The organizational structure may range
+ from centralized to peer-to-peer, or it may be closely tied to other
+ systems. Such groups can also form federations with other edges or
+ with remote clouds.
+
+ Related challenges include:
+
+ * Support for scaling and enabling fault tolerance or self-healing
+ [Jeong]. In addition to using a hierarchical organization to cope
+ with scaling, another available and possibly complementary
+ mechanism is multicast [RFC7390] [CORE-GROUPCOMM-BIS]. Other
+ approaches include relying on blockchains [Ali].
+
+ * Integration of edge computing with virtualized Radio Access
+ Networks (Fog RAN) [SFC-FOG-RAN] and 5G access networks.
+
+ * Sharing resources in multi-vendor and multi-operator scenarios to
+ optimize criteria such as profit [Anglano], resource usage,
+ latency, and energy consumption.
+
+ * Capacity planning, placement of infrastructure nodes to minimize
+ delay [Fan], cost, energy, etc.
+
+ * Incentives for participation, for example, in peer-to-peer
+ federation schemes.
+
+ * Design of federated AI over IoT edge computing systems [Brecko],
+ for example, for anomaly detection.
+
+4.3.3. Multi-Tenancy and Isolation
+
+ Some IoT edge computing systems make use of virtualized (compute,
+ storage, and networking) resources to address the need for secure
+ multi-tenancy at the edge. This leads to "edge clouds" that share
+ properties with remote clouds and can reuse some of their ecosystems.
+ Virtualization function management is largely covered by ETSI NFV and
+ MEC standards and recommendations. Projects such as [LFEDGE-EVE]
+ further cover virtualization and its management in distributed edge
+ computing settings.
+
+ Related challenges include:
+
+ * Adapting cloud management platforms to the edge to account for its
+ distributed nature, heterogeneity, need for customization, and
+ limited resources (for example, using Conflict-free Replicated
+ Data Types (CRDTs) [Jeffery] or intent-based management mechanisms
+ [Cao]).
+
+ * Minimizing virtual function instantiation time and resource usage.
+
+4.4. Functional Components
+
+4.4.1. In-Network Computation
+
+ A core function of IoT edge computing is to enable local computation
+ on a node at the network edge, typically for application-layer
+ processing, such as processing input data from sensors, making local
+ decisions, preprocessing data, and offloading computation on behalf
+ of a device, service, or user. Related functions include
+ orchestrating computation (in a centralized or distributed manner)
+ and managing application life cycles. Support for in-network
+ computation may vary in terms of capability; for example, computing
+ nodes can host virtual machines, software containers, software
+ actors, unikernels running stateful or stateless code, or a rule
+ engine providing an API to register actions in response to conditions
+ (such as an IoT device ID, sensor values to check, thresholds, etc.).
+
+ Edge offloading includes offloading to and from an IoT device and to
+ and from a network node. [Cloudlets] describes an example of
+ offloading computation from an end device to a network node. In
+ contrast, oneM2M is an example of a system that allows a cloud-based
+ IoT platform to transfer resources and tasks to a target edge node
+ [oneM2M-TR0052]. Once transferred, the edge node can directly
+ support IoT devices that it serves with the service offloaded by the
+ cloud (e.g., group management, location management, etc.).
+
+ QoS can be provided in some systems through the combination of
+ network QoS (e.g., traffic engineering or wireless resource
+ scheduling) and compute and storage resource allocations. For
+ example, in some systems, a bandwidth manager service can be exposed
+ to enable allocation of the bandwidth to or from an edge computing
+ application instance.
+
+ In-network computation can leverage the underlying services provided
+ using data generated by IoT devices and access networks. Such
+ services include IoT device location, radio network information,
+ bandwidth management, and congestion management (e.g., the congestion
+ management feature of oneM2M [oneM2M-TR0052]).
+
+ Related challenges include:
+
+ * Computation placement: in a centralized or distributed (e.g.,
+ peer-to-peer) manner, selecting an appropriate compute device.
+ The selection is based on available resources, location of data
+ input and data sinks, compute node properties, etc. with varying
+ goals. These goals include end-to-end latency, privacy, high
+ availability, energy conservation, or network efficiency (for
+ example, using load-balancing techniques to avoid congestion).
+
+ * Onboarding code on a platform or computing device and invoking
+ remote code execution, possibly as part of a distributed
+ programming model and with respect to similar concerns of latency,
+ privacy, etc. For example, offloading can be included in a
+ vehicular scenario [Grewe]. These operations should deal with
+ heterogeneous compute nodes [Schafer] and may also support end
+ devices, including IoT devices, as compute nodes [Larrea].
+
+ * Adapting Quality of Results (QoR) for applications where a perfect
+ result is not necessary [Li].
+
+ * Assisted or automatic partitioning of code. For example, for
+ application programs [COIN-APPCENTRES] or network programs
+ [REQS-P4COMP].
+
+ * Supporting computation across trust domains. For example,
+ verifying computation results.
+
+ * Supporting computation mobility: relocating an instance from one
+ compute node to another while maintaining a given service level;
+ session continuity when communicating with end devices that are
+ mobile, possibly at high speed (e.g., in vehicular scenarios);
+ defining lightweight execution environments for secure code
+ mobility, for example, using WebAssembly [Nieke].
+
+ * Defining, managing, and verifying SLAs for edge computing systems;
+ pricing is a challenging task.
+
+4.4.2. Edge Storage and Caching
+
+ Local storage or caching enables local data processing (e.g.,
+ preprocessing or analysis) as well as delayed data transfer to the
+ cloud or delayed physical shipping. An edge node may offer local
+ data storage (in which persistence is subject to retention policies),
+ caching, or both. Generally, "caching" refers to temporary storage
+ to improve performance without persistence guarantees. An edge-
+ caching component manages data persistence; for example, it schedules
+ the removal of data when it is no longer needed. Other related
+ aspects include the authentication and encryption of data. Edge
+ storage and caching can take the form of a distributed storage
+ system.
+
+ Related challenges include:
+
+ * Cache and data placement: using cache positioning and data
+ placement strategies to minimize data retrieval delay [Liu] and
+ energy consumption. Caches may be positioned in the access-
+ network infrastructure or on end devices.
+
+ * Maintaining consistency, freshness, reliability, and privacy of
+ data stored or cached in systems that are distributed,
+ constrained, and dynamic (e.g., due to node mobility, energy-
+ saving regimes, and disruptions) and which can have additional
+ data governance constraints on data storage location. For
+ example, [Mortazavi] describes leveraging a hierarchical storage
+ organization. Freshness-related metrics include the age of
+ information [Yates] that captures the timeliness of information
+ received from a sender (e.g., an IoT device).
+
+4.4.3. Communication
+
+ An edge cloud may provide a northbound data plane or management plane
+ interface to a remote network, such as a cloud, home, or enterprise
+ network. This interface does not exist in stand-alone (local-only)
+ scenarios. To support such an interface when it exists, an edge
+ computing component needs to expose an API, deal with authentication
+ and authorization, and support secure communication.
+
+ An edge cloud may provide an API or interface to local or mobile
+ users, for example, to provide access to services and applications or
+ to manage data published by local or mobile devices.
+
+ Edge computing nodes communicate with IoT devices over a southbound
+ interface, typically for data acquisition and IoT device management.
+
+ Communication brokering is a typical function of IoT edge computing
+ that facilitates communication with IoT devices, enables clients to
+ register as recipients for data from devices, forwards traffic to or
+ from IoT devices, enables various data discovery and redistribution
+ patterns (for example, north-south with clouds and east-west with
+ other edge devices [EDGE-DATA-DISCOVERY-OVERVIEW]). Another related
+ aspect is dispatching alerts and notifications to interested
+ consumers both inside and outside the edge computing domain.
+ Protocol translation, analytics, and video transcoding can also be
+ performed when necessary. Communication brokering may be centralized
+ in some systems, for example, using a hub-and-spoke message broker or
+ distributed with message buses, possibly in a layered bus approach.
+ Distributed systems can leverage direct communication between end
+ devices over device-to-device links. A broker can ensure
+ communication reliability and traceability and, in some cases,
+ transaction management.
+
+ Related challenges include:
+
+ * Defining edge computing abstractions, such as PaaS [Yangui],
+ suitable for users and cloud systems to interact with edge
+ computing systems and dealing with interoperability issues, such
+ as data-model heterogeneity.
+
+ * Enabling secure and resilient communication between IoT devices
+ and a remote cloud, for example, through multipath support.
+
+4.5. Application Components
+
+ IoT edge computing can host applications, such as those mentioned in
+ Section 2.4. While describing the components of individual
+ applications is out of our scope, some of those applications share
+ similar functions, such as IoT device management and data management,
+ as described below.
+
+4.5.1. IoT Device Management
+
+ IoT device management includes managing information regarding IoT
+ devices, including their sensors and how to communicate with them.
+ Edge computing addresses the scalability challenges of a large number
+ of IoT devices by separating the scalability domain into local (e.g.,
+ edge) networks and remote networks. For example, in the context of
+ the oneM2M standard, a device management functionality (called
+ "software campaign" in oneM2M) enables the installation, deletion,
+ activation, and deactivation of software functions and services on a
+ potentially large number of edge nodes [oneM2M-TR0052]. Using a
+ dashboard or management software, a service provider issues these
+ requests through an IoT cloud platform supporting the software
+ campaign functionality.
+
+ The challenges listed in Section 4.3.1 may be applicable to IoT
+ device management as well.
+
+4.5.2. Data Management and Analytics
+
+ Data storage and processing at the edge are major aspects of IoT edge
+ computing, directly addressing the high-level IoT challenges listed
+ in Section 3. Data analysis, for example, through AI/ML tasks
+ performed at the edge, may benefit from specialized hardware support
+ on the computing nodes.
+
+ Related challenges include:
+
+ * Addressing concerns regarding resource usage, security, and
+ privacy when sharing, processing, discovering, or managing data:
+ for example, presenting data in views composed of an aggregation
+ of related data [Zhang], protecting data communication between
+ authenticated peers [Basudan], classifying data (e.g., in terms of
+ privacy, importance, and validity), and compressing and encrypting
+ data, for example, using homomorphic encryption to directly
+ process encrypted data [Stanciu].
+
+ * Other concerns regarding edge data discovery (e.g., streaming
+ data, metadata, and events) include siloization and lack of
+ standards in edge environments that can be dynamic (e.g.,
+ vehicular networks) and heterogeneous
+ [EDGE-DATA-DISCOVERY-OVERVIEW].
+
+ * Data-driven programming models [Renart], for example, those that
+ are event based, including handling naming and data abstractions.
+
+ * Data integration in an environment without data standardization or
+ where different sources use different ontologies
+ [Farnbauer-Schmidt].
+
+ * Addressing concerns such as limited resources, privacy, and
+ dynamic and heterogeneous environments to deploy machine learning
+ at the edge: for example, making machine learning more lightweight
+ and distributed (e.g., enabling distributed inference at the
+ edge), supporting shorter training times and simplified models,
+ and supporting models that can be compressed for efficient
+ communication [Murshed].
+
+ * Although edge computing can support IoT services independently of
+ cloud computing, it can also be connected to cloud computing.
+ Thus, the relationship between IoT edge computing and cloud
+ computing, with regard to data management, is another potential
+ challenge [ISO_TR].
+
+4.6. Simulation and Emulation Environments
+
+ IoT edge computing introduces new challenges to the simulation and
+ emulation tools used by researchers and developers. A varied set of
+ applications, networks, and computing technologies can coexist in a
+ distributed system, making modeling difficult. Scale, mobility, and
+ resource management are additional challenges [SimulatingFog].
+
+ Tools include simulators, where simplified application logic runs on
+ top of a fog network model, and emulators, where actual applications
+ can be deployed, typically in software containers, over a cloud
+ infrastructure (e.g., Docker and Kubernetes) running over a network
+ emulating network edge conditions, such as variable delays,
+ throughput, and mobility events. To gain in scale, emulated and
+ simulated systems can be used together in hybrid federation-based
+ approaches [PseudoDynamicTesting]; whereas to gain in realism,
+ physical devices can be interconnected with emulated systems.
+ Examples of related work and platforms include the publicly
+ accessible MEC sandbox work recently initiated in ETSI [ETSI_Sandbox]
+ and open-source simulators and emulators ([AdvantEDGE] emulator and
+ tools cited in [SimulatingFog]). EdgeNet [Senel] is a globally
+ distributed edge cloud for Internet researchers, which uses nodes
+ contributed by institutions and which is based on Docker for
+ containerization and Kubernetes for deployment and node management.
+
+ Digital twins are virtual instances of a physical system (twin) that
+ are continually updated with the latter's performance, maintenance,
+ and health status data throughout the life cycle of the physical
+ system [Madni]. In contrast to an emulation or simulated
+ environment, digital twins, once generated, are maintained in sync by
+ their physical twin, which can be, among many other instances, an IoT
+ device, edge device, or an edge network. The benefits of digital
+ twins go beyond those of emulation and include accelerated business
+ processes, enhanced productivity, and faster innovation with reduced
+ costs [NETWORK-DIGITAL-TWIN-ARCH].
+
+5. Security Considerations
+
+ Privacy and security are drivers of the adoption of edge computing
+ for the IoT (Section 3.4). As discussed in Section 4.3.1,
+ authentication and trust (among computing nodes, management nodes,
+ and end devices) can be challenging as scale, mobility, and
+ heterogeneity increase. The sometimes disconnected nature of edge
+ resources can avoid reliance on third-party authorities. Distributed
+ edge computing is exposed to reliability and denial-of-service
+ attacks. A personal or proprietary IoT data leakage is also a major
+ threat, particularly because of the distributed nature of the systems
+ (Section 4.5.2). Furthermore, blockchain-based distributed IoT edge
+ computing must be designed for privacy, since public blockchain
+ addressing does not guarantee absolute anonymity [Ali].
+
+ However, edge computing also offers solutions in the security space:
+ maintaining privacy by computing sensitive data closer to data
+ generators is a major use case for IoT edge computing. An edge cloud
+ can be used to perform actions based on sensitive data or to
+ anonymize or aggregate data prior to transmission to a remote cloud
+ server. Edge computing communication brokering functions can also be
+ used to secure communication between edge and cloud networks.
+
+6. Conclusion
+
+ IoT edge computing plays an essential role, complementary to the
+ cloud, in enabling IoT systems in certain situations. In this
+ document, we presented use cases and listed the core challenges faced
+ by the IoT that drive the need for IoT edge computing. Therefore,
+ the first part of this document may help focus future research
+ efforts on the aspects of IoT edge computing where it is most useful.
+ The second part of this document presents a general system model and
+ structured overview of the associated research challenges and related
+ work. The structure, based on the system model, is not meant to be
+ restrictive and exists for the purpose of having a link between
+ individual research areas and where they are applicable in an IoT
+ edge computing system.
+
+7. IANA Considerations
+
+ This document has no IANA actions.
+
+8. Informative References
+
+ [AdvantEDGE]
+ "AdvantEDGE, Mobile Edge Emulation Platform", commit
+ 8f6edbe, May 2023,
+ <https://github.com/InterDigitalInc/AdvantEDGE>.
+
+ [Ali] Ali, M., Vecchio, M., and F. Antonelli, "Enabling a
+ Blockchain-Based IoT Edge", IEEE Internet of Things
+ Magazine, vol. 1, no.2, pp. 24-29,
+ DOI 10.1109/IOTM.2019.1800024, December 2018,
+ <https://doi.org/10.1109/IOTM.2019.1800024>.
+
+ [Anglano] Anglano, C., Canonico, M., Castagno, P., Guazzone, M., and
+ M. Sereno, "A game-theoretic approach to coalition
+ formation in fog provider federations", 2018 Third
+ International Conference on Fog and Mobile Edge Computing
+ (FMEC), DOI 10.1109/fmec.2018.8364054, April 2018,
+ <https://doi.org/10.1109/fmec.2018.8364054>.
+
+ [Argungu] Argungu, J., Idina, M., Chalawa, U., Ummar, M., Bello, S.,
+ Arzika, I., and B. Mala, "A Survey of Edge Computing
+ Approaches in Smart Factory", International Journal of
+ Advanced Research in Computer and Communication
+ Engineering, Vol. 12, Issue 9, September 2023.
+
+ [Ashton] Ashton, K., "That 'Internet of Things' Thing", RFID
+ Journal, vol. 22, no. 7, pp. 97-114, June 2009,
+ <http://www.itrco.jp/libraries/RFIDjournal-
+ That%20Internet%20of%20Things%20Thing.pdf>.
+
+ [Badjie] Badjie, B., "The Future of Autonomous Driving Systems with
+ Edge Computing", September 2023,
+ <https://medium.com/@bakarykumba1996/the-future-of-
+ autonomous-driving-systems-with-edge-computing-
+ 8c919597c4ee>.
+
+ [Basudan] Basudan, S., Lin, X., and K. Sankaranarayanan, "A Privacy-
+ Preserving Vehicular Crowdsensing-Based Road Surface
+ Condition Monitoring System Using Fog Computing", IEEE
+ Internet of Things Journal, vol. 4, no. 3, pp. 772-782,
+ DOI 10.1109/jiot.2017.2666783, June 2017,
+ <https://doi.org/10.1109/jiot.2017.2666783>.
+
+ [BigRentz] BigRentz, "41 Construction Safety Statistics for 2024",
+ February 2024, <https://www.bigrentz.com/blog/
+ construction-safety-statistics>.
+
+ [Botta] Botta, A., de Donato, W., Persico, V., and A. Pescapé,
+ "Integration of Cloud computing and Internet of Things: A
+ survey", Future Generation Computer Systems, vol. 56, pp.
+ 684-700, DOI 10.1016/j.future.2015.09.021, March 2016,
+ <https://doi.org/10.1016/j.future.2015.09.021>.
+
+ [Brecko] Brecko, A., Kajáti, E., Koziorek, J., and I. Zolotová,
+ "Federated Learning for Edge Computing: A Survey", Applied
+ Sciences 12(18):9124, DOI 10.3390/app12189124, September
+ 2022, <https://doi.org/10.3390/app12189124>.
+
+ [Cao] Cao, L., Merican, A., Tootaghaj, D., Ahmed, F., Sharma,
+ P., and V. Saxena, "eCaaS: A Management Framework of Edge
+ Container as a Service for Business Workload", Proceedings
+ of the 4th International Workshop on Edge Systems,
+ Analytics and Networking, DOI 10.1145/3434770.3459741,
+ April 2021, <https://doi.org/10.1145/3434770.3459741>.
+
+ [CertMagic]
+ CertMagic, "Digital Twin Technology: Simulating Real-World
+ Scenarios for Enhanced Decision Making", May 2023,
+ <https://certmagic.medium.com/digital-twin-technology-
+ simulating-real-world-scenarios-for-enhanced-decision-
+ making-8844c51e856d>.
+
+ [Chen] Chen, B., Wan, J., Celesti, A., Li, D., Abbas, H., and Q.
+ Zhang, "Edge Computing in IoT-Based Manufacturing", IEEE
+ Communications Magazine, vol. 56, no. 9, pp. 103-109,
+ DOI 10.1109/mcom.2018.1701231, September 2018,
+ <https://doi.org/10.1109/mcom.2018.1701231>.
+
+ [Chiang] Chiang, M. and T. Zhang, "Fog and IoT: An Overview of
+ Research Opportunities", IEEE Internet of Things Journal,
+ vol. 3, no. 6, pp. 854-864, DOI 10.1109/jiot.2016.2584538,
+ December 2016,
+ <https://doi.org/10.1109/jiot.2016.2584538>.
+
+ [Chipmunk] Shin, Y., Park, S., Ko, N., and A. Jeong, "Chipmunk:
+ Distributed Object Storage for NDN", Proceedings of the
+ 7th ACM Conference on Information-Centric Networking, ACM,
+ DOI 10.1145/3405656.3420231, September 2020,
+ <https://doi.org/10.1145/3405656.3420231>.
+
+ [Cloudlets]
+ Satyanarayanan, M., Bahl, P., Caceres, R., and N. Davies,
+ "The Case for VM-Based Cloudlets in Mobile Computing",
+ IEEE Pervasive Computing, vol. 8, no. 4, pp. 14-23,
+ DOI 10.1109/mprv.2009.82, October 2009,
+ <https://doi.org/10.1109/mprv.2009.82>.
+
+ [COIN-APPCENTRES]
+ Trossen, D., Sarathchandra, C., and M. Boniface, "In-
+ Network Computing for App-Centric Micro-Services", Work in
+ Progress, Internet-Draft, draft-sarathchandra-coin-
+ appcentres-04, 26 January 2021,
+ <https://datatracker.ietf.org/doc/html/draft-
+ sarathchandra-coin-appcentres-04>.
+
+ [CORE-GROUPCOMM-BIS]
+ Dijk, E., Wang, C., and M. Tiloca, "Group Communication
+ for the Constrained Application Protocol (CoAP)", Work in
+ Progress, Internet-Draft, draft-ietf-core-groupcomm-bis-
+ 10, 23 October 2023,
+ <https://datatracker.ietf.org/doc/html/draft-ietf-core-
+ groupcomm-bis-10>.
+
+ [Echeverria]
+ Echeverría, S., Klinedinst, D., Williams, K., and G.
+ Lewis, "Establishing Trusted Identities in Disconnected
+ Edge Environments", 2016 IEEE/ACM Symposium on Edge
+ Computing (SEC), DOI 10.1109/sec.2016.27, October 2016,
+ <https://doi.org/10.1109/sec.2016.27>.
+
+ [EDGE-COMPUTING-BACKGROUND]
+ de Foy, X., Hong, J., Hong, Y., Kovatsch, M., Schooler,
+ E., and D. Kutscher, "IoT Edge Computing: Initiatives,
+ Projects and Products", Work in Progress, Internet-Draft,
+ draft-defoy-t2trg-iot-edge-computing-background-00, 25 May
+ 2020, <https://datatracker.ietf.org/doc/html/draft-defoy-
+ t2trg-iot-edge-computing-background-00>.
+
+ [EDGE-DATA-DISCOVERY-OVERVIEW]
+ McBride, M., Kutscher, D., Schooler, E., Bernardos, C. J.,
+ Lopez, D., and X. de Foy, "Edge Data Discovery for COIN",
+ Work in Progress, Internet-Draft, draft-mcbride-edge-data-
+ discovery-overview-05, 1 November 2020,
+ <https://datatracker.ietf.org/doc/html/draft-mcbride-edge-
+ data-discovery-overview-05>.
+
+ [ENERGY] Beckel, C., Sadamori, L., Staake, T., and S. Santini,
+ "Revealing household characteristics from smart meter
+ data", Energy, vol. 78, pp. 397-410,
+ DOI 10.1016/j.energy.2014.10.025, December 2014,
+ <https://doi.org/10.1016/j.energy.2014.10.025>.
+
+ [ETSI_MEC_01]
+ ETSI, "Multi-access Edge Computing (MEC); Terminology",
+ V2.1.1, ETSI GS MEC 001, January 2019,
+ <https://www.etsi.org/deliver/etsi_gs/
+ MEC/001_099/001/02.01.01_60/gs_MEC001v020101p.pdf>.
+
+ [ETSI_MEC_03]
+ ETSI, "Multi-access Edge Computing (MEC); Framework and
+ Reference Architecture", V2.1.1, ETSI GS MEC 003, January
+ 2019, <https://www.etsi.org/deliver/etsi_gs/
+ MEC/001_099/003/02.01.01_60/gs_MEC003v020101p.pdf>.
+
+ [ETSI_MEC_33]
+ ETSI, "Multi-access Edge Computing (MEC); IoT API",
+ V3.1.1, ETSI GS MEC 033, December 2022,
+ <https://www.etsi.org/deliver/etsi_gs/
+ MEC/001_099/033/03.01.01_60/gs_MEC033v030101p.pdf>.
+
+ [ETSI_Sandbox]
+ ETSI, "Multi-access Edge Computing (MEC) MEC Sandbox",
+ Portal, September 2023,
+ <https://portal.etsi.org/webapp/WorkProgram/
+ Report_WorkItem.asp?WKI_ID=57671>.
+
+ [Fan] Fan, Q. and N. Ansari, "Cost Aware cloudlet Placement for
+ big data processing at the edge", 2017 IEEE International
+ Conference on Communications (ICC),
+ DOI 10.1109/icc.2017.7996722, May 2017,
+ <https://doi.org/10.1109/icc.2017.7996722>.
+
+ [Farnbauer-Schmidt]
+ Farnbauer-Schmidt, M., Lindner, J., Kaffenberger, C., and
+ J. Albrecht, "Combining the Concepts of Semantic Data
+ Integration and Edge Computing", INFORMATIK 2019: 50 Jahre
+ Gesellschaft für Informatik - Informatik für Gesellschaf,
+ pp. 139-152, DOI 10.18420/inf2019_19, September 2019,
+ <https://doi.org/10.18420/inf2019_19>.
+
+ [Grewe] Grewe, D., Wagner, M., Arumaithurai, M., Psaras, I., and
+ D. Kutscher, "Information-Centric Mobile Edge Computing
+ for Connected Vehicle Environments: Challenges and
+ Research Directions", Proceedings of the Workshop on
+ Mobile Edge Communications, pp. 7-12,
+ DOI 10.1145/3098208.3098210, August 2017,
+ <https://doi.org/10.1145/3098208.3098210>.
+
+ [Harchol] Harchol, Y., Mushtaq, A., McCauley, J., Panda, A., and S.
+ Shenker, "CESSNA: Resilient Edge-Computing", Proceedings
+ of the 2018 Workshop on Mobile Edge Communications,
+ DOI 10.1145/3229556.3229558, August 2018,
+ <https://doi.org/10.1145/3229556.3229558>.
+
+ [IEC_IEEE_60802]
+ IEC/IEEE, "Use Cases IEC/IEEE 60802", V1.3, IEC/
+ IEEE 60802, September 2018,
+ <https://grouper.ieee.org/groups/802/1/files/public/
+ docs2018/60802-industrial-use-cases-0918-v13.pdf>.
+
+ [ISO_TR] "Internet of things (IoT) - Edge computing", ISO/IEC TR
+ 30164:2020, April 2020,
+ <https://www.iso.org/standard/53284.html>.
+
+ [Jeffery] Jeffery, A., Howard, H., and R. Mortier, "Rearchitecting
+ Kubernetes for the Edge", Proceedings of the 4th
+ International Workshop on Edge Systems, Analytics and
+ Networking, DOI 10.1145/3434770.3459730, April 2021,
+ <https://doi.org/10.1145/3434770.3459730>.
+
+ [Jeong] Jeong, T., Chung, J., Hong, J., and S. Ha, "Towards a
+ distributed computing framework for Fog", 2017 IEEE Fog
+ World Congress (FWC), DOI 10.1109/fwc.2017.8368528,
+ October 2017, <https://doi.org/10.1109/fwc.2017.8368528>.
+
+ [Jones] Jones, D., Snider, C., Nassehi, A., Yon, J., and B. Hicks,
+ "Characterising the Digital Twin: A systematic literature
+ review", CIRP Journal of Manufacturing Science and
+ Technology, vol. 29, pp. 36-52,
+ DOI 10.1016/j.cirpj.2020.02.002, May 2020,
+ <https://doi.org/10.1016/j.cirpj.2020.02.002>.
+
+ [Kelly] Kelly, R., "Internet of Things Data to Top 1.6 Zettabytes
+ by 2020", April 2015,
+ <https://campustechnology.com/articles/2015/04/15/
+ internet-of-things-data-to-top-1-6-zettabytes-by-
+ 2020.aspx>. Retrieved on 2022-05-24.
+
+ [Khan] Khan, L., Yaqoob, I., Tran, N., Kazmi, S., Dang, T., and
+ C. Hong, "Edge-Computing-Enabled Smart Cities: A
+ Comprehensive Survey", IEEE Internet of Things Journal,
+ vol. 7, no. 10, pp. 10200-10232,
+ DOI 10.1109/jiot.2020.2987070, October 2020,
+ <https://doi.org/10.1109/jiot.2020.2987070>.
+
+ [Kua] Patil, V., Desai, H., and L. Zhang, "Kua: a distributed
+ object store over named data networking", Proceedings of
+ the 9th ACM Conference on Information-Centric Networking,
+ DOI 10.1145/3517212.3558083, September 2022,
+ <https://doi.org/10.1145/3517212.3558083>.
+
+ [Larrea] Larrea, J. and A. Barbalace, "The serverkernel operating
+ system", Proceedings of the Third ACM International
+ Workshop on Edge Systems, Analytics and Networking,
+ DOI 10.1145/3378679.3394537, May 2020,
+ <https://doi.org/10.1145/3378679.3394537>.
+
+ [LFEDGE-EVE]
+ Linux Foundation, "Project Edge Virtualization Engine
+ (EVE)", Portal, <https://www.lfedge.org/projects/eve>.
+ Retrieved on 2022-05-24.
+
+ [Li] Li, Y., Chen, Y., Lan, T., and G. Venkataramani, "MobiQoR:
+ Pushing the Envelope of Mobile Edge Computing Via Quality-
+ of-Result Optimization", 2017 IEEE 37th International
+ Conference on Distributed Computing Systems (ICDCS),
+ DOI 10.1109/icdcs.2017.54, June 2017,
+ <https://doi.org/10.1109/icdcs.2017.54>.
+
+ [Lin] Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and W.
+ Zhao, "A Survey on Internet of Things: Architecture,
+ Enabling Technologies, Security and Privacy, and
+ Applications", IEEE Internet of Things Journal, vol. 4,
+ no. 5, pp. 1125-1142, DOI 10.1109/jiot.2017.2683200,
+ October 2017, <https://doi.org/10.1109/jiot.2017.2683200>.
+
+ [Liu] Liu, J., Bai, B., Zhang, J., and K. Letaief, "Cache
+ Placement in Fog-RANs: From Centralized to Distributed
+ Algorithms", IEEE Transactions on Wireless Communications,
+ vol. 16, no. 11, pp. 7039-7051,
+ DOI 10.1109/twc.2017.2737015, November 2017,
+ <https://doi.org/10.1109/twc.2017.2737015>.
+
+ [Madni] Madni, A., Madni, C., and S. Lucero, "Leveraging Digital
+ Twin Technology in Model-Based Systems Engineering",
+ Systems 7(1):7, DOI 10.3390/systems7010007, January 2019,
+ <https://doi.org/10.3390/systems7010007>.
+
+ [Mahadev] Satyanarayanan, M., "The Emergence of Edge Computing",
+ Computer, vol. 50, no. 1, pp. 30-39,
+ DOI 10.1109/mc.2017.9, January 2017,
+ <https://doi.org/10.1109/mc.2017.9>.
+
+ [Mehmood] Mehmood, M., Oad, A., Abrar, M., Munir, H., Hasan, S.,
+ Muqeet, H., and N. Golilarz, "Edge Computing for IoT-
+ Enabled Smart Grid", Security and Communication Networks,
+ Vol. 2021, Article ID 5524025, DOI 10.1155/2021/5524025,
+ July 2021, <https://doi.org/10.1155/2021/5524025>.
+
+ [Mortazavi]
+ Mortazavi, S., Balasubramanian, B., de Lara, E., and S.
+ Narayanan, "Toward Session Consistency for the Edge",
+ USENIX Workshop on Hot Topics in Edge Computing (HotEdge
+ 18), 2018,
+ <https://www.usenix.org/conference/hotedge18/presentation/
+ mortazavi>.
+
+ [MQTT5] Banks, A., Ed., Briggs, E., Ed., Borgendale, K., Ed., and
+ R. Gupta, Ed., "MQTT Version 5.0", OASIS Standard, March
+ 2019, <https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-
+ v5.0.html>.
+
+ [Murshed] Murshed, M., Murphy, C., Hou, D., Khan, N.,
+ Ananthanarayanan, G., and F. Hussain, "Machine Learning at
+ the Network Edge: A Survey", ACM Computing Surveys, vol.
+ 54, no. 8, pp. 1-37, DOI 10.1145/3469029, October 2021,
+ <https://doi.org/10.1145/3469029>.
+
+ [NETWORK-DIGITAL-TWIN-ARCH]
+ Zhou, C., Yang, H., Duan, X., Lopez, D., Pastor, A., Wu,
+ Q., Boucadair, M., and C. Jacquenet, "Network Digital
+ Twin: Concepts and Reference Architecture", Work in
+ Progress, Internet-Draft, draft-irtf-nmrg-network-digital-
+ twin-arch-05, 4 March 2024,
+ <https://datatracker.ietf.org/doc/html/draft-irtf-nmrg-
+ network-digital-twin-arch-05>.
+
+ [Nieke] Nieke, M., Almstedt, L., and R. Kapitza, "Edgedancer:
+ Secure Mobile WebAssembly Services on the Edge",
+ Proceedings of the 4th International Workshop on Edge
+ Systems, Analytics and Networking,
+ DOI 10.1145/3434770.3459731, April 2021,
+ <https://doi.org/10.1145/3434770.3459731>.
+
+ [NIST] Mell, P. and T. Grance, "The NIST Definition of Cloud
+ Computing", NIST Special Publication 800-145,
+ DOI 10.6028/nist.sp.800-145, September 2011,
+ <https://doi.org/10.6028/nist.sp.800-145>.
+
+ [NVIDIA] Grzywaczewski, A., "Training AI for Self-Driving Vehicles:
+ the Challenge of Scale", NVIDIA Developer Blog, October
+ 2017, <https://devblogs.nvidia.com/training-self-driving-
+ vehicles-challenge-scale/>. Retrieved on 2022-05-24.
+
+ [OGrady] O'Grady, M., Langton, D., and G. O'Hare, "Edge computing:
+ A tractable model for smart agriculture?", Artificial
+ Intelligence in Agriculture, Vol. 3, Pages 42-51,
+ DOI 10.1016/j.aiia.2019.12.001, September 2019,
+ <https://doi.org/10.1016/j.aiia.2019.12.001>.
+
+ [oneM2M-TR0001]
+ Mladin, C., "Use Cases Collection", oneM2M, v4.2.0,
+ TR 0001, October 2018,
+ <https://member.onem2m.org/Application/documentapp/
+ downloadLatestRevision/default.aspx?docID=28153>.
+
+ [oneM2M-TR0018]
+ Lu, C. and M. Jiang, "Industrial Domain Enablement",
+ oneM2M, v2.5.2, TR 0018, February 2019,
+ <https://member.onem2m.org/Application/documentapp/
+ downloadLatestRevision/default.aspx?docID=29334>.
+
+ [oneM2M-TR0026]
+ Yamamoto, K., Mladin, C., and V. Kueh, "Vehicular Domain
+ Enablement", oneM2M, TR 0026, January 2020,
+ <https://member.onem2m.org/Application/documentapp/
+ downloadLatestRevision/default.aspx?docID=31410>.
+
+ [oneM2M-TR0052]
+ Yamamoto, K. and C. Mladin, "Study on Edge and Fog
+ Computing in oneM2M systems", oneM2M, TR 0052, September
+ 2020, <https://member.onem2m.org/Application/documentapp/
+ downloadLatestRevision/default.aspx?docID=32633>.
+
+ [oneM2M-TS0002]
+ He, S., "TS 0002, Requirements", oneM2M, TS 0002, February
+ 2019, <https://member.onem2m.org/Application/documentapp/
+ downloadLatestRevision/default.aspx?docID=29274>.
+
+ [OpenFog] OpenFog Consortium, "OpenFog Reference Architecture for
+ Fog Computing", February 2017,
+ <https://iiconsortium.org/pdf/
+ OpenFog_Reference_Architecture_2_09_17.pdf>.
+
+ [PseudoDynamicTesting]
+ Ficco, M., Esposito, C., Xiang, Y., and F. Palmieri,
+ "Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud
+ Ecosystems", IEEE Communications Magazine, vol. 55, no.
+ 11, pp. 98-104, DOI 10.1109/mcom.2017.1700328, November
+ 2017, <https://doi.org/10.1109/mcom.2017.1700328>.
+
+ [Renart] Renart, E., Diaz-Montes, J., and M. Parashar, "Data-Driven
+ Stream Processing at the Edge", 2017 IEEE 1st
+ International Conference on Fog and Edge Computing
+ (ICFEC), DOI 10.1109/icfec.2017.18, May 2017,
+ <https://doi.org/10.1109/icfec.2017.18>.
+
+ [REQS-P4COMP]
+ Singh, H. and M. Montpetit, "Requirements for P4 Program
+ Splitting for Heterogeneous Network Nodes", Work in
+ Progress, Internet-Draft, draft-hsingh-coinrg-reqs-p4comp-
+ 03, 18 February 2021,
+ <https://datatracker.ietf.org/doc/html/draft-hsingh-
+ coinrg-reqs-p4comp-03>.
+
+ [REST-IOT] Keränen, A., Kovatsch, M., and K. Hartke, "Guidance on
+ RESTful Design for Internet of Things Systems", Work in
+ Progress, Internet-Draft, draft-irtf-t2trg-rest-iot-13, 25
+ January 2024, <https://datatracker.ietf.org/doc/html/
+ draft-irtf-t2trg-rest-iot-13>.
+
+ [RFC6291] Andersson, L., van Helvoort, H., Bonica, R., Romascanu,
+ D., and S. Mansfield, "Guidelines for the Use of the "OAM"
+ Acronym in the IETF", BCP 161, RFC 6291,
+ DOI 10.17487/RFC6291, June 2011,
+ <https://www.rfc-editor.org/info/rfc6291>.
+
+ [RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained
+ Application Protocol (CoAP)", RFC 7252,
+ DOI 10.17487/RFC7252, June 2014,
+ <https://www.rfc-editor.org/info/rfc7252>.
+
+ [RFC7390] Rahman, A., Ed. and E. Dijk, Ed., "Group Communication for
+ the Constrained Application Protocol (CoAP)", RFC 7390,
+ DOI 10.17487/RFC7390, October 2014,
+ <https://www.rfc-editor.org/info/rfc7390>.
+
+ [RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases",
+ RFC 8578, DOI 10.17487/RFC8578, May 2019,
+ <https://www.rfc-editor.org/info/rfc8578>.
+
+ [Schafer] Schäfer, D., Edinger, J., VanSyckel, S., Paluska, J., and
+ C. Becker, "Tasklets: Overcoming Heterogeneity in
+ Distributed Computing Systems", 2016 IEEE 36th
+ International Conference on Distributed Computing Systems
+ Workshops (ICDCSW), DOI 10.1109/icdcsw.2016.22, June 2016,
+ <https://doi.org/10.1109/icdcsw.2016.22>.
+
+ [Senel] Şenel, B., Mouchet, M., Cappos, J., Fourmaux, O.,
+ Friedman, T., and R. McGeer, "EdgeNet: A Multi-Tenant and
+ Multi-Provider Edge Cloud", Proceedings of the 4th
+ International Workshop on Edge Systems, Analytics and
+ Networking, DOI 10.1145/3434770.3459737, April 2021,
+ <https://doi.org/10.1145/3434770.3459737>.
+
+ [SFC-FOG-RAN]
+ Bernardos, C. J. and A. Mourad, "Service Function Chaining
+ Use Cases in Fog RAN", Work in Progress, Internet-Draft,
+ draft-bernardos-sfc-fog-ran-10, 22 October 2021,
+ <https://datatracker.ietf.org/doc/html/draft-bernardos-
+ sfc-fog-ran-10>.
+
+ [Shi] Shi, W., Cao, J., Zhang, Q., Li, Y., and L. Xu, "Edge
+ Computing: Vision and Challenges", IEEE Internet of Things
+ Journal, vol. 3, no. 5, pp. 637-646,
+ DOI 10.1109/jiot.2016.2579198, October 2016,
+ <https://doi.org/10.1109/jiot.2016.2579198>.
+
+ [SimulatingFog]
+ Svorobej, S., Takako Endo, P., Bendechache, M., Filelis-
+ Papadopoulos, C., Giannoutakis, K., Gravvanis, G.,
+ Tzovaras, D., Byrne, J., and T. Lynn, "Simulating Fog and
+ Edge Computing Scenarios: An Overview and Research
+ Challenges", Future Internet, vol. 11, no. 3, pp. 55,
+ DOI 10.3390/fi11030055, February 2019,
+ <https://doi.org/10.3390/fi11030055>.
+
+ [Stanciu] Stanciu, V., Steen, M., Dobre, C., and A. Peter, "Privacy-
+ Preserving Crowd-Monitoring Using Bloom Filters and
+ Homomorphic Encryption", Proceedings of the 4th
+ International Workshop on Edge Systems, Analytics and
+ Networking, DOI 10.1145/3434770.3459735, April 2021,
+ <https://doi.org/10.1145/3434770.3459735>.
+
+ [Tanveer] Tanveer, S., Sree, N., Bhavana, B., and D. Varsha, "Smart
+ Agriculture System using IoT", 2022 IEEE World Conference
+ on Applied Intelligence and Computing (AIC), Sonbhadra,
+ India, pp. 482-486, DOI 10.1109/AIC55036.2022.9848948,
+ August 2022,
+ <https://doi.org/10.1109/AIC55036.2022.9848948>.
+
+ [Weiner] Weiner, M., Jorgovanovic, M., Sahai, A., and B. Nikolie,
+ "Design of a low-latency, high-reliability wireless
+ communication system for control applications", 2014 IEEE
+ International Conference on Communications (ICC),
+ DOI 10.1109/icc.2014.6883918, June 2014,
+ <https://doi.org/10.1109/icc.2014.6883918>.
+
+ [Yangui] Yangui, S., Ravindran, P., Bibani, O., Glitho, R., Ben
+ Hadj-Alouane, N., Morrow, M., and P. Polakos, "A platform
+ as-a-service for hybrid cloud/fog environments", 2016 IEEE
+ International Symposium on Local and Metropolitan Area
+ Networks (LANMAN), DOI 10.1109/lanman.2016.7548853, June
+ 2016, <https://doi.org/10.1109/lanman.2016.7548853>.
+
+ [Yates] Yates, R. and S. Kaul, "The Age of Information: Real-Time
+ Status Updating by Multiple Sources", IEEE Transactions on
+ Information Theory, vol. 65, no. 3, pp. 1807-1827,
+ DOI 10.1109/tit.2018.2871079, March 2019,
+ <https://doi.org/10.1109/tit.2018.2871079>.
+
+ [Yousefpour]
+ Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K.,
+ Jalali, F., Niakanlahiji, A., Kong, J., and J. Jue, "All
+ one needs to know about fog computing and related edge
+ computing paradigms: A complete survey", Journal of
+ Systems Architecture, vol. 98, pp. 289-330,
+ DOI 10.1016/j.sysarc.2019.02.009, September 2019,
+ <https://doi.org/10.1016/j.sysarc.2019.02.009>.
+
+ [Yue] Yue, Q., Mu, S., Zhang, L., Wang, Z., Zhang, Z., Zhang,
+ X., Wang, Y., and Z. Miao, "Assisting Smart Construction
+ With Reliable Edge Computing Technology", Frontiers in
+ Energy Research, Sec. Smart Grids, Vol. 10,
+ DOI 10.3389/fenrg.2022.900298, May 2022,
+ <https://doi.org/10.3389/fenrg.2022.900298>.
+
+ [Zhang] Zhang, Q., Zhang, X., Zhang, Q., Shi, W., and H. Zhong,
+ "Firework: Big Data Sharing and Processing in
+ Collaborative Edge Environment", 2016 Fourth IEEE Workshop
+ on Hot Topics in Web Systems and Technologies (HotWeb),
+ DOI 10.1109/hotweb.2016.12, October 2016,
+ <https://doi.org/10.1109/hotweb.2016.12>.
+
+ [Zhang2] Zhang, J., Chen, B., Zhao, Y., Cheng, X., and F. Hu, "Data
+ Security and Privacy-Preserving in Edge Computing
+ Paradigm: Survey and Open Issues", IEEE Access, vol. 6,
+ pp. 18209-18237, DOI 10.1109/access.2018.2820162, March
+ 2018, <https://doi.org/10.1109/access.2018.2820162>.
+
+Acknowledgements
+
+ The authors would like to thank Joo-Sang Youn, Akbar Rahman, Michel
+ Roy, Robert Gazda, Rute Sofia, Thomas Fossati, Chonggang Wang, Marie-
+ José Montpetit, Carlos J. Bernardos, Milan Milenkovic, Dale Seed,
+ JaeSeung Song, Roberto Morabito, Carsten Bormann, and Ari Keränen for
+ their valuable comments and suggestions on this document.
+
+Authors' Addresses
+
+ Jungha Hong
+ ETRI
+ 218 Gajeong-ro, Yuseung-Gu
+ Daejeon
+ 34129
+ Republic of Korea
+ Email: jhong@etri.re.kr
+
+
+ Yong-Geun Hong
+ Daejeon University
+ 62 Daehak-ro, Dong-gu
+ Daejeon
+ 300716
+ Republic of Korea
+ Email: yonggeun.hong@gmail.com
+
+
+ Xavier de Foy
+ InterDigital Communications, LLC
+ 1000 Sherbrooke West
+ Montreal H3A 3G4
+ Canada
+ Email: xavier.defoy@interdigital.com
+
+
+ Matthias Kovatsch
+ Huawei Technologies Duesseldorf GmbH
+ Riesstr. 25 C // 3.OG
+ 80992 Munich
+ Germany
+ Email: ietf@kovatsch.net
+
+
+ Eve Schooler
+ University of Oxford
+ Parks Road
+ Oxford
+ OX1 3PJ
+ United Kingdom
+ Email: eve.schooler@gmail.com
+
+
+ Dirk Kutscher
+ Hong Kong University of Science and Technology (Guangzhou)
+ No.1 Du Xue Rd
+ Guangzhou
+ China
+ Email: ietf@dkutscher.net