1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
|
Internet Research Task Force (IRTF) J. Hong
Request for Comments: 9556 ETRI
Category: Informational Y-G. Hong
ISSN: 2070-1721 Daejeon University
X. de Foy
InterDigital Communications, LLC
M. Kovatsch
Huawei Technologies Duesseldorf GmbH
E. Schooler
University of Oxford
D. Kutscher
HKUST(GZ)
April 2024
Internet of Things (IoT) Edge Challenges and Functions
Abstract
Many Internet of Things (IoT) applications have requirements that
cannot be satisfied by centralized cloud-based systems (i.e., cloud
computing). These include time sensitivity, data volume,
connectivity cost, operation in the face of intermittent services,
privacy, and security. As a result, IoT is driving the Internet
toward edge computing. This document outlines the requirements of
the emerging IoT edge and its challenges. It presents a general
model and major components of the IoT edge to provide a common basis
for future discussions in the Thing-to-Thing Research Group (T2TRG)
and other IRTF and IETF groups. This document is a product of the
IRTF T2TRG.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Research Task Force
(IRTF). The IRTF publishes the results of Internet-related research
and development activities. These results might not be suitable for
deployment. This RFC represents the consensus of the Thing-to-Thing
Research Group of the Internet Research Task Force (IRTF). Documents
approved for publication by the IRSG are not candidates for any level
of Internet Standard; see Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9556.
Copyright Notice
Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Table of Contents
1. Introduction
2. Background
2.1. Internet of Things (IoT)
2.2. Cloud Computing
2.3. Edge Computing
2.4. Examples of IoT Edge Computing Use Cases
3. IoT Challenges Leading toward Edge Computing
3.1. Time Sensitivity
3.2. Connectivity Cost
3.3. Resilience to Intermittent Services
3.4. Privacy and Security
4. IoT Edge Computing Functions
4.1. Overview of IoT Edge Computing
4.2. General Model
4.3. OAM Components
4.3.1. Resource Discovery and Authentication
4.3.2. Edge Organization and Federation
4.3.3. Multi-Tenancy and Isolation
4.4. Functional Components
4.4.1. In-Network Computation
4.4.2. Edge Storage and Caching
4.4.3. Communication
4.5. Application Components
4.5.1. IoT Device Management
4.5.2. Data Management and Analytics
4.6. Simulation and Emulation Environments
5. Security Considerations
6. Conclusion
7. IANA Considerations
8. Informative References
Acknowledgements
Authors' Addresses
1. Introduction
At the time of writing, many IoT services leverage cloud computing
platforms because they provide virtually unlimited storage and
processing power. The reliance of IoT on back-end cloud computing
provides additional advantages, such as scalability and efficiency.
At the time of writing, IoT systems are fairly static with respect to
integrating and supporting computation. It is not that there is no
computation, but that systems are often limited to static
configurations (edge gateways and cloud services).
However, IoT devices generate large amounts of data at the edges of
the network. To meet IoT use case requirements, data is increasingly
being stored, processed, analyzed, and acted upon close to the data
sources. These requirements include time sensitivity, data volume,
connectivity cost, and resiliency in the presence of intermittent
connectivity, privacy, and security, which cannot be addressed by
centralized cloud computing. A more flexible approach is necessary
to address these needs effectively. This involves distributing
computing (and storage) and seamlessly integrating it into the edge-
cloud continuum. We refer to this integration of edge computing and
IoT as "IoT edge computing". This document describes the related
background, use cases, challenges, system models, and functional
components.
Owing to the dynamic nature of the IoT edge computing landscape, this
document does not list existing projects in this field. Section 4.1
presents a high-level overview of the field based on a limited review
of standards, research, and open-source and proprietary products in
[EDGE-COMPUTING-BACKGROUND].
This document represents the consensus of the Thing-to-Thing Research
Group (T2TRG). It has been reviewed extensively by the research
group members who are actively involved in the research and
development of the technology covered by this document. It is not an
IETF product and is not a standard.
2. Background
2.1. Internet of Things (IoT)
Since the term "Internet of Things" was coined by Kevin Ashton in
1999 while working on Radio-Frequency Identification (RFID)
technology [Ashton], the concept of IoT has evolved. At the time of
writing, it reflects a vision of connecting the physical world to the
virtual world of computers using (often wireless) networks over which
things can send and receive information without human intervention.
Recently, the term has become more literal by connecting things to
the Internet and converging on Internet and web technologies.
A "Thing" is a physical item made available in the IoT, thereby
enabling digital interaction with the physical world for humans,
services, and/or other Things [REST-IOT]. In this document, we will
use the term "IoT device" to designate the embedded system attached
to the Thing.
Resource-constrained Things, such as sensors, home appliances, and
wearable devices, often have limited storage and processing power,
which can create challenges with respect to reliability, performance,
energy consumption, security, and privacy [Lin]. Some, less-
resource-constrained Things, can generate a voluminous amount of
data. This range of factors led to IoT designs that integrate Things
into larger distributed systems, for example, edge or cloud computing
systems.
2.2. Cloud Computing
Cloud computing has been defined in [NIST]:
| Cloud computing is a model for enabling ubiquitous, convenient,
| on-demand network access to a shared pool of configurable
| computing resources (e.g., networks, servers, storage,
| applications, and services) that can be rapidly provisioned and
| released with minimal management effort or service provider
| interaction.
The low cost and massive availability of storage and processing power
enabled the realization of another computing model in which
virtualized resources can be leased in an on-demand fashion and
provided as general utilities. Platform-as-a-Service (PaaS) and
cloud computing platforms widely adopted this paradigm for delivering
services over the Internet, gaining both economical and technical
benefits [Botta].
At the time of writing, an unprecedented volume and variety of data
is generated by Things, and applications deployed at the network edge
consume this data. In this context, cloud-based service models are
not suitable for some classes of applications that require very short
response times, require access to local personal data, or generate
vast amounts of data. These applications may instead leverage edge
computing.
2.3. Edge Computing
Edge computing, also referred to as "fog computing" in some settings,
is a new paradigm in which substantial computing and storage
resources are placed at the edge of the Internet, close to mobile
devices, sensors, actuators, or machines. Edge computing happens
near data sources [Mahadev] as well as close to where decisions are
made or where interactions with the physical world take place
("close" here can refer to a distance that is topological, physical,
latency-based, etc.). It processes both downstream data (originating
from cloud services) and upstream data (originating from end devices
or network elements). The term "fog computing" usually represents
the notion of multi-tiered edge computing, that is, several layers of
compute infrastructure between end devices and cloud services.
An edge device is any computing or networking resource residing
between end-device data sources and cloud-based data centers. In
edge computing, end devices consume and produce data. At the network
edge, devices not only request services and information from the
cloud but also handle computing tasks including processing, storing,
caching, and load balancing on data sent to and from the cloud [Shi].
This does not preclude end devices from hosting computation
themselves, when possible, independently or as part of a distributed
edge computing platform.
Several Standards Developing Organizations (SDOs) and industry forums
have provided definitions of edge and fog computing:
* ISO defines edge computing as a "form of distributed computing in
which significant processing and data storage takes place on nodes
which are at the edge of the network" [ISO_TR].
* ETSI defines multi-access edge computing as a "system which
provides an IT service environment and cloud-computing
capabilities at the edge of an access network which contains one
or more type of access technology, and in close proximity to its
users" [ETSI_MEC_01].
* The Industry IoT Consortium (IIC) (now incorporating what was
formerly OpenFog) defines fog computing as "a horizontal, system-
level architecture that distributes computing, storage, control
and networking functions closer to the users along a cloud-to-
thing continuum" [OpenFog].
Based on these definitions, we can summarize a general philosophy of
edge computing as distributing the required functions close to users
and data, while the difference to classic local systems is the usage
of management and orchestration features adopted from cloud
computing.
Actors from various industries approach edge computing using
different terms and reference models, although, in practice, these
approaches are not incompatible and may integrate with each other:
* The telecommunication industry tends to use a model where edge
computing services are deployed over a Network Function
Virtualization (NFV) infrastructure, at aggregation points, or in
proximity to the user equipment (e.g., gNodeBs) [ETSI_MEC_03].
* Enterprise and campus solutions often interpret edge computing as
an "edge cloud", that is, a smaller data center directly connected
to the local network (often referred to as "on-premise").
* The automation industry defines the edge as the connection point
between IT and Operational Technology (OT). Hence, edge computing
sometimes refers to applying IT solutions to OT problems, such as
analytics, more-flexible user interfaces, or simply having more
computing power than an automation controller.
2.4. Examples of IoT Edge Computing Use Cases
IoT edge computing can be used in home, industry, grid, healthcare,
city, transportation, agriculture, and/or educational scenarios.
Here, we discuss only a few examples of such use cases to identify
differentiating requirements, providing references to other use
cases.
*Smart Factory*
As part of the Fourth Industrial Revolution, smart factories run
real-time processes based on IT technologies, such as artificial
intelligence and big data. Even a very small environmental change
in a smart factory can lead to a situation in which production
efficiency decreases or product quality problems occur.
Therefore, simple but time-sensitive processing can be performed
at the edge, for example, controlling the temperature and humidity
in the factory or operating machines based on the real-time
collection of the operational status of each machine. However,
data requiring highly precise analysis, such as machine life-cycle
management or accident risk prediction, can be transferred to a
central data center for processing.
The use of edge computing in a smart factory [Argungu] can reduce
the cost of network and storage resources by reducing the
communication load to the central data center or server. It is
also possible to improve process efficiency and facility asset
productivity through real-time prediction of failures and to
reduce the cost of failure through preliminary measures. In the
existing manufacturing field, production facilities are manually
run according to a program entered in advance; however, edge
computing in a smart factory enables tailoring solutions by
analyzing data at each production facility and machine level.
Digital twins [Jones] of IoT devices have been jointly used with
edge computing in industrial IoT scenarios [Chen].
*Smart Grid*
In future smart-city scenarios, the smart grid will be critical in
ensuring highly available and efficient energy control in city-
wide electricity management [Mehmood]. Edge computing is expected
to play a significant role in these systems to improve the
transmission efficiency of electricity, to react to and restore
power after a disturbance, to reduce operation costs, and to reuse
energy effectively since these operations involve local decision-
making. In addition, edge computing can help monitor power
generation and power demand and make local electrical energy
storage decisions in smart grid systems.
*Smart Agriculture*
Smart agriculture integrates information and communication
technologies with farming technology. Intelligent farms use IoT
technology to measure and analyze parameters, such as the
temperature, humidity, sunlight, carbon dioxide, and soil quality,
in crop cultivation facilities. Depending on the analysis
results, control devices are used to set the environmental
parameters to an appropriate state. Remote management is also
possible through mobile devices, such as smartphones.
In existing farms, simple systems, such as management according to
temperature and humidity, can be easily and inexpensively
implemented using IoT technology [Tanveer]. Field sensors gather
data on field and crop condition. This data is then transmitted
to cloud servers that process data and recommend actions. The use
of edge computing can reduce the volume of back-and-forth data
transmissions significantly, resulting in cost and bandwidth
savings. Locally generated data can be processed at the edge, and
local computing and analytics can drive local actions. With edge
computing, it is easy for farmers to select large amounts of data
for processing, and data can be analyzed even in remote areas with
poor access conditions. Other applications include enabling
dashboarding, for example, to visualize the farm status, as well
as enhancing Extended Reality (XR) applications that require edge
audio and/or video processing. As the number of people working on
farming has been decreasing over time, increasing automation
enabled by edge computing can be a driving force for future smart
agriculture [OGrady].
*Smart Construction*
Safety is critical at construction sites. Every year, many
construction workers lose their lives because of falls,
collisions, electric shocks, and other accidents [BigRentz].
Therefore, solutions have been developed to improve construction
site safety, including the real-time identification of workers,
monitoring of equipment location, and predictive accident
prevention. To deploy these solutions, many cameras and IoT
sensors have been installed on construction sites to measure
noise, vibration, gas concentration, etc. Typically, the data
generated from these measurements is collected in on-site gateways
and sent to remote cloud servers for storage and analysis. Thus,
an inspector can check the information stored on the cloud server
to investigate an incident. However, this approach can be
expensive because of transmission costs (for example, of video
streams over a mobile network connection) and because usage fees
of private cloud services.
Using edge computing [Yue], data generated at the construction
site can be processed and analyzed on an edge server located
within or near the site. Only the result of this processing needs
to be transferred to a cloud server, thus reducing transmission
costs. It is also possible to locally generate warnings to
prevent accidents in real time.
*Self-Driving Car*
Edge computing plays a crucial role in safety-focused self-driving
car systems [Badjie]. With a multitude of sensors, such as high-
resolution cameras, radars, Light Detection and Ranging (LiDAR)
systems, sonar sensors, and GPS systems, autonomous vehicles
generate vast amounts of real-time data. Local processing
utilizing edge computing nodes allows for efficient collection and
analysis of this data to monitor vehicle distances and road
conditions and respond promptly to unexpected situations.
Roadside computing nodes can also be leveraged to offload tasks
when necessary, for example, when the local processing capacity of
the car is insufficient because of hardware constraints or a large
data volume.
For instance, when the car ahead slows, a self-driving car adjusts
its speed to maintain a safe distance, or when a roadside signal
changes, it adapts its behavior accordingly. In another example,
cars equipped with self-parking features utilize local processing
to analyze sensor data, determine suitable parking spots, and
execute precise parking maneuvers without relying on external
processing or connectivity. It is also possible to use in-cabin
cameras coupled with local processing to monitor the driver's
attention level and detect signs of drowsiness or distraction.
The system can issue warnings or implement preventive measures to
ensure driver safety.
Edge computing empowers self-driving cars by enabling real-time
processing, reducing latency, enhancing data privacy, and
optimizing bandwidth usage. By leveraging local processing
capabilities, self-driving cars can make rapid decisions, adapt to
changing environments, and ensure safer and more efficient
autonomous driving experiences.
*Digital Twin*
A digital twin can simulate different scenarios and predict
outcomes based on real-time data collected from the physical
environment. This simulation capability empowers proactive
maintenance, optimization of operations, and the prediction of
potential issues or failures. Decision makers can use digital
twins to test and validate different strategies, identify
inefficiencies, and optimize performance [CertMagic].
With edge computing, real-time data is collected, processed, and
analyzed directly at the edge, allowing for the accurate
monitoring and simulation of physical assets. Moreover, edge
computing effectively minimizes latency, enabling rapid responses
to dynamic conditions as computational resources are brought
closer to the physical object. Running digital twin processing at
the edge enables organizations to obtain timely insights and make
informed decisions that maximize efficiency and performance.
*Other Use Cases*
Artificial intelligence (AI) and machine learning (ML) systems at
the edge empower real-time analysis, faster decision-making,
reduced latency, improved operational efficiency, and personalized
experiences across various industries by bringing AI and ML
capabilities closer to edge devices.
In addition, oneM2M has studied several IoT edge computing use
cases, which are documented in [oneM2M-TR0001], [oneM2M-TR0018],
and [oneM2M-TR0026]. The edge-computing-related requirements
raised through the analysis of these use cases are captured in
[oneM2M-TS0002].
3. IoT Challenges Leading toward Edge Computing
This section describes the challenges faced by the IoT that are
motivating the adoption of edge computing. These are distinct from
the research challenges applicable to IoT edge computing, some of
which are mentioned in Section 4.
IoT technology is used with increasingly demanding applications in
domains such as industrial, automotive, and healthcare, which leads
to new challenges. For example, industrial machines, such as laser
cutters, produce over 1 terabyte of data per hour, and similar
amounts can be generated in autonomous cars [NVIDIA]. 90% of IoT
data is expected to be stored, processed, analyzed, and acted upon
close to the source [Kelly], as cloud computing models alone cannot
address these new challenges [Chiang].
Below, we discuss IoT use case requirements that are moving cloud
capabilities to be more proximate, distributed, and disaggregated.
3.1. Time Sensitivity
Often, many industrial control systems, such as manufacturing
systems, smart grids, and oil and gas systems, require stringent end-
to-end latency between the sensor and control nodes. While some IoT
applications may require latency below a few tens of milliseconds
[Weiner], industrial robots and motion control systems have use cases
for cycle times in the order of microseconds [IEC_IEEE_60802]. In
some cases, speed-of-light limitations may simply prevent cloud-based
solutions; however, this is not the only challenge relative to time
sensitivity. Guarantees for bounded latency and jitter ([RFC8578],
Section 7) are also important for industrial IoT applications. This
means that control packets must arrive with as little variation as
possible and within a strict deadline. Given the best-effort
characteristics of the Internet, this challenge is virtually
impossible to address without using end-to-end guarantees for
individual message delivery and continuous data flows.
3.2. Connectivity Cost
Some IoT deployments may not face bandwidth constraints when
uploading data to the cloud. Theoretically, both 5G and Wi-Fi 6
networks top out at 10 gigabits per second (i.e., 4.5 terabytes per
hour), allowing the transfer of large amounts of uplink data.
However, the cost of maintaining continuous high-bandwidth
connectivity for such usage is unjustifiable and impractical for most
IoT applications. In some settings, for example, in aeronautical
communication, higher communication costs reduce the amount of data
that can be practically uploaded even further. Therefore, minimizing
reliance on high-bandwidth connectivity is a requirement; this can be
done, for example, by processing data at the edge and deriving
summarized or actionable insights that can be transmitted to the
cloud.
3.3. Resilience to Intermittent Services
Many IoT devices, such as sensors, actuators, and controllers, have
very limited hardware resources and cannot rely solely on their own
resources to meet their computing and/or storage needs. They require
reliable, uninterrupted, or resilient services to augment their
capabilities to fulfill their application tasks. This is difficult
and partly impossible to achieve using cloud services for systems
such as vehicles, drones, or oil rigs that have intermittent network
connectivity. Conversely, a cloud backend might want to access
device data even if the device is currently asleep.
3.4. Privacy and Security
When IoT services are deployed at home, personal information can be
learned from detected usage data. For example, one can extract
information about employment, family status, age, and income by
analyzing smart meter data [ENERGY]. Policy makers have begun to
provide frameworks that limit the usage of personal data and impose
strict requirements on data controllers and processors. Data stored
indefinitely in the cloud also increases the risk of data leakage,
for instance, through attacks on rich targets.
It is often argued that industrial systems do not provide privacy
implications, as no personal data is gathered. However, data from
such systems is often highly sensitive, as one might be able to infer
trade secrets, such as the setup of production lines. Hence, owners
of these systems are generally reluctant to upload IoT data to the
cloud.
Furthermore, passive observers can perform traffic analysis on
device-to-cloud paths. Therefore, hiding traffic patterns associated
with sensor networks can be another requirement for edge computing.
4. IoT Edge Computing Functions
We first look at the current state of IoT edge computing
(Section 4.1) and then define a general system model (Section 4.2).
This provides a context for IoT edge computing functions, which are
listed in Sections 4.3, 4.4, and 4.5.
4.1. Overview of IoT Edge Computing
This section provides an overview of the current (at the time of
writing) IoT edge computing field based on a limited review of
standards, research, and open-source and proprietary products in
[EDGE-COMPUTING-BACKGROUND].
IoT gateways, both open-source (such as EdgeX Foundry or Home Edge)
and proprietary products, represent a common class of IoT edge
computing products, where the gateway provides a local service on
customer premises and is remotely managed through a cloud service.
IoT communication protocols are typically used between IoT devices
and the gateway, including a Constrained Application Protocol (CoAP)
[RFC7252], Message Queuing Telemetry Transport (MQTT) [MQTT5], and
many specialized IoT protocols (such as Open Platform Communications
Unified Architecture (OPC UA) and Data Distribution Service (DDS) in
the industrial IoT space), while the gateway communicates with the
distant cloud typically using HTTPS. Virtualization platforms enable
the deployment of virtual edge computing functions (using Virtual
Machines (VMs) and application containers), including IoT gateway
software, on servers in the mobile network infrastructure (at base
stations and concentration points), edge data centers (in central
offices), and regional data centers located near central offices.
End devices are envisioned to become computing devices in forward-
looking projects but are not commonly used at the time of writing.
In addition to open-source and proprietary solutions, a horizontal
IoT service layer is standardized by the oneM2M standards body to
reduce fragmentation, increase interoperability, and promote reuse in
the IoT ecosystem. Furthermore, ETSI Multi-access Edge Computing
(MEC) developed an IoT API [ETSI_MEC_33] that enables the deployment
of heterogeneous IoT platforms and provides a means to configure the
various components of an IoT system.
Physical or virtual IoT gateways can host application programs that
are typically built using an SDK to access local services through a
programmatic API. Edge cloud system operators host their customers'
application VMs or containers on servers located in or near access
networks that can implement local edge services. For example, mobile
networks can provide edge services for radio network information,
location, and bandwidth management.
Resilience in the IoT can entail the ability to operate autonomously
in periods of disconnectedness to preserve the integrity and safety
of the controlled system, possibly in a degraded mode. IoT devices
and gateways are often expected to operate in always-on and
unattended modes, using fault detection and unassisted recovery
functions.
The life-cycle management of services and applications on physical
IoT gateways is generally cloud based. Edge cloud management
platforms and products (such as StarlingX, Akraino Edge Stack, or
proprietary products from major cloud providers) adapt cloud
management technologies (e.g., Kubernetes) to the edge cloud, that
is, to smaller, distributed computing devices running outside a
controlled data center. Typically, the service and application life
cycle is using an NFV-like management and orchestration model.
The platform generally enables advertising or consuming services
hosted on the platform (e.g., the Mp1 interface in ETSI MEC supports
service discovery and communication), and enables communication with
local and remote endpoints (e.g., message routing function in IoT
gateways). The platform is usually extensible to edge applications
because it can advertise a service that other edge applications can
consume. The IoT communication services include protocol
translation, analytics, and transcoding. Communication between edge
computing devices is enabled in tiered or distributed deployments.
An edge cloud platform may enable pass-through without storage or
local storage (e.g., on IoT gateways). Some edge cloud platforms use
distributed storage such as that provided by a distributed storage
platform (e.g., EdgeFS and Ceph) or, in more experimental settings,
by an Information-Centric Networking (ICN) network, for example,
systems such as Chipmunk [Chipmunk] and Kua [Kua] have been proposed
as distributed information-centric objects stores. External storage,
for example, on databases in a distant or local IT cloud, is
typically used for filtered data deemed worthy of long-term storage;
although, in some cases, it may be for all data, for example, when
required for regulatory reasons.
Stateful computing is the default on most systems, VMs, and
containers. Stateless computing is supported on platforms providing
a "serverless computing" service (also known as function-as-
a-service, e.g., using stateless containers) or on systems based on
named function networking.
In many IoT use cases, a typical network usage pattern is a high-
volume uplink with some form of traffic reduction enabled by
processing over edge computing devices. Alternatives to traffic
reduction include deferred transmission (to off-peak hours or using
physical shipping). Downlink traffic includes application control
and software updates. Downlink-heavy traffic patterns are not
excluded but are more often associated with non-IoT usage (e.g.,
video Content Delivery Networks (CDNs)).
4.2. General Model
Edge computing is expected to play an important role in deploying new
IoT services integrated with big data and AI enabled by flexible in-
network computing platforms. Although there are many approaches to
edge computing, this section lays out an attempt at a general model
and lists associated logical functions. In practice, this model can
be mapped to different architectures, such as:
* A single IoT gateway, or a hierarchy of IoT gateways, typically
connected to the cloud (e.g., to extend the centralized cloud-
based management of IoT devices and data to the edge). The IoT
gateway plays a common role in providing access to a heterogeneous
set of IoT devices and sensors, handling IoT data, and delivering
IoT data to its final destination in a cloud network. An IoT
gateway requires interactions with the cloud; however, it can also
operate independently in a disconnected mode.
* A set of distributed computing nodes, for example, embedded in
switches, routers, edge cloud servers, or mobile devices. Some
IoT devices have sufficient computing capabilities to participate
in such distributed systems owing to advances in hardware
technology. In this model, edge computing nodes can collaborate
to share resources.
* A hybrid system involving both IoT gateways and supporting
functions in distributed computing nodes.
In the general model described in Figure 1, the edge computing domain
is interconnected with IoT devices (southbound connectivity),
possibly with a remote (e.g., cloud) network (northbound
connectivity), and with a service operator's system. Edge computing
nodes provide multiple logical functions or components that may not
be present in a given system. They may be implemented in a
centralized or distributed fashion, at the network edge, or through
interworking between the edge network and remote cloud networks.
+---------------------+
| Remote Network | +---------------+
|(e.g., cloud network)| | Service |
+-----------+---------+ | Operator |
| +------+--------+
| |
+--------------+-------------------+-----------+
| Edge Computing Domain |
| |
| One or more computing nodes |
| (IoT gateway, end devices, switches, |
| routers, mini/micro-data centers, etc.) |
| |
| OAM Components |
| - Resource Discovery and Authentication |
| - Edge Organization and Federation |
| - Multi-Tenancy and Isolation |
| - ... |
| |
| Functional Components |
| - In-Network Computation |
| - Edge Caching |
| - Communication |
| - Other Services |
| - ... |
| |
| Application Components |
| - IoT Devices Management |
| - Data Management and Analytics |
| - ... |
| |
+------+--------------+-------- - - - -+- - - -+
| | | | |
| | +-----+--+
+----+---+ +-----+--+ | |Compute | |
| End | | End | ... |Node/End|
|Device 1| |Device 2| ...| |Device n| |
+--------+ +--------+ +--------+
+ - - - - - - - -+
Figure 1: Model of IoT Edge Computing
In the distributed model described in Figure 2, the edge computing
domain is composed of IoT edge gateways and IoT devices that are also
used as computing nodes. Edge computing domains are connected to a
remote (e.g., cloud) network and their respective service operator's
system. The computing nodes provide logical functions, for example,
as part of distributed machine learning or distributed image
processing applications. The processing capabilities in IoT devices
are limited; they require the support of other nodes. In a
distributed machine learning application, the training process for AI
services can be executed at IoT edge gateways or cloud networks, and
the prediction (inference) service is executed in the IoT devices.
Similarly, in a distributed image processing application, some image
processing functions can be executed at the edge or in the cloud. To
limit the amount of data to be uploaded to central cloud functions,
IoT edge devices may pre-process data.
+----------------------------------------------+
| Edge Computing Domain |
| |
| +--------+ +--------+ +--------+ |
| |Compute | |Compute | |Compute | |
| |Node/End| |Node/End| .... |Node/End| |
| |Device 1| |Device 2| .... |Device m| |
| +----+---+ +----+---+ +----+---+ |
| | | | |
| +---+-------------+-----------------+--+ |
| | IoT Edge Gateway | |
| +-----------+-------------------+------+ |
| | | |
+--------------+-------------------+-----------+
| |
+-----------+---------+ +------+-------+
| Remote Network | | Service |
|(e.g., cloud network)| | Operator(s) |
+-----------+---------+ +------+-------+
| |
+--------------+-------------------+-----------+
| | | |
| +-----------+-------------------+------+ |
| | IoT Edge Gateway | |
| +---+-------------+-----------------+--+ |
| | | | |
| +----+---+ +----+---+ +----+---+ |
| |Compute | |Compute | |Compute | |
| |Node/End| |Node/End| .... |Node/End| |
| |Device 1| |Device 2| .... |Device n| |
| +--------+ +--------+ +--------+ |
| |
| Edge Computing Domain |
+----------------------------------------------+
Figure 2: Example of Machine Learning over a Distributed IoT Edge
Computing System
In the following, we enumerate major edge computing domain
components. Here, they are loosely organized into Operations,
Administration, and Maintenance (OAM); functional; and application
components, with the understanding that the distinction between these
classes may not always be clear, depending on actual system
architectures. Some representative research challenges are
associated with those functions. We used input from coauthors,
participants of T2TRG meetings, and some comprehensive reviews of the
field ([Yousefpour], [Zhang2], and [Khan]).
4.3. OAM Components
Edge computing OAM extends beyond the network-related OAM functions
listed in [RFC6291]. In addition to infrastructure (network,
storage, and computing resources), edge computing systems can also
include computing environments (for VMs, software containers, and
functions), IoT devices, data, and code.
Operation-related functions include performance monitoring for
Service Level Agreement (SLA) measurements, fault management, and
provisioning for links, nodes, compute and storage resources,
platforms, and services. Administration covers network/compute/
storage resources, platform and service discovery, configuration, and
planning. Discovery during normal operation (e.g., discovery of
compute or storage nodes by endpoints) is typically not included in
OAM; however, in this document, we do not address it separately.
Management covers the monitoring and diagnostics of failures, as well
as means to minimize their occurrence and take corrective actions.
This may include software update management and high service
availability through redundancy and multipath communication.
Centralized (e.g., Software-Defined Networking (SDN)) and
decentralized management systems can be used. Finally, we
arbitrarily chose to address data management as an application
component; however, in some systems, data management may be
considered similar to a network management function.
We further detail a few relevant OAM components.
4.3.1. Resource Discovery and Authentication
Discovery and authentication may target platforms and infrastructure
resources, such as computing, networking, and storage, as well as
other resources, such as IoT devices, sensors, data, code units,
services, applications, and users interacting with the system. In a
broker-based system, an IoT gateway can act as a broker to discover
IoT resources. More decentralized solutions can also be used in
replacement of or in complement to the broker-based solutions; for
example, CoAP enables multicast discovery of an IoT device and CoAP
service discovery enables one to obtain a list of resources made
available by this device [RFC7252]. For device authentication,
current centralized gateway-based systems rely on the installation of
a secret on IoT devices and computing devices (e.g., a device
certificate stored in a hardware security module or a combination of
code and data stored in a trusted execution environment).
Related challenges include:
* Discovery, authentication, and trust establishment between IoT
devices, compute nodes, and platforms, with regard to concerns
such as mobility, heterogeneous devices and networks, scale,
multiple trust domains, constrained devices, anonymity, and
traceability.
* Intermittent connectivity to the Internet, removing the need to
rely on a third-party authority [Echeverria].
* Resiliency to failure [Harchol], denial-of-service attacks, and
easier physical access for attackers.
4.3.2. Edge Organization and Federation
In a distributed system context, once edge devices have discovered
and authenticated each other, they can be organized or self-organized
into hierarchies or clusters. The organizational structure may range
from centralized to peer-to-peer, or it may be closely tied to other
systems. Such groups can also form federations with other edges or
with remote clouds.
Related challenges include:
* Support for scaling and enabling fault tolerance or self-healing
[Jeong]. In addition to using a hierarchical organization to cope
with scaling, another available and possibly complementary
mechanism is multicast [RFC7390] [CORE-GROUPCOMM-BIS]. Other
approaches include relying on blockchains [Ali].
* Integration of edge computing with virtualized Radio Access
Networks (Fog RAN) [SFC-FOG-RAN] and 5G access networks.
* Sharing resources in multi-vendor and multi-operator scenarios to
optimize criteria such as profit [Anglano], resource usage,
latency, and energy consumption.
* Capacity planning, placement of infrastructure nodes to minimize
delay [Fan], cost, energy, etc.
* Incentives for participation, for example, in peer-to-peer
federation schemes.
* Design of federated AI over IoT edge computing systems [Brecko],
for example, for anomaly detection.
4.3.3. Multi-Tenancy and Isolation
Some IoT edge computing systems make use of virtualized (compute,
storage, and networking) resources to address the need for secure
multi-tenancy at the edge. This leads to "edge clouds" that share
properties with remote clouds and can reuse some of their ecosystems.
Virtualization function management is largely covered by ETSI NFV and
MEC standards and recommendations. Projects such as [LFEDGE-EVE]
further cover virtualization and its management in distributed edge
computing settings.
Related challenges include:
* Adapting cloud management platforms to the edge to account for its
distributed nature, heterogeneity, need for customization, and
limited resources (for example, using Conflict-free Replicated
Data Types (CRDTs) [Jeffery] or intent-based management mechanisms
[Cao]).
* Minimizing virtual function instantiation time and resource usage.
4.4. Functional Components
4.4.1. In-Network Computation
A core function of IoT edge computing is to enable local computation
on a node at the network edge, typically for application-layer
processing, such as processing input data from sensors, making local
decisions, preprocessing data, and offloading computation on behalf
of a device, service, or user. Related functions include
orchestrating computation (in a centralized or distributed manner)
and managing application life cycles. Support for in-network
computation may vary in terms of capability; for example, computing
nodes can host virtual machines, software containers, software
actors, unikernels running stateful or stateless code, or a rule
engine providing an API to register actions in response to conditions
(such as an IoT device ID, sensor values to check, thresholds, etc.).
Edge offloading includes offloading to and from an IoT device and to
and from a network node. [Cloudlets] describes an example of
offloading computation from an end device to a network node. In
contrast, oneM2M is an example of a system that allows a cloud-based
IoT platform to transfer resources and tasks to a target edge node
[oneM2M-TR0052]. Once transferred, the edge node can directly
support IoT devices that it serves with the service offloaded by the
cloud (e.g., group management, location management, etc.).
QoS can be provided in some systems through the combination of
network QoS (e.g., traffic engineering or wireless resource
scheduling) and compute and storage resource allocations. For
example, in some systems, a bandwidth manager service can be exposed
to enable allocation of the bandwidth to or from an edge computing
application instance.
In-network computation can leverage the underlying services provided
using data generated by IoT devices and access networks. Such
services include IoT device location, radio network information,
bandwidth management, and congestion management (e.g., the congestion
management feature of oneM2M [oneM2M-TR0052]).
Related challenges include:
* Computation placement: in a centralized or distributed (e.g.,
peer-to-peer) manner, selecting an appropriate compute device.
The selection is based on available resources, location of data
input and data sinks, compute node properties, etc. with varying
goals. These goals include end-to-end latency, privacy, high
availability, energy conservation, or network efficiency (for
example, using load-balancing techniques to avoid congestion).
* Onboarding code on a platform or computing device and invoking
remote code execution, possibly as part of a distributed
programming model and with respect to similar concerns of latency,
privacy, etc. For example, offloading can be included in a
vehicular scenario [Grewe]. These operations should deal with
heterogeneous compute nodes [Schafer] and may also support end
devices, including IoT devices, as compute nodes [Larrea].
* Adapting Quality of Results (QoR) for applications where a perfect
result is not necessary [Li].
* Assisted or automatic partitioning of code. For example, for
application programs [COIN-APPCENTRES] or network programs
[REQS-P4COMP].
* Supporting computation across trust domains. For example,
verifying computation results.
* Supporting computation mobility: relocating an instance from one
compute node to another while maintaining a given service level;
session continuity when communicating with end devices that are
mobile, possibly at high speed (e.g., in vehicular scenarios);
defining lightweight execution environments for secure code
mobility, for example, using WebAssembly [Nieke].
* Defining, managing, and verifying SLAs for edge computing systems;
pricing is a challenging task.
4.4.2. Edge Storage and Caching
Local storage or caching enables local data processing (e.g.,
preprocessing or analysis) as well as delayed data transfer to the
cloud or delayed physical shipping. An edge node may offer local
data storage (in which persistence is subject to retention policies),
caching, or both. Generally, "caching" refers to temporary storage
to improve performance without persistence guarantees. An edge-
caching component manages data persistence; for example, it schedules
the removal of data when it is no longer needed. Other related
aspects include the authentication and encryption of data. Edge
storage and caching can take the form of a distributed storage
system.
Related challenges include:
* Cache and data placement: using cache positioning and data
placement strategies to minimize data retrieval delay [Liu] and
energy consumption. Caches may be positioned in the access-
network infrastructure or on end devices.
* Maintaining consistency, freshness, reliability, and privacy of
data stored or cached in systems that are distributed,
constrained, and dynamic (e.g., due to node mobility, energy-
saving regimes, and disruptions) and which can have additional
data governance constraints on data storage location. For
example, [Mortazavi] describes leveraging a hierarchical storage
organization. Freshness-related metrics include the age of
information [Yates] that captures the timeliness of information
received from a sender (e.g., an IoT device).
4.4.3. Communication
An edge cloud may provide a northbound data plane or management plane
interface to a remote network, such as a cloud, home, or enterprise
network. This interface does not exist in stand-alone (local-only)
scenarios. To support such an interface when it exists, an edge
computing component needs to expose an API, deal with authentication
and authorization, and support secure communication.
An edge cloud may provide an API or interface to local or mobile
users, for example, to provide access to services and applications or
to manage data published by local or mobile devices.
Edge computing nodes communicate with IoT devices over a southbound
interface, typically for data acquisition and IoT device management.
Communication brokering is a typical function of IoT edge computing
that facilitates communication with IoT devices, enables clients to
register as recipients for data from devices, forwards traffic to or
from IoT devices, enables various data discovery and redistribution
patterns (for example, north-south with clouds and east-west with
other edge devices [EDGE-DATA-DISCOVERY-OVERVIEW]). Another related
aspect is dispatching alerts and notifications to interested
consumers both inside and outside the edge computing domain.
Protocol translation, analytics, and video transcoding can also be
performed when necessary. Communication brokering may be centralized
in some systems, for example, using a hub-and-spoke message broker or
distributed with message buses, possibly in a layered bus approach.
Distributed systems can leverage direct communication between end
devices over device-to-device links. A broker can ensure
communication reliability and traceability and, in some cases,
transaction management.
Related challenges include:
* Defining edge computing abstractions, such as PaaS [Yangui],
suitable for users and cloud systems to interact with edge
computing systems and dealing with interoperability issues, such
as data-model heterogeneity.
* Enabling secure and resilient communication between IoT devices
and a remote cloud, for example, through multipath support.
4.5. Application Components
IoT edge computing can host applications, such as those mentioned in
Section 2.4. While describing the components of individual
applications is out of our scope, some of those applications share
similar functions, such as IoT device management and data management,
as described below.
4.5.1. IoT Device Management
IoT device management includes managing information regarding IoT
devices, including their sensors and how to communicate with them.
Edge computing addresses the scalability challenges of a large number
of IoT devices by separating the scalability domain into local (e.g.,
edge) networks and remote networks. For example, in the context of
the oneM2M standard, a device management functionality (called
"software campaign" in oneM2M) enables the installation, deletion,
activation, and deactivation of software functions and services on a
potentially large number of edge nodes [oneM2M-TR0052]. Using a
dashboard or management software, a service provider issues these
requests through an IoT cloud platform supporting the software
campaign functionality.
The challenges listed in Section 4.3.1 may be applicable to IoT
device management as well.
4.5.2. Data Management and Analytics
Data storage and processing at the edge are major aspects of IoT edge
computing, directly addressing the high-level IoT challenges listed
in Section 3. Data analysis, for example, through AI/ML tasks
performed at the edge, may benefit from specialized hardware support
on the computing nodes.
Related challenges include:
* Addressing concerns regarding resource usage, security, and
privacy when sharing, processing, discovering, or managing data:
for example, presenting data in views composed of an aggregation
of related data [Zhang], protecting data communication between
authenticated peers [Basudan], classifying data (e.g., in terms of
privacy, importance, and validity), and compressing and encrypting
data, for example, using homomorphic encryption to directly
process encrypted data [Stanciu].
* Other concerns regarding edge data discovery (e.g., streaming
data, metadata, and events) include siloization and lack of
standards in edge environments that can be dynamic (e.g.,
vehicular networks) and heterogeneous
[EDGE-DATA-DISCOVERY-OVERVIEW].
* Data-driven programming models [Renart], for example, those that
are event based, including handling naming and data abstractions.
* Data integration in an environment without data standardization or
where different sources use different ontologies
[Farnbauer-Schmidt].
* Addressing concerns such as limited resources, privacy, and
dynamic and heterogeneous environments to deploy machine learning
at the edge: for example, making machine learning more lightweight
and distributed (e.g., enabling distributed inference at the
edge), supporting shorter training times and simplified models,
and supporting models that can be compressed for efficient
communication [Murshed].
* Although edge computing can support IoT services independently of
cloud computing, it can also be connected to cloud computing.
Thus, the relationship between IoT edge computing and cloud
computing, with regard to data management, is another potential
challenge [ISO_TR].
4.6. Simulation and Emulation Environments
IoT edge computing introduces new challenges to the simulation and
emulation tools used by researchers and developers. A varied set of
applications, networks, and computing technologies can coexist in a
distributed system, making modeling difficult. Scale, mobility, and
resource management are additional challenges [SimulatingFog].
Tools include simulators, where simplified application logic runs on
top of a fog network model, and emulators, where actual applications
can be deployed, typically in software containers, over a cloud
infrastructure (e.g., Docker and Kubernetes) running over a network
emulating network edge conditions, such as variable delays,
throughput, and mobility events. To gain in scale, emulated and
simulated systems can be used together in hybrid federation-based
approaches [PseudoDynamicTesting]; whereas to gain in realism,
physical devices can be interconnected with emulated systems.
Examples of related work and platforms include the publicly
accessible MEC sandbox work recently initiated in ETSI [ETSI_Sandbox]
and open-source simulators and emulators ([AdvantEDGE] emulator and
tools cited in [SimulatingFog]). EdgeNet [Senel] is a globally
distributed edge cloud for Internet researchers, which uses nodes
contributed by institutions and which is based on Docker for
containerization and Kubernetes for deployment and node management.
Digital twins are virtual instances of a physical system (twin) that
are continually updated with the latter's performance, maintenance,
and health status data throughout the life cycle of the physical
system [Madni]. In contrast to an emulation or simulated
environment, digital twins, once generated, are maintained in sync by
their physical twin, which can be, among many other instances, an IoT
device, edge device, or an edge network. The benefits of digital
twins go beyond those of emulation and include accelerated business
processes, enhanced productivity, and faster innovation with reduced
costs [NETWORK-DIGITAL-TWIN-ARCH].
5. Security Considerations
Privacy and security are drivers of the adoption of edge computing
for the IoT (Section 3.4). As discussed in Section 4.3.1,
authentication and trust (among computing nodes, management nodes,
and end devices) can be challenging as scale, mobility, and
heterogeneity increase. The sometimes disconnected nature of edge
resources can avoid reliance on third-party authorities. Distributed
edge computing is exposed to reliability and denial-of-service
attacks. A personal or proprietary IoT data leakage is also a major
threat, particularly because of the distributed nature of the systems
(Section 4.5.2). Furthermore, blockchain-based distributed IoT edge
computing must be designed for privacy, since public blockchain
addressing does not guarantee absolute anonymity [Ali].
However, edge computing also offers solutions in the security space:
maintaining privacy by computing sensitive data closer to data
generators is a major use case for IoT edge computing. An edge cloud
can be used to perform actions based on sensitive data or to
anonymize or aggregate data prior to transmission to a remote cloud
server. Edge computing communication brokering functions can also be
used to secure communication between edge and cloud networks.
6. Conclusion
IoT edge computing plays an essential role, complementary to the
cloud, in enabling IoT systems in certain situations. In this
document, we presented use cases and listed the core challenges faced
by the IoT that drive the need for IoT edge computing. Therefore,
the first part of this document may help focus future research
efforts on the aspects of IoT edge computing where it is most useful.
The second part of this document presents a general system model and
structured overview of the associated research challenges and related
work. The structure, based on the system model, is not meant to be
restrictive and exists for the purpose of having a link between
individual research areas and where they are applicable in an IoT
edge computing system.
7. IANA Considerations
This document has no IANA actions.
8. Informative References
[AdvantEDGE]
"AdvantEDGE, Mobile Edge Emulation Platform", commit
8f6edbe, May 2023,
<https://github.com/InterDigitalInc/AdvantEDGE>.
[Ali] Ali, M., Vecchio, M., and F. Antonelli, "Enabling a
Blockchain-Based IoT Edge", IEEE Internet of Things
Magazine, vol. 1, no.2, pp. 24-29,
DOI 10.1109/IOTM.2019.1800024, December 2018,
<https://doi.org/10.1109/IOTM.2019.1800024>.
[Anglano] Anglano, C., Canonico, M., Castagno, P., Guazzone, M., and
M. Sereno, "A game-theoretic approach to coalition
formation in fog provider federations", 2018 Third
International Conference on Fog and Mobile Edge Computing
(FMEC), DOI 10.1109/fmec.2018.8364054, April 2018,
<https://doi.org/10.1109/fmec.2018.8364054>.
[Argungu] Argungu, J., Idina, M., Chalawa, U., Ummar, M., Bello, S.,
Arzika, I., and B. Mala, "A Survey of Edge Computing
Approaches in Smart Factory", International Journal of
Advanced Research in Computer and Communication
Engineering, Vol. 12, Issue 9, September 2023.
[Ashton] Ashton, K., "That 'Internet of Things' Thing", RFID
Journal, vol. 22, no. 7, pp. 97-114, June 2009,
<http://www.itrco.jp/libraries/RFIDjournal-
That%20Internet%20of%20Things%20Thing.pdf>.
[Badjie] Badjie, B., "The Future of Autonomous Driving Systems with
Edge Computing", September 2023,
<https://medium.com/@bakarykumba1996/the-future-of-
autonomous-driving-systems-with-edge-computing-
8c919597c4ee>.
[Basudan] Basudan, S., Lin, X., and K. Sankaranarayanan, "A Privacy-
Preserving Vehicular Crowdsensing-Based Road Surface
Condition Monitoring System Using Fog Computing", IEEE
Internet of Things Journal, vol. 4, no. 3, pp. 772-782,
DOI 10.1109/jiot.2017.2666783, June 2017,
<https://doi.org/10.1109/jiot.2017.2666783>.
[BigRentz] BigRentz, "41 Construction Safety Statistics for 2024",
February 2024, <https://www.bigrentz.com/blog/
construction-safety-statistics>.
[Botta] Botta, A., de Donato, W., Persico, V., and A. Pescapé,
"Integration of Cloud computing and Internet of Things: A
survey", Future Generation Computer Systems, vol. 56, pp.
684-700, DOI 10.1016/j.future.2015.09.021, March 2016,
<https://doi.org/10.1016/j.future.2015.09.021>.
[Brecko] Brecko, A., Kajáti, E., Koziorek, J., and I. Zolotová,
"Federated Learning for Edge Computing: A Survey", Applied
Sciences 12(18):9124, DOI 10.3390/app12189124, September
2022, <https://doi.org/10.3390/app12189124>.
[Cao] Cao, L., Merican, A., Tootaghaj, D., Ahmed, F., Sharma,
P., and V. Saxena, "eCaaS: A Management Framework of Edge
Container as a Service for Business Workload", Proceedings
of the 4th International Workshop on Edge Systems,
Analytics and Networking, DOI 10.1145/3434770.3459741,
April 2021, <https://doi.org/10.1145/3434770.3459741>.
[CertMagic]
CertMagic, "Digital Twin Technology: Simulating Real-World
Scenarios for Enhanced Decision Making", May 2023,
<https://certmagic.medium.com/digital-twin-technology-
simulating-real-world-scenarios-for-enhanced-decision-
making-8844c51e856d>.
[Chen] Chen, B., Wan, J., Celesti, A., Li, D., Abbas, H., and Q.
Zhang, "Edge Computing in IoT-Based Manufacturing", IEEE
Communications Magazine, vol. 56, no. 9, pp. 103-109,
DOI 10.1109/mcom.2018.1701231, September 2018,
<https://doi.org/10.1109/mcom.2018.1701231>.
[Chiang] Chiang, M. and T. Zhang, "Fog and IoT: An Overview of
Research Opportunities", IEEE Internet of Things Journal,
vol. 3, no. 6, pp. 854-864, DOI 10.1109/jiot.2016.2584538,
December 2016,
<https://doi.org/10.1109/jiot.2016.2584538>.
[Chipmunk] Shin, Y., Park, S., Ko, N., and A. Jeong, "Chipmunk:
Distributed Object Storage for NDN", Proceedings of the
7th ACM Conference on Information-Centric Networking, ACM,
DOI 10.1145/3405656.3420231, September 2020,
<https://doi.org/10.1145/3405656.3420231>.
[Cloudlets]
Satyanarayanan, M., Bahl, P., Caceres, R., and N. Davies,
"The Case for VM-Based Cloudlets in Mobile Computing",
IEEE Pervasive Computing, vol. 8, no. 4, pp. 14-23,
DOI 10.1109/mprv.2009.82, October 2009,
<https://doi.org/10.1109/mprv.2009.82>.
[COIN-APPCENTRES]
Trossen, D., Sarathchandra, C., and M. Boniface, "In-
Network Computing for App-Centric Micro-Services", Work in
Progress, Internet-Draft, draft-sarathchandra-coin-
appcentres-04, 26 January 2021,
<https://datatracker.ietf.org/doc/html/draft-
sarathchandra-coin-appcentres-04>.
[CORE-GROUPCOMM-BIS]
Dijk, E., Wang, C., and M. Tiloca, "Group Communication
for the Constrained Application Protocol (CoAP)", Work in
Progress, Internet-Draft, draft-ietf-core-groupcomm-bis-
10, 23 October 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-core-
groupcomm-bis-10>.
[Echeverria]
Echeverría, S., Klinedinst, D., Williams, K., and G.
Lewis, "Establishing Trusted Identities in Disconnected
Edge Environments", 2016 IEEE/ACM Symposium on Edge
Computing (SEC), DOI 10.1109/sec.2016.27, October 2016,
<https://doi.org/10.1109/sec.2016.27>.
[EDGE-COMPUTING-BACKGROUND]
de Foy, X., Hong, J., Hong, Y., Kovatsch, M., Schooler,
E., and D. Kutscher, "IoT Edge Computing: Initiatives,
Projects and Products", Work in Progress, Internet-Draft,
draft-defoy-t2trg-iot-edge-computing-background-00, 25 May
2020, <https://datatracker.ietf.org/doc/html/draft-defoy-
t2trg-iot-edge-computing-background-00>.
[EDGE-DATA-DISCOVERY-OVERVIEW]
McBride, M., Kutscher, D., Schooler, E., Bernardos, C. J.,
Lopez, D., and X. de Foy, "Edge Data Discovery for COIN",
Work in Progress, Internet-Draft, draft-mcbride-edge-data-
discovery-overview-05, 1 November 2020,
<https://datatracker.ietf.org/doc/html/draft-mcbride-edge-
data-discovery-overview-05>.
[ENERGY] Beckel, C., Sadamori, L., Staake, T., and S. Santini,
"Revealing household characteristics from smart meter
data", Energy, vol. 78, pp. 397-410,
DOI 10.1016/j.energy.2014.10.025, December 2014,
<https://doi.org/10.1016/j.energy.2014.10.025>.
[ETSI_MEC_01]
ETSI, "Multi-access Edge Computing (MEC); Terminology",
V2.1.1, ETSI GS MEC 001, January 2019,
<https://www.etsi.org/deliver/etsi_gs/
MEC/001_099/001/02.01.01_60/gs_MEC001v020101p.pdf>.
[ETSI_MEC_03]
ETSI, "Multi-access Edge Computing (MEC); Framework and
Reference Architecture", V2.1.1, ETSI GS MEC 003, January
2019, <https://www.etsi.org/deliver/etsi_gs/
MEC/001_099/003/02.01.01_60/gs_MEC003v020101p.pdf>.
[ETSI_MEC_33]
ETSI, "Multi-access Edge Computing (MEC); IoT API",
V3.1.1, ETSI GS MEC 033, December 2022,
<https://www.etsi.org/deliver/etsi_gs/
MEC/001_099/033/03.01.01_60/gs_MEC033v030101p.pdf>.
[ETSI_Sandbox]
ETSI, "Multi-access Edge Computing (MEC) MEC Sandbox",
Portal, September 2023,
<https://portal.etsi.org/webapp/WorkProgram/
Report_WorkItem.asp?WKI_ID=57671>.
[Fan] Fan, Q. and N. Ansari, "Cost Aware cloudlet Placement for
big data processing at the edge", 2017 IEEE International
Conference on Communications (ICC),
DOI 10.1109/icc.2017.7996722, May 2017,
<https://doi.org/10.1109/icc.2017.7996722>.
[Farnbauer-Schmidt]
Farnbauer-Schmidt, M., Lindner, J., Kaffenberger, C., and
J. Albrecht, "Combining the Concepts of Semantic Data
Integration and Edge Computing", INFORMATIK 2019: 50 Jahre
Gesellschaft für Informatik - Informatik für Gesellschaf,
pp. 139-152, DOI 10.18420/inf2019_19, September 2019,
<https://doi.org/10.18420/inf2019_19>.
[Grewe] Grewe, D., Wagner, M., Arumaithurai, M., Psaras, I., and
D. Kutscher, "Information-Centric Mobile Edge Computing
for Connected Vehicle Environments: Challenges and
Research Directions", Proceedings of the Workshop on
Mobile Edge Communications, pp. 7-12,
DOI 10.1145/3098208.3098210, August 2017,
<https://doi.org/10.1145/3098208.3098210>.
[Harchol] Harchol, Y., Mushtaq, A., McCauley, J., Panda, A., and S.
Shenker, "CESSNA: Resilient Edge-Computing", Proceedings
of the 2018 Workshop on Mobile Edge Communications,
DOI 10.1145/3229556.3229558, August 2018,
<https://doi.org/10.1145/3229556.3229558>.
[IEC_IEEE_60802]
IEC/IEEE, "Use Cases IEC/IEEE 60802", V1.3, IEC/
IEEE 60802, September 2018,
<https://grouper.ieee.org/groups/802/1/files/public/
docs2018/60802-industrial-use-cases-0918-v13.pdf>.
[ISO_TR] "Internet of things (IoT) - Edge computing", ISO/IEC TR
30164:2020, April 2020,
<https://www.iso.org/standard/53284.html>.
[Jeffery] Jeffery, A., Howard, H., and R. Mortier, "Rearchitecting
Kubernetes for the Edge", Proceedings of the 4th
International Workshop on Edge Systems, Analytics and
Networking, DOI 10.1145/3434770.3459730, April 2021,
<https://doi.org/10.1145/3434770.3459730>.
[Jeong] Jeong, T., Chung, J., Hong, J., and S. Ha, "Towards a
distributed computing framework for Fog", 2017 IEEE Fog
World Congress (FWC), DOI 10.1109/fwc.2017.8368528,
October 2017, <https://doi.org/10.1109/fwc.2017.8368528>.
[Jones] Jones, D., Snider, C., Nassehi, A., Yon, J., and B. Hicks,
"Characterising the Digital Twin: A systematic literature
review", CIRP Journal of Manufacturing Science and
Technology, vol. 29, pp. 36-52,
DOI 10.1016/j.cirpj.2020.02.002, May 2020,
<https://doi.org/10.1016/j.cirpj.2020.02.002>.
[Kelly] Kelly, R., "Internet of Things Data to Top 1.6 Zettabytes
by 2020", April 2015,
<https://campustechnology.com/articles/2015/04/15/
internet-of-things-data-to-top-1-6-zettabytes-by-
2020.aspx>. Retrieved on 2022-05-24.
[Khan] Khan, L., Yaqoob, I., Tran, N., Kazmi, S., Dang, T., and
C. Hong, "Edge-Computing-Enabled Smart Cities: A
Comprehensive Survey", IEEE Internet of Things Journal,
vol. 7, no. 10, pp. 10200-10232,
DOI 10.1109/jiot.2020.2987070, October 2020,
<https://doi.org/10.1109/jiot.2020.2987070>.
[Kua] Patil, V., Desai, H., and L. Zhang, "Kua: a distributed
object store over named data networking", Proceedings of
the 9th ACM Conference on Information-Centric Networking,
DOI 10.1145/3517212.3558083, September 2022,
<https://doi.org/10.1145/3517212.3558083>.
[Larrea] Larrea, J. and A. Barbalace, "The serverkernel operating
system", Proceedings of the Third ACM International
Workshop on Edge Systems, Analytics and Networking,
DOI 10.1145/3378679.3394537, May 2020,
<https://doi.org/10.1145/3378679.3394537>.
[LFEDGE-EVE]
Linux Foundation, "Project Edge Virtualization Engine
(EVE)", Portal, <https://www.lfedge.org/projects/eve>.
Retrieved on 2022-05-24.
[Li] Li, Y., Chen, Y., Lan, T., and G. Venkataramani, "MobiQoR:
Pushing the Envelope of Mobile Edge Computing Via Quality-
of-Result Optimization", 2017 IEEE 37th International
Conference on Distributed Computing Systems (ICDCS),
DOI 10.1109/icdcs.2017.54, June 2017,
<https://doi.org/10.1109/icdcs.2017.54>.
[Lin] Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and W.
Zhao, "A Survey on Internet of Things: Architecture,
Enabling Technologies, Security and Privacy, and
Applications", IEEE Internet of Things Journal, vol. 4,
no. 5, pp. 1125-1142, DOI 10.1109/jiot.2017.2683200,
October 2017, <https://doi.org/10.1109/jiot.2017.2683200>.
[Liu] Liu, J., Bai, B., Zhang, J., and K. Letaief, "Cache
Placement in Fog-RANs: From Centralized to Distributed
Algorithms", IEEE Transactions on Wireless Communications,
vol. 16, no. 11, pp. 7039-7051,
DOI 10.1109/twc.2017.2737015, November 2017,
<https://doi.org/10.1109/twc.2017.2737015>.
[Madni] Madni, A., Madni, C., and S. Lucero, "Leveraging Digital
Twin Technology in Model-Based Systems Engineering",
Systems 7(1):7, DOI 10.3390/systems7010007, January 2019,
<https://doi.org/10.3390/systems7010007>.
[Mahadev] Satyanarayanan, M., "The Emergence of Edge Computing",
Computer, vol. 50, no. 1, pp. 30-39,
DOI 10.1109/mc.2017.9, January 2017,
<https://doi.org/10.1109/mc.2017.9>.
[Mehmood] Mehmood, M., Oad, A., Abrar, M., Munir, H., Hasan, S.,
Muqeet, H., and N. Golilarz, "Edge Computing for IoT-
Enabled Smart Grid", Security and Communication Networks,
Vol. 2021, Article ID 5524025, DOI 10.1155/2021/5524025,
July 2021, <https://doi.org/10.1155/2021/5524025>.
[Mortazavi]
Mortazavi, S., Balasubramanian, B., de Lara, E., and S.
Narayanan, "Toward Session Consistency for the Edge",
USENIX Workshop on Hot Topics in Edge Computing (HotEdge
18), 2018,
<https://www.usenix.org/conference/hotedge18/presentation/
mortazavi>.
[MQTT5] Banks, A., Ed., Briggs, E., Ed., Borgendale, K., Ed., and
R. Gupta, Ed., "MQTT Version 5.0", OASIS Standard, March
2019, <https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-
v5.0.html>.
[Murshed] Murshed, M., Murphy, C., Hou, D., Khan, N.,
Ananthanarayanan, G., and F. Hussain, "Machine Learning at
the Network Edge: A Survey", ACM Computing Surveys, vol.
54, no. 8, pp. 1-37, DOI 10.1145/3469029, October 2021,
<https://doi.org/10.1145/3469029>.
[NETWORK-DIGITAL-TWIN-ARCH]
Zhou, C., Yang, H., Duan, X., Lopez, D., Pastor, A., Wu,
Q., Boucadair, M., and C. Jacquenet, "Network Digital
Twin: Concepts and Reference Architecture", Work in
Progress, Internet-Draft, draft-irtf-nmrg-network-digital-
twin-arch-05, 4 March 2024,
<https://datatracker.ietf.org/doc/html/draft-irtf-nmrg-
network-digital-twin-arch-05>.
[Nieke] Nieke, M., Almstedt, L., and R. Kapitza, "Edgedancer:
Secure Mobile WebAssembly Services on the Edge",
Proceedings of the 4th International Workshop on Edge
Systems, Analytics and Networking,
DOI 10.1145/3434770.3459731, April 2021,
<https://doi.org/10.1145/3434770.3459731>.
[NIST] Mell, P. and T. Grance, "The NIST Definition of Cloud
Computing", NIST Special Publication 800-145,
DOI 10.6028/nist.sp.800-145, September 2011,
<https://doi.org/10.6028/nist.sp.800-145>.
[NVIDIA] Grzywaczewski, A., "Training AI for Self-Driving Vehicles:
the Challenge of Scale", NVIDIA Developer Blog, October
2017, <https://devblogs.nvidia.com/training-self-driving-
vehicles-challenge-scale/>. Retrieved on 2022-05-24.
[OGrady] O'Grady, M., Langton, D., and G. O'Hare, "Edge computing:
A tractable model for smart agriculture?", Artificial
Intelligence in Agriculture, Vol. 3, Pages 42-51,
DOI 10.1016/j.aiia.2019.12.001, September 2019,
<https://doi.org/10.1016/j.aiia.2019.12.001>.
[oneM2M-TR0001]
Mladin, C., "Use Cases Collection", oneM2M, v4.2.0,
TR 0001, October 2018,
<https://member.onem2m.org/Application/documentapp/
downloadLatestRevision/default.aspx?docID=28153>.
[oneM2M-TR0018]
Lu, C. and M. Jiang, "Industrial Domain Enablement",
oneM2M, v2.5.2, TR 0018, February 2019,
<https://member.onem2m.org/Application/documentapp/
downloadLatestRevision/default.aspx?docID=29334>.
[oneM2M-TR0026]
Yamamoto, K., Mladin, C., and V. Kueh, "Vehicular Domain
Enablement", oneM2M, TR 0026, January 2020,
<https://member.onem2m.org/Application/documentapp/
downloadLatestRevision/default.aspx?docID=31410>.
[oneM2M-TR0052]
Yamamoto, K. and C. Mladin, "Study on Edge and Fog
Computing in oneM2M systems", oneM2M, TR 0052, September
2020, <https://member.onem2m.org/Application/documentapp/
downloadLatestRevision/default.aspx?docID=32633>.
[oneM2M-TS0002]
He, S., "TS 0002, Requirements", oneM2M, TS 0002, February
2019, <https://member.onem2m.org/Application/documentapp/
downloadLatestRevision/default.aspx?docID=29274>.
[OpenFog] OpenFog Consortium, "OpenFog Reference Architecture for
Fog Computing", February 2017,
<https://iiconsortium.org/pdf/
OpenFog_Reference_Architecture_2_09_17.pdf>.
[PseudoDynamicTesting]
Ficco, M., Esposito, C., Xiang, Y., and F. Palmieri,
"Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud
Ecosystems", IEEE Communications Magazine, vol. 55, no.
11, pp. 98-104, DOI 10.1109/mcom.2017.1700328, November
2017, <https://doi.org/10.1109/mcom.2017.1700328>.
[Renart] Renart, E., Diaz-Montes, J., and M. Parashar, "Data-Driven
Stream Processing at the Edge", 2017 IEEE 1st
International Conference on Fog and Edge Computing
(ICFEC), DOI 10.1109/icfec.2017.18, May 2017,
<https://doi.org/10.1109/icfec.2017.18>.
[REQS-P4COMP]
Singh, H. and M. Montpetit, "Requirements for P4 Program
Splitting for Heterogeneous Network Nodes", Work in
Progress, Internet-Draft, draft-hsingh-coinrg-reqs-p4comp-
03, 18 February 2021,
<https://datatracker.ietf.org/doc/html/draft-hsingh-
coinrg-reqs-p4comp-03>.
[REST-IOT] Keränen, A., Kovatsch, M., and K. Hartke, "Guidance on
RESTful Design for Internet of Things Systems", Work in
Progress, Internet-Draft, draft-irtf-t2trg-rest-iot-13, 25
January 2024, <https://datatracker.ietf.org/doc/html/
draft-irtf-t2trg-rest-iot-13>.
[RFC6291] Andersson, L., van Helvoort, H., Bonica, R., Romascanu,
D., and S. Mansfield, "Guidelines for the Use of the "OAM"
Acronym in the IETF", BCP 161, RFC 6291,
DOI 10.17487/RFC6291, June 2011,
<https://www.rfc-editor.org/info/rfc6291>.
[RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained
Application Protocol (CoAP)", RFC 7252,
DOI 10.17487/RFC7252, June 2014,
<https://www.rfc-editor.org/info/rfc7252>.
[RFC7390] Rahman, A., Ed. and E. Dijk, Ed., "Group Communication for
the Constrained Application Protocol (CoAP)", RFC 7390,
DOI 10.17487/RFC7390, October 2014,
<https://www.rfc-editor.org/info/rfc7390>.
[RFC8578] Grossman, E., Ed., "Deterministic Networking Use Cases",
RFC 8578, DOI 10.17487/RFC8578, May 2019,
<https://www.rfc-editor.org/info/rfc8578>.
[Schafer] Schäfer, D., Edinger, J., VanSyckel, S., Paluska, J., and
C. Becker, "Tasklets: Overcoming Heterogeneity in
Distributed Computing Systems", 2016 IEEE 36th
International Conference on Distributed Computing Systems
Workshops (ICDCSW), DOI 10.1109/icdcsw.2016.22, June 2016,
<https://doi.org/10.1109/icdcsw.2016.22>.
[Senel] Şenel, B., Mouchet, M., Cappos, J., Fourmaux, O.,
Friedman, T., and R. McGeer, "EdgeNet: A Multi-Tenant and
Multi-Provider Edge Cloud", Proceedings of the 4th
International Workshop on Edge Systems, Analytics and
Networking, DOI 10.1145/3434770.3459737, April 2021,
<https://doi.org/10.1145/3434770.3459737>.
[SFC-FOG-RAN]
Bernardos, C. J. and A. Mourad, "Service Function Chaining
Use Cases in Fog RAN", Work in Progress, Internet-Draft,
draft-bernardos-sfc-fog-ran-10, 22 October 2021,
<https://datatracker.ietf.org/doc/html/draft-bernardos-
sfc-fog-ran-10>.
[Shi] Shi, W., Cao, J., Zhang, Q., Li, Y., and L. Xu, "Edge
Computing: Vision and Challenges", IEEE Internet of Things
Journal, vol. 3, no. 5, pp. 637-646,
DOI 10.1109/jiot.2016.2579198, October 2016,
<https://doi.org/10.1109/jiot.2016.2579198>.
[SimulatingFog]
Svorobej, S., Takako Endo, P., Bendechache, M., Filelis-
Papadopoulos, C., Giannoutakis, K., Gravvanis, G.,
Tzovaras, D., Byrne, J., and T. Lynn, "Simulating Fog and
Edge Computing Scenarios: An Overview and Research
Challenges", Future Internet, vol. 11, no. 3, pp. 55,
DOI 10.3390/fi11030055, February 2019,
<https://doi.org/10.3390/fi11030055>.
[Stanciu] Stanciu, V., Steen, M., Dobre, C., and A. Peter, "Privacy-
Preserving Crowd-Monitoring Using Bloom Filters and
Homomorphic Encryption", Proceedings of the 4th
International Workshop on Edge Systems, Analytics and
Networking, DOI 10.1145/3434770.3459735, April 2021,
<https://doi.org/10.1145/3434770.3459735>.
[Tanveer] Tanveer, S., Sree, N., Bhavana, B., and D. Varsha, "Smart
Agriculture System using IoT", 2022 IEEE World Conference
on Applied Intelligence and Computing (AIC), Sonbhadra,
India, pp. 482-486, DOI 10.1109/AIC55036.2022.9848948,
August 2022,
<https://doi.org/10.1109/AIC55036.2022.9848948>.
[Weiner] Weiner, M., Jorgovanovic, M., Sahai, A., and B. Nikolie,
"Design of a low-latency, high-reliability wireless
communication system for control applications", 2014 IEEE
International Conference on Communications (ICC),
DOI 10.1109/icc.2014.6883918, June 2014,
<https://doi.org/10.1109/icc.2014.6883918>.
[Yangui] Yangui, S., Ravindran, P., Bibani, O., Glitho, R., Ben
Hadj-Alouane, N., Morrow, M., and P. Polakos, "A platform
as-a-service for hybrid cloud/fog environments", 2016 IEEE
International Symposium on Local and Metropolitan Area
Networks (LANMAN), DOI 10.1109/lanman.2016.7548853, June
2016, <https://doi.org/10.1109/lanman.2016.7548853>.
[Yates] Yates, R. and S. Kaul, "The Age of Information: Real-Time
Status Updating by Multiple Sources", IEEE Transactions on
Information Theory, vol. 65, no. 3, pp. 1807-1827,
DOI 10.1109/tit.2018.2871079, March 2019,
<https://doi.org/10.1109/tit.2018.2871079>.
[Yousefpour]
Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K.,
Jalali, F., Niakanlahiji, A., Kong, J., and J. Jue, "All
one needs to know about fog computing and related edge
computing paradigms: A complete survey", Journal of
Systems Architecture, vol. 98, pp. 289-330,
DOI 10.1016/j.sysarc.2019.02.009, September 2019,
<https://doi.org/10.1016/j.sysarc.2019.02.009>.
[Yue] Yue, Q., Mu, S., Zhang, L., Wang, Z., Zhang, Z., Zhang,
X., Wang, Y., and Z. Miao, "Assisting Smart Construction
With Reliable Edge Computing Technology", Frontiers in
Energy Research, Sec. Smart Grids, Vol. 10,
DOI 10.3389/fenrg.2022.900298, May 2022,
<https://doi.org/10.3389/fenrg.2022.900298>.
[Zhang] Zhang, Q., Zhang, X., Zhang, Q., Shi, W., and H. Zhong,
"Firework: Big Data Sharing and Processing in
Collaborative Edge Environment", 2016 Fourth IEEE Workshop
on Hot Topics in Web Systems and Technologies (HotWeb),
DOI 10.1109/hotweb.2016.12, October 2016,
<https://doi.org/10.1109/hotweb.2016.12>.
[Zhang2] Zhang, J., Chen, B., Zhao, Y., Cheng, X., and F. Hu, "Data
Security and Privacy-Preserving in Edge Computing
Paradigm: Survey and Open Issues", IEEE Access, vol. 6,
pp. 18209-18237, DOI 10.1109/access.2018.2820162, March
2018, <https://doi.org/10.1109/access.2018.2820162>.
Acknowledgements
The authors would like to thank Joo-Sang Youn, Akbar Rahman, Michel
Roy, Robert Gazda, Rute Sofia, Thomas Fossati, Chonggang Wang, Marie-
José Montpetit, Carlos J. Bernardos, Milan Milenkovic, Dale Seed,
JaeSeung Song, Roberto Morabito, Carsten Bormann, and Ari Keränen for
their valuable comments and suggestions on this document.
Authors' Addresses
Jungha Hong
ETRI
218 Gajeong-ro, Yuseung-Gu
Daejeon
34129
Republic of Korea
Email: jhong@etri.re.kr
Yong-Geun Hong
Daejeon University
62 Daehak-ro, Dong-gu
Daejeon
300716
Republic of Korea
Email: yonggeun.hong@gmail.com
Xavier de Foy
InterDigital Communications, LLC
1000 Sherbrooke West
Montreal H3A 3G4
Canada
Email: xavier.defoy@interdigital.com
Matthias Kovatsch
Huawei Technologies Duesseldorf GmbH
Riesstr. 25 C // 3.OG
80992 Munich
Germany
Email: ietf@kovatsch.net
Eve Schooler
University of Oxford
Parks Road
Oxford
OX1 3PJ
United Kingdom
Email: eve.schooler@gmail.com
Dirk Kutscher
Hong Kong University of Science and Technology (Guangzhou)
No.1 Du Xue Rd
Guangzhou
China
Email: ietf@dkutscher.net
|