Theroleofedgecomputingin Internetof Things
Theroleofedgecomputingin Internetof Things
Theroleofedgecomputingin Internetof Things
net/publication/323268025
CITATIONS READS
288 10,595
5 authors, including:
All content following this page was uploaded by Ibrar Yaqoob on 03 September 2018.
s
red
nd
Cloud Data Centers
Hu
ds
an
us
Edge Gateways
o
Th
s
ion
Smart IoT
ill
Devices
M
• We present a few indispensable scenarios of However, wireless network technologies are not as
edge computing in IoT. reliable as wired technologies.
• We identify and elaborate several open research
challenges. B. Computing Nodes
These contributions are discussed separately in IoT devices have limited processing capabili-
Sections II to V. The concluding remarks are pro- ties, which make them unsuitable for computation-
vided in Section VI. intensive tasks. However, resource-constrained IoT
devices can augment their capabilities by leveraging
II. TAXONOMY OF I OT- BASED E DGE the resources of edge servers. The edge computing
C OMPUTING paradigm relies on different computational devices
Figure 2 depicts a taxonomy of IoT-based edge to provide services to IoT users. These computa-
computing that considers particular features, such tional devices are the core element of IoT-based
as wireless network technologies, computing nodes, edge computing. Computing nodes include servers,
computing paradigms, service level objectives, ma- base stations (BS), routers, and vehicles that can
jor enablers, data types, applications, and attributes. provide resources and various services to IoT de-
vices. The use of these devices is specific to the
A. Network Technologies computing paradigm.
IoT devices send collected data to a locally avail-
able edge server for processing. These devices com- C. Computing Paradigms
municate with edge computing platforms through ei- Various computing paradigms are used in IoT
ther wireless networking technologies, such as WiFi to provide different services depending on diverse
and cellular networking (e.g., 3G, 4G, and 5G), or application requirements. These paradigms can be
wired technologies, such as Ethernet. These network categorized into cloud computing, edge computing
technologies vary in terms of data rate, transmission (i.e., MEC, fog, and cloudlet), mobile ad hoc cloud
range, and number of supported devices. Wireless (MAC), and hybrid platforms. Cloud computing is
networks provide flexibility and mobility to users a centralized computing infrastructure that aims to
who execute their applications on the edge server. provide interruption-free access to powerful cloud
IEEE COMMUNICATIONS MAGAZINE 3
WiFi Cloud Latency Networking Non Real- Smart Home Low Latency
Servers Computing time
Minimization Technologies
Mobile Network
Bluetooth Resource Smart Cities Context
Ad hoc Awareness
Cloud Management
servers. These servers can rapidly process large when we require the large computing resources of
amounts of data upon receipt from remote IoT cloud computing but cannot tolerate the latency
devices and send back the results. However, real- of the cloud. Variants of edge computing can be
time delay-sensitive applications cannot afford long employed in such applications to overcome the
delays induced by a wide area network. Continuous latency problems of cloud computing.
transmission of voluminous raw data through unreli-
able wireless links may also be ineffective. By con-
trast, edge computing is a decentralized computing D. Service Level Objectives
platform that brings cloud computing capabilities The different service-level objectives for edge
near IoT devices, that is, the network edge. An computing in the context of IoT are as follows]:
important type of edge computing platform is MEC, 1) Latency Minimization: High latency has be-
which brings cloud computing capabilities to the come a crucial problem for IoT-based smart ap-
edge of a cellular network [10]. Computational and plications. An alternative platform, such as edge
storage services in MEC are provided at BS. Unlike computing, that can guarantee timely delivery of
MEC, fog computing employs local fog nodes (i.e., services is required to fulfill the quality of service
local network devices, such as a router or switch) (QoS) requirements of delay-sensitive IoT applica-
available within a limited geographic region to pro- tions (e.g., smart transportation and online gaming).
vide computational services. Fog computing is con- 2) Network Management: A number of phenom-
sidered a premier technology following the success ena, such as inadequate virtualization support, lack
of IoT. Cloudlet is another form of edge computing, of seamless connectivity, and inefficient congestion
in which delay-sensitive and computation-intensive control, degrade the overall network performance.
tasks from IoT devices are performed on a server Therefore, efficient usage of network resources in
deployed in the local area network. Unlike cloud and edge computing is vital for IoT.
edge computing platforms that rely on infrastructure 3) Cost Optimization: The use of an adequate
deployment, MAC capitalizes the shared resources platform for enabling edge computing necessitates
of available mobile devices within local proxim- extensive infrastructure deployment that involves
ity to process computation-intensive tasks. Cloud substantial upfront investment and operational ex-
and edge computing are used together in hybrid penses. Most of these expenses are related to net-
computing. Such infrastructure is usually adopted work node placement, which requires deliberate
IEEE COMMUNICATIONS MAGAZINE 4
planning and optimization to minimize the overall different virtual machines for a number of cloud
cost. Deployment of an optimal number of nodes computing services at the edge of networks.
at appropriate positions can significantly reduce
capital, and optimal arrangement of edge nodes can F. Data Types
minimize operational costs.
One of the primary reasons for edge computing is
4) Energy Management: Energy management is
that its precursor (i.e., cloud computing) was unable
also an important objective of IoT-based edge com-
to fulfill certain requirements of applications deal-
puting. Subscribers need to have strict control over
ing with various data types. These data types can
power management. Energy-efficient IoT devices
be broadly categorized based on delay sensitivity.
and applications are desirable in edge computing.
Hard real-time data cannot tolerate any delay at
According to a study, one trillion IoT nodes need
all, whereas soft real-time data can afford several
sensing platforms that support various applications
bounded delays. Delay-tolerant applications can be
using power harvesting to ensure scalability, reduce
classified as non-real-time.
costs, and avoid frequent battery replacement.
5) Resource Management: Optimal management
of computational resources is crucial in obtaining G. Applications
service-level objectives. Appropriate resource man- A number of applications currently use edge
agement includes coordination of resources, estima- computing.
tion of available resources, and proper allocation of 1) Smart Homes: Smart homes equipped with
workload. a number of IoT devices belong to an emerging
6) Data Management: The large number of IoT application domain of edge computing. The IoT
devices at present are expected to generate large applications envisioned for the monitoring and me-
amounts of data that need to be managed in a timely tering of smart homes will allow subscribers to
manner. Efficient and effective data management obtain automated and precise readings of different
mechanisms are desirable in edge computing. Trans- meters and access invoices accordingly without de-
mission and aggregation of IoT-generated data are lay [11]. These IoT applications are designed for
important concerns in data management. remote monitoring and metering of various utilities,
such as water, electricity, and gas. The data collected
from IoT devices can be transmitted to an edge
E. Major Enablers server for processing instead of sending them to the
The driving forces behind the success of edge cloud, which can lead to real-time data analytics.
computing are different types of technologies. 2) Healthcare: Edge computing has been suc-
Emerging network technologies, such as 4G and cessfully implemented in recent years and is now
cognitive radios, are vital in fulfilling the require- commonly used in different medical appliances.
ments of delay-sensitive applications. These com- Edge computing enables end users to monitor
munication technologies are used in edge comput- and react to health-related data generated by var-
ing for device-to-device and device-to-edge server ious servers. Different architectures that use cloud,
communication. Software development kits with fog, and edge computing have been proposed
appropriate application programming interfaces as- to reap the benefits of collaborative computing
sist in developing and integrating new compatible paradigms. Healthcare applications are usually con-
applications and customizing existing applications sidered delay-sensitive applications in IoT. Initially,
and services. Cloud computing utilizes powerful cloud computing was employed for healthcare ap-
servers for computation-intensive jobs; the same plications but was not highly successful because of
idea has been envisioned to bring cloud capabilities latency issues. The introduction of edge computing
to the edge devices of networks to minimize latency. resolved these issues and made cloud computing
Such servers can help offload computations from realistic for healthcare IoT applications.
small resource-limited mobile devices. Virtualiza- 3) Video Surveillance: Edge computing is cur-
tion is another emerging enabler that allows for rently used for smart video surveillance in different
the creation of logically isolated resources using sectors of life, including domestic security and
similar physical resources. Virtualization is used by anti-terrorism. Different video contents are obtained
IEEE COMMUNICATIONS MAGAZINE 5
Edge
Server
Thermal
Edge Power
Server
Edge Factories
Server
Human Smart
Gadgets
Cloud
Edge Offices
Edge
Server Server
Smart Cars
data will be locally analyzed. This can be helpful for E. Enhanced Data Security
many organizations in many industries, including When data are sent abroad for data processing,
manufacturing, healthcare, telecommunication, and data insecurity is increased. Data collection and
finance, such that the need for the IoT concept analysis are performed locally in edge computing.
increases. Therefore, instead of traffic light cameras Extensive routing is not involved, such that identi-
sending data to a central infrastructure for data anal- fying any suspicious activity is easy. Implementing
ysis, they can analyze streaming data themselves, necessary actions before any security breach occurs
communicate with other devices, and make imme- also becomes easy.
diate decisions to accomplish the required tasks.
V. O PEN R ESEARCH C HALLENGES
The following discussion highlights the open re-
D. Decision Making search challenges in the deployment of edge cloud
in the IoT environment.
After locally analyzing the data, the next step for
edge devices is to make critical strategic decisions.
In a smart transportation system, each car generates A. Heterogeneity
a large amount of data every second and requires Heterogeneity in the IoT-based edge computing
real-time processing and correct decisions. For real- environment exists in computing and communica-
time processing, the data cannot be sent to the cloud tion technologies. Computing platforms can have
for processing and decision making because the different operating systems and hardware architec-
response time would be too long in this case. In tures, whereas communication technologies can be
such a case, the data should be analyzed locally heterogeneous with regard to data rate, transmission
on any edge device. In this manner, the car can range, and bandwidth. One of the challenges in edge
make a correct decision on the spot to avoid adverse computing is to develop a solution in software space
situations. that is portable across different environments. This
IEEE COMMUNICATIONS MAGAZINE 8
challenge is crucial because various applications data is computationally difficult. Security risks are
are deployed in edge devices. Several researchers also involved. Therefore, the data should be pre-
have proposed software solutions to resolve this processed at the gateway level, such as noise/low-
issue, but all of these solutions are hardware spe- quality removal, event detection, and privacy protec-
cific. Thus, they cannot resolve the problem in tion. The processed data will be sent to the upper
heterogeneous environments. To solve this issue, layer for future service provision. However, many
programmers should develop a programming model challenges may occur in this process. For privacy
for edge nodes that is supported by task- and data- and security purposes, applications running on edge
level parallelism to facilitate the execution of work-
devices should be blind to these raw data. Therefore,
loads simultaneously at multiple hardware levels. the details of the data should be removed during
The second consideration is to use a language that data preprocessing. However, the usability of the
supports hardware heterogeneity. data can be affected by hiding the details of sensed
data. Defining the extent to which the raw data
B. Standard Protocols and Interfaces should be filtered out is also a challenge because
several applications cannot obtain accurate results
Edge computing is an emerging technology in from such data.
the IoT field. In this heterogeneous environment,
different devices and sensors connect and commu-
nicate with one another and with the edge server via E. Security and Privacy
communication protocols. These devices have their Edge computing acts as a boon to cybersecurity
own interfaces and thus demand specific communi- because data do not travel over a network. However,
cation protocols. Considering that different vendors a highly dynamic environment at the edge of a
manufacture different devices in the IoT environ- network makes the network unprotected. Given that
ment, standard protocols and interfaces should be different devices are connected in IoT, a large array
developed to enable communication among these of potential security threats can be generated. Many
heterogeneous devices. The development of stan- applications are running at the network edge, so the
dard protocols and interfaces in the IoT environment data provided to these applications should be in a
is challenging because of the rapid development of hidden form. Otherwise, any intruder can use the
new devices. open data for illegal purposes. For example, if a
home is connected to IoT, then private data, such as
individual health data, can be stolen. In this case,
C. Availability
how to support the service without harming privacy
Availability in the IoT-based edge computing is a challenge. Applications running on edge devices
environment includes hardware- and software-level should be blind to the raw data. Personal data
provision of resources and services anywhere and can be removed before reaching the edge device.
anytime for subscribed IoT devices. Usually, avail- Several solutions have been provided by researchers
ability comprises three factors, namely, mean time to standardize and store health data [13]. X. Sun
between failure, failure probability, and mean time et al. [14] proposed a hierarchical fog computing
to recovery. Ensuring the availability of resources framework called EdgeIoT. This framework uses a
and services for the growing number of IoT devices proxy virtual machine for securing the privacy of
is a challenging research perspective. However, user content and reducing data traffic in the core
availability can be optimized by maximizing the network. However, security features with enhanced
mean time between failures and minimizing the robustness should be implemented on edge nodes.
failure probability and mean time to recovery.
VI. C ONCLUSION
D. Data Abstraction In this article, we investigated, highlighted, and
With IoT, a number of data-generating devices reported recent premier advances in edge comput-
are connected in the network, and all of these data ing technologies (e.g., fog computing, MEC, and
generators report tremendously large raw data to the cloudlets) with respect to measuring their effect on
edge device. For the edge device, analyzing such big IoT. Then, we categorized edge computing literature
IEEE COMMUNICATIONS MAGAZINE 9
by devising a taxonomy, which was used to uncover [11] E. Ahmed, I. Yaqoob, A. Gani, M. Imran, and M. Guizani,
the premium features of edge computing that can be “Internet-of-things-based smart environments: state of the art,
taxonomy, and open research challenges,” IEEE Wireless Com-
beneficial to the IoT paradigm. We outlined a few munications, vol. 23, no. 5, pp. 10–16, 2016.
key requirements for the deployment of edge com- [12] J. Pan and J. McElhannon, “Future edge cloud and edge
puting in IoT and discussed indispensable scenarios computing for internet of things applications,” IEEE Internet
of Things Journal, vol. 5, no. 1, pp. 439–449, Feb 2018.
of edge computing in IoT. Furthermore, several open [13] F. A. Kraemer, A. E. Braten, N. Tamkittikhun, and D. Palma,
research challenges to the successful deployment of “Fog computing in healthcare–a review and discussion,” IEEE
edge computing in IoT are identified and discussed. Access, vol. 5, pp. 9206–9222, 2017.
[14] X. Sun and N. Ansari, “Edgeiot: Mobile edge computing for the
We conclude that although the deployment of edge internet of things,” IEEE Communications Magazine, vol. 54,
computing in IoT provides numerous benefits, the no. 12, pp. 22–29, 2016.
convergence of these two computing paradigms
brings about new issues that should be resolved in
the future.
ACKNOWLEDGEMENTS
Najmul Hassan was born in 1983 in Ab-
Imran’s work is supported by the Deanship of bottabad, Pakistan. He did his MS in Com-
Scientific Research at King Saud University through puter Sciences from Mohammad Ali Jinnah
Research group No. (RG # 1435-051). PLACE University, Islamabad, Pakistan in 2010. He is
PHOTO currently working in collaboration with Dr. Jin
HERE Li, School of Computer Science Guangzhou
R EFERENCES University China. His research areas are In-
ternet of Things, Edge/Cloud Communication,
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and
Wireless Body Area Networks and Wireless
M. Ayyash, “Internet of things: A survey on enabling tech-
Sensor Networks.
nologies, protocols, and applications,” IEEE Communications
Surveys Tutorials, vol. 17, no. 4, pp. 2347–2376, Fourthquarter
2015.
[2] M. Satyanarayanan, P. Simoens, Y. Xiao, P. Pillai, Z. Chen,
K. Ha, W. Hu, and B. Amos, “Edge analytics in the internet of
things,” IEEE Pervasive Computing, vol. 14, no. 2, pp. 24–31,
2015.
[3] M. Jia, J. Cao, and W. Liang, “Optimal cloudlet placement Saira Gillani received her PhD degree in
and user to cloudlet allocation in wireless metropolitan area Information Sciences from Corvinus Univer-
networks,” IEEE Transactions on Cloud Computing, vol. 5, sity of Budapest, Hungary in december 2015.
no. 4, pp. 725–737, Oct 2017. PLACE She is currently serving as an assistant pro-
[4] S. Yi, C. Li, and Q. Li, “A survey of fog computing: concepts, PHOTO fessor in Saudi Electronic University, Jed-
applications and issues,” in Proceedings of the 2015 Workshop HERE dah, Saudi Arabia. Previously, she worked
on Mobile Big Data. ACM, 2015, pp. 37–42. as research scholar in Corvinno, Technology
[5] T. Taleb, S. Dutta, A. Ksentini, M. Iqbal, and H. Flinck, Transfer Center of Information Technology
“Mobile edge computing potential in making cities smarter,” and Services in Budapest, Hungary. Her areas
IEEE Communications Magazine, vol. 55, no. 3, pp. 38–43, of interest include Text Mining, Data Mining, Machine Learning,
March 2017. VANET, Mobile Edge Computing and Internet of Things.
[6] M. Satyanarayanan, “The emergence of edge computing,” Com-
puter, vol. 50, no. 1, pp. 30–39, 2017.
[7] E. K. Markakis, I. Politis, A. Lykourgiotis, Y. Rebahi, G. Mas-
torakis, C. X. Mavromoustakis, and E. Pallis, “Efficient next
generation emergency communications over multi-access edge
computing,” IEEE Communications Magazine, vol. 55, no. 11,
pp. 92–97, NOVEMBER 2017.
Ejaz Ahmed (S’13, M’17) received his
[8] P. Mach and Z. Becvar, “Mobile edge computing: A survey
Ph.D. (Computer Science) from University of
on architecture and computation offloading,” IEEE Commu-
Malaya, Kuala Lumpur, Malaysia in 2016. He
nications Surveys Tutorials, vol. 19, no. 3, pp. 1628–1656,
PLACE is an associate editor of IEEE Communication
thirdquarter 2017.
PHOTO Magazine, IEEE Access, KSII TIIS, Elsevier
[9] E. Ahmed, A. Ahmed, I. Yaqoob, J. Shuja, A. Gani, M. Imran,
HERE JNCA and Elsevier FGCS. His areas of interest
and M. Shoaib, “Bringing computation closer toward the user
include Big Data, Mobile Cloud Computing,
network: Is edge computing the solution?” IEEE Communica-
Mobile Edge Computing, Internet of Things,
tions Magazine, vol. 55, no. 11, pp. 138–144, 2017.
and Cognitive Radio Networks. He has also
[10] X. Huang, R. Yu, J. Kang, Y. He, and Y. Zhang, “Exploring
received a number of awards during his research career.
mobile edge computing for 5g-enabled software defined vehic-
ular networks,” IEEE Wireless Communications, vol. 24, no. 6,
pp. 55–63, Dec 2017.
IEEE COMMUNICATIONS MAGAZINE 10
Ibrar Yaqoob received his Ph.D. (Com- Muhammad Imran is currently working
puter Science) from the University of Malaya, at King Saud University and visiting scien-
Malaysia, in 2017. He has published a num- tist with Iowa State University. His research
PLACE ber of research articles in refereed interna- PLACE interest includes MANET, WSNs, WBANs,
PHOTO tional journals and magazines. His numerous PHOTO M2M/IoT, SDN, Security and privacy. He has
HERE research articles are very famous and among HERE published number of research papers in ref-
the most downloaded in top journals. His re- ereed international conferences and journals.
search interests include big data, mobile cloud, He serves as a Co-Editor in Chief for EAI
the Internet of Things, cloud computing, and Transactions and Associate/Guest editor for
wireless networks. IEEE (Access, Communications Magazine), Computer Networks,
Sensors, IJDSN, JIT, WCMC, AHSWN, IET WSS, IJAACS and
IJITEE.
IEEE COMMUNICATIONS MAGAZINE 11
s
red
nd
Cloud Data Centers
Hu
sd
an
us
Edge Gateways
o
Th
s
ion
Smart IoT
ill
Devices
M
WiFi Cloud Latency Networking Non Real- Smart Home Low Latency
Servers Computing time
Minimization Technologies
Mobile Network
Bluetooth Resource Smart Cities Context
Ad hoc Awareness
Cloud Management
Edge
Server
Thermal
Edge Power
Server
Edge Factories
Server
Human Smart
Gadgets
Cloud
Edge Offices
Edge
Server Server
Smart Cars
View publication stats