Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795307
Pietro Battistoni, M. Sebillo, G. Vitiello
The present paper outlines the framework design of an Application Agnostic Architecture for Fog and Mist Computing systems. An analysis explains how the proposed architecture satisfies the primary characteristics of a Fog and Mist computing paradigm by using low power and low-cost components. It also introduces an Indoor Navigation System and a Notification service as a use-case, to assess the proposed framework as a Fog-Computing architecture while demonstrating how it can address Mobile and IoT challenges.
{"title":"Experimenting with a Fog-computing Architecture for Indoor Navigation","authors":"Pietro Battistoni, M. Sebillo, G. Vitiello","doi":"10.1109/FMEC.2019.8795307","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795307","url":null,"abstract":"The present paper outlines the framework design of an Application Agnostic Architecture for Fog and Mist Computing systems. An analysis explains how the proposed architecture satisfies the primary characteristics of a Fog and Mist computing paradigm by using low power and low-cost components. It also introduces an Indoor Navigation System and a Notification service as a use-case, to assess the proposed framework as a Fog-Computing architecture while demonstrating how it can address Mobile and IoT challenges.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122421407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795315
Eric Gyamfi, J. A. Ansere, Lina Xu
The Security of the Internet of Things (IoT) has gained great attention recently due to the increased cyber-threats in those systems. IoT technologies have many use cases and real-life applications and the IoT devices have been widely produced by industries. However, the security issue of IoT devices has not been fully resolved, leaving those devices exposing to cyber-threats. IoT end devices are normally resource constraint, which makes the implementation of traditional security solutions extremely hard if not impossible. The emergence of IoT-Edge computing technologies can grant the IoT devices the ability to overcome the local resource constraint problem. The current industrial revolution (Industry 4.0) requires IoT devices to be secured in its data transmission, and protected from network Intrusions. Since many IoT devices reply on the unsecured Internet as a means for data transmission, there is an urgent need to provide a public key cryptographic technique to protect the end-to-end transmission between those IoT devices. In this paper, based on the Elliptic Curve Cryptographic (ECC) technique, we have proposed a lightweight asymmetric security solution to enhance secured transmission of data through utilising the IoT-Edge computing architecture. We also have successfully embedded our lightweight cryptography on the edge, and the IoT device. The experimental results has shown that the proposed lightweight ECC security system can provide better practice when implemented in the IoT-Edge environment.
{"title":"ECC Based Lightweight Cybersecurity Solution For IoT Networks Utilising Multi-Access Mobile Edge Computing","authors":"Eric Gyamfi, J. A. Ansere, Lina Xu","doi":"10.1109/FMEC.2019.8795315","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795315","url":null,"abstract":"The Security of the Internet of Things (IoT) has gained great attention recently due to the increased cyber-threats in those systems. IoT technologies have many use cases and real-life applications and the IoT devices have been widely produced by industries. However, the security issue of IoT devices has not been fully resolved, leaving those devices exposing to cyber-threats. IoT end devices are normally resource constraint, which makes the implementation of traditional security solutions extremely hard if not impossible. The emergence of IoT-Edge computing technologies can grant the IoT devices the ability to overcome the local resource constraint problem. The current industrial revolution (Industry 4.0) requires IoT devices to be secured in its data transmission, and protected from network Intrusions. Since many IoT devices reply on the unsecured Internet as a means for data transmission, there is an urgent need to provide a public key cryptographic technique to protect the end-to-end transmission between those IoT devices. In this paper, based on the Elliptic Curve Cryptographic (ECC) technique, we have proposed a lightweight asymmetric security solution to enhance secured transmission of data through utilising the IoT-Edge computing architecture. We also have successfully embedded our lightweight cryptography on the edge, and the IoT device. The experimental results has shown that the proposed lightweight ECC security system can provide better practice when implemented in the IoT-Edge environment.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795354
Muder Almiani, A. Razaque, Liu Yimu, M. J. Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi
In recent years, the application of Bluetooth has always been the highly debated topic among the researches. Through the Bluetooth protocol, Bluetooth can implement the data switching in short distance between various devices. Nevertheless, BlueBorne Attack makes the seemingly stable Bluetooth protocols full of vulnerabilities. Our research will concentrate on predicting the BlueBorne Attack with the following directions: the working mechanism, the working methods and effective range of BlueBorne. Based on the comprehensive review of recent peer-reviewed researches, this project provides a new model based on application layer to solve the security problem of BlueBorne. The paper asserts that compared with the previous research, the unique model has better consequence with highly stability.
{"title":"Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending","authors":"Muder Almiani, A. Razaque, Liu Yimu, M. J. Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi","doi":"10.1109/FMEC.2019.8795354","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795354","url":null,"abstract":"In recent years, the application of Bluetooth has always been the highly debated topic among the researches. Through the Bluetooth protocol, Bluetooth can implement the data switching in short distance between various devices. Nevertheless, BlueBorne Attack makes the seemingly stable Bluetooth protocols full of vulnerabilities. Our research will concentrate on predicting the BlueBorne Attack with the following directions: the working mechanism, the working methods and effective range of BlueBorne. Based on the comprehensive review of recent peer-reviewed researches, this project provides a new model based on application layer to solve the security problem of BlueBorne. The paper asserts that compared with the previous research, the unique model has better consequence with highly stability.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125854812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/fmec.2019.8795358
{"title":"FMEC 2019 Message from the General Chairs","authors":"","doi":"10.1109/fmec.2019.8795358","DOIUrl":"https://doi.org/10.1109/fmec.2019.8795358","url":null,"abstract":"","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"30 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129361684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795326
E. Effiok, E. Liu, Jon Hitchcock
IoT application in health care provides ways to monitor and collect health related biomarkers, in particular, lifestyle related data, by recording and analyzing long-term data, to provide insight to patients’ status. In order to make most use of this application, linking the collected patients’ data with a disease predictive model will generate a personalized disease progression and predictions. Various risk factors have been researched extensively to find the effect on the disease. However, risk factors are fragmented all over medical literature, and often each publication reports on one or a few risk factors, a combination of several of those factors, often from different research. In this paper, we propose an approach to explore the combination of risk factors. The outcome will form a base for a complete risk prediction model that can be used for many health applications.
{"title":"Lifestyle Risk Association Aggregation","authors":"E. Effiok, E. Liu, Jon Hitchcock","doi":"10.1109/FMEC.2019.8795326","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795326","url":null,"abstract":"IoT application in health care provides ways to monitor and collect health related biomarkers, in particular, lifestyle related data, by recording and analyzing long-term data, to provide insight to patients’ status. In order to make most use of this application, linking the collected patients’ data with a disease predictive model will generate a personalized disease progression and predictions. Various risk factors have been researched extensively to find the effect on the disease. However, risk factors are fragmented all over medical literature, and often each publication reports on one or a few risk factors, a combination of several of those factors, often from different research. In this paper, we propose an approach to explore the combination of risk factors. The outcome will form a base for a complete risk prediction model that can be used for many health applications.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795333
Lylia Alouache, M. Maachaoui, M. Aliouat, Rachid Chelouah
The progress of wireless technologies in recent years has tipped the automotive industry towards the digital world with multiple communication systems forming Internet of Vehicles (IoV). These communication systems are subject to disturbances and alterations due to the wireless and dynamic characteristics of vehicles. IoV aims to integrate new information services, safety applications, and internet services, based on the benefits of cloud computing, It tries to improve safety and comfort on the road. The deployment of these services requires messages to be exchanged between the vehicles in a secure manner. Consequently, routing and security topics are crucial to provide a quality of services and to preserve the data integrity. The Software Defined Networking (SDN) architecture is the way that can guarantee these two issues. The purpose of this paper is, firstly, to present the impact of SDN architecture in a vehicular network. Besides, as the robustness of the routing protocols depends on the integrity and authenticity of the routing rules, an improvement of the HSDN-GRA vehicular routing protocol is also described. This improvement develops a distributed trust model and aims to secure the communication between the control plane and the data plane. The goal is to secure the southbound interface between the defined semi-centralized controller and the other vehicles, as well as the Vehicle to Vehicle (V2V) communication.
{"title":"Securing Southbound Interface of HSDN-GRA Vehicular Routing Protocol using a Distributed Trust","authors":"Lylia Alouache, M. Maachaoui, M. Aliouat, Rachid Chelouah","doi":"10.1109/FMEC.2019.8795333","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795333","url":null,"abstract":"The progress of wireless technologies in recent years has tipped the automotive industry towards the digital world with multiple communication systems forming Internet of Vehicles (IoV). These communication systems are subject to disturbances and alterations due to the wireless and dynamic characteristics of vehicles. IoV aims to integrate new information services, safety applications, and internet services, based on the benefits of cloud computing, It tries to improve safety and comfort on the road. The deployment of these services requires messages to be exchanged between the vehicles in a secure manner. Consequently, routing and security topics are crucial to provide a quality of services and to preserve the data integrity. The Software Defined Networking (SDN) architecture is the way that can guarantee these two issues. The purpose of this paper is, firstly, to present the impact of SDN architecture in a vehicular network. Besides, as the robustness of the routing protocols depends on the integrity and authenticity of the routing rules, an improvement of the HSDN-GRA vehicular routing protocol is also described. This improvement develops a distributed trust model and aims to secure the communication between the control plane and the data plane. The goal is to secure the southbound interface between the defined semi-centralized controller and the other vehicles, as well as the Vehicle to Vehicle (V2V) communication.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795310
G. Varkonyi, A. Kertész, Szilvia Varadi
Recent advances in Information and Communications Technology (ICT) are expanding the world of Internet services with smart applications running on interconnected smart devices. Cloud computing already started to dominate the Internet, and with the appearance of Internet of Things (IoT), and Fog and Edge computing IoT-Fog-Cloud systems are formed. Beside such architectural developments, Artificial Intelligence (AI) methods receive new interests by managing Big Data coming from these complex, heterogeneous systems. In May 2018, the General Data Protection Regulation (GDPR) came into force in the European Union (EU) to strengthen users’ influence on their personal data. Though the initiative of the regulation was known two years before, the 25th May, 2018 was a shock for many ICT actors. The privacy awareness of end-users of the Internet of Services is also wanting, and the emergence of new technologies in this field further complicates the identification of data protection responsibilities. In this paper summarize the GDPR novelties affecting the design and operation of IoT applications in fogs and clouds, we present the results of a recent survey on the GDPR awareness of international students on privacy issues related to the usage of IoT-Fog-Cloud systems and AI solutions. Based on the results of the survey, we also state our implications for safer utilization of these complex ICT systems in the future.
{"title":"Privacy-awareness of Users in our Cloudy Smart World","authors":"G. Varkonyi, A. Kertész, Szilvia Varadi","doi":"10.1109/FMEC.2019.8795310","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795310","url":null,"abstract":"Recent advances in Information and Communications Technology (ICT) are expanding the world of Internet services with smart applications running on interconnected smart devices. Cloud computing already started to dominate the Internet, and with the appearance of Internet of Things (IoT), and Fog and Edge computing IoT-Fog-Cloud systems are formed. Beside such architectural developments, Artificial Intelligence (AI) methods receive new interests by managing Big Data coming from these complex, heterogeneous systems. In May 2018, the General Data Protection Regulation (GDPR) came into force in the European Union (EU) to strengthen users’ influence on their personal data. Though the initiative of the regulation was known two years before, the 25th May, 2018 was a shock for many ICT actors. The privacy awareness of end-users of the Internet of Services is also wanting, and the emergence of new technologies in this field further complicates the identification of data protection responsibilities. In this paper summarize the GDPR novelties affecting the design and operation of IoT applications in fogs and clouds, we present the results of a recent survey on the GDPR awareness of international students on privacy issues related to the usage of IoT-Fog-Cloud systems and AI solutions. Based on the results of the survey, we also state our implications for safer utilization of these complex ICT systems in the future.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124772133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795322
Areeg Samir, C. Pahl
Edge cloud environments are often build as virtualized coordinated clusters of possibly heterogeneous devices. In the emerging of cluster platforms like Kubernetes or Docker Swarm, scalability is based on resource utilization. Resource utilization has been used for capacity planning and for forecasting resource demand. However, due to the large scale and complex structure of these architectures, analyzing large amount of monitoring data may cause a huge resource overhead that affects the performance of anomaly detection and the accuracy of anomaly location. To address such challenges, we propose a self-adaptive healing approach that detects, identifies, predicts and recovers anomalies in clustered architectures. The approach will be evaluated to assess the accuracy of the mechanism.
{"title":"Self-Adaptive Healing for Containerized Cluster Architectures with Hidden Markov Models","authors":"Areeg Samir, C. Pahl","doi":"10.1109/FMEC.2019.8795322","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795322","url":null,"abstract":"Edge cloud environments are often build as virtualized coordinated clusters of possibly heterogeneous devices. In the emerging of cluster platforms like Kubernetes or Docker Swarm, scalability is based on resource utilization. Resource utilization has been used for capacity planning and for forecasting resource demand. However, due to the large scale and complex structure of these architectures, analyzing large amount of monitoring data may cause a huge resource overhead that affects the performance of anomaly detection and the accuracy of anomaly location. To address such challenges, we propose a self-adaptive healing approach that detects, identifies, predicts and recovers anomalies in clustered architectures. The approach will be evaluated to assess the accuracy of the mechanism.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122984410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795342
F. Buccafurri, G. Lax, A. Russo
Fog computing is the answer to the emerging need of mobility support, mostly due to the deployment of the Internet of Things. In this paper, motivated by the many security and privacy issues found in handling device’s handover in Fog computing, we propose a new approach based on the possibilities offered by the recent EU regulation eIDAS, for improving the security in the identification of users, when they require data mobility.
{"title":"Exploiting Digital Identity for Mobility in Fog Computing","authors":"F. Buccafurri, G. Lax, A. Russo","doi":"10.1109/FMEC.2019.8795342","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795342","url":null,"abstract":"Fog computing is the answer to the emerging need of mobility support, mostly due to the deployment of the Internet of Things. In this paper, motivated by the many security and privacy issues found in handling device’s handover in Fog computing, we propose a new approach based on the possibilities offered by the recent EU regulation eIDAS, for improving the security in the identification of users, when they require data mobility.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-01DOI: 10.1109/FMEC.2019.8795356
Sarra Mehamel, S. Bouzefrane, K. Slimani, M. Daoui
Edge caching is one of the most emerging technologies recognized as a content retrieval solution in the edge of the network. It has been also considered as enabling technology of mobile edge computing (MEC) that presents an interesting opportunity to perform caching services. Particularly, the MEC servers are implemented directly at the base stations (BSs) which enable edge caching and ensure deployment in close-proximity to the mobile users. However, the integration of servers in mobile edge computing environment (base stations) complicates the energy saving issue because the power consumed by mobile edge computing servers (MECS) is costly especially when the load changes dynamically over time. Furthermore, users with mobile devices arise their demands, introducing the challenge of handling such mobile content requests beside the limited caching size. Thus, it is necessary and crucial for caching mechanisms to consider the mentioned factors, meanwhile most existing studies focus on cache allocation, content popularity and cache design. In this paper, we present an energy-efficient fuzzy caching strategy for edge devices that takes into consideration four influencing features of mobile environment, while introducing a hardware implementation using Field-Programmable Gate Array (FPGA) to cut the overall energy requirements.
{"title":"New Caching System Under Uncertainty for Mobile Edge Computing","authors":"Sarra Mehamel, S. Bouzefrane, K. Slimani, M. Daoui","doi":"10.1109/FMEC.2019.8795356","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795356","url":null,"abstract":"Edge caching is one of the most emerging technologies recognized as a content retrieval solution in the edge of the network. It has been also considered as enabling technology of mobile edge computing (MEC) that presents an interesting opportunity to perform caching services. Particularly, the MEC servers are implemented directly at the base stations (BSs) which enable edge caching and ensure deployment in close-proximity to the mobile users. However, the integration of servers in mobile edge computing environment (base stations) complicates the energy saving issue because the power consumed by mobile edge computing servers (MECS) is costly especially when the load changes dynamically over time. Furthermore, users with mobile devices arise their demands, introducing the challenge of handling such mobile content requests beside the limited caching size. Thus, it is necessary and crucial for caching mechanisms to consider the mentioned factors, meanwhile most existing studies focus on cache allocation, content popularity and cache design. In this paper, we present an energy-efficient fuzzy caching strategy for edge devices that takes into consideration four influencing features of mobile environment, while introducing a hardware implementation using Field-Programmable Gate Array (FPGA) to cut the overall energy requirements.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}