学习驱动的泛在移动边缘计算:未来一代物联网的网络管理挑战

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS International Journal of Network Management Pub Date : 2023-09-03 DOI:10.1002/nem.2250
Praveen Kumar Donta, Edmundo Monteiro, Chinmaya Kumar Dehury, Ilir Murturi
{"title":"学习驱动的泛在移动边缘计算:未来一代物联网的网络管理挑战","authors":"Praveen Kumar Donta,&nbsp;Edmundo Monteiro,&nbsp;Chinmaya Kumar Dehury,&nbsp;Ilir Murturi","doi":"10.1002/nem.2250","DOIUrl":null,"url":null,"abstract":"<p>Ubiquitous edge computing facilitates efficient cloud services near mobile devices, enabling mobile edge computing (MEC) to offer services more efficiently by presenting storage and processing capability within the proximity of mobile devices and in general IoT domains. However, compared with conventional mobile cloud computing, ubiquitous MEC introduces numerous complex challenges due to the heterogeneous smart devices, network infrastructures, and limited transmission bandwidth. Processing and managing such massive volumes of data generated from these devices is complex and challenging in edge infrastructures. On the other side, time-critical applications have stringent requirements such as ultra-low-latency, energy cost, mobility, resource, and security issues that cannot be neglected. For example, smart healthcare or industrial networks generate emergency information very frequently (i.e., often in terms of milliseconds), which needs to be processed near the sensing devices with minimal processing delay. In this context, future generation IoT requires robust and intelligent network management approaches that can handle the system complexity (e.g., scalability and orchestration) with little or no little human intervention and offer a better service to end-users. More precisely, AI/ML approaches designed explicitly for networks under high traffic volume of data help overcome several management challenges, such as (i) improving performance by balancing load and traffic, (ii) distributing the bandwidth spectrum based on demand, and (iii) traffic predictions. Moreover, this need also opens several new research directions such as new MEC architecture, service provisioning technique, security mechanisms, advanced 5G or beyond communication technology, ambient intelligence, and AI/ML-based solutions.</p><p>This issue collect surveys and contribution articles on emerging trends and technologies in ubiquitous MEC for future generation IoT networks and their managements. The papers related to machine learning, deep learning, optimization, blockchain, 5G, or beyond solutions, especially for domain-specific IoT network management, which use MEC environments, are collected after evaluating the review process. Each paper submitted to this special issue was reviewed by three to seven experts during the assessment process. At the end we consider one survey paper and four research contributions.</p><p>The first paper <i>Ravi et al.</i> proposed a survey on “Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks.” This survey presents recently published stochastic modeling-based algorithms for VANETs. This article briefly covers various queueing models for the reader's convenience. This paper discusses a variety of VANET issues such as mobility, routing, data dissemination, cooperative communication, congestion control, and traffic load balancing issues addressed by stochastic modeling techniques. The authors provided extensive open challenges for young researchers on several network management topics such as zero-touch provisioning, blockchain, intelligent digital twin, cooperative communication among vehicles, and routing predictions according to vehicle mobility. These topics are emerging in this area, and they are open to further research.</p><p>The second paper <i>Song et al.</i> contributed on “A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment.” The proposed work aims to secure the transmission of model parameters between IoT terminals during a federated learning process. With the key self-verification algorithm, the model legitimizes the public and private keys of the terminal, which greatly enhances their security. In order to protect against terminal identity leakage, <i>Song et al.</i> provide an attribute-based cryptographic method; the terminal generates ciphertext attributes and gives them to the cloud server. The security of sharing the parameters of each model in the FL process is guaranteed. Terminal self-adaptive is achieved by defining access structures to meet shared resource access rights. Upon satisfying the access authority, each terminal stores and downloads the shared ciphertext model parameters from the edge-cloud server.</p><p>Third, <i>Arora et al.</i> contributed a paper entitled “Blockchain-inspired lightweight trust-based system in vehicular networks.” This paper proposes a trust-based vehicle registration paradigm that uses certificate authorities. Further a blockchain-based system is used to provide efficient two-way authentication and key agreement through encryption and digital signatures. As a result, the proposed scheme is efficient for establishing distributed trust management, which offers privacy protection for vehicles. The source code for the proposed scheme is openly available in Github for the readers to explore further.</p><p>Fourth, <i>Cao et al.</i> contributed a paper on “Dynamic management network system of automobile detection applying edge computing.” This paper proposes an architectural architecture to detect vehicle deviation dynamically through greedy methods and a mixed-integer linear programming. In this architecture, the authors used various sensors to acquire data from vehicles and edge computing to detect deviation. This model can quickly analyze any vehicle's deviation and control congestion during data transmissions.</p><p>Fifth, <i>Jafar et al.</i> proposes “A blockchain-enabled security management framework for mobile edge computing,” which guarantees secure data storage and includes blockchain features like immutability and traceability. The framework also includes a smart contract-based access and sharing mechanism, and simulations show that it offers high security, low latency, and low operations cost for resource-constrained MEC devices.</p><p>Data offloading is one of the primary challenges in edge computing, and it is more complex in MEC. These devices benefit from efficient data offloading by improving performance, reducing latency, and conserving energy. To address this challenge, <i>Samriya et al.</i> proposed “Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing.” In this paper, a reinforcement learning-based Markov decision process offloading model is proposed to overcome computational complexities, secured and efficient offloading. This work optimizes energy efficiency, and mobile users' time by considering the constrained computation of IoT devices, and also ensures efficient resource sharing among multiple users.</p><p>Seventh, <i>Singh et al.</i> proposed “Load balancing clustering and routing for IoT-enabled wireless sensor networks,” in which an energy-efficient and reliable routing protocol is designed using fuzzy C-means and grey wolf optimization. This approach confirms improvements in different parameters such as total energy consumed, packet delivery ratio, packet drop rate, throughput, delay, remaining energy, and total network lifetime. The authors provide their simulation code open through Github (https://github.com/Shanky197197/WSN-code) to the researchers for further exploration.</p><p>Lastly, <i>Babu et al.</i> contributed an article entitled “Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system.” This paper shows a proof of concept to secure the fog-based IoT nodes with device-to-device communication through blockchain system. In this paper, blockchain is used primarily to achieve localized authentication, which further reduces latency and increases throughput. The results of this work confirm the superiority of the proposed Fog-Sec in terms of time complexity, and efficiency such as low latency and high throughput. The source code for the proposed Fog-Sec is available for readers on request. Readers can access it through the link https://drive.google.com/drive/folders/16jbzCrBbaBhbm-dwZmMxfFXg_jOO-Hen?usp=share_link or Reference 31 in the paper.</p><p>We believe that these <i>eight</i> papers make significant contributions and offer valuable insights into the challenges and opportunities of ubiquitous MEC. As a result of this special issue, we hope that more research will be conducted in this area to address network management challenges for the future generation of IoT through ubiquitous MEC and various learning models.</p><p>We are extremely grateful to academic experts who voluntarily gave their time and contributed works to maintaining the high quality standards of the Journal. We would like to sincerely thank all reviewers who participated in the manuscript assessment process and timely returning the review reports to made decisions timely for this special issue. We sincerely thank Prof. James Won-Ki Hong (EiC), Prof. Lisandro Zambenedetti Granville (Associate EiC), and Prof. Jérôme François (Associate EiC). We also thank the editorial office of the IJNM, Wiley Journal who were instrumental in providing a rapid and efficient editorial process.</p><p>The guest editors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2023-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2250","citationCount":"1","resultStr":"{\"title\":\"Learning-driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things\",\"authors\":\"Praveen Kumar Donta,&nbsp;Edmundo Monteiro,&nbsp;Chinmaya Kumar Dehury,&nbsp;Ilir Murturi\",\"doi\":\"10.1002/nem.2250\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Ubiquitous edge computing facilitates efficient cloud services near mobile devices, enabling mobile edge computing (MEC) to offer services more efficiently by presenting storage and processing capability within the proximity of mobile devices and in general IoT domains. However, compared with conventional mobile cloud computing, ubiquitous MEC introduces numerous complex challenges due to the heterogeneous smart devices, network infrastructures, and limited transmission bandwidth. Processing and managing such massive volumes of data generated from these devices is complex and challenging in edge infrastructures. On the other side, time-critical applications have stringent requirements such as ultra-low-latency, energy cost, mobility, resource, and security issues that cannot be neglected. For example, smart healthcare or industrial networks generate emergency information very frequently (i.e., often in terms of milliseconds), which needs to be processed near the sensing devices with minimal processing delay. In this context, future generation IoT requires robust and intelligent network management approaches that can handle the system complexity (e.g., scalability and orchestration) with little or no little human intervention and offer a better service to end-users. More precisely, AI/ML approaches designed explicitly for networks under high traffic volume of data help overcome several management challenges, such as (i) improving performance by balancing load and traffic, (ii) distributing the bandwidth spectrum based on demand, and (iii) traffic predictions. Moreover, this need also opens several new research directions such as new MEC architecture, service provisioning technique, security mechanisms, advanced 5G or beyond communication technology, ambient intelligence, and AI/ML-based solutions.</p><p>This issue collect surveys and contribution articles on emerging trends and technologies in ubiquitous MEC for future generation IoT networks and their managements. The papers related to machine learning, deep learning, optimization, blockchain, 5G, or beyond solutions, especially for domain-specific IoT network management, which use MEC environments, are collected after evaluating the review process. Each paper submitted to this special issue was reviewed by three to seven experts during the assessment process. At the end we consider one survey paper and four research contributions.</p><p>The first paper <i>Ravi et al.</i> proposed a survey on “Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks.” This survey presents recently published stochastic modeling-based algorithms for VANETs. This article briefly covers various queueing models for the reader's convenience. This paper discusses a variety of VANET issues such as mobility, routing, data dissemination, cooperative communication, congestion control, and traffic load balancing issues addressed by stochastic modeling techniques. The authors provided extensive open challenges for young researchers on several network management topics such as zero-touch provisioning, blockchain, intelligent digital twin, cooperative communication among vehicles, and routing predictions according to vehicle mobility. These topics are emerging in this area, and they are open to further research.</p><p>The second paper <i>Song et al.</i> contributed on “A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment.” The proposed work aims to secure the transmission of model parameters between IoT terminals during a federated learning process. With the key self-verification algorithm, the model legitimizes the public and private keys of the terminal, which greatly enhances their security. In order to protect against terminal identity leakage, <i>Song et al.</i> provide an attribute-based cryptographic method; the terminal generates ciphertext attributes and gives them to the cloud server. The security of sharing the parameters of each model in the FL process is guaranteed. Terminal self-adaptive is achieved by defining access structures to meet shared resource access rights. Upon satisfying the access authority, each terminal stores and downloads the shared ciphertext model parameters from the edge-cloud server.</p><p>Third, <i>Arora et al.</i> contributed a paper entitled “Blockchain-inspired lightweight trust-based system in vehicular networks.” This paper proposes a trust-based vehicle registration paradigm that uses certificate authorities. Further a blockchain-based system is used to provide efficient two-way authentication and key agreement through encryption and digital signatures. As a result, the proposed scheme is efficient for establishing distributed trust management, which offers privacy protection for vehicles. The source code for the proposed scheme is openly available in Github for the readers to explore further.</p><p>Fourth, <i>Cao et al.</i> contributed a paper on “Dynamic management network system of automobile detection applying edge computing.” This paper proposes an architectural architecture to detect vehicle deviation dynamically through greedy methods and a mixed-integer linear programming. In this architecture, the authors used various sensors to acquire data from vehicles and edge computing to detect deviation. This model can quickly analyze any vehicle's deviation and control congestion during data transmissions.</p><p>Fifth, <i>Jafar et al.</i> proposes “A blockchain-enabled security management framework for mobile edge computing,” which guarantees secure data storage and includes blockchain features like immutability and traceability. The framework also includes a smart contract-based access and sharing mechanism, and simulations show that it offers high security, low latency, and low operations cost for resource-constrained MEC devices.</p><p>Data offloading is one of the primary challenges in edge computing, and it is more complex in MEC. These devices benefit from efficient data offloading by improving performance, reducing latency, and conserving energy. To address this challenge, <i>Samriya et al.</i> proposed “Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing.” In this paper, a reinforcement learning-based Markov decision process offloading model is proposed to overcome computational complexities, secured and efficient offloading. This work optimizes energy efficiency, and mobile users' time by considering the constrained computation of IoT devices, and also ensures efficient resource sharing among multiple users.</p><p>Seventh, <i>Singh et al.</i> proposed “Load balancing clustering and routing for IoT-enabled wireless sensor networks,” in which an energy-efficient and reliable routing protocol is designed using fuzzy C-means and grey wolf optimization. This approach confirms improvements in different parameters such as total energy consumed, packet delivery ratio, packet drop rate, throughput, delay, remaining energy, and total network lifetime. The authors provide their simulation code open through Github (https://github.com/Shanky197197/WSN-code) to the researchers for further exploration.</p><p>Lastly, <i>Babu et al.</i> contributed an article entitled “Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system.” This paper shows a proof of concept to secure the fog-based IoT nodes with device-to-device communication through blockchain system. In this paper, blockchain is used primarily to achieve localized authentication, which further reduces latency and increases throughput. The results of this work confirm the superiority of the proposed Fog-Sec in terms of time complexity, and efficiency such as low latency and high throughput. The source code for the proposed Fog-Sec is available for readers on request. Readers can access it through the link https://drive.google.com/drive/folders/16jbzCrBbaBhbm-dwZmMxfFXg_jOO-Hen?usp=share_link or Reference 31 in the paper.</p><p>We believe that these <i>eight</i> papers make significant contributions and offer valuable insights into the challenges and opportunities of ubiquitous MEC. As a result of this special issue, we hope that more research will be conducted in this area to address network management challenges for the future generation of IoT through ubiquitous MEC and various learning models.</p><p>We are extremely grateful to academic experts who voluntarily gave their time and contributed works to maintaining the high quality standards of the Journal. We would like to sincerely thank all reviewers who participated in the manuscript assessment process and timely returning the review reports to made decisions timely for this special issue. We sincerely thank Prof. James Won-Ki Hong (EiC), Prof. Lisandro Zambenedetti Granville (Associate EiC), and Prof. Jérôme François (Associate EiC). We also thank the editorial office of the IJNM, Wiley Journal who were instrumental in providing a rapid and efficient editorial process.</p><p>The guest editors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.</p>\",\"PeriodicalId\":14154,\"journal\":{\"name\":\"International Journal of Network Management\",\"volume\":\"33 5\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2023-09-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2250\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Network Management\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/nem.2250\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/nem.2250","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 1

摘要

无处不在的边缘计算促进了移动设备附近的高效云服务,使移动边缘计算(MEC)能够通过在移动设备附近和一般物联网领域提供存储和处理能力来更高效地提供服务。然而,与传统的移动云计算相比,由于异构的智能设备、网络基础设施和有限的传输带宽,无处不在的MEC带来了许多复杂的挑战。在边缘基础设施中,处理和管理这些设备生成的大量数据既复杂又具有挑战性。另一方面,时间关键型应用程序有着严格的要求,如超低延迟、能源成本、移动性、资源和安全问题,这些都不容忽视。例如,智能医疗保健或工业网络非常频繁地生成紧急信息(即,通常以毫秒为单位),这些信息需要在传感设备附近以最小的处理延迟进行处理。在这种情况下,未来一代物联网需要稳健和智能的网络管理方法,这些方法可以在很少或根本不需要人工干预的情况下处理系统复杂性(例如,可扩展性和协调性),并为最终用户提供更好的服务。更准确地说,专门为高流量数据下的网络设计的AI/ML方法有助于克服一些管理挑战,例如(i)通过平衡负载和流量来提高性能,(ii)根据需求分配带宽频谱,以及(iii)流量预测。此外,这一需求还开辟了几个新的研究方向,如新的MEC架构、服务提供技术、安全机制、先进的5G或超越通信技术、环境智能和基于AI/ML的解决方案。本期收集了关于未来一代物联网网络及其管理的无处不在的MEC新兴趋势和技术的调查和贡献文章。与机器学习、深度学习、优化、区块链、5G或其他解决方案相关的论文,特别是针对使用MEC环境的特定领域物联网网络管理的论文,是在评估审查过程后收集的。在评估过程中,三至七名专家对提交给本特刊的每份论文进行了审查。最后我们
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Learning-driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things

Ubiquitous edge computing facilitates efficient cloud services near mobile devices, enabling mobile edge computing (MEC) to offer services more efficiently by presenting storage and processing capability within the proximity of mobile devices and in general IoT domains. However, compared with conventional mobile cloud computing, ubiquitous MEC introduces numerous complex challenges due to the heterogeneous smart devices, network infrastructures, and limited transmission bandwidth. Processing and managing such massive volumes of data generated from these devices is complex and challenging in edge infrastructures. On the other side, time-critical applications have stringent requirements such as ultra-low-latency, energy cost, mobility, resource, and security issues that cannot be neglected. For example, smart healthcare or industrial networks generate emergency information very frequently (i.e., often in terms of milliseconds), which needs to be processed near the sensing devices with minimal processing delay. In this context, future generation IoT requires robust and intelligent network management approaches that can handle the system complexity (e.g., scalability and orchestration) with little or no little human intervention and offer a better service to end-users. More precisely, AI/ML approaches designed explicitly for networks under high traffic volume of data help overcome several management challenges, such as (i) improving performance by balancing load and traffic, (ii) distributing the bandwidth spectrum based on demand, and (iii) traffic predictions. Moreover, this need also opens several new research directions such as new MEC architecture, service provisioning technique, security mechanisms, advanced 5G or beyond communication technology, ambient intelligence, and AI/ML-based solutions.

This issue collect surveys and contribution articles on emerging trends and technologies in ubiquitous MEC for future generation IoT networks and their managements. The papers related to machine learning, deep learning, optimization, blockchain, 5G, or beyond solutions, especially for domain-specific IoT network management, which use MEC environments, are collected after evaluating the review process. Each paper submitted to this special issue was reviewed by three to seven experts during the assessment process. At the end we consider one survey paper and four research contributions.

The first paper Ravi et al. proposed a survey on “Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks.” This survey presents recently published stochastic modeling-based algorithms for VANETs. This article briefly covers various queueing models for the reader's convenience. This paper discusses a variety of VANET issues such as mobility, routing, data dissemination, cooperative communication, congestion control, and traffic load balancing issues addressed by stochastic modeling techniques. The authors provided extensive open challenges for young researchers on several network management topics such as zero-touch provisioning, blockchain, intelligent digital twin, cooperative communication among vehicles, and routing predictions according to vehicle mobility. These topics are emerging in this area, and they are open to further research.

The second paper Song et al. contributed on “A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment.” The proposed work aims to secure the transmission of model parameters between IoT terminals during a federated learning process. With the key self-verification algorithm, the model legitimizes the public and private keys of the terminal, which greatly enhances their security. In order to protect against terminal identity leakage, Song et al. provide an attribute-based cryptographic method; the terminal generates ciphertext attributes and gives them to the cloud server. The security of sharing the parameters of each model in the FL process is guaranteed. Terminal self-adaptive is achieved by defining access structures to meet shared resource access rights. Upon satisfying the access authority, each terminal stores and downloads the shared ciphertext model parameters from the edge-cloud server.

Third, Arora et al. contributed a paper entitled “Blockchain-inspired lightweight trust-based system in vehicular networks.” This paper proposes a trust-based vehicle registration paradigm that uses certificate authorities. Further a blockchain-based system is used to provide efficient two-way authentication and key agreement through encryption and digital signatures. As a result, the proposed scheme is efficient for establishing distributed trust management, which offers privacy protection for vehicles. The source code for the proposed scheme is openly available in Github for the readers to explore further.

Fourth, Cao et al. contributed a paper on “Dynamic management network system of automobile detection applying edge computing.” This paper proposes an architectural architecture to detect vehicle deviation dynamically through greedy methods and a mixed-integer linear programming. In this architecture, the authors used various sensors to acquire data from vehicles and edge computing to detect deviation. This model can quickly analyze any vehicle's deviation and control congestion during data transmissions.

Fifth, Jafar et al. proposes “A blockchain-enabled security management framework for mobile edge computing,” which guarantees secure data storage and includes blockchain features like immutability and traceability. The framework also includes a smart contract-based access and sharing mechanism, and simulations show that it offers high security, low latency, and low operations cost for resource-constrained MEC devices.

Data offloading is one of the primary challenges in edge computing, and it is more complex in MEC. These devices benefit from efficient data offloading by improving performance, reducing latency, and conserving energy. To address this challenge, Samriya et al. proposed “Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing.” In this paper, a reinforcement learning-based Markov decision process offloading model is proposed to overcome computational complexities, secured and efficient offloading. This work optimizes energy efficiency, and mobile users' time by considering the constrained computation of IoT devices, and also ensures efficient resource sharing among multiple users.

Seventh, Singh et al. proposed “Load balancing clustering and routing for IoT-enabled wireless sensor networks,” in which an energy-efficient and reliable routing protocol is designed using fuzzy C-means and grey wolf optimization. This approach confirms improvements in different parameters such as total energy consumed, packet delivery ratio, packet drop rate, throughput, delay, remaining energy, and total network lifetime. The authors provide their simulation code open through Github (https://github.com/Shanky197197/WSN-code) to the researchers for further exploration.

Lastly, Babu et al. contributed an article entitled “Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system.” This paper shows a proof of concept to secure the fog-based IoT nodes with device-to-device communication through blockchain system. In this paper, blockchain is used primarily to achieve localized authentication, which further reduces latency and increases throughput. The results of this work confirm the superiority of the proposed Fog-Sec in terms of time complexity, and efficiency such as low latency and high throughput. The source code for the proposed Fog-Sec is available for readers on request. Readers can access it through the link https://drive.google.com/drive/folders/16jbzCrBbaBhbm-dwZmMxfFXg_jOO-Hen?usp=share_link or Reference 31 in the paper.

We believe that these eight papers make significant contributions and offer valuable insights into the challenges and opportunities of ubiquitous MEC. As a result of this special issue, we hope that more research will be conducted in this area to address network management challenges for the future generation of IoT through ubiquitous MEC and various learning models.

We are extremely grateful to academic experts who voluntarily gave their time and contributed works to maintaining the high quality standards of the Journal. We would like to sincerely thank all reviewers who participated in the manuscript assessment process and timely returning the review reports to made decisions timely for this special issue. We sincerely thank Prof. James Won-Ki Hong (EiC), Prof. Lisandro Zambenedetti Granville (Associate EiC), and Prof. Jérôme François (Associate EiC). We also thank the editorial office of the IJNM, Wiley Journal who were instrumental in providing a rapid and efficient editorial process.

The guest editors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Network Management
International Journal of Network Management COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
5.10
自引率
6.70%
发文量
25
审稿时长
>12 weeks
期刊介绍: Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.
期刊最新文献
Issue Information Security, Privacy, and Trust Management on Decentralized Systems and Networks A Blockchain-Based Proxy Re-Encryption Scheme With Cryptographic Reverse Firewall for IoV Construction of Metaphorical Maps of Cyberspace Resources Based on Point-Cluster Feature Generalization Risk-Aware SDN Defense Framework Against Anti-Honeypot Attacks Using Safe Reinforcement Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1