Special Issue "Mobile Edge Computing"

A special issue of Computers (ISSN 2073-431X).

Deadline for manuscript submissions: closed (30 May 2018)

Special Issue Editors

Guest Editor
Prof. Dr. Thomas Magedanz

Software-based Networks (NGNI), Fraunhofer FOKUS, Berlin, Germany
Website | E-Mail
Interests: software-based converging networks; service platforms; edge computing; network slicing
Guest Editor
Dr. Alexander Willner

Industrial Internet of Things (IIoT), Technische Universität Berlin, Berlin, Germany
Website | E-Mail
Interests: IIoT; Edge and Fog Computing; Service Virtualization and Orchestration; Semantic Interoperability
Guest Editor
Dr. Stefano Secci

LIP6, Sorbonne Université Pierre et Marie Curie (UPMC), 75005 Paris, France
Website | E-Mail
Interests: network virtualization; orchestration; optimization

Special Issue Information

Dear Colleagues,

Mobile Edge Computing/Multi-access Edge Computing (MEC) is a rapidly growing area of research, coping with the many challenges that the virtualization of mobile access networks and services is creating. In particular, the elasticity created by the virtualization of network functions can only be fully exploited if an adequate management control is in place. Relevant computing architecture, protocols, orchestration algorithms, monitoring systems, and Application Programming Interfaces (APIs) need to be specified to meet the various requirements that are imposed by different domains. This Special Issue targets related contributions that can be applied to the continuum of hierarchically distribution services between end devices, edge nodes and the cloud. In this context, interesting challenges related to edge connectivity, real-time enablement, optimization of data distribution and aggregation of data, edge intelligence and security arise. Therefore, the topics of interest for submission include, but are not limited to:

  • Mobile Edge and Fog Computing architectures and protocols
  • Connectivity enhancements for Edge Devices
  • Virtual network overlay protocols
  • Network programming (SDN) aspects in MEC provisioning
  • Network virtualization (NFV) aspects in MEC provisioning
  • Orchestration algorithms
  • Edge application design
  • Heterogeneous data aggregation and modeling
  • End device and Edge enhancements in support of MEC services
  • End device and Edge data analytics
  • Autonomous Cyber-Physical Systems at the edge
  • Security for distributed Edge clouds
  • Industrial Internet of Things (IIoT) Fog and Edge applications
Prof. Dr. Thomas Magedanz
Dr. Alexander Willner
Dr. Stefano Secci
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 350 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • MEC (Mobile Edge Computing / Multi-access Edge Computing)
  • Edge Computing
  • Edge Intelligence
  • Fog Computing
  • NFV (Network virtualization)
  • SDN (Network programming)
  • Network Slicing
  • 5G
  • IIoT (Industrial Internet of Things)
  • NGI
  • Future Networks

Published Papers (2 papers)

View options order results:
result details:
Displaying articles 1-2
Export citation of selected articles as:

Research

Open AccessFeature PaperArticle BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT
Received: 2 May 2018 / Revised: 3 July 2018 / Accepted: 11 July 2018 / Published: 13 July 2018
PDF Full-text (1365 KB) | HTML Full-text | XML Full-text
Abstract
While Internet of Things (IoT) technology has been widely recognized as an essential part of Smart Cities, it also brings new challenges in terms of privacy and security. Access control (AC) is among the top security concerns, which is critical in resource and
[...] Read more.
While Internet of Things (IoT) technology has been widely recognized as an essential part of Smart Cities, it also brings new challenges in terms of privacy and security. Access control (AC) is among the top security concerns, which is critical in resource and information protection over IoT devices. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanism to meet the requirements of IoT systems. Another weakness in today’s AC is the centralized authorization server, which can cause a performance bottleneck or be the single point of failure. Inspired by the smart contract on top of a blockchain protocol, this paper proposes BlendCAC, which is a decentralized, federated capability-based AC mechanism to enable effective protection for devices, services and information in large-scale IoT systems. A federated capability-based delegation model (FCDM) is introduced to support hierarchical and multi-hop delegation. The mechanism for delegate authorization and revocation is explored. A robust identity-based capability token management strategy is proposed, which takes advantage of the smart contract for registration, propagation, and revocation of the access authorization. A proof-of-concept prototype has been implemented on both resources-constrained devices (i.e., Raspberry PI nodes) and more powerful computing devices (i.e., laptops) and tested on a local private blockchain network. The experimental results demonstrate the feasibility of the BlendCAC to offer a decentralized, scalable, lightweight and fine-grained AC solution for IoT systems. Full article
(This article belongs to the Special Issue Mobile Edge Computing)
Figures

Figure 1

Open AccessFeature PaperArticle Improving Efficiency of Edge Computing Infrastructures through Orchestration Models
Received: 22 May 2018 / Revised: 14 June 2018 / Accepted: 14 June 2018 / Published: 20 June 2018
PDF Full-text (510 KB) | HTML Full-text | XML Full-text
Abstract
Edge computing is an effective paradigm for proximity in computation, but must inexorably face mobility issues and traffic fluctuations. While software orchestration may provide effective service handover between different edge infrastructures, seamless operation with negligible service disruption necessarily requires pre-provisioning and the need
[...] Read more.
Edge computing is an effective paradigm for proximity in computation, but must inexorably face mobility issues and traffic fluctuations. While software orchestration may provide effective service handover between different edge infrastructures, seamless operation with negligible service disruption necessarily requires pre-provisioning and the need to leave some network functions idle for most of the time, which eventually results in large energy waste and poor efficiency. Existing consolidation algorithms are largely ineffective in these conditions because they lack context, i.e., the knowledge of which resources are effectively used and which ones are just provisioned for other purposes (i.e., redundancy, resilience, scaling, migration). Though the concept is rather straightforward, its feasibility in real environments must be demonstrated. Motivated by the lack of energy-efficiency mechanisms in cloud management software, we have developed a set of extensions to OpenStack for power management and Quality of Service, explicitly targeting the introduction of more context for applications. In this paper, we briefly describe the overall architecture and evaluate its efficiency and effectiveness. We analyze performance metrics and their relationship with power consumption, hence extending the analysis to specific aspects that cannot be investigated by software simulations. We also show how the usage of context information can greatly improve the effectiveness of workload consolidation in terms of energy saving. Full article
(This article belongs to the Special Issue Mobile Edge Computing)
Figures

Figure 1

Back to Top