Next Article in Journal
A Multi-Scale Feature Fusion Hybrid Convolution Attention Model for Birdsong Recognition
Previous Article in Journal
Direction-Aware Lightweight Framework for Traditional Mongolian Document Layout Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Comprehensive Review of Edge Computing for Power Systems: State of the Art, Architecture, and Applications

by
Fatma Yıldırım
1,*,
Yunus Yalman
1,
Kamil Çağatay Bayındır
1 and
Erman Terciyanlı
2
1
Department of Electrical and Electronics Engineering, Ankara Yildirim Beyazit University and Endoks Energy, Ankara 06170, Turkey
2
Inavitas Energy, Ankara 06170, Turkey
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(8), 4592; https://doi.org/10.3390/app15084592
Submission received: 15 March 2025 / Revised: 10 April 2025 / Accepted: 16 April 2025 / Published: 21 April 2025
(This article belongs to the Special Issue Applications of Artificial Intelligence in the Novel Power System)

Abstract

:
The increasing complexity of conventional energy distribution systems, combined with the growing demand for efficient data processing, has necessitated the implementation of smart grid technologies and the integration of advanced computing paradigms such as edge computing. Traditional cloud-based solutions face significant challenges, including high latency, limited bandwidth, and cybersecurity vulnerabilities, rendering them less effective for real-time smart grid applications. Edge computing enables localized data processing, which significantly reduces latency and optimizes bandwidth usage. These capabilities enhance the resilience and intelligence of modern energy systems. This paper presents a systematic review of edge computing in energy distribution systems, examining its architectures, methodologies, and real-world applications. Key application areas consist of real-time data transmission, smart metering, microgrid management, anomaly and fault detection, state estimation, and energy management. The analysis shows how edge computing improves secure communication, supports decentralized intelligence, and facilitates scalable energy optimization. Beyond these advantages, the review also identifies critical challenges such as interoperability issues, resource constraints, and security vulnerabilities. By categorizing edge computing applications, the findings provide a comprehensive reference for both researchers and industry professionals working on the development of next-generation energy management systems.

1. Introduction

The increasing demand for smart energy systems has led to a rapid rise in the number and variety of Internet of Things (IoT)-based smart devices in power systems [1]. IoT has emerged as a key enabler of smart grids, facilitating real-time monitoring, predictive maintenance, and decentralized control of energy systems [2]. This technological transformation not only enhances system efficiency but also lays the foundation for more resilient and adaptable grids, which are critical for the future of energy management. However, the exponential growth in the number of IoT devices has resulted in massive data generation, necessitating high bandwidth and powerful data processing infrastructures. Projections made over a decade ago foreshadowed this trend: Cisco Internet Business Solutions Group (IBSG) predicted that the number of internet-connected smart devices would reach approximately 25 billion by 2015 and 50 billion by 2020 [3]. According to the International Data Corporation (IDC), the amount of digital data generated in 2010 exceeded 1 zettabyte, and as of 2012, approximately 2.5 exabytes of data are generated every day [4]. Dell Technologies estimated that by 2025, there would be 41.6 billion IoT devices worldwide, generating a total of 79.4 zettabytes of data [5]. This exponential data growth calls for innovative solutions to handle the surge in data traffic and to ensure the effective management of network resources.
The increasing volume of data generated by IoT devices necessitates advanced big data analytics and processing capabilities. Cisco’s 2018–2023 report highlights the urgent need for innovative solutions in network architecture and data management to address the challenges posed by this data explosion [6]. This underscores the importance of developing efficient network infrastructures and management frameworks capable of accommodating the exponential growth in connected devices and data traffic.
In response to the increasing demands of modern data management, cloud computing (CC) emerged as a significant technological advancement. Introduced by IBM and Google in 2007, CC provided new methodologies for software development, particularly in addressing the challenges of internet-scale applications. These technologies offered scalability, flexibility, and distributed data management, enabling businesses to manage their data without the need for on-premises infrastructure [7]. CC provides flexibility and scalability in storing, accessing, and processing data. This technology is seen as a unique solution for delivering applications to businesses [8]. However, while CC offered scalable solutions, it also introduced new challenges, particularly in the area of security. As cloud providers increasingly host vast amounts of sensitive data and core business applications, ensuring the confidentiality, integrity, and security of these data have become a pressing issue [9]. Today, security and privacy issues have emerged as major challenges when cloud providers hosting large datasets and core applications share these data with their customers [10]. Thus, although CC has provided a flexible and scalable solution for businesses, its rapid adoption has also highlighted the need for robust security frameworks to address the growing risks associated with cloud environments. The rapid expansion of the IoT has led to an unprecedented surge in data generation at the network edge. Traditional CC architectures struggle to efficiently process this influx of information while maintaining low latency and high security. Relying solely on centralized cloud processing increases response times, exacerbates bandwidth congestion, and elevates privacy risks. To address these limitations, fog computing (FC) emerged as an intermediate solution that reduces network traffic and provides storage and computation near the edge of the network [11]. Existing solutions such as FC attempt to bridge this gap, yet they remain insufficient for real-time, latency-sensitive applications [12]. To overcome these challenges, EC has emerged as a more effective approach by enabling localized data processing at the source. Unlike CC, EC minimizes communication latency by reducing the distance data must travel before being analyzed, resulting in significantly lower response times [13]. At this point, EC significantly reduces communication latency compared to the cloud by processing data at the source. Time-sensitive data analysis tasks can be processed at the edge to reduce the latency caused by data transfer [14]. Still, EC not only provides the advantage of low latency but also has the potential to solve energy consumption, bandwidth overhead, and security issues. This localized processing reduces the latency associated with data transfer and offers distinct advantages for time-sensitive applications. EC not only provides the benefit of low latency but also has the potential to address issues related to energy consumption, bandwidth overhead, and security [15].
Each of the existing works in the literature focuses on different aspects of the applications of EC in smart grids, often delving into specific areas. For instance, ref. [16] provides an overview of the potential of EC in the SG, noting that only a limited number of studies have directly applied EC to SG. Ref. [17] provides a theoretical framework, concentrating on the hardware and software components of the EC-CC information architecture, but with limited coverage of practical application scenarios. Ref. [18] provides an overview of IoT and edge computing-based smart grid systems, addressing their architecture, integration with SCADA systems, and key challenges such as scalability, sustainability, security, and resilience. In this context, it focuses on key application areas such as power distribution monitoring, microgrids, and advanced metering systems. Similarly, ref. [19] proposes solutions for IoT-based smart grids where cloud computing is insufficient, such as real-time data processing, terminal management, and privacy protection. In the reviews on fog computing and related paradigms (including EC) [20], research topics have been categorized and classified. Ref. [21] introduces the emergence and capabilities of EC, examines state-of-the-art architectural developments, and explores communication techniques.
This paper synthesizes the fragmented nature of the existing literature, systematically analyzing the relationships between EC, FC, and CC paradigms in power systems, both theoretically and practically. It spans all layers of power systems, from generation to consumption, from transmission to load management, from security to data privacy, and from field applications to energy optimization. The role of information technology (IT) paradigms, previously addressed in a fragmented manner in the literature, is integrated with an energy systems perspective. Therefore, this paper provides a unique and in-depth contribution to the literature by offering a comprehensive, multi-layered, and comparative overview, including application scenarios, advantage-disadvantage analyses, and future research directions. By performing so, it establishes a structured framework for evaluating the impact of EC on modern power systems, considering various computational methodologies, technological advancements, hardware and software components, architectural approaches, and application domains. A systematic literature review was conducted, encompassing over 500 publications. From these, 237 relevant and cohesive studies were selected for detailed analysis. These included peer-reviewed research articles, conference proceedings, and technical reports. The sources were drawn from a variety of applied science journals, including those focused on energy systems, computer science, and electrical engineering. The review also incorporated publications from prominent energy systems conferences related to smart grids, power distribution, and renewable energy technologies.
The main contributions of this study are as follows:
  • Systematic Literature Review: A systematic review is conducted to analyze the role of EC in energy distribution systems, addressing its potential advantages and limitations in comparison to other computing paradigms.
  • Technical Comparison of Computing Architectures: EC is critically compared with CC and FC in terms of essential criteria such as latency, computational efficiency, data transmission, and security, emphasizing their contextual applicability in power systems.
  • Real-Time Data Processing and Optimization Techniques: The integration of EC with communication protocols such as Minimum Message Queuing Telemetry Transport (MQTT) and Advanced Message Queuing Protocol (AMQP), container technologies like Docker and Kubernetes, and AI-driven predictive maintenance models is explored. The study also analyzes the role of EC in sensor data processing to enhance fault prediction accuracy and optimize demand-side management in energy systems.
  • Technological Components and Infrastructure: The role of hardware and software architectures in EC-enabled energy systems is analyzed. The study explores computational frameworks, edge devices, virtualization technologies, and distributed resource allocation strategies that contribute to the efficient deployment of EC.
  • Applications in Power Systems: The advantages of EC in various power system applications, including data transmission, real-time monitoring and control, microgrid systems, smart metering, anomaly detection, state estimation, energy management, and fault detection, are assessed in terms of their contributions to grid stability, operational efficiency, and system reliability. The study evaluates how EC-based solutions improve energy consumption modeling, enable decentralized energy management, optimize grid stability, and enhance system reliability.
  • Security and Privacy Solutions: By identifying major vulnerabilities in EC-powered energy systems, the paper proposes mitigation strategies including decentralized authentication, hybrid encryption, and secure transmission protocols to strengthen system resilience.
  • Future Research Directions: Key areas requiring further investigation are highlighted, including scalable EC architectures, energy-efficient edge processors, advanced data management techniques, and the integration of distributed AI applications to enhance the resilience and efficiency of energy systems.
The structure of this paper is illustrated in Figure 1 and organized as follows. Section 2 presents an overview of various computing paradigms utilized in power systems, including CC, EC, FC, Mobile Cloud Computing (MCC), and Mobile Edge Computing (MEC). It also presents a comparative analysis of these paradigms, highlighting their respective strengths and limitations in the context of energy distribution systems. Section 3 examines the core technologies, hardware, and software tools employed in EC, with subsections dedicated to data processing techniques, container technologies, communication protocols, and the software platforms and hardware tools that facilitate EC deployment. Section 4 discusses the diverse applications of EC systems, such as data transmission, monitoring and control, microgrid systems, smart metering, anomaly detection, state estimation, energy management, and fault detection. In Section 5, security and privacy concerns associated with EC are addressed, and potential solutions are proposed. Section 6 identifies the challenges faced by EC systems and outlines potential future research directions to advance the field. Finally, Section 7 concludes the paper by summarizing the key findings and contributions.

2. Architecture and Framework of Computing Methods

2.1. Cloud Computing

CC refers to the delivery of storage, services, and application resources over the Internet [22]. The National Institute of Standards and Technology (NIST) defines CC as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” [23]. This model offers significant advantages, including cost efficiency, resource scalability, and broad accessibility. However, despite these benefits, CC also presents several critical challenges. Its widespread and centralized nature increases its vulnerability to cyber threats, making it an attractive target for various forms of cyberattacks [24]. Issues such as data breaches, insecure APIs, and shared vulnerabilities are particularly concerning in applications that handle sensitive information [9].
Another fundamental limitation of CC lies in its insufficient support for latency-sensitive applications, particularly within IoT environments. Although cloud data centers are adept at processing large volumes of IoT-generated data efficiently, their centralized architecture often introduces latency, which impedes real-time responsiveness. While some studies have explored optimization strategies to reduce these delays in CC-based systems, others argue that inherent structural limitations hinder their ability to meet stringent real-time requirements [25]. This limitation is particularly critical in power management systems, where timely, data-driven decisions are essential for maintaining stability and reliability [26]. For instance, cloud-based implementations using heuristic techniques such as genetic algorithms (GA) have been developed to schedule IoT requests and minimize overall latency [27]. However, these solutions frequently fail to meet the stringent real-time performance requirements. As a result, emerging paradigms like FC and EC have gained traction for their ability to process data closer to the source, thereby reducing response times and enhancing system performance [28].
Despite its latency challenges, CC remains integral to supporting the self-healing capabilities of smart grids, thereby contributing to energy savings and enhancing operational efficiency [29]. Its integration has become increasingly important with the growing deployment of renewable energy resources, as CC enhances both system stability and reliability [30]. By optimizing resource allocation through techniques such as time-sharing of computing cores, CC facilitates cost-effective and efficient computational processes across multiple devices [31]. Moreover, CC-based simulation platforms offer practical and economical solutions for power system analysis and decision-making support. For instance, in [32], a cloud-based framework is presented that monitors and controls power generation and consumption to minimize energy waste. CC-based optimization systems also play a critical role in extending the operational life of hybrid renewable energy systems and battery storage technologies, enabling more flexible and adaptive power distribution models [33]. The advancements in CC also improve storage performance and adaptive control mechanisms in energy management systems.
Despite these advantages, challenges persist. The efficient utilization of renewable energy resources in smart grids is hindered by issues related to big data management and the intermittent nature of renewable energy sources. To address these challenges, ref. [34] highlights the necessity of incorporating CC into smart grid energy management, emphasizing its role in handling large-scale data processing and decision-making. A specific model, CloudIoT, has been introduced to address the complexity of managing vast data streams and user demands in IoT-integrated smart networks [35]. This model improves interoperability and facilitates the seamless integration of CC and IoT technologies. Studies such as [36,37] analyze the synergistic benefits of CC and IoT, demonstrating how this combination enhances performance, scalability, and adaptability in smart grids.

2.2. Edge Computing

EC is a network paradigm that aims to perform computations as close as possible to the data source in order to reduce latency and optimize bandwidth usage. In other words, it refers to offloading certain processes from centralized cloud environments to localized nodes to localized locations, such as a user’s computer, an IoT device, or an edge server [38]. More specifically, ref. [12] defines EC as “a new computing model performed at the edge of the network” and encompassing network resources and computing processes between the data source and the CC center. Ref. [39] emphasizes that EC aims to provide more efficient services by placing computing and storage resources closer to mobile devices or sensors at the network edge. Similarly, ref. [40] states that EC delivers real-time services by reducing transmission delays and bandwidth usage with computing and storage resources placed at the edge of the network. This technology enhances data processing and network optimization by providing front-end computational support for applications such as mobile devices and the IoT.
EC refers to the decentralization of storage and computing resources and locating them closer to the data source. In this approach, raw data are analyzed directly near the network edge rather than being sent to a central cloud server for processing and analysis [41]. Moreover, EC refers to the physical computing infrastructure positioned between the device and the hyperscale cloud, enabling support for various applications. In ref. [42], EC provides to provide more efficient and faster services by bringing the capabilities of CC closer to the device, i.e., the data source.
EC is particularly effective in smart grid systems due to its ability to perform computations closer to the data source, reducing latency and optimizing bandwidth usage. It consists of a three-layer architecture: (1) the device layer, including edge devices (2) the edge server layer and (3) the cloud layer [43]. The device layer includes various edge devices with limited computing and storage resources, such as sensors, actuators, and IEDs (e.g., relays, energy analyzers, and quality recorders) located in distribution centers of the power grid, which are responsible for data collection. This layer offers faster and more flexible solutions by processing current, voltage, and fault current data from IEDs when anomaly conditions are detected. The network connecting the device layer to the edge server layer and the edge server to the cloud server layer requires high resolution, high data rates, and high bandwidth for data transmission. Wireless connections are often preferred over wired connections. The edge server layer, positioned between the cloud server layer and the device layer, brings the cloud server tasks closer to the data source, reducing latency and bandwidth usage [21]. The cloud server layer is responsible for further processing and managing large volumes of data that have been pre-processed at the edge server layer. Figure 2a illustrates the general hierarchical architecture of EC.
The literature contains numerous applications of EC across various domains. In Industry 4.0, ref. [44] examines the integration of EC with Smart Manufacturing applications, highlighting its benefits during the digital phase of the Physical-Digital-Physical (PDP) cycle and advancements in Industry 4.0. Ref. [45] explores the use of computational intelligence (CI) techniques to address challenges such as resource allocation and task offloading in both CC and EC, emphasizing the complex nature of these optimization problems, including their convexity and NP-hardness. Furthermore, EC has been proposed as a solution to the big data problem generated by IoT-connected devices by offering distributed computation and storage services, and a distributed multi-level storage (DMLS) model and multi-factor least utilized (mLFU) algorithm have been used to manage constrained resources [46].
In the energy sector, ref. [47] focuses on improving efficiency by analyzing existing architecture and decision-making criteria, utilizing optimization algorithms, and SWOT analysis to support edge offloading and the implementation of AI-enabled energy services in smart grids. Ref. [48] emphasizes that EC focuses on providing services and computations near the source of data generation to meet the needs of industry and real-time applications. Ref. [49] proposes a communication and computation resource allocation model to optimize offloading decisions between multi-access edge computing and cloud servers. This model aims to optimize performance while minimizing resource usage for computation offload requests with low latency requirements. Ref. [50] investigates how EC enhances IoT by bringing data processing and storage closer to the user while simultaneously highlighting significant risks to data security and privacy despite the improved quality of service. Ref. [51] examines EC and edge artificial intelligence (Edge AI) applications, presenting approaches for deploying AI algorithms on edge devices. These studies comprehensively address the potential and challenges of EC in various domains.

2.3. Fog Computing

FC is an architecture designed to extend cloud capabilities by integrating computation, storage, and networking services along a continuum between end devices and centralized cloud data centers [52]. Introduced by Cisco Systems in 2012, FC is described as “an extension of the CC paradigm that provides computation, storage, and networking services between end devices and traditional cloud servers” [53]. Cisco applied this technology by extending the CC paradigm to the edge of networks, specifically wireless networks for the Internet of Things (IoT) [46]. The OpenFog Consortium defines FC as “a horizontal system-level architecture that distributes compute, storage, control, and networking functions closer to users along the continuum from the cloud environment to objects” [54]. For instance, compared to large-scale cloud data centers (e.g., Microsoft Azure regions), an IoT device typically communicates with a fog node that resides in closer proximity [55]. Figure 2b illustrates a three-tier fog system: the cloud layer, the fog layer, and the IoT/end-user layer. The fog layer can consist of one or more fog domains, each managed by different providers. Communication between the IoT/End-user layer and the fog layer occurs over the LAN, while communication with the cloud layer happens over the WAN, sometimes via the fog [56].
FC facilitates a seamless service continuum between cloud infrastructure and end devices, enhancing computing flexibility in heterogeneous environments. These two technologies provide ubiquitous computing, storage, control, and communication capabilities, offering mutually dependent and beneficial services to create a continuous continuum of services. FC is a decentralized computing infrastructure situated between edge devices and the cloud, working with heterogeneous devices. Fog Computing Networks (FCN) support non-IP-based access technologies for communicating with end devices, as well as functions such as resource allocation, security, and device management [57]. By enabling data processing closer to the user, FC minimizes latency and enhances the efficiency of data handling.
To address performance and efficiency requirements in FC environments, ref. [58] introduced a dynamic Integer Linear Programming (ILP) method to optimize resource allocation from the FC layer to IoT devices. This method aims to ensure that tasks are completed within time constraints while minimizing service latency and energy consumption, particularly with devices that have limited processing power and energy capacity. A fog orchestrator is proposed to centrally organize the resource pool, match applications to specific requests, and provide an automated workflow to physical resources [59]. This orchestrator manages deployment and scheduling, performs workload management with runtime quality of service (QoS) control, and aims to manage specific objects efficiently. Resource management remains a challenging problem due to constraints and dynamic workloads. While AI and ML algorithms have been employed to address these challenges, issues such as high variance, explainability, and the difficulty of online training persist [60].
Security and privacy remain critical challenges in FC systems due to their distributed and dynamic architecture. Traditional intrusion detection mechanisms often prove inadequate in such environments. To address this, ref. [61] proposes a distributed deep learning framework designed to detect cyberattacks in edge and fog-based IoT networks. Furthermore, ref. [62] presents FogBus, a framework supporting seamless IoT–Fog–Cloud integration. FogBus supports platform-independent execution for multiple applications and leverages blockchain, encryption, and authentication technologies to ensure security across the continuum.

2.4. Mobile Cloud Computing and Mobile Edge Computing

The IoT enables a wide range of innovative applications aimed at enhancing user experience and quality of life [63]. However, the centralized architecture of CC introduces several limitations, including constrained bandwidth, increased latency, and higher energy consumption, which impede the fulfillment of real-time performance demands. To overcome these challenges, MEC has emerged as a distributed computing paradigm that brings computational and storage resources closer to end-users by integrating edge capabilities into mobile networks [64]. By embedding EC functionalities into mobile infrastructures, MEC supports real-time responsiveness for latency-sensitive applications and enhances network efficiency [65]. In 2014, the European Telecommunications Standards Institute (ETSI), through its Industry Specification Group (ISG), formalized the MEC architecture to enable seamless convergence of cloud functionalities within mobile network environments.
MCC combines mobile computing and cloud computing paradigms by employing computation offloading techniques to mitigate the inherent resource constraints of mobile devices [66]. Despite offering benefits such as extended battery life, enhanced storage capabilities, scalability, and reliability, MCC still faces significant challenges in terms of security, privacy, trust, bandwidth limitations, data management, synchronization, energy efficiency, and system heterogeneity [67]. To alleviate these concerns, MEC shifts control, storage, and processing operations to the network edge, allowing resource-constrained mobile devices to execute computationally intensive, low-latency applications more effectively [68]. In contrast to MCC, where computational tasks are offloaded to remote cloud servers via the Internet, MEC executes processing tasks closer to the end-user, thereby enhancing both Quality of Experience (QoE) and Quality of Service (QoS). A hierarchical deployment architecture for MCC and MEC is illustrated in Figure 2c and Figure 2d, respectively.
The Introductory Technical White Paper defines MEC as a computing paradigm that allows computationally intensive and latency-sensitive tasks to be executed on mobile devices by leveraging unused processing power and storage capacity at the network edge [69]. In parallel, Cisco introduced FC as a broader concept that extends MEC beyond smartphones to include other edge devices, such as set-top boxes [53].
One of the key applications of MEC is face recognition, which involves five main computational steps: image acquisition, face detection, preprocessing, feature extraction, and classification [70]. Moreover, MEC enhances the efficiency and responsiveness of Augmented Reality (AR) applications on mobile devices [71]. These systems typically comprise five essential components: a video source, tracker, mapper, object recognizer, and renderer. While the video source and renderer are executed locally, the tracker, mapper, and object recognizer can be offloaded to the edge server due to their high computational demand [71]. This offloading strategy minimizes redundant data transmission by aggregating user input in shared geographic regions, thereby improving overall system performance and energy efficiency. This approach allows mobile users to fully leverage MEC’s benefits, particularly in reducing latency and improving energy efficiency. A comparison of MEC and MCC systems is provided in Table 1.

2.5. Comparison of Computing Methods

The integration of cloud, fog, edge, and IoT layers forms a multi-tiered architecture, with a central cloud—potentially distributed across various geographies—at the top. Beneath the cloud, multiple fog nodes act as intermediaries, each managing numerous edge devices that, in turn, interface with a wide array of IoT devices [72]. Although EC and FC share overlapping functionalities, their key distinction lies in the scope and location of intelligence deployment. Specifically, FC enables computation directly in IoT devices, thereby aligning more closely with decentralized IoT architectures [42]. Conversely, EC focuses on processing data at or near the data source, thereby reducing latency and alleviating the burden on central cloud infrastructure by transmitting only filtered or aggregated data for deeper analysis. This collaborative ecosystem between CC, FC, and EC fosters efficient, scalable, and resilient solutions across various sectors, including smart manufacturing, energy systems, cybersecurity, and intelligent home automation.
Despite its scalability and processing power, CC faces challenges related to exponential data growth and network bandwidth limitations [73]. By contrast, EC offers superior performance in terms of response time and real-time data processing, making it particularly suitable for time-sensitive applications. However, while edge servers offer better computing and storage capabilities compared to IoT devices, they still lag behind cloud servers in terms of overall computational power. As a result, resource-intensive tasks are often offloaded to cloud infrastructures, which, although providing enhanced processing capabilities, can introduce latency [74]. A comparative overview of CC, FC, and EC is presented in Table 2, outlining their architectural distinctions, latency characteristics, and application domains.
Table 3 presents a detailed comparison of CC, FC, and EC in the context of energy systems, highlighting their differences in latency, energy efficiency, scalability, and real-time processing capabilities. The comparison emphasizes why EC is particularly advantageous for real-time energy management and distributed energy resources (DERs).

3. Technology, Hardware and Software of Edge Computing

3.1. The Technology of Edge Computing

EC technologies in power systems are widely used in distributed computing areas such as data transmission and processing. These technologies also reveal the main working principles of the EC architecture.

3.1.1. Data Processing of Edge Computing

CC often struggles to meet the rising computational demands due to its centralized nature. In contrast, EC addresses this challenge by distributing computation, data storage, and processing to local edge nodes, ensuring more efficient data handling. These edge nodes process and cache data locally, predicting user traffic demands, which helps reduce latency by avoiding the need to download information from remote data centers [75]. Moreover, EC significantly reduces the bandwidth burden on centralized clouds, as it manages data locally and performs real-time computations at the edge, minimizing end-to-end latency. For instance, ref. [76] introduces a method to improve video streaming experiences within smart cities by autonomously creating MEC services. This approach enables seamless data access anytime, anywhere, ensuring optimal QoE while reducing latency. Video streams from monitoring devices are processed and analyzed locally on MEC servers, with relevant information forwarded to application servers to further alleviate network traffic. Furthermore, ref. [77] explores the use of serverless computing platforms to address challenges in running data-intensive applications in edge environments. This approach optimizes computation and data movement by adapting to workload-specific requirements, ensuring efficient use of edge infrastructure.
A growing area of research is the integration of blockchain with EC, primarily to tackle privacy concerns in IoT data processing. To mitigate security risks, specialized EC environments are being developed that continuously monitor and audit node activities. For example, ref. [78] introduces Recordchain, a blockchain architecture tailored to EC environments, addressing bandwidth and security issues effectively. Figure 3 illustrates the data processing flow in EC, where each edge node handles a specific IoT device region, processing data locally and optimizing storage and bandwidth usage. IoT data are categorized as short-term or long-term, with short-term data being discarded once obsolete, ensuring efficient resource utilization.
In efforts to address high transmission delays and limited bandwidth, several studies propose hybrid network architectures that combine CC and EC. For example, ref. [79] introduced a three-layer network architecture designed to reduce communication delays by optimizing device cooperation at the edge layer using Kruskal’s algorithm to compute a minimum spanning tree. Additionally, ref. [80] examines performance metrics such as message transmission delays and response times, focusing on large dataset processing within MEC environments. Another notable proposal for smart grid environments [81] integrates P2P technology with EC to enhance data processing and transmission efficiency through distributed data collection, computation, and storage.
Data management in IoT also benefits from EC by enabling the categorization of data into distinct segments for more efficient processing. Ref. [82] introduces such a framework, while [83] proposes a statistical analysis scheme of multidimensional smart grid data, ensuring user privacy preservation. Moreover, ref. [84] presents an EC-based platform for distributed networks, where computational tasks are distributed across edge nodes prior to central data aggregation. The importance of data security in EC is also evident in studies focused on smart grids. For example, ref. [85] introduces a monitoring model for EC-based grids, which facilitates the timely detection of network failures and supports real-time responses.
The transformational impact of EC on operational efficiency, data security, and business optimization is increasingly acknowledged. By reducing latency and improving autonomous decision-making and analytics capabilities [86], EC is reshaping industries. Research on hardware accelerators for EC underscores their role in achieving low latency, low power consumption, and high reliability. Ref. [87] explores the use of the CORDIC algorithm to pre-calculate micro-rotation directions, proposing a multi-stage structure to enhance EC performance. Overall, these developments demonstrate how EC is reshaping traditional data-handling paradigms by enabling localized, secure, and real-time processing capabilities, particularly in data-intensive and latency-sensitive environments like smart cities and grids.

3.1.2. Container Technology

Container technology is a virtualization method used to increase the portability and efficiency of applications. This technology enables applications to run in an isolated environment with all their dependencies, accelerating software development and deployment processes and optimizing resource usage. Containers are widely preferred in modern infrastructures such as microservice architectures, CC, and EC.

Virtual Technology of Containers

Containers have become a widely adopted method for running applications in EC. However, before an application can be launched, the end node must download the container image, which consists of various layers. Due to the limited bandwidth available in EC environments, the initialization latency due to long download times can significantly impact real-time performance. To mitigate this, ref. [88] proposes a specific sequence for container assignment and layer downloads to minimize initialization latency. While layers in Docker images are not entirely identical, ref. [89] argues that reorganizing the Docker image layers to maximize their overlap can reduce both storage and network consumption. Furthermore, ref. [90] emphasizes that integrating MEC, network function virtualization (NFV), and container-based virtualization technology (CVT) in 5G networks provides low latency, high bandwidth, and agility, creating a flexible and resilient network compatible with IoT devices. In [91], lightweight virtualization technologies are explored in IoT and MEC environments to enhance container efficiency on low-power devices. Additionally, virtualization in Edge/Fog servers supports scalable and high-performance services, as illustrated in Figure 4, which highlights the effectiveness of mechanisms that provide on-demand services by launching customized VMs or containers [92].
Virtualization, or containerization at the operating system level, is commonly used to separate process groups [93]. Prominent projects in this area include Docker (San Francisco, CA, USA), LXC (Global), CoreOS (San Francisco, CA, USA), LMCTFY (Google, Mountain View, CA, USA), and Apache Mesos (San Francisco, CA, USA). Compared to hypervisor-based virtualization, container technology allows for more efficient use of system resources by minimizing overhead and providing a lighter abstraction layer. Hypervisors operate full virtual machines with dedicated operating systems, whereas containers share the host OS, leading to faster performance and reduced resource consumption [94]. In contrast, container technology enables more efficient use of system resources, reducing the overhead.
To enhance flexibility and scalability in application management, container-based virtualization is often utilized in distributed and resilient edge clusters. For instance, Kubernetes (Mountain View, California, USA) and Apache Kafka (San Francisco, California, USA), both leveraging containerization, are implemented in such clusters [95]. Cloud environments favor containerization over hypervisor-based virtualization due to its reduced overhead and more efficient resource utilization. A similar security architecture is proposed in [96] to secure cloud environments using hypervisor-based virtualization. However, cloud providers are progressively adopting containerization to deliver faster and more scalable services by integrating virtualization technologies with self-service capabilities over network infrastructures.
In FC, virtual machines in cloud environments are insufficient to meet the requirements of fog nodes. Therefore, fog nodes use container technology to improve resource utilization and reduce service latency [97]. Docker is the most widely adopted container technology, directly managed by the main kernel [98]. Docker containers are configured through the command line interface (CLI) and Dockerfile, which contains all executable source code, libraries, and dependencies required for initialization.
ARM architectures—commonly used in mobile and low-power systems—are supported by container platforms like Docker and Kubernetes. Docker facilitates the creation of images specifically designed for ARM32 or ARM64 systems. Popular repositories such as Docker Hub provide optimized container images for these platforms. Table 4 illustrates the compatibility of container technologies with ARM-based edge hardware.
Finally, Kubernetes [109] is an open-source platform that manages the entire lifecycle of applications by organizing containers and hosting both VM- and container-based applications. Kubernetes optimizes resource usage by automating deployment, scaling, and maintenance, enabling rapid deployment of custom applications [110].
In summary, container-based virtualization technologies play a crucial role in improving the efficiency, scalability, and flexibility of EC and FC environments. By minimizing latency, optimizing resource usage, and supporting diverse hardware architectures, containers and orchestration tools such as Kubernetes have become indispensable in modern EC infrastructures. These advancements are essential in achieving real-time processing and service continuity, particularly in resource-constrained edge environments.

Container Isolation Technology

Containers enhance the efficiency of application management in EC environments. Containers improve application management in edge environments [111] by utilizing a single core and providing multiple isolated environments with lower overhead compared to VMs [112]. However, containers face limitations in security and isolation. To overcome these challenges, Unikernel, with its simplified architecture, offers higher security and stronger isolation [113]. Some EC systems adopt a hybrid virtualization mode that combines both VMs and containers to manage hardware resources and application services. Table 5 provides examples of virtualization technologies used in EC.
Container-based EC systems have been increasingly adopted for various EC applications due to their ability to run efficiently on low-resource devices. For example, a container-based edge system was implemented on an ARM device in [124], where images were acquired through a container runtime/engine, processed locally, and subsequently transmitted to the cloud for storage and further analysis. This approach highlights the potential of containerized environments in optimizing local data processing and cloud integration.
Container runtimes such as Docker and Containerd are essential technologies for lightweight, efficient EC systems. In [125], two popular container runtime technologies, Docker and Containerd, were evaluated on Raspberry Pi 3 and 4 devices. Docker, owing to its lightweight nature, proved suitable for low-performance IoT devices, offering robustness, simplicity, and portability, while Containerd’s open-source runtime further enhanced these advantages.
In addition to container runtimes, the performance of various ARM-based single-board processors has also been analyzed in the context of containerized applications. A study in [91] evaluated Docker containers on five ARM-based processors, including Raspberry Pi 2 Model B, Raspberry Pi 3 Model B, Odroid C1+, Odroid C2, and Odroid XU4. The findings emphasized the need to consider both task scheduling and containerization to optimize application execution efficiency of applications on edge servers. To address this, a joint task scheduling and containerization (JTSC) scheme was developed in [126]. Furthermore, ref. [127] highlights the importance of container virtualization technology in providing low-latency services in EC and proposes a two-stage optimization storage strategy to reduce image file download time. This strategy optimizes file placement during both container initialization and runtime phases.

3.2. The Software and Tools of Edge Computing

3.2.1. Software Platforms

EC aims to reduce latency and enhance efficiency by processing data closer to the source. Software and tools in this domain play a crucial role in efficiently managing edge infrastructures, optimizing communication between devices, data processing, and resource utilization. There are several programming frameworks that have been specifically designed for EC, with popular choices including MXNet v1.9.1 (Apache Software Foundation, Forest Hill, MD, USA) [128], TensorFlow Lite v.2.17.0 (Google LLC, Mountain View, CA, USA) [129,130], CoreML v.2.3 (Apple Inc., Cupertino, CA, USA) [131], Caffe2 v.0.8.0 (Meta Platforms, Inc., Menlo Park, CA, USA) [132], PyTorch v.2.0 (Meta Platforms, Inc., Menlo Park, CA, USA) [133], and TensorRT v10.9.0.34 (NVIDIA Corporation, Santa Clara, CA, USA) [134]. TensorFlow Lite v.2.17.0 [129], developed by Google (Mountain View, CA, USA), is a version of TensorFlow v.2.15.0 optimized for mobile and edge devices. It uses advanced optimization techniques to perform deep learning model inference with a low latency on edge devices. In contrast, Caffe2 v0.8.0 [132], an updated version of the Caffe v.1.0 framework released by Facebook (Meta Platforms Inc., Menlo Park, CA, USA) in 2017, supports newer computational models such as mobile and distributed computing. It also offers cross-platform support, allowing developers to leverage GPU power on both cloud and edge devices.
FocusStack [135] is another key platform in EC, offering edge-cloud collaboration. By utilizing a container-based execution environment, FocusStack aligns edge devices with the capabilities of their infrastructure, ensuring scalability and efficiency for IoT applications [136]. This collaboration optimizes the deployment of IoT solutions by leveraging the strengths of both edge and cloud computing.
In [137], DeepThings, a framework for the adaptive distributed execution of CNN-based inference applications on IoT edge clusters, is proposed. This framework enhances the flexibility of EC systems by enabling dynamic adaptation to varying workloads, thereby improving computational efficiency in edge environments. Another important contribution is the use of Docker container-based analytics services at the edge for data processing, as highlighted in [138]. This approach reduces latency by processing data locally on edge devices before sending it to the cloud for further analysis. Moreover, the feasibility of deploying a deep learning framework for real-time video stream analysis on a Raspberry Pi is explored, with the MXNet v1.9.1 [139] framework selected for this task. Additionally, TensorFlow v.2.15.0 [140] employs a placement algorithm to distribute computational tasks based on estimated execution and communication times, optimizing the processing flow.

3.2.2. Communication Protocols

The computational workflow is distributed across the IoT devices, edge nodes, and cloud data centers depending on the application’s functional requirements and QoS parameters. In this process, data are transmitted from the IoT device to the edge and then from the edge to the cloud using different communication protocols. Lightweight protocols such as the Constrained Application Protocol (CoAP) and Bluetooth Low Energy (BLE) are commonly employed to connect resource-constrained end devices to edge gateways [141].
To facilitate data flow and monitoring on the edge server, foundational software tools such as Eclipse Mosquitto (implementing the MQTT protocol), Node-RED (a flow-based programming environment), and SQLite (a lightweight SQL database engine) are commonly deployed [142]. MQTT, recognized for its minimal bandwidth and power consumption, follows a lightweight publish/subscribe (pub/sub) model and is widely adopted in edge computing scenarios. Eclipse Mosquitto was selected due to its open-source nature and compatibility with constrained devices. Figure 5 illustrates the operational interactions among these components within the edge environment.
MQTT, as a pub/sub protocol, is supported by various brokers including Eclipse Mosquitto and HiveMQ. To enhance security in MQTT communications, the MQTLS protocol proposed in [143] introduces a mechanism that ensures that brokers read messages only when necessary, enabling selective message delivery between publishers and subscribers. Currently, MQTT security is primarily ensured through the use of the TLS protocol between the client and broker, as illustrated in Figure 6.
AMQP is an open-standard, TCP-based application layer protocol designed for message-oriented environments [144]. Similarly, the Extensible Messaging and Presence Protocol (XMPP) is utilized in instant messaging applications and supports both synchronous (request-response) and asynchronous (pub-sub) communication models. XMPP also relies on TCP as its underlying transport protocol [145].
The MQTT architecture consists of publishers (message-generating entities), intermediaries (components that ensure QoS and security), and subscribers (message receivers) [146]. Table 6 presents a comparative overview of commonly used application-layer communication protocols, emphasizing their respective strengths and use cases in edge and IoT networks.

3.3. The Hardware and Tools of Edge Computing

Edge devices include smartphones, laptops, desktop computers, and distributed servers (e.g., in base stations) [147]. A summary of some end devices is provided in Table 7. Additionally, Table 6 presents hardware that supports the execution of AI algorithms for edge devices, edge nodes, and edge cloud systems in AI of Things (AIoT) applications [16,148].

4. The Application of Edge Computing System

Power systems, encompassing a wide range of components from energy transmission to distribution, are becoming increasingly intelligent with the integration of EC technologies. The increasing need for data processing and the growing complexity of traditional energy distribution networks have made these systems highly dependent on the capabilities of EC. This technology offers innovative solutions in various applications, including data transmission, monitoring and control, microgrid systems, smart meters, anomaly detection, state estimation, energy management, and fault location. This section will explore the applications of EC in power systems, emphasizing its potential advantages and its integration into modern energy grids.

4.1. Data Transmission

Data transmission in power systems plays a critical role in the efficient management and monitoring of energy networks. In these systems, large volumes of data are collected from sensors, smart meters, and other monitoring devices to facilitate the oversight of energy generation, transmission, and distribution. Figure 7 illustrates the EC architecture for power transmission applications. To ensure secure and timely data transfer, specialized communication protocols and infrastructures are required to ensure secure and timely data transmission [149]. A three-tier architecture has been proposed for implementing EC in smart grids, formed by the cloud-edge-thing continuum [150]. The total response time is determined by the sum of transmission and processing delays. In cases where IoT devices generate massive amounts of data but have limited computational resources, high network latency becomes unacceptable as they fail to meet QoS requirements. Unlike traditional cloud services, EC addresses the needs of IoT applications more efficiently by enabling real-time data collection and analysis with low latency [151]. Additionally, in [152], a fine-grained adaptive power control scheme is introduced to reduce latency, which optimizes data transmission paths using adaptive power management techniques.
Various optimization strategies have been investigated to enhance power transmission and energy efficiency. In [153], a long-term stochastic optimization problem was decomposed into multiple subproblems to maximize the transmission success rate. This approach integrates power control coefficients and aggregation coefficients, aiming to optimize the minimum time-average transmission success rate (TATSR) by determining the optimal coefficients for each period while accounting for the dynamic statistics of randomly arriving data. Additionally, power allocation strategies designed to improve energy efficiency were explored in [154]. This study employs fractional programming and convex optimization techniques, demonstrating that secondary users can achieve substantial energy savings even under average transmission power constraints.
Furthermore, EC solutions for power transmission have been explored in [155], emphasizing the role of IoT sensor technologies in preventing faults in transmission lines. These technologies not only enhance transmission power capacity but also reduce economic losses by improving reliability. In the domain of voltage/VAR control (VVC) for distributed energy resources (DER), ref. [156] proposed an artificial neural network (ANN)-based strategy, enabling DER inverters to operate autonomously and overcome the limitations of conventional control methods. In a related effort, ref. [157] introduced a hierarchical-hybrid architecture for VVC in grids with high penetration of distributed generators (DG). Similarly, in [158], a three-tier voltage control framework tailored for grid clusters equipped with smart PV-based inverters (SPVIs) was presented, aiming to maintain voltage stability and minimize power losses. Finally, ref. [159] developed a monitoring system that combines Zigbee wireless communication with EC for remote transmission line monitoring. This system demonstrated low energy consumption, strong anti-interference capabilities, and improved fault detection accuracy. The proposed EC architecture for power distribution applications is illustrated in Figure 8.

4.2. Monitoring and Control

In power grids, the continuous monitoring and transmission of critical data in distribution networks enhance operational efficiency. However, the increasing density and volume of exchanged information across the network can degrade QoS, particularly under centralized processing models. To address this challenge, numerous studies have investigated decentralized computing approaches and the integration of EC into power distribution systems.
Several studies have focused on integrating IoT paradigms into the Internet of Services (IoS) to enable decentralized computation and management. For instance, ref. [160] investigates decentralized computing potentials by embedding IoT principles into IoS architectures, while [161] develops an online monitoring system designed for transient electromechanical simulation in distribution grids. Similarly, ref. [162] proposes an EC-based monitoring framework for evaluating reactive power behavior in smart distribution transformers, aiming to improve real-time data analytics and responsiveness.
The potential of cloud-edge collaborative computing models has also been extensively explored in intelligent monitoring applications. Ref. [163] introduces a hybrid architecture to enable real-time diagnostics of power distribution equipment via a cloud-edge framework. Likewise, ref. [164] improves grid security and reliability by integrating IoT and EC into a smart grid monitoring platform. Collectively, these contributions highlight how EC enhances operational performance and system resilience in power distribution networks.
Another critical dimension of EC applications involves resource management and service orchestration in complex power systems. In [165], an EC-based service scheduling approach is proposed to address the increasing computational and bandwidth demands in smart city and Power Distribution IoT (PD-IoT) infrastructures. Complementarily, ref. [166] introduces a task allocation strategy for real-time monitoring and early warning services, aiming to optimize the utilization of computational resources.
In addition to monitoring and resource allocation, EC has been employed to enhance system integration and metering infrastructure. In ref. [167], a smart integrated terminal is designed using EC principles to improve metering efficiency and operational coordination. Similarly, ref. [168] introduces an EC-based power grid mapping structure for the digital management of distributed power networks. To establish a structured framework for power distribution applications, ref. [169] defines a four-layer EC-based architecture, comprising cloud, network, edge, and terminal layers, which serves as a reference model for future implementations, as shown in Figure 9. Further expanding on this architecture, ref. [170] proposes a “cloud-side-edge collaboration” framework to enhance the scalability and availability of substation operation support systems. This model ensures seamless coordination between monitoring, data processing, and decision-making tasks across multiple layers.
Moreover, EC enables optimization of communication latency and computational load management. For instance, ref. [171] develops a node scheduling model based on EC that employs a genetic algorithm with a fighter search strategy to reduce transmission delays and minimize economic costs.
Despite these advancements, traditional centralized monitoring systems remain insufficient to address the growing complexity and dynamism of modern power grids. To overcome these limitations, ref. [43] proposes a five-tier EC framework for real-time monitoring. As shown in Figure 10, the system automates line monitoring by processing image data from IoT devices at the edge, thereby enhancing threat detection and response times.

4.3. Microgrid System

EC architecture in microgrid systems represents an innovative approach that enhances energy management and data processing. This architecture enables the efficient processing, storage, and management of data from energy equipment, thereby enhancing real-time decision-making and operational efficiency. As shown in Figure 11, the EC architecture for microgrids follows a three-tier structure comprising device, edge, and cloud layers. The device layer includes of microgrid energy equipment, the edge layer incorporates edge platforms that provide computing, storage, and application functionalities, while the cloud layer hosts various cloud-based services.
In microgrid applications, the edge layer plays a crucial role in data collection, transmission, and device control by utilizing various network communication protocols such as MQTT and CoAP, as described in Edge Computing Software Protocols. Each edge gateway device collects real-time operational data from energy equipment and transmits it to the edge server, enabling local data processing and efficient network management. This decentralized approach alleviates the processing burden on the cloud while enhancing system responsiveness. The cloud server subsequently analyzes the aggregated data to support decision-making processes. For instance, Figure 12 illustrates a microgrid system implemented in a rural community in central China, where EC-based energy management techniques enable real-time forecasting of renewable energy generation and load demand [171]. Equipment scheduling microservices further optimize energy usage by managing generator outputs and battery charge–discharge cycles in real-time.
Several studies have explored the integration of EC into microgrid energy management. Ref. [172] investigates energy supply scheduling in multi-access edge computing (MEC)-enabled microgrids, proposing an optimization framework that considers uncertainties and delay constraints in energy production and consumption. Addressing similar challenges, refs. [173,174] introduce a risk-sensitive energy profiling approach for MEC networks, utilizing multi-agent deep reinforcement learning (MADRL) to enhance decision-making under dynamic conditions. Additionally, ref. [175] presents a power control framework that integrates EC with reinforcement learning, enabling real-time network state detection and power flow optimization through edge intelligence. Figure 13 illustrates the system model designed in [172,173] general terms.
The use of machine learning (ML) in EC-based microgrid management has gained significant attention. Ref. [176] proposes an ML-driven EC architecture for energy management, utilizing Kafka Streams and open-source IoT platforms to predict energy consumption and production. In this model, edge devices collect data from individual prosumers and apply AI algorithms for real-time energy forecasting. Similarly, ref. [177] examines a microgrid operating in islanding mode, focusing on dynamic response mechanisms to maintain voltage and frequency stability. Further, ref. [178] explores power supply management, power balance, and malicious behavior detection in IoT-enabled smart grids, introducing EC-based prediction strategies and task rating-based privacy protection mechanisms. To enhance microgrid efficiency, ref. [179] presents a hybrid EC framework that leverages short-term electricity generation and consumption forecasting, incorporating wind power and smart meter data. In addition, ref. [180] integrates AI-driven algorithms into MEC-based microgrid optimization, proposing a neural network-based identification method that employs online adaptive dynamic programming to eliminate dependency on predefined system models. Finally, ref. [181] highlights the significance of EC connectivity with control centers in microgrids, emphasizing its role in addressing real-time electricity demand scenarios.

4.4. Smart Metering System

Advanced metering infrastructure (AMI) is a critical component of modern power systems, enabling bidirectional data communication between smart meters and utility centers [182]. The integration of EC and edge intelligence with AMI enhances operational efficiency by reducing communication costs, protecting user privacy, and increasing situational awareness [183]. Figure 14 presents an overview of the EC-enabled smart meter architecture. In such systems, distributed deep learning based on federated learning (FL) has proven to be an effective approach for applications like non-intrusive load monitoring (NILM).
Smart meters, as key consumer-side components of AMI, perform several essential functions, including real-time pricing updates, energy consumption monitoring, power loss detection, power quality assessment, P2P communication with other meters, and remote switch control [184]. The meter data management system (MDMS) plays a crucial role in processing and storing the large volumes of data collected from smart meters via data concentrators. Furthermore, MDMS supports decision-making processes that optimize energy consumption by integrating with other application systems. Smart meters collect real-time energy consumption data from IoT devices within the home area network (HAN) and transmit these data to the MDMS, where control instructions are generated. To enhance communication efficiency, ref. [185] proposes an aggregation-based Low Power Loss Area Network (RPL) scheme for power distribution networks. This scheme modifies the ContikiRPL protocol using the Low Power Personal Area Network (6LoWPAN) protocol, improving communication between smart meters.
EC enables distributed computing capabilities, supporting energy control and enhancing the functionality of smart grids (SGs) through deep learning models [186,187]. In [188], an optimization framework is proposed for code and data placement to enhance system stability and cost-effectiveness. Moreover, an advanced AMI model presented in [178] facilitates accurate electricity price forecasting, local-level service analysis, resource allocation optimization, and cost reduction by improving metering efficiency. Similarly, ref. [189] introduces a knowledge-based deployment strategy to optimize the energy consumption and lifespan of smart meters. The role of smart metering in IoT-based smart grids extends beyond conventional applications to improving power quality and reliability. Ref. [190] examines the applicability of smart metering technologies in modern power grids, emphasizing their role in enhancing grid modernization efforts. Furthermore, ref. [191] introduces a LoRa-based smart metering system designed to minimize energy consumption during data transmission, thereby enhancing the overall efficiency of the network. This system employs deep learning-based compression and optimization techniques, enabling energy-efficient data transfer with reduced latency. Ref. [192] develops an EC-supported data analytics system that utilizes a multi-process architecture for smart meters. The results demonstrate that incorporating edge analytics into smart meters significantly enhances data processing performance, with multiprocessing further improving system responsiveness.

4.5. Anomaly Detection

Various anomaly detection approaches have been discussed in the literature. For instance, the method proposed in [193] for smart meter fault detection is a decision tree (DT) approach that filters abnormal data using meter data analytics and classifies them according to energy loss levels. This method provides online detection and verification for large-volume meters, thereby reducing the need for on-site inspections. To address the latency issues in data transmission, ref. [194] proposes anomaly detection using prediction algorithms such as Deep Neural Network (DNN), Support Vector Regression (SVR), and K-Nearest Neighbor (KNN). The study shows that DNN is the most effective solution with low latency (1.25 ms). The system ensures seamless data flow and collaboration between Smart Meters, Concentrators, Edge-MDMS, and Cloud-MDMS, enabling early detection and alerting of anomalies.
In another approach, ref. [195] developed a hybrid model to identify anomalies in building energy data. This model combines polynomial regression with Gaussian distribution to detect anomalies in school electricity consumption data. Focusing on cybersecurity and data security, ref. [196] proposes an EC-based anomaly detection method for AMI. This method is implemented at the endpoint of the data concentrator, effectively mitigating the risk of privacy leaks and reducing both communication latency and computation time. Successful results were achieved with 99.05% detection accuracy and a 0.74% false detection rate. Similarly, ref. [197] introduces privacy-preserving anomaly detection methods through FL, an innovative approach that leverages distributed edge devices to detect anomalies while maintaining data privacy. By enabling local data processing, FL eliminates the need to transfer sensitive information to centralized servers, ensuring user privacy. This is particularly beneficial in scenarios like transformer-based models for sequential anomaly detection, where decentralized training enhances model accuracy and reduces communication overhead.
In the context of Edge-AI, ref. [198] highlights the convergence of EC and AI, which enables the deployment of advanced AI models to be deployed closer to users, significantly enhancing performance. A key framework in this domain is Federated Continual Learning (FCL), which supports distributed learning across clients while preserving data privacy. FCL ensures stable model performance in dynamic environments by retaining knowledge from previous tasks, making it ideal for anomaly detection applications that require real-time adaptability across distributed edge devices.
Finally, ref. [199] developed a Granger causality test-based approach to detect electricity theft among low-voltage (LV) users. This method detects electricity theft with data measured at the distribution transformer unit (DTU) and avoids false alarms caused by corrupted data.

4.6. State Estimation

In modern energy systems, SE plays a crucial role in monitoring power grids by analyzing erroneous measurements and determining the correct values of unknown variables. With the increasing demand for real-time control, SE requires a high bandwidth and powerful computing resources. To address this challenge, solutions such as performing SE at distributed edge nodes and transmitting the results to the control center have been proposed. In this context, ref. [200] presents a Cloud-IoT-based architecture solution that combines the benefits of CC and EC for condition estimation in smart grids. This solution enhances operational flexibility and adaptability by separating measurement data from physical devices using virtualization technologies. Similarly, ref. [201] proposes a multi-layered hierarchical framework that integrates cybersecurity measures, performing condition estimation on edge devices while utilizing security mechanisms to detect malicious devices using Phasor Measurement Unit (PMU) data.
To mitigate false data injection attacks, ref. [202] developed an edge-based FL framework. This approach addresses challenges such as distributed datasets and unknown system parameters while improving detection accuracy through a mechanism that incentivizes data owners. Ref. [203] examines how false data injection (FDI) attacks can affect the SE system. Furthermore, ref. [204] introduces a data-driven switching state identification algorithm for renewable energy integration and frequent line switch states. The EC framework distributes computational tasks to smart terminals, thereby reducing communication and computational load and enhancing algorithm performance. Additionally, ref. [205] presents an NSGA-III-based optimization, leveraging EC to address network partitioning and edge server placement challenges. This approach optimizes network performance by minimizing edge server costs.

4.7. Energy Management System

Studies on EMS primarily focus on objectives such as optimizing energy consumption, enhancing demand response, and improving user satisfaction. Ref. [206] examines the impact of IoT and EC technologies on energy management in smart cities, proposing an approach that enables instant energy control and long-term savings by processing data collected from IoT devices using deep learning techniques. Ref. [207] developed a customizable home energy management system (HEMS) middleware platform that is based on microservice architecture and low-cost hardware. This system, utilizing an edge computing approach, minimizes cloud dependency by performing energy management closer to the user while also achieving high performance with low latency and efficient resource utilization.
In the context of EMS, various strategies have been proposed to optimize both energy supply and demand, as well as improve efficiency and user satisfaction. For example, ref. [208] focuses on optimizing both supply-side energy allocation and demand-side load response in smart grids using privacy-preserving distributed algorithms. This approach aims to balance energy distribution across the grid while safeguarding users’ privacy. Ref. [209] presents an EC architecture that integrates unified learning and deep reinforcement learning (DRL) algorithms to optimize energy consumption in building energy management systems, aiming to improve energy efficiency.
To address energy cost reduction in residential settings, ref. [210] developed an IoT edge-based energy management system and proposed a middleware architecture for HEMS. This system adopts a load-shifting and reinforcement-learning approach, performing planning based on energy production, consumption, and device runtime. Ref. [211] proposes a three-tier edge-cloud collaboration-based residential energy management (ECCREM) architecture to reduce energy costs and stabilize demand fluctuations. Using Stackelberg and Lyapunov-based pricing algorithms, this architecture optimizes energy demand and aims to increase user satisfaction by up to 20% with priority-based scheduling strategies.

4.8. Fault Location

A system developed using EC stores transition amplitude ratios at edge nodes and utilizes a radial basis function (RBF) neural network to accurately detect faults in networks with hybrid feeders [174]. Transients are sampled at measurement nodes and transmitted to the edge nodes, which identify the faulty branch and perform the detection process. To address overload issues caused by centralized management in large-scale digital distribution networks, ref. [175] proposes a power grid mapping-based EC structure that improves network efficiency by optimizing the use of centralized management resources. In [212], an innovative line selection and fault detection method for distribution networks with cloud-edge-terminal hierarchical architecture is proposed. When a fault occurs, the traveling wavefront arrival times are transmitted via optical fiber to the edge computing gateway. Here, large volumes of fault data are filtered, and invalid and noisy information is eliminated. The time characteristic matrices generated from the valid data are transferred to the cloud layer, where line selection is performed. Then, fault localization is handed over to the edge layer, and fault localization is performed. The result is transmitted to the terminal layer to trigger the relevant circuit breaker. Finally, the correct fault information is transmitted to the cloud and presented to the user in a pop-up window format. Similarly, ref. [169] proposes an EC-based fault detection method to promptly identify faults in distribution networks and improve electricity supply reliability. The EC-supported fault monitoring and control framework is depicted in Figure 15. In [213,214,215,216], a hierarchical fault monitoring system for large and complex distribution networks is developed, offering low latency and localized data processing with EC. This system aims to overcome the limitations of traditional methods, particularly in detecting and processing small current faults, such as single-phase ground (SLG) faults.
Table 8 summarizes the power system application of EC.

5. The Security and Privacy of Edge Computing

EC has become a critical technology for enhancing privacy, security, and resilience against cyber-attacks in smart grids. Additionally, it addresses key challenges such as the efficient deployment of IoT devices and the management of processing loads. Several studies have made significant contributions by focusing on security and privacy requirements. Ref. [219] examines the cybersecurity challenges and solutions for cyber-physical systems (CPS) within the IIoT–edge computing context, highlighting common threats such as DoS and ransomware. It also discusses various security technologies, including machine learning, blockchain, and encryption, as essential tools for improving security and real-time data protection in IIoT–edge environments, while outlining future research directions in this area. Refs. [50,220] analyzed cybersecurity vulnerabilities in smart grids, including power outages, protocol failures, and breaches, and proposed solutions to enhance resilience using secure communication and intrusion detection technologies. Additionally, security and privacy concerns in EC-supported IoT systems have been thoroughly explored [50], with an analysis of threat vectors and vulnerabilities by ETSI standards. Solutions against these threats and future roadmaps have also been proposed [221]. Infrastructure, security, privacy, and scalability challenges are discussed in detail, examining the integration of edge computing and IoT technologies in smart cities through applications such as energy management, public safety, healthcare, and transportation [222]. Ref. [223] evaluates decentralized edge architectures, edge nodes, and gateways, examining their role in various Industry 5.0 applications such as smart cities, autonomous systems, and healthcare. EC introduces security and privacy challenges alongside deploying heterogeneous devices and the complexities of big data processing. Ref. [224] addressed security and privacy issues in EC architecture, discussing the role of ML and DL algorithms in combating these threats, especially to reduce the risks associated with a large attack surface. For IoT systems, ref. [225] proposed FC and EC approaches to facilitate the handling of confidential user data and improve data security. This study proposes enhancing security by continuously monitoring system resources and restricting data transmission to processed information. Additionally, a System Security Manager is introduced to mitigate vulnerabilities associated with device-level attacks.
As these advancements in security and privacy through EC are crucial, they enable the development of more resilient and secure Digital Twins (DT) for grid systems, especially in predictive maintenance and resilience applications [226]. This makes it an essential component for developing DT in grid resilience and predictive maintenance systems. In line with this, ref. [227] proposes an FL-based DT framework called SAINT, designed to address challenges in resource scheduling for 5G edge computing-empowered distribution grids. SAINT optimizes latency, accuracy, and security by reducing iteration delay, enhancing model recognition, and supporting intelligent resource scheduling while considering energy consumption and access priority.
Several studies have focused on how blockchain technology can reduce the processing load on the cloud and minimize the latency between IoT devices and the cloud. The integration of blockchain and EC provides a decentralized approach to address security and data integrity issues in IoT networks, providing a reliable authentication and data storage mechanism [228,229]. Although EC improves the security of sensitive data, it poses security challenges such as authentication of IoT devices and edge servers and risks such as vulnerability to malicious attacks [230]. Accordingly, the hybrid centralized and blockchain-based authentication architecture proposed by [231] provides an efficient and decentralized authentication mechanism for IoT systems using edge computing. While deploying edge servers for centralized authentication, it uses a lightweight blockchain network to increase security, reduce transaction costs, and meet the scalability and real-time performance needs of IoT devices. Blockchain technology strengthens the security of EC with its immutable, hack-resistant, and decentralized data storage features, securing transactions between IoT devices and acting as a trusted database [232]. In addition, blockchain’s consensus mechanisms provide an innovative method for distributed database management and new payment models for network services in edge environments.
The integration of EC and blockchain combines CC, data processing, and access control in a secure and unified platform, enabling rapid deployment of computational services to edge servers and accelerating the development of the Industrial Internet of Things (IIoT). In this context, a blockchain-enabled edge intelligence framework is proposed to provide secure and flexible edge service management, including cross-domain sharing-based scheduling of edge resources and a credit-based edge transaction approval mechanism. Numerical results show that these approaches provide significant improvements in both edge service cost and capacity [233]. Furthermore, a lightweight secret key agreement protocol based on public key with self-authentication has been developed to enable secure communication in resource-constrained edge devices. These mechanisms work together to provide IIoT security guarantees such as authentication, auditability, and confidentiality [234].
In addition to improving security, deep learning-based user authentication, combined with hybrid encryption, enhances blockchain-aided data storage while optimizing task offloading in MEC. This approach improves data integrity, boosts computational efficiency, and further strengthens security in decentralized environments [235]. The concept of “decentralizing edge devices” leverages blockchain technology to establish a distributed ecosystem where edge devices operate independently without reliance on a central authority. Blockchain ensures secure interactions by tracking, verifying, and regulating the behavior of these devices while managing their data exchange. This decentralized structure enables edge devices to support distributed computing platforms, facilitating collaborative execution of computational tasks without a central governing entity [236]. Moreover, blockchain-based decentralization can lead to more adaptable and secure distributed networks, fostering the development of decentralized applications. In this context, a power allocation platform has been proposed, utilizing a decentralized edge computing model to enhance resource efficiency and security [237].
While deep learning-based decentralized authentication and hybrid encryption significantly enhance security and efficiency, their implementation presents notable challenges. One of the key concerns is the computational overhead introduced by these mechanisms, particularly in resource-constrained edge devices. Processing cryptographic operations and consensus mechanisms may lead to increased energy consumption and latency, affecting real-time performance. Additionally, integrating decentralized authentication with existing legacy IoT systems remains a challenge due to differences in protocol compatibility and infrastructure requirements. Addressing these challenges requires optimizing cryptographic algorithms for lightweight execution and developing interoperability frameworks to ensure seamless integration with traditional authentication mechanisms.
These contributions collectively strengthen the security of EC and IoT systems, fostering a more resilient and sustainable architectural framework.

6. Discussion and Future Research Directions

Although EC was developed to address issues such as bandwidth limitations, latency, and real-time data processing arising from the integration with CC, there are still some fundamental challenges and unresolved research areas in this field, despite significant progress. In particular, the rapid increase in IoT devices has made scalability between these devices a necessity. However, managing this scalability within EC remains a major challenge. Moreover, the limited storage capacity of edge devices further increases the dependency on cloud computing. Therefore, the development of new communication protocols and the optimization of existing ones are essential to ensure interoperability between edge and cloud computing systems.
The advantage of EC in reducing latency presents a significant potential for developing effective architectures in critical processes, such as real-time control and monitoring in power systems. However, these processes require a more detailed investigation to develop applicable and scalable solutions. One key research challenge is optimizing the performance of connectivity layers within the EC architecture. Achieving high-speed data transfer and low-latency communication between hierarchical layers is fundamental to ensuring system efficiency and reliability. To establish a well-defined taxonomy, the EC architecture can be categorized into three primary layers: the Device-Edge Layer, the Edge-Server Layer, and the Cloud Layer. The Device-Edge Layer consists of resource-constrained IoT devices, sensors, and smart meters deployed at the network periphery. These devices perform preliminary data processing, local analytics, and real-time decision-making to reduce communication overhead and minimize latency. The computational capacity in this layer is typically limited, necessitating efficient workload distribution and lightweight data processing techniques. The Edge-Server Layer acts as an intermediary between the device layer and the cloud, comprising edge servers, gateways, and micro data centers with enhanced computational and storage capabilities. These nodes aggregate, filter, and process data received from multiple IoT devices before transmitting the refined information to the cloud. Additionally, this layer supports low-latency services and real-time analytics, enabling localized intelligence while reducing dependency on centralized cloud infrastructures. The Cloud Layer represents the centralized computing infrastructure responsible for deep learning, large-scale data analytics, and long-term storage. It provides extensive computational resources for complex model training, historical data analysis, and large-scale optimization. While CC ensures high processing power, it introduces latency and bandwidth constraints, making efficient coordination with the edge layers essential. The effectiveness of EC depends on the seamless interaction between these layers. Therefore, selecting appropriate networking technologies, optimizing communication protocols, and defining standardized roles for each layer are critical research directions. Future work should focus on refining these hierarchical structures to enhance the performance, scalability, and interoperability of EC-enabled power systems.
With the shift in data processing to the network’s edge, data privacy and security have become even more critical. In this context, developing and testing effective mechanisms to protect sensitive data is vital for EC to be adopted as a sustainable and reliable technology. In the future, new cryptographic approaches, security mechanisms, and hybrid architectures aimed at enhancing data privacy could significantly increase the effectiveness of EC. Additionally, network optimization, energy efficiency, and system resilience will remain significant research topics in the expanding application areas of EC.
Prediction systems based on AI techniques, including ML algorithms, hold significant potential to enhance the efficient utilization of EC in power systems and energy management processes.Furthermore, the integration of distributed security solutions, such as blockchain, with EC could play a key role in enhancing data security and integrity. By developing EC-based solutions, the next generation of power distribution networks can be made smarter, more autonomous, and more secure. The use of EC in energy management and power systems will not only improve operational and analytical processes but also contribute to making the overall energy ecosystem more efficient and sustainable.
The development of quantum-resistant encryption techniques is becoming increasingly crucial to secure sensitive data processed at the edge of EC systems. As quantum computing evolves, traditional cryptographic methods may become vulnerable, making it essential to integrate quantum-resistant algorithms into EC architectures. This will enhance the resilience of EC systems and protect against emerging cybersecurity threats, particularly in the context of smart grids.
In addition, the rise in energy-harvesting edge devices presents a significant opportunity to improve the sustainability and autonomy of EC systems. By harnessing energy from environmental sources such as solar, wind, or vibration, these devices reduce dependence on traditional power supplies. In smart grids, energy-harvesting technologies could enable self-sustaining edge nodes, enhancing the energy efficiency and reliability of the network, especially in remote or off-grid areas. Future research should focus on optimizing energy harvesting mechanisms to improve the scalability and resilience of EC systems in diverse environments.

7. Conclusions

EC has emerged as a transformative solution for modern power systems, addressing critical challenges associated with latency, bandwidth limitations, and real-time data processing. This comprehensive review has systematically examined the state-of-the-art EC applications in energy distribution systems, highlighting its role in optimizing grid operations and enhancing overall efficiency. The study explored various EC architectures, methodologies, and integration strategies with advanced technologies such as AI, machine learning, and IoT. Additionally, it examined key technological components, including containerization, software platforms, and hardware architectures, which play a crucial role in the deployment and efficiency of EC systems. Key applications of EC, including data transmission, monitoring and control, microgrid systems, smart metering, anomaly detection, energy management, and fault detection, have been analyzed in depth. The findings suggest that EC significantly improves system resilience, reliability, and operational flexibility by enabling local data processing and reducing dependency on centralized cloud infrastructures.
Despite these advantages, several challenges remain, such as security concerns, network optimization, and the need for scalable deployment strategies. Ensuring data privacy, developing robust security frameworks, and optimizing communication protocols are crucial for the widespread adoption of EC in smart grids. Additionally, integrating EC with emerging technologies offers opportunities to enhance security, efficiency, and automation. Future research should focus on refining EC architectures, improving interoperability between EC and CC, and addressing real-time energy management constraints.

Author Contributions

Conceptualization, K.Ç.B., E.T., Y.Y. and F.Y.; methodology, F.Y. and Y.Y.; investigation, F.Y.; resources, F.Y.; writing—original draft preparation, F.Y. and Y.Y.; writing—review and editing, F.Y., Y.Y. and K.Ç.B.; visualization, F.Y.; supervision, K.Ç.B., E.T. and Y.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

Erman Terciyanlı was employed by the Inavitas Energy. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

IoTInternet of Things
LANLocal Area Network
ECEdge Computing
APIApplication Programming Interface
GAGenetic Algorithm
IEDImprovised Explosive Devices
CCCloud Computing
CIComputational Intelligence
DMLSDistributed Multi-level Storage
AIArtificial Intelligence
MECMulti-access Edge Computing
WANWide Area Network
FCNFog Computing Network
ILPInteger Linear Programming
MLMachine Learning
QoSQuality of Service
MCCMobile Cloud Computing
QoEQuality of Experience
ARAugmented Reality
P2PPeer-to-peer
NFVNetwork Function Virtualisation
CVTContainer-based Virtualisation Technology
VMVirtual Machine
CLICommand Line Interface
JTSCJoint Task Scheduling and Containerisation
BLEBluetooth Low Energy
CoAPConstrained Application Protocol
MQTTMinimum Message Queuing Telemetry Transport
SQLStructured Query Language
TLSTransport Layer Security
AMQPAdvanced Message Queuing Protocol
XMPPExtensible Messaging and Presence Protocol
TCPTransmission Control Protocol
AioTAI of Things
TATSRTime Average Transmission Success Rate
SGSmart Grid
6LoWPANLow Power Personal Area Network
DERDistributed Energy Resources
DGDistributed Generators
SPVISmart PV-based Inverters
FDIFalse Data Injection
SEState Estimation
ANNArtificial Neural Network
VVCVoltage/VAR Control
IoSInternet of Services
MADRLMulti-agent Deep Reinforcement Learning
AMIAdvanced Metering Infrastructure
NILMNon-intrusive Load Monitoring
MDMSMeter Data Management System
HANHome Area Network
SMSmart Metering
DNNDeep Neural Network
SVRSupport Vector Regression
KNNK-Nearest Neighbor
AMIAdvanced Metering Infrastructure
LVLow Voltage
DTUDistribution Transformer Unit
PMUPhasor Measurement Data
DSSEDistribution System State Estimation
DMSDistribution Management System
VARVector Autoregression
FDIAFalse Data Injection Attack
HEMSHome Energy Management System
EMSEnergy Management System
ECCREMEdge-cloud Collaboration-based Residential Energy Management
SDNSoftware-Defined Network
TATSRTime Average Transmission Success Ratio
PD-IoTPower Distribution Internet of Things
MDRLModel-based Deep Reinforcement Learning
LoRaLong Range
SCADASupervisory Control and Data Acquisition
VVCVolt/var Control
PD-IoTPower Distribution Internet of Things
FLFederated Learning
DRLDeep Reinforcement Learning
HDTGHierarchical Decision-making Strategy Based on Prediction Strategy and Task Grading
LoRaLong Range
DTDecision Tree
TWAMTraveling Wave Acquisition Module
IIoTIndustrial Internet of Things
DTDigital Twins
SLGSingle-Phase Ground
DRLDeep Reinforcement Learning
CPSCyber-Physical Systems
RBFRadial Basis Function

References

  1. Ahmad, T.; Zhang, D. Using the internet of things in smart energy systems and networks. Sustain. Cities Soc. 2021, 68, 102783. [Google Scholar] [CrossRef]
  2. Mahmood, M.; Chowdhury, P.; Yeassin, R.; Hasan, M.; Ahmad, T.; Chowdhury, N.U.R. Impacts of digitalization on smart grids, renewable energy, and demand response: An updated review of current applications. Energy Convers. Manag. X 2024, 24, 100790. [Google Scholar] [CrossRef]
  3. Prasad, S.S.; Kumar, C. A Green and Reliable Internet of Things. Commun. Netw. 2013, 5, 44–48. [Google Scholar] [CrossRef]
  4. Ravandi, B.; Papapanagiotou, I. A Self-Learning Scheduling in Cloud Software Defined Block Storage. In Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, 25–30 June 2017; pp. 415–422. [Google Scholar] [CrossRef]
  5. Edge to Core and the Internet of Things|Dell Technologies Info Hub. Available online: https://infohub.delltechnologies.com/en-us/t/edge-to-core-and-the-internet-of-things-2/ (accessed on 11 December 2024).
  6. Cisco Annual Internet Report-Cisco Annual Internet Report (2018–2023) White Paper-Cisco. Available online: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html (accessed on 11 December 2024).
  7. Google and IBM Announce Academic Data Center Collaboration-DCD. Available online: https://www.datacenterdynamics.com/en/news/google-and-ibm-announce-academic-data-center-collaboration/ (accessed on 11 December 2024).
  8. Nieuwenhuis, L.J.M.; Ehrenhard, M.L.; Prause, L. The shift to Cloud Computing: The impact of disruptive technology on the enterprise software business ecosystem. Technol. Forecast. Soc. Change 2018, 129, 308–313. [Google Scholar] [CrossRef]
  9. Kumar Yadav Yanamala, A.; Pointe Blvd, O. Emerging Challenges in Cloud Computing Security: A Comprehensive Review. Int. J. Adv. Eng. Technol. Innov. 2024, 4, 448–479. [Google Scholar]
  10. Ometov, A.; Molua, O.L.; Komarov, M.; Nurmi, J. A Survey of Security in Cloud, Edge, and Fog Computing. Sensors 2022, 22, 927. [Google Scholar] [CrossRef]
  11. Singh, S.P.; Nayyar, A.; Kumar, R.; Sharma, A. Fog computing: From architecture to edge computing and big data processing. J. Supercomput. 2018, 75, 2070–2105. [Google Scholar] [CrossRef]
  12. Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge Computing: Vision and Challenges. IEEE Internet Things J. 2016, 3, 637–646. [Google Scholar] [CrossRef]
  13. Mittal, S.; Negi, N.; Chauhan, R. Integration of edge computing with cloud computing. In Proceedings of the 2017 International Conference on Emerging Trends in Computing and Communication Technologies (ICETCCT), Dehradun, India, 17–18 November 2017; pp. 1–6. [Google Scholar] [CrossRef]
  14. Dai, W.; Nishi, H.; Vyatkin, V.; Huang, V.; Shi, Y.; Guan, X. Industrial Edge Computing: Enabling Embedded Intelligence. EEE Ind. Electron. Mag. 2019, 13, 48–56. [Google Scholar] [CrossRef]
  15. Zhang, T.; Li, Y.; Chen, C.L.P. Edge computing and its role in Industrial Internet: Methodologies, applications, and future directions. Inf. Sci. 2021, 557, 34–65. [Google Scholar] [CrossRef]
  16. Gooi, H.B.; Wang, T.; Tang, Y. Edge Intelligence for Smart Grid: A Survey on Application Potentials. CSEE J. Power Energy Syst. 2023, 9, 1623–1640. [Google Scholar] [CrossRef]
  17. Li, J.; Gu, C.; Xiang, Y.; Li, F. Edge-cloud Computing Systems for Smart Grid: State-of-the-art, Architecture, and Applications. J. Mod. Power Syst. Clean Energy 2022, 10, 805–817. [Google Scholar] [CrossRef]
  18. Minh, Q.N.; Nguyen, V.H.; Quy, V.K.; Ngoc, L.A.; Chehri, A.; Jeon, G. Edge Computing for IoT-Enabled Smart Grid: The Future of Energy. Energies 2022, 15, 6140. [Google Scholar] [CrossRef]
  19. Singh, N.; Buyya, R.; Kim, H. Securing Cloud-Based Internet of Things: Challenges and Mitigations. Sensors 2025, 25, 79. [Google Scholar] [CrossRef]
  20. Yousefpour, A.; Fung, C.; Nguyen, T.; Kadiyala, K.; Jalali, F.; Niakanlahiji, A.; Kong, J.; Jue, J.P. All One Needs to Know about Fog Computing and Related Edge Computing Paradigms: A Complete Survey. J. Syst. Archit. 2019, 98, 289–330. [Google Scholar] [CrossRef]
  21. Liang, S.; Jin, S.; Chen, Y. A Review of Edge Computing Technology and Its Applications in Power Systems. Energies 2024, 17, 3230. [Google Scholar] [CrossRef]
  22. Mansouri, Y.; Babar, M.A. A review of edge computing: Features and resource virtualization. J. Parallel Distrib. Comput. 2021, 150, 155–183. [Google Scholar] [CrossRef]
  23. Mell, P.; Grance, T. The NIST Definition of Cloud Computing, Special Publication (NIST SP); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011. [Google Scholar] [CrossRef]
  24. Habeeb, R.A.A.; Nasaruddin, F.; Gani, A.; Hashem, I.A.T.; Ahmed, E.; Imran, M. Real-time big data processing for anomaly detection: A Survey. Int. J. Inf. Manag. 2019, 45, 289–307. [Google Scholar] [CrossRef]
  25. Hua, H.; Li, Y.; Wang, T.; Dong, N.; Li, W.; Cao, J. Edge Computing with Artificial Intelligence: A Machine Learning Perspective. ACM Comput. Surv. 2023, 55, 184. [Google Scholar] [CrossRef]
  26. AL-Jumaili, A.H.A.; Muniyandi, R.C.; Hasan, M.K.; Paw, J.K.S.; Singh, M.J. Big Data Analytics Using Cloud Computing Based Frameworks for Power Management Systems: Status, Constraints, and Future Recommendations. Sensors 2023, 23, 2952. [Google Scholar] [CrossRef]
  27. Aburukba, R.O.; AliKarrar, M.; Landolsi, T.; El-Fakih, K. Scheduling Internet of Things requests to minimize latency in hybrid Fog–Cloud computing. Futur. Gener. Comput. Syst. 2020, 111, 539–551. [Google Scholar] [CrossRef]
  28. Caiza, G.; Saeteros, M.; Oñate, W.; Garcia, M.V. Fog Computing at Industrial Level, Architecture, Latency, Energy, and Security: A Review. Heliyon 2020, 6, e03706. [Google Scholar] [CrossRef] [PubMed]
  29. Fang, X.; Misra, S.; Xue, G.; Yang, D. Managing smart grid information in the cloud: Opportunities, model, and applications. IEEE Netw. 2012, 26, 32–38. [Google Scholar] [CrossRef]
  30. Popeangă, J. Cloud Computing and Smart Grids. Database Syst. J. 2012, III, 57–66. [Google Scholar]
  31. Song, Y.; Chen, Y.; Yu, Z.; Huang, S.; Shen, C. CloudPSS: A high-performance power system simulator based on cloud computing. Energy Rep. 2020, 6, 1611–1618. [Google Scholar] [CrossRef]
  32. AL-Jumaili, A.H.A.; Mashhadany, Y.I.A.; Sulaiman, R.; Alyasseri, Z.A.A. A Conceptual and Systematics for Intelligent Power Management System-Based Cloud Computing: Prospects, and Challenges. Appl. Sci. 2021, 11, 9820. [Google Scholar] [CrossRef]
  33. AL-Jumaili, A.H.A.; Muniyandi, R.C.; Hasan, M.K.; Singh, M.J.; Paw, J.K.S.; Amir, M. Advancements in intelligent cloud computing for power optimization and battery management in hybrid renewable energy systems: A comprehensive review. Energy Rep. 2023, 10, 2206–2227. [Google Scholar] [CrossRef]
  34. Allahvirdizadeh, Y.; Moghaddam, M.P.; Shayanfar, H. A survey on cloud computing in energy management of the smart grids. Int. Trans. Electr. Energy Syst. 2019, 29, e12094. [Google Scholar] [CrossRef]
  35. Bagherzadeh, L.; Shahinzadeh, H.; Shayeghi, H.; Dejamkhooy, A.; Bayindir, R.; Iranpour, M. Integration of Cloud Computing and IoT (CloudIoT) in Smart Grids: Benefits, Challenges, and Solutions. In Proceedings of the International Conference on Computational Intelligence for Smart Power System and Sustainable Energy, CISPSSE 2020, Keonjhar, India, 29–31 July 2020. [Google Scholar] [CrossRef]
  36. Stergiou, C.; Psannis, K.E.; Kim, B.G.; Gupta, B. Secure integration of IoT and Cloud Computing. Futur. Gener. Comput. Syst. 2018, 78, 964–975. [Google Scholar] [CrossRef]
  37. Wang, C.; Bi, Z.; Da Xu, L. IoT and cloud computing in automation of assembly modeling systems. IEEE Trans. Ind. Inform. 2014, 10, 1426–1434. [Google Scholar] [CrossRef]
  38. What is Edge Computing?|Cloudflare. Available online: https://www.cloudflare.com/learning/serverless/glossary/what-is-edge-computing/ (accessed on 11 December 2024).
  39. Satyanarayanan, M. The emergence of edge computing. Computer 2017, 50, 30–39. [Google Scholar] [CrossRef]
  40. Hong, X.; Wang, Y. Edge Computing Technology: Development and Countermeasures. Chin. J. Eng. Sci. 2018, 20, 20–26. [Google Scholar] [CrossRef]
  41. Khan, W.Z.; Ahmed, E.; Hakak, S.; Yaqoob, I.; Ahmed, A. Edge computing: A survey. Futur. Gener. Comput. Syst. 2019, 97, 219–235. [Google Scholar] [CrossRef]
  42. What Is Edge Computing? Introduction to Edge Computing. Available online: https://stlpartners.com/articles/edge-computing/what-is-edge-computing/ (accessed on 11 December 2024).
  43. Huang, Y.; Lu, Y.; Wang, F.; Fan, X.; Liu, J.; Leung, V.C.M. An Edge Computing Framework for Real-Time Monitoring in Smart Grid. In Proceedings of the 2018 IEEE International Conference on Industrial Internet, ICII 2018, Seattle, WA, USA, 21–23 October 2018; pp. 99–108. [Google Scholar] [CrossRef]
  44. Nain, G.; Pattanaik, K.K.; Sharma, G.K. Towards edge computing in intelligent manufacturing: Past, present and future. J. Manuf. Syst. 2022, 62, 588–611. [Google Scholar] [CrossRef]
  45. Asim, M.; Wang, Y.; Wang, K.; Huang, P.Q. A Review on Computational Intelligence Techniques in Cloud and Edge; Computing. IEEE Trans. Emerg. Top. Comput. Intell. 2020, 4, 742–763. [Google Scholar] [CrossRef]
  46. Xing, J.; Dai, H.; Yu, Z. A distributed multi-level model with dynamic replacement for the storage of smart edge computing. Syst. Arch. 2018, 83, 1–11. [Google Scholar] [CrossRef]
  47. Arcas, G.I.; Cioara, T.; Anghel, I.; Lazea, D.; Hangan, A. Edge Offloading in Smart Grid. Smart Cities 2024, 7, 680–711. [Google Scholar] [CrossRef]
  48. Cao, K.; Liu, Y.; Meng, G.; Sun, Q. An Overview on Edge Computing Research. EEE Access 2020, 8, 85714–85728. [Google Scholar] [CrossRef]
  49. Kovacevic, I.; Harjula, E.; Glisic, S.; Lorenzo, B.; Ylianttila, M. Cloud and Edge Computation Offloading for Latency Limited Services. IEEE Access 2021, 9, 55764–55776. [Google Scholar] [CrossRef]
  50. Alwarafy, A.; Al-Thelaya, K.A.; Abdallah, M.; Schneider, J.; Hamdi, M. A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things. IEEE Internet Things J. 2020, 8, 4004–4022. [Google Scholar] [CrossRef]
  51. Singh, R.; Gill, S.S. Edge AI: A survey. Internet Things Cyber-Phys. Syst. 2023, 3, 71–92. [Google Scholar] [CrossRef]
  52. Chiang, M.; Zhang, T. Fog and IoT: An Overview of Research Opportunities. IEEE Internet Things J. 2016, 3, 854–864. [Google Scholar] [CrossRef]
  53. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the MCC’12-Proceedings of the 1st ACM Mobile Cloud Computing Workshop, New York, NY, USA, 17 August 2012; pp. 13–15. [Google Scholar] [CrossRef]
  54. New Reference Architecture Is a Leap Forward for Fog Computing-Cisco Blogs. Available online: https://blogs.cisco.com/innovation/new-reference-architecture-is-a-leap-forward-for-fog-computing (accessed on 12 December 2024).
  55. Baktyan, A.; Zahary, A. A Review on Cloud and Fog Computing Integration for IoT: Platforms Perspective. EAI Endorsed Trans. Internet Things 2018, 4, 156084. [Google Scholar] [CrossRef]
  56. Mouradian, C.; Naboulsi, D.; Yangui, S.; Glitho, R.H.; Morrow, M.J.; Polakos, P.A. A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges. IEEE Commun. Surv. Tutor. 2017, 20, 416–464. [Google Scholar] [CrossRef]
  57. Dolui, K.; Datta, S.K. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In Proceedings of the GIoTS 2017-Global Internet of Things Summit, Proceedings, Geneva, Switzerland, 6–9 June 2017. [Google Scholar] [CrossRef]
  58. Bebortta, S.; Tripathy, S.S.; Modibbo, U.M.; Ali, I. An optimal fog-cloud offloading framework for big data optimization in heterogeneous IoT networks. Decis. Anal. J. 2023, 8, 100295. [Google Scholar] [CrossRef]
  59. Wen, Z.; Yang, R.; Garraghan, P.; Lin, T.; Xu, J.; Rovatsos, M. Fog orchestration for internet of things services. IEEE Internet Comput. 2017, 21, 16–24. [Google Scholar] [CrossRef]
  60. Iftikhar, S.; Gill, S.S.; Song, C.; Xu, M.; Aslanpour, M.S.; Toosi, A.N.; Du, J.; Wu, H.; Ghosh, S.; Chowdhury, D.; et al. AI-based fog and edge computing: A systematic review, taxonomy and future directions. Internet Things 2023, 21, 100674. [Google Scholar] [CrossRef]
  61. Abeshu, A.; Chilamkurti, N. Deep Learning: The Frontier for Distributed Attack Detection in Fog-To-Things Computing. IEEE Commun. Mag. 2018, 56, 169–175. [Google Scholar] [CrossRef]
  62. Tuli, S.; Mahmud, R.; Tuli, S.; Buyya, R. FogBus: A Blockchain-based Lightweight Framework for Edge and Fog Computing. J. Syst. Softw. 2019, 154, 22–36. [Google Scholar] [CrossRef]
  63. Xia, F.; Yang, L.T.; Wang, L.; Vinel, A. Internet of Things. Int. J. Commun. Syst. 2012, 25, 1101–1102. [Google Scholar] [CrossRef]
  64. Abbas, N.; Zhang, Y.; Taherkordi, A.; Skeie, T. Mobile Edge Computing: A Survey. IEEE Internet Things J. 2018, 5, 450–465. [Google Scholar] [CrossRef]
  65. Hu, Y.C.; Patel, M.; Sabella, D.; Sprecher, N.; Young, V. ETSI White Paper #11 Mobile Edge Computing—A Key Technology Towards 5G; ETSI: Valbonne, France, 2015. [Google Scholar]
  66. Akherfi, K.; Gerndt, M.; Harroud, H. Mobile cloud computing for computation offloading: Issues and challenges. Appl. Comput. Inform. 2018, 14, 1–16. [Google Scholar] [CrossRef]
  67. Noor, T.H.; Zeadally, S.; Alfazi, A.; Sheng, Q.Z. Mobile cloud computing: Challenges and future research directions. J. Netw. Comput. Appl. 2018, 115, 70–85. [Google Scholar] [CrossRef]
  68. Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. A Survey on Mobile Edge Computing: The Communication Perspective. IEEE Commun. Surv. Tutor. 2017, 19, 2322–2358. [Google Scholar] [CrossRef]
  69. TKiendrébéogo; Ouédraogo, I.Z.; Pousga, S.; Barry, D.; Kaboré-Zoungrana, C.Y. Effects of Rations Containing Maggot Concentrate as a Fish Substitute on the Technical and Economic Performance of Large White’s Piglets in Burkina Faso. Food Nutr. Sci. 2019, 10, 1389–1399. [Google Scholar] [CrossRef]
  70. QasemJaber, Z.; Issam Younis, M. Design and Implementation of Real Time Face Recognition System (RTFRS). Int. J. Comput. Appl. 2014, 94, 15–22. [Google Scholar] [CrossRef]
  71. Al-Shuwaili, A.; Simeone, O. Energy-Efficient Resource Allocation for Mobile Edge Computing-Based Augmented Reality Applications. IEEE Wirel. Commun. Lett. 2017, 6, 398–401. [Google Scholar] [CrossRef]
  72. Stanovnik, S.; Cankar, M. On the Similarities and Differences Between the Cloud, Fog and the Edge; Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); LNCS; Springer Nature: Berlin/Heidelberg, Germany, 2020; Volume 11997, pp. 112–123. [Google Scholar] [CrossRef]
  73. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.H.; Konwinski, A.; Lee, G.; Patterson, D.A.; Rabkin, A. Above the Clouds: A Berkeley View of Cloud Computing; EECS Department, University of California: Berkeley, CA, USA, 2009. [Google Scholar]
  74. Dayong, W.; Bin Abu Bakar, K.; Isyaku, B.; Abdalla Elfadil Eisa, T.; Abdelmaboud, A. A Comprehensive Review on Internet of Things Task Offloading in Multi-Access Edge Computing. Heliyon 2024, 10, e29916. [Google Scholar] [CrossRef]
  75. Liu, R.; Yang, R.; Wang, Z.; Sun, X. Application of Edge Computing in Smart Grid. In Proceedings of the 2022 3rd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2022, Xi’an, China, 15–17 July 2022; pp. 62–65. [Google Scholar] [CrossRef]
  76. Taleb, T.; Dutta, S.; Ksentini, A.; Iqbal, M.; Flinck, H. Mobile edge computing potential in making cities smarter. IEEE Commun. Mag. 2017, 55, 38–43. [Google Scholar] [CrossRef]
  77. Rausch, T.; Rashed, A.; Dustdar, S. Optimized container scheduling for data-intensive serverless edge computing. Futur. Gener. Comput. Syst. 2021, 114, 259–271. [Google Scholar] [CrossRef]
  78. Tulkinbekov, K.; Kim, D.H. Blockchain-Enabled Approach for Big Data Processing in Edge Computing. IEEE Internet Things J. 2022, 9, 18473–18486. [Google Scholar] [CrossRef]
  79. Li, G.; Wang, J.; Wu, J.; Song, J. Data Processing Delay Optimization in Mobile Edge Computing. Wirel. Commun. Mob. Comput. 2018, 2018, 6897523. [Google Scholar] [CrossRef]
  80. Kumar, N.; Zeadally, S.; Rodrigues, J.J.P.C. Vehicular delay-tolerant networks for smart grid data management using mobile edge computing. IEEE Commun. Mag. 2016, 54, 60–66. [Google Scholar] [CrossRef]
  81. Hou, W.J.; Jiang, Y.; Lei, W.; Xu, A.; Wen, H.; Chen, S. A P2P network based edge computing smart grid model for efficient resources coordination. Peer-to-Peer Netw. Appl. 2020, 13, 1026–1037. [Google Scholar] [CrossRef]
  82. Siddiqui, I.F.; Qureshi, N.M.F.; Chowdhry, B.S.; Uqaili, M.A. Edge-node-aware adaptive data processing frameworfor smart grid. Wirel. Pers. Commun. 2019, 106, 179–189. [Google Scholar] [CrossRef]
  83. Zhang, X.; Huang, C.; Gu, D.; Zhang, J.; Xue, J.; Wang, H. Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems. J. Syst. Arch. 2022, 127, 102508. [Google Scholar] [CrossRef]
  84. Guerrero, J.I.; Martín, A.; Parejo, A.; Larios, D.F.; Molina, F.J.; León, C. A General-Purpose Distributed Analytic Platform Based on Edge Computing and Computational Intelligence Applied on Smart Grids. Sensors 2023, 23, 3845. [Google Scholar] [CrossRef]
  85. Xiao, J.; Wang, Y.; Zhang, X.; Luo, G.; Xu, C. Multi source data security protection of smart grid based on edge computing. Meas. Sens. 2024, 35, 101288. [Google Scholar] [CrossRef]
  86. Modupe, O.T.; Otitoola, A.A.; Oladapo, O.J.; Abiona, O.O.; Oyeniran, O.C.; Adewusi, A.O.; Komolafe, A.M.; Obijuru, A. Reviewing the Transformational Impact of Edge Computing on Real-Time Data Processing and Analytics. Sci. IT Res. J. 2024, 5, 693–702. [Google Scholar] [CrossRef]
  87. Qin, M.; Liu, T.; Hou, B.; Gao, Y.; Yao, Y.; Sun, H. A Low-Latency RDP-CORDIC Algorithm for Real-Time Signal Processing of Edge Computing Devices in Smart Grid Cyber-Physical Systems. Sensors 2022, 22, 7489. [Google Scholar] [CrossRef]
  88. Lou, J.; Luo, H.; Tang, Z.; Jia, W.; Zhao, W. Efficient Container Assignment and Layer Sequencing in Edge Computing. IEEE Trans. Serv. Comput. 2022, 16, 1118–1131. [Google Scholar] [CrossRef]
  89. Skourtis, D.; Rupprecht, L.; Tarasov, V.; Megiddo, N. Carving Perfect Layers out of Docker Images. In Proceedings of the 11th USENIX Conference on Hot Topics in Cloud Computing (HotCloud′19), Renton, WA, USA, 8 July 2019. [Google Scholar]
  90. Hsieh, H.C.; Lee, C.S.; Chen, J.L. Mobile Edge Computing Platform with Container-Based Virtualization Technology for IoT Applications. Wirel. Pers. Commun. 2018, 102, 527–542. [Google Scholar] [CrossRef]
  91. Morabito, R. Virtualization on internet of things edge devices with container technologies: A performance evaluation. IEEE Access 2017, 5, 8835–8850. [Google Scholar] [CrossRef]
  92. Caprolu, M.; Di Pietro, R.; Lombardi, F.; Raponi, S. Edge Computing Perspectives: Architectures, Technologies, and Open Security Issues. In Proceedings of the 2019 IEEE International Conference on Edge Computing (EDGE), Edge Computing (EDGE), Milan, Italy, 8–13 July 2019; pp. 116–123. [Google Scholar] [CrossRef]
  93. Kakakhel, S.R.U.; Mukkala, L.; Westerlund, T.; Plosila, J. Virtualization at the network edge: A technology perspective. In Proceedings of the 2018 3rd International Conference on Fog and Mobile Edge Computing, FMEC 2018, Barcelona, Spain, 23–26 April 2018; pp. 87–92. [Google Scholar] [CrossRef]
  94. Morabito, R.; Cozzolino, V.; Ding, A.Y.; Beijar, N.; Ott, J. Consolidate IoT Edge Computing with Lightweight Virtualization. IEEE Netw. 2018, 32, 102–111. [Google Scholar] [CrossRef]
  95. Javed, A. Container-Based IoT Sensor Node on Raspberry Pi and the Kubernetes Cluster Framework. Master’s Thesis, Aalto University, Espoo, Finland, 2016; pp. 8–68. [Google Scholar] [CrossRef]
  96. Sabahi, F. Secure Virtualization for Cloud Environment Using Hypervisor-Based Technology. Int. J. Mach. Learn. Comput. 2012, 39–45. [Google Scholar] [CrossRef]
  97. Luo, J.; Yin, L.; Hu, J.; Wang, C.; Liu, X.; Fan, X.; Luo, H. Container-based fog computing architecture and energy-balancing scheduling algorithm for energy IoT. Futur. Gener. Comput. Syst. 2019, 97, 50–60. [Google Scholar] [CrossRef]
  98. Kaur, K.; Mangat, V.; Kumar, K. A Review on Virtualized Infrastructure Managers with Management and Orchestration Features in NFV Architecture. Comput. Netw. 2022, 217, 109281. [Google Scholar] [CrossRef]
  99. Jing, Y.; Qiao, Z.; Sinnott, R.O. Benchmarking Container Technologies For IoT Environments. In Proceedings of the 2022 7th International Conference on Fog and Mobile Edge Computing, FMEC 2022, Paris, France, 12–15 December 2022. [Google Scholar] [CrossRef]
  100. Alam, M.; Rufino, J.; Ferreira, J.; Ahmed, S.H.; Shah, N.; Chen, Y. Orchestration of Microservices for IoT Using Docker and Edge Computing. IEEE Commun. Mag. 2018, 56, 118–123. [Google Scholar] [CrossRef]
  101. Yang, S.; Ren, Y.; Zhang, J.; Guan, J.; Li, B. KubeHICE: Performance-aware Container Orchestration on Heterogeneous-ISA Architectures in Cloud-Edge Platforms. In Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, 30 September–3 October 2021. [Google Scholar] [CrossRef]
  102. Lan, D.; Taherkordi, A.; Eliassen, F.; Liu, L.; Delbruel, S.; Dustdar, S.; Yang, Y. Task Partitioning and Orchestration on Heterogeneous Edge Platforms: The Case of Vision Applications. IEEE Internet Things J. 2022, 9, 7418–7432. [Google Scholar] [CrossRef]
  103. Fernandez, J.M.; Vidal, I.; Valera, F. Enabling the Orchestration of IoT Slices through Edge and Cloud Microservice Platforms. ensors 2019, 19, 2980. [Google Scholar] [CrossRef]
  104. Kaiser, S.; Haq, M.S.; Tosun, A.S.; Korkmaz, T. Container Technologies for ARM Architecture: A Comprehensive Survey of the State-of-the-Art. IEEE Access 2022, 10, 84853–84881. [Google Scholar] [CrossRef]
  105. Sane, P. Navigating ARM-Based Application Adoption: Software Engineer’s Insights on Challenges and Solutions. In Proceedings of the 2024 International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2024, Chennai, India, 21–23 March 2024. [Google Scholar] [CrossRef]
  106. Raho, M.; Spyridakis, A.; Paolino, M.; Raho, D. KVM, Xen and Docker: A performance analysis for ARM based NFV and cloud computing. In Proceedings of the Advances in Information, Electronic and Electrical Engineering, AIEEE 2015-Proceedings of the 2015 IEEE 3rd Workshop, Riga, Latvia, 13–14 November 2015. [Google Scholar] [CrossRef]
  107. Haq, M.S.; Tosun, A.S.; Korkmaz, T. Security Analysis of Docker Containers for ARM Architecture. In Proceedings of the Proceedings-2022 IEEE/ACM 7th Symposium on Edge Computing, SEC 2022, Seattle, WA, USA, 5–8 December 2022; pp. 224–236. [Google Scholar] [CrossRef]
  108. Chemashkin, F.Y.; Drobintsev, P.D.; Zhilenkov, A.A. Research of Clustering Methods of ARM Devices Based for Edge Computing Use Cases. In Proceedings of the Seminar on Information Systems Theory and Practice, ISTP 2023, Saint Petersburg, Russian Federation, 30 November 2023; pp. 14–18. [Google Scholar] [CrossRef]
  109. Kubernetes. Available online: https://kubernetes.io/ (accessed on 12 December 2024).
  110. Ning, H.; Li, Y.; Shi, F.; Yang, L.T. Heterogeneous edge computing open platforms and tools for internet of things. Future Gener. Comput. Syst. 2020, 106, 67–76. [Google Scholar] [CrossRef]
  111. Gupta, N.; Anantharaj, K.; Subramani, K. Containerized architecture for edge computing in smart home: AAA consistent architecture for model deployment. In Proceedings of the 2020 International Conference on Computer Communication and Informatics, ICCCI 2020, Coimbatore, India, 22–24 January 2020. [Google Scholar] [CrossRef]
  112. Madhavapeddy, A.; Mortier, R.; Rotsos, C.; Scott, D.; Singh, B.; Gazagnaire, T.; Smith, S.; Hand, S.; Crowcroft, J. Unikernels. ACM SIGARCH Comput. Arch. News 2013, 41, 461–472. [Google Scholar] [CrossRef]
  113. Chen, S.; Zhou, M. Evolving Container to Unikernel for Edge Computing and Applications in Process Industry. Processes 2021, 9, 351. [Google Scholar] [CrossRef]
  114. John, J.; Ghosal, A.; Margaria, T.; Pesch, D. DSLs for model driven development of secure interoperable automation systems with EdgeX foundry. In Proceedings of the 2021 Forum on Specification & Design Languages (FDL), Antibes, France, 8–10 September 2021. [Google Scholar] [CrossRef]
  115. Foundation, T.L. EdgeX Foundry|#1 Open Source Edge Platform. Available online: https://www.edgexfoundry.org (accessed on 12 December 2024).
  116. Amento, B.; Balasubramanian, B.; Hall, R.J.; Joshi, K.; Jung, G.; Purdy, K.H. FocusStack: Orchestrating edge clouds using location-based focus of attention. In Proceedings of the Proceedings-1st IEEE/ACM Symposium on Edge Computing, SEC 2016, Washington, DC, USA, 27–28 October 2016; pp. 179–191. [Google Scholar] [CrossRef]
  117. Akraino Edge Stac–LF EDGE: Building an Open Source Framework for the Edge. Available online: https://lfedge.org/category/akraino-edge-stack/ (accessed on 12 December 2024).
  118. GitHub-Azure/Iotedge: The IoT Edge OSS Project. Available online: https://github.com/Azure/iotedge (accessed on 12 December 2024).
  119. KubeEdge. Available online: https://kubeedge.io/ (accessed on 12 December 2024).
  120. CORD Archives-Open Networking Foundation. Available online: https://opennetworking.org/tag/cord/ (accessed on 12 December 2024).
  121. IoT Edge’de Zeka-AWS IoT Greengrass-AWS. Available online: https://aws.amazon.com/tr/greengrass/ (accessed on 12 December 2024).
  122. GitHub-Baetyl/Baetyl: Extend Cloud Computing, Data and Service Seamlessly to Edge Devices. Available online: https://github.com/baetyl/baetyl (accessed on 12 December 2024).
  123. Hung, C.C.; Ananthanarayanan, G.; Bodik, P.; Golubchik, L.; Yu, M.; Bahl, P.; Philipose, M. VideoEdge: Processing camera streams using hierarchical clusters. In Proceedings of the Proceedings-2018 3rd ACM/IEEE Symposium on Edge Computing, SEC 2018, Seattle, WA, USA, 25–27 October 2018; pp. 115–131. [Google Scholar] [CrossRef]
  124. Alqaisi, O.I.; Tosun, A.S.; Korkmaz, T. Performance Analysis of Container Technologies for Computer Vision Applications on Edge Devices. IEEE Access 2024, 12, 41852–41869. [Google Scholar] [CrossRef]
  125. Hojabri, M.; Dersch, U.; Papaemmanouil, A.; Bosshart, P. A Comprehensive Survey on Phasor Measurement Unit Applications in Distribution Systems. Energies 2019, 12, 4552. [Google Scholar] [CrossRef]
  126. Zhang, J.; Zhou, X.; Ge, T.; Wang, X.; Hwang, T. Joint Task Scheduling and Containerizing for Efficient Edge Computing. IEEE Trans. Parallel Distrib. Syst. 2021, 32, 2086–2100. [Google Scholar] [CrossRef]
  127. Yin, L.; Luo, J.; Li, K. An Optimal Image Storage Strategy for Container-Based Edge Computing in Smart Factory. IEEE Internet Things J. 2023, 10, 7204–7214. [Google Scholar] [CrossRef]
  128. Chen, T.; Li, M.; Li, Y.; Lin, M.; Wang, N.; Wang, M.; Xiao, T.; Xu, B.; Zhang, C.; Zhang, Z. MXNet: A Flexible and Efficient Machine Learning Library for Heterogeneous Distributed Systems. December 2015. Available online: https://arxiv.org/abs/1512.01274v1 (accessed on 12 December 2024).
  129. TensorFlow. Available online: https://www.tensorflow.org/ (accessed on 12 December 2024).
  130. Demosthenous, G.; Vassiliades, V. Continual Learning on the Edge with TensorFlow Lite. May 2021. Available online: http://arxiv.org/abs/2105.01946 (accessed on 12 December 2024).
  131. Core ML|Apple Developer Documentation. Available online: https://developer.apple.com/documentation/coreml (accessed on 12 December 2024).
  132. Caffe2|A New Lightweight, Modular, and Scalable Deep Learning Framework. Available online: https://caffe2.ai/ (accessed on 12 December 2024).
  133. PyTorch. Available online: https://pytorch.org/ (accessed on 12 December 2024).
  134. TensorRT SDK|NVIDIA Developer. Available online: https://developer.nvidia.com/tensorrt (accessed on 12 December 2024).
  135. Amento, B.; Hall, R.J.; Joshi, K.; Purdy, K.H. FocusStack: Orchestrating Edge Clouds Using Focus of Attention. IEEE Internet Comput. 2017, 21, 56–61. [Google Scholar] [CrossRef]
  136. Lin, L.; Liao, X.; Jin, H.; Li, P. Computation Offloading Toward Edge Computing. Proc. IEEE 2019, 107, 1584–1607. [Google Scholar] [CrossRef]
  137. Zhao, Z.; Barijough, K.M.; Gerstlauer, A. DeepThings: Distributed adaptive deep learning inference on resource-constrained IoT edge clusters. IEEE Trans. Comput. Des. Integr. Circuits Syst. 2018, 37, 2348–2359. [Google Scholar] [CrossRef]
  138. Mendki, P. Docker container based analytics at IoT edge Video analytics usecase. In Proceedings of the Proceedings-2018 3rd International Conference On Internet of Things: Smart Innovation and Usages, IoT-SIU 2018, Bhimtal, India, 23–24 February 2018. [Google Scholar] [CrossRef]
  139. Apache MXNet|A Flexible and Efficient Library for Deep Learning. Available online: https://mxnet.apache.org/versions/1.9.1/ (accessed on 12 December 2024).
  140. Abadi, M.; Agarwal, A.; Barham, P.; Brevdo, E.; Chen, Z.; Citro, C.; Corrado, G.S.; Davis, A.; Dean, J.; Devin, M.; et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems. March 2016. Available online: https://arxiv.org/abs/1603.04467v2 (accessed on 12 December 2024).
  141. Jha, D.N.; Alwasel, K.; Alshoshan, A.; Huang, X.; Naha, R.K.; Battula, S.K.; Garg, S.; Puthal, D.; James, P.; Zomaya, A.; et al. IoTSim-Edge: A simulation framework for modeling the behavior of Internet of Things and edge computing environments. Softw. Pract. Exp. 2020, 50, 844–867. [Google Scholar] [CrossRef]
  142. Romero, D.A.V.; Laureano, E.V.; Betancourt, R.O.J.; Álvarez, E.N. An open source IoT edge-computing system for monitoring energy consumption in buildings. Results Eng. 2024, 21, 101875. [Google Scholar] [CrossRef]
  143. Lee, H.; Lim, J.; Kwon, T.L. MQTLS: Toward Secure MQTT Communication with an Untrusted Broker. In Proceedings of the ICTC 2019-10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future, Jeju, Republic of Korea, 16–18 October 2019; pp. 53–58. [Google Scholar] [CrossRef]
  144. Prajapati, A. AMQP and beyond. In Proceedings of the 2021 International Conference on Smart Applications, Communications and Networking, SmartNets 2021, Glasgow, UK, 22–24 September 2021. [Google Scholar] [CrossRef]
  145. Saint-Andre, P.; Houri, A.; Hildebrand, J. Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Instant Messaging. 2015. [Google Scholar] [CrossRef]
  146. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  147. Damsgaard, H.J.; Ometov, A.; Nurmi, J. Approximation Opportunities in Edge Computing Hardware: A Systematic Literature Review. ACM Comput. Surv. 2023, 55, 252. [Google Scholar] [CrossRef]
  148. Chang, Z.; Liu, S.; Xiong, X.; Cai, Z.; Tu, G. A Survey of Recent Advances in Edge-Computing-Powered Artificial Intelligence of Things. IEEE Internet Things J. 2021, 8, 13849–13875. [Google Scholar] [CrossRef]
  149. Taigman, Y.; Yang, M.; Ranzato, M.; Wolf, L. DeepFace: Closing the Gap to Human-Level Performance in Face Verification. In Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, Computer Vision and Pattern Recognition (CVPR), Columbus, OH, USA, 23–28 June 2014; pp. 1701–1708. [Google Scholar] [CrossRef]
  150. Feng, C.; Wang, Y.; Chen, Q.; Ding, Y.; Strbac, G.; Kang, C. Smart grid encounters edge computing: Opportunities and applications. Adv. Appl. Energy 2021, 1, 100006. [Google Scholar] [CrossRef]
  151. Yu, W.; Liang, F.; He, X.; Hatcher, W.G.; Lu, C.; Lin, J.; Yang, X. A Survey on the Edge Computing for the Internet of Things. IEEE Access 2017, 6, 6900–6919. [Google Scholar] [CrossRef]
  152. Li, X.; Li, D.; Wan, J.; Liu, C.; Imran, M. Adaptive transmission optimization in SDN-based industrial internet of things with edge computing. IEEE Internet Things J. 2018, 5, 1351–1360. [Google Scholar] [CrossRef]
  153. Wang, X.; Zhai, C. Dynamic Power Control for Cell-Free Industrial Internet of Things with Random Data Arrivals. IEEE Trans. Ind. Inform. 2021, 18, 4138–4147. [Google Scholar] [CrossRef]
  154. Zhou, F.; Beaulieu, N.C.; Li, Z.; Si, J.; Qi, P. Energy-Efficient Optimal Power Allocation for Fading Cognitive Radio Channels: Ergodic Capacity, Outage Capacity, and Minimum-Rate Capacity. IEEE Trans. Wirel. Commun. 2015, 15, 2741–2755. [Google Scholar] [CrossRef]
  155. Slama, S.B. Prosumer in smart grids based on intelligent edge computing: A review on Artificial Intelligence Scheduling Techniques. Ain Shams Eng. J. 2022, 13, 101504. [Google Scholar] [CrossRef]
  156. Li, S.; Sun, Y.; Ramezani, M.; Xiao, Y. Artificial Neural Networks for Volt/VAR Control of DER Inverters at the Grid Edge. IEEE Trans. Smart Grid 2018, 10, 5564–5573. [Google Scholar] [CrossRef]
  157. Malekpour, A.R.; Annaswamy, A.M.; Shah, J. Hierarchical Hybrid Architecture for Volt/Var Control of Power Distribution Grids. IEEE Trans. Power Syst. 2019, 35, 854–863. [Google Scholar] [CrossRef]
  158. Fard, A.Y.; Shadmand, M.B. Multitimescale Three-Tiered Voltage Control Framework for Dispersed Smart Inverters at the Grid Edge. IEEE Trans. Ind. Appl. 2020, 57, 824–834. [Google Scholar] [CrossRef]
  159. Hou, J.; Guo, H.; Wang, S.; Zeng, C.; Hu, H.; Wang, F. Design of a Power Transmission Line Monitoring System Based upon Edge Computing and Zigbee Wireless Communication. Mob. Inf. Syst. 2022, 2022, 9379789. [Google Scholar] [CrossRef]
  160. Boccadoro, P. Smart Grids Empowerment with Edge Computing: An Overview. September 2018. Available online: http://arxiv.org/abs/1809.10060 (accessed on 12 December 2024).
  161. Zhang, J. Online Monitoring System of Electromechanical Transient Simulation Data of Distribution Network Based on Edge Computing. Scalable Comput. Pract. Exp. 2024, 25, 5151–5160. [Google Scholar] [CrossRef]
  162. Huang, F.; Lin, J.; Zhang, D.; Wu, D. Design of Reactive Power Online Monitoring System of Intelligent Distribution Transformer Based on Edge Computing. J. Phys. Conf. Ser. 2023, 2532, 012020. [Google Scholar] [CrossRef]
  163. Erbao, X.; Yan, L.; Mingshun, Y.; Xi, C. Design of Intelligent Monitoring System for Power Distribution Equipment Based on Cloud Edge Collaborative Computing. In Proceedings of the 2019 International Conference on Precision Machining, Non-Traditional Machining and Intelligent Manufacturing (PNTIM 2019), Xi′an, China, 22–24 November 2019; pp. 10–13. [Google Scholar] [CrossRef]
  164. Song, S.; Li, S.; Gao, H.; Sun, J.; Wang, Z.; Yan, Y. Research on Multi-Parameter Data Monitoring System of Distribution Station Based on Edge Computing. In Proceedings of the 2021 3rd Asia Energy and Electrical Engineering Symposium, AEEES 2021, Chengdu, China, 26–29 March 2021; pp. 621–625. [Google Scholar] [CrossRef]
  165. Liu, Z.; Qiu, X.; Zhang, S.; Deng, S.; Liu, G. Service Scheduling Based on Edge Computing for Power Distribution IoT. Mater. Contin. 2020, 62, 1351–1364. [Google Scholar] [CrossRef]
  166. Li, H.; Dong, Y.; Yin, C.; Xi, J.; Bai, L.; Hui, Z. A Real-Time Monitoring and Warning System for Power Grids Based on Edge Computing. Math. Probl. Eng. 2022, 2022, 8719227. [Google Scholar] [CrossRef]
  167. Chen, W.; Zhen, Y.; Zheng, L.; Bai, H.; Huo, C.; Zhang, G. An Intelligent Integrated Terminal Based on Edge Computing for Power Distribution and Metering. In Proceedings of the 2021 IEEE 4th International Conference on Computer and Communication Engineering Technology, CCET 2021, Beijing, China, 13–15 August 2021; pp. 434–438. [Google Scholar] [CrossRef]
  168. Xu, Z.; Jiang, W.; Xu, J.; Deng, Y.; Cheng, S.; Zhao, J. A Power-Grid-Mapping Edge Computing Structure for Digital Distributed Distribution Networks. IEEE Trans. Smart Grid 2023, 15, 3432–3445. [Google Scholar] [CrossRef]
  169. Lin, J.; Wang, P.; Guo, S.; Zhang, J.; Sheng, Y. Power distribution network management based on edge computing. In Proceedings of the 2021 China International Conference on Electricity Distribution (CICED), Shanghai, China, 7–9 April 2021; Volume 2021, pp. 352–356. [Google Scholar] [CrossRef]
  170. Long, Y.; Bao, Y.; Zeng, L. Research on Edge-Computing-Based High Concurrency and Availability ‘Cloud, Edge, and End Collaboration’ Substation Operation Support System and Applications. Energies 2023, 17, 194. [Google Scholar] [CrossRef]
  171. Guo, H.; Cui, H. An Edge Computing Architecture and Application Oriented to Distributed Microgrid. In Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, 30 September–3 October 2021; Available online: https://ieeexplore.ieee.org/abstract/document/9644694/ (accessed on 15 December 2024).
  172. Munir, M.S.; Abedin, S.F.; Tran, N.H.; Hong, C.S. When Edge Computing Meets Microgrid: A Deep Reinforcement Learning Approach. IEEE Internet Things J. 2019, 6, 7360–7374. [Google Scholar] [CrossRef]
  173. Munir, M.S.; Abedin, S.F.; Kim, D.H.; Tran, N.H.; Han, Z.; Hong, C.S. A multi-agent system toward the green edge computing with microgrid. In Proceedings of the IEEE Global Communications Conference, GLOBECOM, Waikoloa, HI, USA, 9–13 December 2019. [Google Scholar] [CrossRef]
  174. Munir, M.S.; Abedin, S.F.; Tran, N.H.; Han, Z.; Huh, E.N.; Hong, C.S. Risk-Aware Energy Scheduling for Edge Computing with Microgrid: A Multi-Agent Deep Reinforcement Learning Approach. IEEE Trans. Netw. Serv. Manag. 2021, 18, 3476–3497. [Google Scholar] [CrossRef]
  175. Pu, T.; Wang, X.; Cao, Y.; Liu, Z.; Qiu, C.; Qiao, J.; Zhang, S. Power flow adjustment for smart microgrid based on edge computing and multi-agent deep reinforcement learning. J. Cloud Comput. 2021, 10, 48. [Google Scholar] [CrossRef]
  176. Nammouchi, A.; Aupke, P.; Kassler, A.; Theocharis, A.; Raffa, V.; Di Felice, M. Integration of AI, IoT and Edge-Computing for Smart Microgrid Energy Management. In Proceedings of the 21st IEEE International Conference on Environment and Electrical Engineering and 2021 5th IEEE Industrial and Commercial Power System Europe, EEEIC/I and CPS Europe 2021-Proceedings, Bari, Italy, 7–10 September 2021. [Google Scholar] [CrossRef]
  177. Dong, W.; Yang, Q.; Li, W.; Zomaya, A.Y. Machine-Learning-Based Real-Time Economic Dispatch in Islanding Microgrids in a Cloud-Edge Computing Environment. IEEE Internet Things J. 2021, 8, 13703–13711. [Google Scholar] [CrossRef]
  178. Chen, S.; Wen, H.; Wu, J.; Lei, W.; Hou, W.; Liu, W.; Xu, A.; Jiang, Y. Internet of Things Based Smart Grids Supported by Intelligent Edge Computing. IEEE Access 2019, 7, 74089–74102. [Google Scholar] [CrossRef]
  179. Lv, L.; Wu, Z.; Zhang, L.; Gupta, B.B.; Tian, Z. An Edge-AI Based Forecasting Approach for Improving Smart Microgrid Efficiency. IEEE Trans. Ind. Inform. 2022, 18, 7946–7954. [Google Scholar] [CrossRef]
  180. Li, T.; Yang, J.; Cui, D. Artificial-intelligence-based algorithms in multi-access edge computing for the performance optimization control of a benchmark microgrid. Phys. Commun. 2021, 44, 101240. Available online: https://www.sciencedirect.com/science/article/pii/S1874490720303177 (accessed on 22 December 2024). [CrossRef]
  181. Prajeesha; Anuradha, M. EDGE Computing Application in SMART GRID-A Review. In Proceedings of the 2nd International Conference on Electronics and Sustainable Communication Systems, ICESC 2021, Coimbatore, India, 4–6 August 2021; pp. 397–402. [Google Scholar] [CrossRef]
  182. Molokomme, D.N.; Chabalala, C.S.; Bokoro, P.N. A review of cognitive radio smart grid communication infrastructure systems. Energies 2020, 13, 3245. [Google Scholar] [CrossRef]
  183. Hudson, N.; Hossain, J.; Hosseinzadeh, M.; Khamfroush, H.; Rahnamay-Naeini, M.; Ghani, N. A framework for edge intelligent smart distribution grids via federated learning. In Proceedings of the 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, 19–22 July 2021. [Google Scholar] [CrossRef]
  184. Wu, Y.; Wu, Y.; Guerrero, J.; Vasquez, J.C. Digitalization and decentralization driving transactive energy Internet: Key technologies and infrastructures. Int. J. Electr. Power Energy Syst. 2021, 126, 106593. Available online: https://www.sciencedirect.com/science/article/pii/S0142061520328210 (accessed on 22 December 2024). [CrossRef]
  185. Tom, R.J.; Sankaranarayanan, S.; De Albuquerque, V.H.C.; Rodrigues, J.J.P.C. Aggregator based RPL for an IoT-fog based power distribution system with 6LoWPAN. China Commun. 2020, 17, 104–117. [Google Scholar] [CrossRef]
  186. Stoupis, J.; Rodrigues, R.; Razeghi-Jahromi, M.; Melese, A.; Xavier, J.I. Hierarchical Distribution Grid Intelligence: Using Edge Compute, Communications, and IoT Technologies. IEEE Power Energy Mag. 2023, 21, 38–47. [Google Scholar] [CrossRef]
  187. Wang, F.; Zhang, M.; Wang, X.; Ma, X.; Liu, J. Deep Learning for Edge Computing Applications: A State-of-the-Art Survey. IEEE Access 2020, 8, 58322–58336. [Google Scholar] [CrossRef]
  188. Farhadi, V.; Mehmeti, F.; He, T.; La Porta, T.F.; Khamfroush, H.; Wang, S.; Chan, K.S.; Poularakis, K. Service placement and request scheduling for data-intensive applications in edge clouds. IEEE/ACM Trans. Netw. 2021, 29, 779–792. [Google Scholar] [CrossRef]
  189. Siddiqui, I.; Lee, S.; Abbas, A.; Bashir, A.K. Optimizing lifespan and energy consumption by smart meters in green-cloud-based smart grids. IEEE Access 2017, 5, 20934–20945. Available online: https://ieeexplore.ieee.org/abstract/document/8046004/ (accessed on 22 December 2024). [CrossRef]
  190. Al-Turjman, F.; Abujubbeh, M. IoT-enabled smart grid via SM: An overview. Future Gener. Comput. Syst. 2019, 96, 579–590. [Google Scholar] [CrossRef]
  191. Kumari, P.; Mishra, R.; Gupta, H.P.; Gupta, H.P.; Dutta, T.; Das, S.K. An energy efficient smart metering system using edge computing in LoRa network. IEEE Trans. Sustain. Comput. 2022, 7, 786–798. [Google Scholar] [CrossRef]
  192. Olivares-Rojas, J.C.; Reyes-Archundia, E.; Gutiérrez-Gnecchi, J.A.; Molina-Moreno, I.; Téllez-Anguiano, A.C.; Cerda-Jacobo, J. Smart metering system data analytics platform using multicore edge computing. Int. J. Reconfigurable Embed. Syst. 2021, 10, 11. Available online: https://ijres.iaescore.com/index.php/IJRES/article/view/20308 (accessed on 22 December 2024). [CrossRef]
  193. Liu, F.; Liang, C.; He, Q. Remote malfunctional smart meter detection in edge computing environment. IEEE Access 2020, 8, 67436–67443. Available online: https://ieeexplore.ieee.org/abstract/document/9057452/ (accessed on 22 December 2024). [CrossRef]
  194. Utomo, D.; Sensors, P.H. A multitiered solution for anomaly detection in edge computing for smart meters. Sensors 2020, 20, 5159. [Google Scholar] [CrossRef]
  195. Cui, W.; Wang, H. Anomaly detection and visualization of school electricity consumption data. In Proceedings of the 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA), Beijing, China, 10–12 March 2017; Available online: https://ieeexplore.ieee.org/abstract/document/8078707/ (accessed on 22 December 2024).
  196. Liang, H.; Ye, C.; Zhou, Y.; Yang, H. Anomaly detection based on edge computing framework for AMI. In Proceedings of the 2021 IEEE International Conference on Electrical Engineering and Mechatronics Technology (ICEEMT), Qingdao, China, 2–4 July 2021; Available online: https://ieeexplore.ieee.org/abstract/document/9601888/ (accessed on 22 December 2024).
  197. Wei, S.; Meng, S.; Li, Q.; Zhou, X.; Qi, L.; Xu, X. Edge-enabled federated sequential recommendation with knowledge-aware Transformer. Futur. Gener. Comput. Syst. 2023, 148, 610–622. [Google Scholar] [CrossRef]
  198. Wang, Z.; Wu, F.; Yu, F.; Zhou, Y.; Hu, J.; Min, G. Federated Continual Learning for Edge-AI: A Comprehensive Survey. 2024. Available online: https://3d43585e923c69c05fe5cddbdcda4e642ae7fbed.vetisonline.com/contentitem/edsarx:edsarx.2411.13740?sid=ebsco:plink:crawler&id=ebsco:edsarx:edsarx.2411.13740&crl=c (accessed on 3 April 2025).
  199. Zheng, Y.; Chen, F.; Yang, H.; Su, S. Edge Computing Based Electricity-Theft Detection of Low-Voltage Users. Front. Energy Res. 2022, 10, 892541. [Google Scholar] [CrossRef]
  200. Meloni, A.; Pegoraro, P.; Atzori, L.; Benigni, A.; Sulis, S. Cloud-based IoT solution for state estimation in smart grids: Exploiting virtualization and edge-intelligence technologies. Comput. Netw. 2018, 130, 156–165. [Google Scholar] [CrossRef]
  201. Kuraganti, C.K.; Robert, B.P.; Gurrala, G.; Puthuparambil, A.B.; Sundaresan, R. A distributed hierarchy based framework for validating edge devices performing state estimation in a power system. In Proceedings of the 2020 IEEE International Conference on Power Systems Technology (POWERCON), Bangalore, India, 14–16 September 2020. [Google Scholar] [CrossRef]
  202. Lin, W.; Chen, G.; Huang, Y. Incentive edge-based federated learning for false data injection attack detection on power grid state estimation: A novel mechanism design approach. Appl. Energy 2022, 314, 118828. Available online: https://www.sciencedirect.com/science/article/pii/S0306261922002707 (accessed on 22 December 2024). [CrossRef]
  203. Tran, N.N.; Pota, H.R.; Tran, Q.N.; Hu, J. Designing Constraint-Based False Data-Injection Attacks against the Unbalanced Distribution Smart Grids. IEEE Internet Things J. 2021, 8, 9422–9435. [Google Scholar] [CrossRef]
  204. Fu, R.; Xu, Z.; Wong, B.; Qian, H.; Ju, L.; Jiang, W. Switch state identification in distribution network based on edge computing. In Proceedings of the 2021 IEEE Sustainable Power and Energy Conference (iSPEC), Nanjing, China, 23–25 December 2021; Available online: https://ieeexplore.ieee.org/abstract/document/9736010/ (accessed on 22 December 2024).
  205. Yuan, L.; Gu, J.; Ma, J.; Wen, H.; Jin, Z. Optimal Network Partition and Edge Server Placement for Distributed State Estimation. J. Mod. Power Syst. Clean Energy 2022, 10, 1637–1647. [Google Scholar] [CrossRef]
  206. Udayakumar, R.; Mahesh, B.; Sathiyakala, R.; Thandapani, K.; Choubey, A.; Khurramov, A. An Integrated Deep Learning and Edge Computing Framework for Intelligent Energy Management in IoT-Based Smart Cities. In Proceedings of the 2023 International Conference for Technological Engineering and its Applications in Sustainable Development (ICTEASD), Al-Najaf, Iraq, 14–15 November 2023; Available online: https://ieeexplore.ieee.org/abstract/document/10585232/ (accessed on 22 December 2024).
  207. Ferreira, L.C.B.C.; Da Rosa Borchardt, A.; Cardoso, G.D.S.; Lemes, D.A.M.; de Sousa, G.R.D.R.; Neto, F.B. Edge computing and microservices middleware for home energy management systems. IEEE Access 2022, 10, 109663–109676. Available online: https://ieeexplore.ieee.org/abstract/document/9917529/ (accessed on 22 December 2024). [CrossRef]
  208. Fu, W.; Wan, Y.; Qin, J.; Kang, Y.; Li, L. Privacy-preserving optimal energy management for smart grid with cloud-edge computing. IEEE Trans. Ind. Inform. 2022, 18, 4029–4038. Available online: https://ieeexplore.ieee.org/abstract/document/9546650/ (accessed on 22 December 2024). [CrossRef]
  209. Márquez-Sánchez, S.; Calvo-Gallego, J.; Erbad, A.; Ibrar, M.; Fernandez, J.H.; Houchati, M.; Corchado, J.M. Enhancing building energy management: Adaptive edge computing for optimized efficiency and inhabitant comfort. Electronics 2023, 12, 4179. [Google Scholar] [CrossRef]
  210. Cicirelli, F.; Gentile, A.F.; Greco, E.; Guerrieri, A.; Spezzano, G.; Vinci, A. An energy management system at the edge based on reinforcement learning. In Proceedings of the 2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT), Prague, Czech Republic, 14–16 September 2020; Available online: https://ieeexplore.ieee.org/abstract/document/9213697/ (accessed on 22 December 2024).
  211. Ruan, L.; Yan, Y.; Guo, S.; Wen, F.; Qiu, X. Priority-based residential energy management with collaborative edge and cloud computing. IEEE Trans. Ind. Inform. 2020, 16, 1848–1857. Available online: https://ieeexplore.ieee.org/abstract/document/8790769/ (accessed on 22 December 2024). [CrossRef]
  212. Deng, F.; Zu, Y.; Mao, Y.; Zeng, X.; Li, Z.; Tang, X.; Wang, Y. A method for distribution network line selection and fault location based on a hierarchical fault monitoring and control system. Int. J. Electr. Power Energy Syst. 2020, 123, 106061. [Google Scholar] [CrossRef]
  213. Shirazi, S.N.; Gouglidis, A.; Farshad, A.; Hutchison, D. The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J. Sel. Areas Commun. 2017, 35, 2586–2595. Available online: https://ieeexplore.ieee.org/abstract/document/8060526/ (accessed on 24 December 2024). [CrossRef]
  214. Taleb, T.; Samdanis, K.; Mada, B.; Flinck, H.; Dutta, S.; Sabella, D. On multi-access edge computing: A survey of the emerging 5G network edge cloud architecture and orchestration. IEEE Commun. Surv. Tutor. 2017, 19, 1657–1681. [Google Scholar] [CrossRef]
  215. Wang, P.; Yao, C.; Zheng, Z.; Sun, G.; Song, L. Joint task assignment, transmission, and computing resource allocation in multilayer mobile edge computing systems. IEEE Internet Things J. 2019, 6, 2872–2884. [Google Scholar] [CrossRef]
  216. Mach, P.; Becvar, Z. Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 2017, 19, 1628–1656. Available online: https://ieeexplore.ieee.org/abstract/document/7879258/ (accessed on 24 December 2024). [CrossRef]
  217. Sun, Y.; Li, X.; Liu, Y.; Hu, J. Edge computing terminal equipment planning method for real-time online monitoring service of power grid. In Proceedings of the 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chengdu, China, 20–22 December 2019; Available online: https://ieeexplore.ieee.org/abstract/document/8997885/ (accessed on 22 December 2024).
  218. Huo, W.; Liu, F.; Wang, L.; Jin, Y.; Wang, L. Research on Distributed Power Distribution Fault Detection Based on Edge Computing. IEEE Access 2019, 8, 24643–24652. [Google Scholar] [CrossRef]
  219. Zhukabayeva, T.; Zholshiyeva, L.; Karabayev, N.; Khan, S.; Alnazzawi, N. Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions. Sensors 2025, 25, 213. [Google Scholar] [CrossRef]
  220. Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-physical systems security—A survey. IEEE Internet Things J. 2017, 4, 1802–1831. Available online: https://ieeexplore.ieee.org/abstract/document/7924372/ (accessed on 22 December 2024). [CrossRef]
  221. Ranaweera, P.; Jurcut, A.D.; Liyanage, M. Survey on multi-access edge computing security and privacy. IEEE Commun. Surv. Tutor. 2021, 23, 1078–1124. Available online: https://ieeexplore.ieee.org/abstract/document/9364272/ (accessed on 22 December 2024). [CrossRef]
  222. Kaur, M.R.; Singh, J. Edge Computing and IoT in Smart Cities-An Overview; National Foundation for Entrepreneurship Development (NFED): Tamil Nadu, India, 2024; Volume 11, ISBN 978-81-954930-4-3. [Google Scholar]
  223. Veeramachaneni, V. Edge Computing: Architecture, Applications, and Future Challenges in a Decentralized Era. Recent Trends Comput. Graph. Multimed. Technol. 2024, 7, 8–23. [Google Scholar] [CrossRef]
  224. Singh, S.; Sulthana, R.; Shewale, T.; Chamola, V.; Benslimane, A.; Sikdar, B. Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey. IEEE Internet Things J. 2021, 9, 236–260. [Google Scholar] [CrossRef]
  225. Hagan, M.; Siddiqui, F.; Sezer, S. Enhancing security and privacy of next-generation edge computing technologies. In Proceedings of the 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, Canada, 26–28 August 2019. [Google Scholar] [CrossRef]
  226. Edge Driven Digital Twins in Distributed Energy Systems Role and Opportunities for Hybrid Data Driven Solutions Release 1.0 AIOTI WG Energy. 2024. Available online: https://ecs-org.eu/?publications=ecso-technical-paper-on-cybersecurity-scenarios-and-digital-twins (accessed on 3 April 2025).
  227. Zhou, Z.; Jia, Z.; Liao, H.; Lu, W.; Mumtaz, S.; Guizani, M.; Tariq, M. Secure and Latency-Aware Digital Twin Assisted Resource Scheduling for 5G Edge Computing-Empowered Distribution Grids. IEEE Trans. Ind. Inform. 2021, 18, 4933–4943. [Google Scholar] [CrossRef]
  228. Luo, C.; Xu, L.; Li, D.; Wu, W. Edge Computing Integrated with Blockchain Technologies; Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); LNCS; Springer: Cham, Switzerland, 2020; Volume 12000, pp. 268–288. [Google Scholar] [CrossRef]
  229. Fu, H.; Wang, P.; Li, H.; Zhan, Y.; Chen, J.; Du, X. A Multiple-Blockchains based Service Monitoring Framework in Edge-Cloud Computing. In Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor; Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), Haikou, China, 20–22 December 2021; pp. 2111–2117. [Google Scholar] [CrossRef]
  230. Mukherjee, M.; Matam, R.; Shu, L.; Maglaras, L.; Ferrag, M.A.; Choudhury, N.; Kumar, V. Security and Privacy in Fog Computing: Challenges. IEEE Access 2017, 5, 19293–19304. [Google Scholar] [CrossRef]
  231. Khashan, O.A.; Khafajah, N.M. Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems. Inf. Sci. 2023, 35, 726–739. [Google Scholar] [CrossRef]
  232. Turcu, C.; Turcu, C.; Chiuchisan, I. Blockchain and Its Potential in Education. March 2019. Available online: https://arxiv.org/abs/1903.09300v1 (accessed on 4 April 2025).
  233. Zhang, K.; Zhu, Y.; Maharjan, S.; Zhang, Y. Edge Intelligence and Blockchain Empowered 5G Beyond for the Industrial Internet of Things. IEEE Netw. 2019, 33, 12–19. [Google Scholar] [CrossRef]
  234. Ren, Y.; Zhu, F.; Qi, J.; Wang, J.; Sangaiah, A.K. Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things. Appl. Sci. 2019, 9, 2058. [Google Scholar] [CrossRef]
  235. Sasikumar, A.; Ravi, L.; Devarajan, M.; Vairavasundaram, S.; Selvalakshmi, A.; Kotecha, K.; Abraham, A. A Decentralized Resource Allocation in Edge Computing for Secure IoT Environments. IEEE Access 2023, 11, 117177–117189. [Google Scholar] [CrossRef]
  236. Stanciu, A. Blockchain Based Distributed Control System for Edge Computing. In Proceedings of the 2017 21st International Conference on Control Systems and Computer, CSCS 2017, Bucharest, Romania, 29–31 May 2017; pp. 667–671. [Google Scholar] [CrossRef]
  237. Long, D.; Wu, Q.; Fan, Q.; Fan, P.; Li, Z.; Fan, J. A Power Allocation Scheme for MIMO-NOMA and D2D Vehicular Edge Computing Based on Decentralized DRL. Sensors 2023, 23, 3449. [Google Scholar] [CrossRef]
Figure 1. Structure of this paper.
Figure 1. Structure of this paper.
Applsci 15 04592 g001
Figure 2. General hierarchical architecture of computing methods. The overall hierarchical architecture of (a) EC; (b) FC; (c) MCC; (d) MEC.
Figure 2. General hierarchical architecture of computing methods. The overall hierarchical architecture of (a) EC; (b) FC; (c) MCC; (d) MEC.
Applsci 15 04592 g002
Figure 3. Localized data processing architecture in EC [78].
Figure 3. Localized data processing architecture in EC [78].
Applsci 15 04592 g003
Figure 4. Virtualization layers and components in EC Architecture [92].
Figure 4. Virtualization layers and components in EC Architecture [92].
Applsci 15 04592 g004
Figure 5. Software infrastructure and services deployed on the edge server [142].
Figure 5. Software infrastructure and services deployed on the edge server [142].
Applsci 15 04592 g005
Figure 6. The security model in the pub-sub model in TLS [143].
Figure 6. The security model in the pub-sub model in TLS [143].
Applsci 15 04592 g006
Figure 7. EC architecture for power transmission applications.
Figure 7. EC architecture for power transmission applications.
Applsci 15 04592 g007
Figure 8. Proposed EC architecture for power distribution applications.
Figure 8. Proposed EC architecture for power distribution applications.
Applsci 15 04592 g008
Figure 9. The architectural framework of the power distribution network based on EC [169].
Figure 9. The architectural framework of the power distribution network based on EC [169].
Applsci 15 04592 g009
Figure 10. Design principles and functional structure of EC architecture in smart grid applications.
Figure 10. Design principles and functional structure of EC architecture in smart grid applications.
Applsci 15 04592 g010
Figure 11. Architectural overview of EC integration in microgrid systems.
Figure 11. Architectural overview of EC integration in microgrid systems.
Applsci 15 04592 g011
Figure 12. Edge computing-based microgrid architecture in central China [171].
Figure 12. Edge computing-based microgrid architecture in central China [171].
Applsci 15 04592 g012
Figure 13. EC-based system model for microgrid applications [172,173].
Figure 13. EC-based system model for microgrid applications [172,173].
Applsci 15 04592 g013
Figure 14. System design and interaction between EC and Smart Meters.
Figure 14. System design and interaction between EC and Smart Meters.
Applsci 15 04592 g014
Figure 15. Proposed EC-supported fault monitoring and control framework [212].
Figure 15. Proposed EC-supported fault monitoring and control framework [212].
Applsci 15 04592 g015
Table 1. The differences between MEC and MCC.
Table 1. The differences between MEC and MCC.
Mobile Edge ComputingMobile Cloud Computing
Distribution/DeploymentRequires simple configuration and planningRequires complex configuration and planning
Distance to End UsersClose to usersRemote to users
Server HardwareCompact data centersLarge-scale data centers
Server LocationWireless gatewaysServers are located in large areas
Use of BackhaulRelieves network congestionThe risk of network congestion is high
System ManagementCentralized and distributedCentralized
LatencyVery low latencyHigh latency
Table 2. The comparison between cloud, fog and edge computing.
Table 2. The comparison between cloud, fog and edge computing.
Cloud ComputingFog ComputingEdge Computing
Location of data collection, processing, storageA cluster of data center servers hosted on the internetNear-edge and core networking, network edge devices, and core networking devicesNetwork edge, edge devices
Computing powerStrong (depend on server cluster)Weak (depend on network edge device network)Common (depend on edge device)
Responsible for the type of taskLarge computation, or long-term storage taskPreprocessingReal-time processing
FocusClusters levelInfrastructures levelThings level
Handling multiple IoT applicationsSupportedSupportedUnsupported
Resource contentionSlightSlighSerious
LatencyHighLowUltra-low
Privacy and SecurityLowLowHigh
Table 3. The comparison between CC, FC, and EC for energy systems.
Table 3. The comparison between CC, FC, and EC for energy systems.
Cloud ComputingFog ComputingEdge Computing
Energy EfficiencyLow (high energy consumption due to data transmission and processing at large-scale data centers)Medium (optimized for regional energy use)High (minimizes transmission energy, efficient local processing)
Data Transmission CostHigh (large amounts of data sent to cloud centers)Medium (aggregates and pre-processes data before sending to cloud)Low (only critical data are sent, reducing bandwidth usage)
ScalabilityHigh (scales based on cloud provider infrastructure)Medium (limited by regional computing capacity)High (scales as more edge devices are deployed)
Resilience to Network FailuresLow (dependent on continuous connectivity)Medium (operates even if the cloud connection is lost)High (independent operation with local processing)
Uninterrupted Power and ResilienceRequires stable power for data centers; failure may impact multiple applicationsProvides flexibility in managing energy at a regional levelCan operate during grid outages, ensuring continuous data processing
Integration with Renewable Energy SourcesSupports large-scale renewable energy integration, but with delays in responseManages regional renewable energy fluctuations, optimizing local usageDirectly interfaces with local renewable sources like microgrids and DERs
Data Aggregation and PreprocessingMinimal (raw data sent to the cloud for analysis)Moderate (aggregates and filters data before sending)High (processes critical data locally, reducing transmission needs)
Support for Smart GridsUsed for large-scale smart grid analytics and decision-makingSupports regional smart grid operations and energy managementEssential for real-time control of smart grids, managing demand-response programs
Support for Distributed Energy Resources (DERs)Centralized monitoring and optimization of DERsEnables coordination of distributed energy assetsDirect integration with DERs for local optimization and real-time adjustments
Support for Demand Response (DR) ProgramsDelayed responses due to cloud processing timesSupports aggregated demand response strategiesReal-time, automated demand response capabilities
Table 4. ARM processor-based container technologies and edge hardware.
Table 4. ARM processor-based container technologies and edge hardware.
Ref. NoContainer TechnologyEdge Node HardwareARM Architecture
[91]DockerRaspberry Pi 3 Model BNot specified
[99]Docker, ContainerdRaspberry Pi 4 Model B and Raspberry Pi 3 Model B+ARM v8
[100]DockerRaspberry Pi 3sARM Cortex-A53
[101]KubeEdge, Kubernetes, DockerARM64 4-core CPUARM64
[102]KubeEdgeJetson AGX Xavier, Raspberry Pi 3ARM64
[103]KubernetesRaspberry PiNot specified
[104]DockerRaspberry Pi 4ARM64
[105]Container (Not specified)Apple Mac Mini M1 2020 with Raspberry Pi and 16GB memoryARM64
[106]DockerA Samsung Exynos 5250 SoC with 1.7 GHz Cortex A15 CPU and a non-virtualized host with 2 GB of memoryARMv7
[107]Kubernetes (K3S), DockerRaspberry Pi 4 B+ARM,x86
[108]KubernetesRaspberry PiARM
Table 5. Virtualization technologies in EC [113].
Table 5. Virtualization technologies in EC [113].
PlatformVirtualization TechniqueOwners
EdgeX over Kubernetes [114,115]ContainerLinux (San Francisco, CA, USA)
FocusStack [116]ContainerNot specified
Akraino Edge Stack [117]Container and Virtual MachineLinux (San Francisco, CA, USA)
Azure IoT Edge [118]ContainerMicrosoft (Redmond, WA, USA)
KubeEdge [119]ContainerHuawei (Shenzhen, China)
Cord [120]Container and Virtual MachineOpen Network Foundation (Menlo Park, CA, USA)
AWS IoT Greengrass [121]ContainerAmazon (Seattle, WA, USA)
OpenEdge [122]ContainerNot specified
VideoEdge [123]ContainerMicrosoft (Redmond, WA, USA)
Table 6. Comparison of common application protocols [146].
Table 6. Comparison of common application protocols [146].
Application ProtocolPublish/SubscribeRequest/ResponseTransportSecurityQuality of Service(QoS)
Constrained Application Protocol (COAP)YesYesUDP (User Datagram Protocol)DTLS (Datagram Transport Layer Security)Yes
Minimum Message Queuing Telemetry Transport (MQTT)YesNoTCP (Transmission Control Protocol)SSL (Secure Sockets Layer)Yes
Advanced Message Queuing Protocol (AMQP)YesNoTCPSSLYes
Extensible Messaging and Presence Protocol (XMPP)YesYesTCPSSLNo
Table 7. Some edge devices and owners [16,148].
Table 7. Some edge devices and owners [16,148].
ProductionsOwners
TPUGoogle
DianNao familyCambrain
Turing GPUsNVIDIA Corporation
7 Series FPGAXilinx
HiSilicon Ascend SeriesHuawei
Exynos 9820Samsung
Xeon D-2100Intel
TrueNorthIBM
Table 8. The survey on the integration of edge computing in applications.
Table 8. The survey on the integration of edge computing in applications.
Ref. NoScenariosKey Technologies
[152]Data TransmissionCentralized Software Defined Network (SDN) and EC
[153]Data TransmissionTATSR
[154]Data TransmissionOptimal Power Allocation Strategy with Transmission Power Constraints
[155]Data TransmissionInformation/Digital Technologies and Artificial Intelligence Planning Techniques
[156]Data TransmissionANN and VVC and EC
[157]Data TransmissionVVC and Reactive Power Control
[158]Data TransmissionVoltage Stability
[159]Data TransmissionZigbee Wireless Communication and EC
[161]Monitoring and ControlTransient Electromechanical Simulation
[162]Monitoring and ControlReactive Power Condition Online Monitoring and EC
[163]Monitoring and ControlA priori Frequent Item Set Algorithm and EC
[165]Monitoring and ControlPD-IoT System
[217]Monitoring and ControlA GA Based on Predator Search Strategy
[172]Microgrid SystemModel-Based Deep Reinforcement Learning (MDRL) and EC
[173]Microgrid SystemMADRL
[174]Microgrid System, Fault LocationRadial Basis Neural Network Function
[175]Microgrid System, Fault LocationDRL and EC
[176]Microgrid SystemML Algorithm and EC
[178]Microgrid System, Smart Metering SystemHierarchical Decision-Making Strategy Based on Prediction Strategy and Task Grading (HDTG) and Real-Time Electricity Price Forecast
[179]Microgrid SystemEdge-AI Algorithm
[180]Microgrid SystemNeural-Network-Based Identification Scheme
[183]Smart Metering SystemNILM
[185]Smart Metering System6LoWPAN Protocol and EC
[187]Smart Metering SystemDL and EC
[189]Smart Metering SystemKnowledge-based Usage Strategy for Smart Meters
[191]Smart Metering SystemEC in Long Range (LoRa) and DL Based Compression–Decompression Model
[193]Anomaly DetectionDT to Filter the Abnormal Data
[195]Anomaly DetectionPolynomial Regression and Gaussian Distribution
[196]Anomaly DetectionKDDCUP99 Datasets
[202]State EstimationFL Framework for False Data Injection
[204]State EstimationData-Driven Algorithm
[205]State EstimationGenetic Algorithm III (NSGA-III)
[208]Energy Management SystemPrivacy-Preserving Average Consensus Algorithm
[209]Energy Management SystemFL and DRL Algorithms
[210]Energy Management SystemReinforcement Learning Algorithm
[211]Energy Management SystemStackelberg and Lyapunov Algorithms
[212]Fault LocationTWAM
[218]Fault LocationPower Signal Fault Signal Analysis and EC
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yıldırım, F.; Yalman, Y.; Bayındır, K.Ç.; Terciyanlı, E. Comprehensive Review of Edge Computing for Power Systems: State of the Art, Architecture, and Applications. Appl. Sci. 2025, 15, 4592. https://doi.org/10.3390/app15084592

AMA Style

Yıldırım F, Yalman Y, Bayındır KÇ, Terciyanlı E. Comprehensive Review of Edge Computing for Power Systems: State of the Art, Architecture, and Applications. Applied Sciences. 2025; 15(8):4592. https://doi.org/10.3390/app15084592

Chicago/Turabian Style

Yıldırım, Fatma, Yunus Yalman, Kamil Çağatay Bayındır, and Erman Terciyanlı. 2025. "Comprehensive Review of Edge Computing for Power Systems: State of the Art, Architecture, and Applications" Applied Sciences 15, no. 8: 4592. https://doi.org/10.3390/app15084592

APA Style

Yıldırım, F., Yalman, Y., Bayındır, K. Ç., & Terciyanlı, E. (2025). Comprehensive Review of Edge Computing for Power Systems: State of the Art, Architecture, and Applications. Applied Sciences, 15(8), 4592. https://doi.org/10.3390/app15084592

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop