sensors-logo

Journal Browser

Journal Browser

Mobile and Embedded Devices in Multi-access Edge Computing

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (15 July 2019) | Viewed by 27922

Special Issue Editors


E-Mail Website
Guest Editor
Department of Software, Sangmyung University, Cheonan, Korea
Interests: security; authentication; privacy; protocol analysis; blockchain; mobility management
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
University of Saint Etienne, France
Interests: mobile networks; Internet of Things; edge computing; NFV/SDNQoE
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Multi-access edge computing (MEC) is expected to bring in a number of new features meant to enrich 5G mobile services. Mobile and embedded devices will play important roles for many emerging applications such as connected cars, smart manufacturing, smart cities, etc.

The state-of-the-art cloud computing paradigm provides for scalable as well as flexible service development. However, it has its limitations. Some services, which are delay sensitive, cannot work due to the high latencies of centralized solutions. Such centralized solutions pose privacy issues. They also demand good connectivity requiring costly data exchanges to acquire information. On the other hand, many mobile and embedded devices use batteries and require offloading heavy computational tasks to conserve battery.

MEC is a new edge computing paradigm that pushes the computing from the cloud towards the edge and near the user. MEC allows processing to take place near the user, ensuring scalability and low latency. MEC extends the centralized cloud paradigm, but there are some important issues that need to be tackled. Mobile edge management and orchestration need to be designed. Ensuring service connectivity even during mobility is another challenge. In the case of MEC for content delivery, adaptive algorithms are needed for example for pre-caching the content at the edge.

This Special Issue focuses on recent advances in the theory and practical technologies for mobile and embedded devices in MEC. Original, unpublished contributions and invited articles reflecting various aspects of mobile and embedded devices are encouraged. Authors are encouraged to submit on, but are not limited to, the following topics:

  • MEC management and orchestration
  • MEC for IoT
  • Mobility management in MEC
  • SDN/NFV for enabling MEC
  • Pre-caching of the content at MEC
  • Distributed optimization for MEC
  • Data-driven optimization for MEC
  • Multi Agents based orchestration for MEC
  • Security management in MEC
  • Privacy management in MEC

Dr. Jong-Hyouk Lee
Dr. Kamal Deep Singh
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Multi-Access Edge Computing
  • 5G Mobile Devices
  • 5G Embedded Devices
  • Security
  • Privacy

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 3942 KiB  
Article
True Random Number Generator (TRNG) Utilizing FM Radio Signals for Mobile and Embedded Devices in Multi-Access Edge Computing
by Kyungroul Lee and Manhee Lee
Sensors 2019, 19(19), 4130; https://doi.org/10.3390/s19194130 - 24 Sep 2019
Cited by 4 | Viewed by 5593
Abstract
As transmissions of data between mobile and embedded devices in multi-access edge computing (MEC) increase, data must be protected, ensuring confidentiality and integrity. These issues are usually solved with cryptographic algorithms systems, which utilize a random number generator to create seeds and keys [...] Read more.
As transmissions of data between mobile and embedded devices in multi-access edge computing (MEC) increase, data must be protected, ensuring confidentiality and integrity. These issues are usually solved with cryptographic algorithms systems, which utilize a random number generator to create seeds and keys randomly. Their role in cryptography is so important that they need to be generated securely. In this paper, a true random number generator (TRNG) utilizing FM radio signals as a source is proposed. The proposed method can generate random numbers with high entropy, increased by at least 118% and up to 431% compared to existing generators. Full article
(This article belongs to the Special Issue Mobile and Embedded Devices in Multi-access Edge Computing)
Show Figures

Figure 1

19 pages, 4312 KiB  
Article
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing
by Insu Oh, Taeeun Kim, Kangbin Yim and Sun-Young Lee
Sensors 2019, 19(18), 3869; https://doi.org/10.3390/s19183869 - 7 Sep 2019
Cited by 7 | Viewed by 3177
Abstract
In connected cars with various electronic control unit (ECU) modules, Ethernet is used to communicate data received by the sensor in real time, but it is partially used alongside a controller area network (CAN) due to the cost. There are security threats in [...] Read more.
In connected cars with various electronic control unit (ECU) modules, Ethernet is used to communicate data received by the sensor in real time, but it is partially used alongside a controller area network (CAN) due to the cost. There are security threats in the CAN, such as replay attacks and denial-of-service attacks, which can disrupt the driver or cause serious damage, such as a car accident through malicious manipulation. Although several secure protocols for protecting CAN messages have been proposed, they carry limitations, such as combining additional elements for security or modifying CAN messages with a limited length. Therefore, in this paper, we propose a method for encrypting the data frame, including real data in the CAN message structure, using format-preserving encryption (FPE), which ensures that the plaintext and ciphertext have the same format and length. In this way, block ciphers such as AES-128 must be divided into two or three blocks, but FPE can be processed simultaneously by encrypting them according to the CAN message format, thus providing better security against denial-of-service attacks. Based on the 150 ms CAN message, a normal message was received from a malicious message injection of 180 ms or more for AES-128 and a malicious message injection of 100 ms or more for FPE. Finally, based on the proposed scheme, a CAN transmission environment is constructed for analyzing the encryption/decryption rate and the process of transmitting and processing the encrypted message for connected cars in multi-access edge computing (MEC). This scheme is compared with other algorithms to verify that it can be used in a real environment. Full article
(This article belongs to the Special Issue Mobile and Embedded Devices in Multi-access Edge Computing)
Show Figures

Figure 1

19 pages, 538 KiB  
Article
Hybrid Clouds for Data-Intensive, 5G-Enabled IoT Applications: An Overview, Key Issues and Relevant Architecture
by Panagiotis Trakadas, Nikolaos Nomikos, Emmanouel T. Michailidis, Theodore Zahariadis, Federico M. Facca, David Breitgand, Stamatia Rizou, Xavi Masip and Panagiotis Gkonis
Sensors 2019, 19(16), 3591; https://doi.org/10.3390/s19163591 - 17 Aug 2019
Cited by 39 | Viewed by 5698
Abstract
Hybrid cloud multi-access edge computing (MEC) deployments have been proposed as efficient means to support Internet of Things (IoT) applications, relying on a plethora of nodes and data. In this paper, an overview on the area of hybrid clouds considering relevant research areas [...] Read more.
Hybrid cloud multi-access edge computing (MEC) deployments have been proposed as efficient means to support Internet of Things (IoT) applications, relying on a plethora of nodes and data. In this paper, an overview on the area of hybrid clouds considering relevant research areas is given, providing technologies and mechanisms for the formation of such MEC deployments, as well as emphasizing several key issues that should be tackled by novel approaches, especially under the 5G paradigm. Furthermore, a decentralized hybrid cloud MEC architecture, resulting in a Platform-as-a-Service (PaaS) is proposed and its main building blocks and layers are thoroughly described. Aiming to offer a broad perspective on the business potential of such a platform, the stakeholder ecosystem is also analyzed. Finally, two use cases in the context of smart cities and mobile health are presented, aimed at showing how the proposed PaaS enables the development of respective IoT applications. Full article
(This article belongs to the Special Issue Mobile and Embedded Devices in Multi-access Edge Computing)
Show Figures

Figure 1

18 pages, 6823 KiB  
Article
Wearable IoT Smart-Log Patch: An Edge Computing-Based Bayesian Deep Learning Network System for Multi Access Physical Monitoring System
by Gunasekaran Manogaran, P. Mohamed Shakeel, H. Fouad, Yunyoung Nam, S. Baskar, Naveen Chilamkurti and Revathi Sundarasekar
Sensors 2019, 19(13), 3030; https://doi.org/10.3390/s19133030 - 9 Jul 2019
Cited by 163 | Viewed by 9267
Abstract
According to the survey on various health centres, smart log-based multi access physical monitoring system determines the health conditions of humans and their associated problems present in their lifestyle. At present, deficiency in significant nutrients leads to deterioration of organs, which creates various [...] Read more.
According to the survey on various health centres, smart log-based multi access physical monitoring system determines the health conditions of humans and their associated problems present in their lifestyle. At present, deficiency in significant nutrients leads to deterioration of organs, which creates various health problems, particularly for infants, children, and adults. Due to the importance of a multi access physical monitoring system, children and adolescents’ physical activities should be continuously monitored for eliminating difficulties in their life using a smart environment system. Nowadays, in real-time necessity on multi access physical monitoring systems, information requirements and the effective diagnosis of health condition is the challenging task in practice. In this research, wearable smart-log patch with Internet of Things (IoT) sensors has been designed and developed with multimedia technology. Further, the data computation in that smart-log patch has been analysed using edge computing on Bayesian deep learning network (EC-BDLN), which helps to infer and identify various physical data collected from the humans in an accurate manner to monitor their physical activities. Then, the efficiency of this wearable IoT system with multimedia technology is evaluated using experimental results and discussed in terms of accuracy, efficiency, mean residual error, delay, and less energy consumption. This state-of-the-art smart-log patch is considered as one of evolutionary research in health checking of multi access physical monitoring systems with multimedia technology. Full article
(This article belongs to the Special Issue Mobile and Embedded Devices in Multi-access Edge Computing)
Show Figures

Figure 1

23 pages, 1702 KiB  
Article
Online Distributed User Association for Heterogeneous Radio Access Network
by B. Bikram Kumar, Lokesh Sharma and Shih-Lin Wu
Sensors 2019, 19(6), 1412; https://doi.org/10.3390/s19061412 - 22 Mar 2019
Cited by 7 | Viewed by 3421
Abstract
Future-generation radio access networks (RAN) are projected to fulfill the diverse requirements of user equipment (UE) by adopting a heterogeneous network (HetNet) environment. Necessary integration of different radio access technologies (RAT), such as 2G, 3G, 4G, wireless local area network (WLAN), and visible [...] Read more.
Future-generation radio access networks (RAN) are projected to fulfill the diverse requirements of user equipment (UE) by adopting a heterogeneous network (HetNet) environment. Necessary integration of different radio access technologies (RAT), such as 2G, 3G, 4G, wireless local area network (WLAN), and visible light communication (VLC) is inevitable. Moreover, UEs equipped with diverse requirements will be capable of accessing some or all the RATs. The complex HetNet environment with diverse requirements of UEs will present many challenges. The HetNet is likely to suffer severely from load imbalance among the base stations (BSs) from inheriting the traditional user association scheme such as max-SINR (signal-to-interference-plus-noise ratio)/max-RSSI (received signal strength indicator), unless some sophisticated schemes are invented. In this paper, a novel scheme is devised for a joint-user association for load balancing, where BSs are densely deployed and UEs typically have a certain degree of mobility. Unlike most of the present works, a dynamic network is considered where the position and channel condition of the UEs are not fixed. We develop two complex and distributed association schemes based on probability and d-choices, while carefully considering both loads of the BSs and SINR experienced by the UEs. Numerical results validate the efficiency of the proposed schemes by showing a received data-rate fairness among UEs and an improvement in the UE’s minimum received data rate. Full article
(This article belongs to the Special Issue Mobile and Embedded Devices in Multi-access Edge Computing)
Show Figures

Figure 1

Back to TopTop