1. Introduction
The global evolution of the Internet is experiencing a notable and inevitable change towards a convergent scenario known as the Internet of Things (IoT), where a large number of devices with heterogeneous characteristics and requirements have to be interconnected to serve different verticals, such as smart cities, intelligent transportation systems, smart grids, (ITS) or e-health [1,2,3,4,5,6]. In order to satisfy the strict requirements related to end-to-end latency and the scalability of new services, as well as the processing of the massive volume of data that they generate, it is necessary to design and deploy a decentralized service platform architecture based on MEC (multi-access edge computing) and/or fog computing, with the aim of reducing the distance between the source of data and the processing resources. Moreover, 5G, and especially 6G, have been proposed to fulfil the strict latency and scalability constraints, providing cell-less multiaccess networks controlled by efficient artificial intelligence techniques and supported by MEC.
All these elements are forcing a holistic redesign of communication networks and distributed computing and storage architectures to maximize the performance/cost ratio, meeting the demanding challenges of latency, scalability, bandwidth, availability and flexibility that future services will require. This evolution is poised to influence all network segments, including wireless, optical, IP, etc. It hinges on the seamless integration of SDN, NFV, and the slicing paradigm, facilitated by the utilization of AI [7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23].
However, such distributed and heterogeneous systems can suffer from attacks that can affect the integrity of infrastructure, applications, users, and data. necessitating a comprehensive understanding of the cybersecurity problem, encompassing various levels [24,25,26,27,28,29].
This Special Issue has been developed in the context of the H2020 IoTalentum project. It presents original research articles and communications from researchers in the edge computing and networking communities, exploring emerging technologies that enable the secure integration of edge computing and networks.
2. Overview of Contribution
The Special Issue titled “Emerging Technologies in Edge Computing and Networking” comprises eleven high-quality papers, including one Communication and ten research articles covering cutting-edge topics such as new edge computing architectures, network virtualization, edge node design (hardware/software), or compression of deep neural networks for edge devices.
Nakazato et al. (contribution 1) design a fully virtualized architecture for Multi-Access Edge Computing (MEC) 5G cellular networks, aimed for local use cases (e.g., stadiums and campuses). In this sense, the authors propose a MEC/Cloud Orchestrator that aims to intelligently select deployment options, and they assess its performance through a Beyond 5G testbed, demonstrating reduced latency and more stable throughput compared to traditional cloud services.
Cao et al. (contribution 2) present a fast and energy-efficient vehicular edge computing framework for optimal offloading decisions in urban scenarios with overlapping Roadside Units (RSU) coverage that minimize delay and energy consumption. The proposed multi-objective offloading method employs an improved non-dominated sorting genetic algorithm-II algorithm and introduces a QoS model to find the optimal offloading strategy with low complexity.
Maia et al. (contribution 3) describe an integrated platform that simulates and monitors realistic industrial conditions in a digital twin-based three-tier architecture: edge, platform, and enterprise tiers. The designed platform can be integrated with the ERP system and captures, analyzes, and correlates a wide range of events, such as attacks, vulnerabilities or safety issues that are tracked by sensors and systems in various domains of the factory.
Bruns et al. (contribution 4) propose a mobile crowdsourcing system that can improve the task assignment and respond to failure-causing events by implementing different mechanisms for outcome prediction and task coordination. The proposed task assignment mechanisms rely on an opportunistic approach and on a market-based model and could be used as a basis for task transfers among the edge nodes in edge computing architectures.
Algarvio et al. (contribution 5) describe a strategic bidding process for retailers to submit bids to a wholesale market composed by a day-ahead market, an intraday market, and a balancing market. This work aims to consider prosumers as part of the portfolio of retailers, where distributed edge computing resources for demand and price forecast may play a pivotal role.
Chen et al. (contribution 6) investigate the load imbalance caused by the use of function aggregation in the deployment of service function chaining (SFC) in the air–ground network. The authors propose a virtual network function (VNF) aggregation scheme based on task similarity that obtains the most suitable physical nodes according to various attributes of physical network nodes and demonstrate the performance by simulations with a network topology of 25 points and 45 edges.
Marco-Detchart et al. (contribution 7) design a low-cost edge-AI device that incorporates the necessary hardware and software components for automatically detecting plant diseases from a set of images of a plant leaf. The authors use edge technology to capture multiple images of the leaves and implement data fusion techniques to enhance the classification process and improve its robustness, avoiding the transmission of images over the network.
Hafid et al. (contribution 8) explores sharding-based Proof-of-Stake (PoS) Blockchain protocols, focusing on their key components and delving into the consensus mechanisms of PoS and practical Byzantine Fault Tolerance (pBFT). In this context, edge computing offers the lowest latency and cost for computing delivery and consumption and is particularly well-suited for PoS deployments due to the higher networking requirements imposed by the Proof-of-Work (PoW) consensus.
Choi et al. (contribution 9) describe a method to simplify and quantify a deep neural network (DNN) used for object detection with the aim to embed it into a real-time edge device. The authors analyze five channel pruning methods for network simplification and two parameter quantization methods for network quantization and demonstrate that the detector can operate in real-time embedded onto a System-on-Chip (SoC) that integrates CPU, GPU, and DSP for high-performance Internet of Things (IoT).
Leng et al. (contribution 10) propose an edge system for license-plate-recognition based on semisupervised learning (SSL) suitable for tiny edge gateways that overcomes inherent limitations such as high latency and energy consumption (throughout pruned feature extraction network and compressed feature fusion network). The authors use a hybrid edge/cloud computing approach, where cloud computing is used to upload data gathered at the network’s edge and continually update the overall neural network model.
Finally, Tominaga et al. (contribution 11) provide in their Communication new improvements for image generation from text descriptions based on stacked generative adversarial networks (StackGAN). The proposed method aims to suppress mode collapse and to reduce the variations in the generated images, which is crucial to reduce computation and communication overhead in future edge computing-based and federated generative adversarial networks (GAN).
3. Conclusions
This Special Issue has collected a set of significant and visionary contributions addressing challenges in edge computing and networking technologies. The presented articles and communications have proposed not only new edge computing architectures, but algo new designs of edge nodes as well as compression methods that enable researchers to embed demanding deep neural networks into tiny edge devices. Finally, the Special Issue has also comprised a set of application papers in sectors such as energy, blockchain and vehicular networks where edge computing reaches a lower latency and computational cost than traditional cloud-based approaches.
Acknowledgments
The guest editors express their sincere gratitude to all continued authors, the early-stage researchers, and advisors of the H2020 IoTalentum project.
Author Contributions
J.P. and R.J.D.B. jointly developed the concept and co-wrote this editorial article. All authors have read and agreed to the published version of the manuscript.
Conflicts of Interest
The authors declare no conflicts of interest.
List of Contributions
Nakazato, J.; Li, Z.; Maruta, K.; Kubota, K.; Yu, T.; Tran, G.K.; Sakaguchi, K.; Masuko, S. MEC/Cloud Orchestrator to Facilitate Private/Local Beyond 5G with MEC and Proof-of-Concept Implementation. Sensors 2022, 22, 5145. https://doi.org/10.3390/s22145145
Cao, C.; Su, M.; Duan, S.; Dai, M.; Li, J.; Li, Y. QoS-Aware Joint Task Scheduling and Resource Allocation in Vehicular Edge Computing. Sensors 2022, 22, 9340. https://doi.org/10.3390/s22239340
Maia, E.; Wannous, S.; Dias, T.; Praça, I.; Faria, A. Holistic Security and Safety for Factories of the Future. Sensors 2022, 22, 9915. https://doi.org/10.3390/s22249915
Bruns, R.; Dötterl, J.; Dunkel, J.; Ossowski, S. Evaluating Collaborative and Autonomous Agents in Data-Stream-Supported Coordination of Mobile Crowdsourcing. Sensors 2023, 23, 614. https://doi.org/10.3390/s23020614
Algarvio, H.; Lopes, F. Strategic Bidding of Retailers in Wholesale Markets: Continuous Intraday Markets and Hybrid Forecast Methods. Sensors 2023, 23, 1681. https://doi.org/10.3390/s23031681
Chen, M.; Chen, Q.; Su, Z.; Sun, S.; Li, C. Task-Similarity-Based VNF Aggregation for Air–Ground Integrated Networks. Sensors 2023, 23, 2259. https://doi.org/10.3390/s23042259
Marco-Detchart, C.; Carrascosa, C.; Julian, V.; Rincon, J. Robust Multi-Sensor Consensus Plant Disease Detection Using the Choquet Integral. Sensors 2023, 23, 2382. https://doi.org/10.3390/s23052382
Hafid, A.; Hafid, A.S.; Makrakis, D. Sharding-Based Proof-of-Stake Blockchain Protocols: Key Components & Probabilistic Security Analysis. Sensors 2023, 23, 2819. https://doi.org/10.3390/s23052819
Choi, K.; Wi, S.M.; Jung, H.G.; Suhr, J.K. Simplification of Deep Neural Network-Based Object Detector for Real-Time Edge Computing. Sensors 2023, 23, 3777. https://doi.org/10.3390/s23073777
Leng, J.; Chen, X.; Zhao, J.; Wang, C.; Zhu, J.; Yan, Y.; Zhao, J.; Shi, W.; Zhu, Z.; Jiang, X.; et al. A Light Vehicle License-Plate-Recognition System Based on Hybrid Edge–Cloud Computing. Sensors 2023, 23, 8913. https://doi.org/10.3390/s23218913
Tominaga, R.; Seo, M. Image Generation from Text Using StackGAN with Improved Conditional Consistency Regularization. Sensors 2023, 23, 249. https://doi.org/10.3390/s23010249
Funding Statement
This action was funded by the IoTalentum Project within the Framework of Marie Skłodowska-Curie Actions Innovative Training Networks (ITN)-European Training Networks (ETN), which is funded by the European Union Horizon 2020 Research and Innovation Program under Grant 953442.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
References
- 1.Martín D.G., Florez S.L., González-Briones A., Corchado J.M. COSIBAS Platform—Cognitive Services for IoT-Based Scenarios: Application in P2P Networks for Energy Exchange. Sensors. 2023;23:982. doi: 10.3390/s23020982. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 2.Campero-Jurado I., Márquez-Sánchez S., Quintanar-Gómez J., Rodríguez S., Corchado J.M. Smart Helmet 5.0 for Industrial Internet of Things Using Artificial Intelligence. Sensors. 2020;20:6241. doi: 10.3390/s20216241. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 3.ur Rehman U., Faria P., Gomes L., Valej Z. Future of energy management systems in smart cities: A systematic literature review. Sustain. Cities Soc. 2023;96:104720. doi: 10.1016/j.scs.2023.104720. [DOI] [Google Scholar]
- 4.Kumar P., Lin Y., Bai G., Paverd A., Dong J. S., Martin A. Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues. IEEE Commun. Surv. Tutor. 2019;21:2886–2927. doi: 10.1109/COMST.2019.2899354. [DOI] [Google Scholar]
- 5.Bwalya D., Azevedo M., Corchado E.S. International Symposium on Distributed Computing and Artificial Intelligence. Springer; Berlin/Heidelberg, Germany: 2023. Exploring the Cutting-Edge of Energy Aggregation Approaches and Business Models. 20th International Conference DCAI; Lecture Notes in Networks and Systems. [DOI] [Google Scholar]
- 6.Adli H.K., Remli M.A., Wan Salihin Wong K.N.S., Ismail N.A., González-Briones A., Corchado J.M., Mohamad M.S. Recent Advancements and Challenges of AIoT Application in Smart Agriculture: A Review. Sensors. 2023;23:3752. doi: 10.3390/s23073752. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 7.De Alwis C., Kalla A., Pham Q.V., Kumar P., Dev K., Hwang W.J., Liyanage M. Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research. IEEE Open J. Commun. Soc. 2021;2:836–886. doi: 10.1109/OJCOMS.2021.3071496. [DOI] [Google Scholar]
- 8.Stan C., Rubio García C., Cimoli B., Vegas Olmos J.J., Tafur Monroy I., Rommel S. Securing Communication with Quantum Key Distribution: Implications and Impact on Network Performance; Proceedings of the Optica Advanced Photonics Congress 2022; Maastricht, The Netherlands. 24–28 July 2022; [DOI] [Google Scholar]
- 9.Nawaz S.J., Sharma S.K., Wyne S., Patwary M.N. Quantum Machine Learning for 6G Communication Networks: State-of-the-Art and Vision for the Future. IEEE Access. 2019;7:46317–46350. doi: 10.1109/ACCESS.2019.2909490. [DOI] [Google Scholar]
- 10.Duong T.Q., Ansere J.A., Narottama B., Sharma V., Dobre O. A., Shin H. Quantum-Inspired Machine Learning for 6G: Fundamentals, Security, Resource Allocations, Challenges, and Future Research Directions. IEEE Open J. Veh. Technol. 2022;3:375–387. doi: 10.1109/OJVT.2022.3202876. [DOI] [Google Scholar]
- 11.Bouchmal O., Cimoli B., Stabile R., Vegas Olmos J.J., Tafur Monroy I. From classical to quantum machine learning: Survey on routing optimization in 6G software defined networking. Front. Commun. Netw. 2023;4:1220227. doi: 10.3389/frcmn.2023.1220227. [DOI] [Google Scholar]
- 12.Deng N., Zong L., Jiang H., Duan Y., Zhang K. Challenges and Enabling Technologies for Multi-Band WDM Optical Networks. J. Light. Technol. 2022;40:3385–3394. doi: 10.1109/JLT.2022.3162725. [DOI] [Google Scholar]
- 13.Hosseini S., de Miguel I., Merayo N., Aguado J., de Dios Ó., Durán Barroso R.J. Migration of elastic optical networks to the C+L-bands subject to a partial upgrade of the number of erbium-doped fiber amplifiers. J. Opt. Commun. Netw. 2023;15:F22–F35. doi: 10.1364/JOCN.493231. [DOI] [Google Scholar]
- 14.Kong X., Wu Y., Wang H., Xia F. Edge Computing for Internet of Everything: A Survey. IEEE Internet Things J. 2022;9:23472–23485. doi: 10.1109/JIOT.2022.3200431. [DOI] [Google Scholar]
- 15.Cherrared S., Imadali S., Fabre E., Gössler G., Yahia I.G.B. A Survey of Fault Management in Network Virtualization Environments: Challenges and Solutions. IEEE Trans. Netw. Serv. Manag. 2019;16:1537–1551. doi: 10.1109/TNSM.2019.2948420. [DOI] [Google Scholar]
- 16.Masoumi M., de Miguel I., Durán Barroso R.J., Ruiz L., Brasca F., Rizzi G., Merayo N., Aguado J.C., Fernández P., Lorenzo R.M., et al. Dynamic Online VNF Placement with Different Protection Schemes in a MEC Environment; Proceedings of the 32nd International Telecommunication Networks and Applications Conference (ITNAC); Wellington, New Zealand. 30 November–2 December 2022; [DOI] [Google Scholar]
- 17.Cao H., Du J., Zhao H., Luo D.X., Kumar N., Yang L., Yu F.R. Toward Tailored Resource Allocation of Slices in 6G Networks With Softwarization and Virtualization. IEEE Internet Things J. 2022;9:6623–6637. doi: 10.1109/JIOT.2021.3111644. [DOI] [Google Scholar]
- 18.Roelents L., Muñiz de Costa A., González de Dios O. International Symposium on Distributed Computing and Artificial Intelligence. Springer; Berlin/Heidelberg, Germany: 2023. Telefónica I+D’s Roadmap for Integrated SDN Orchestration of Multi-domain Multi-layer Transport Networks. 20th International Conference DCAI; Lecture Notes in Networks and Systems. [DOI] [Google Scholar]
- 19.Shen X., Gao J., Wu W., Li M., Zhou C., Zhuang W. Holistic Network Virtualization and Pervasive Network Intelligence for 6G. IEEE Commun. Surv. Tutor. 2022;24:1–30. doi: 10.1109/COMST.2021.3135829. [DOI] [Google Scholar]
- 20.Janjua H.K., de Miguel I., Durán Barroso R.J., González de Dios Ó., Aguado J.C., Merayo N., Fernández P., Lorenzo R.M. Efficient Optimization of Actor-Critic Learning for Constrained Resource Orchestration in RAN with Network Slicing; Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN); Paris, France. 6–9 March 2023; [DOI] [Google Scholar]
- 21.Habibi M.A., Han B., Fellan A., Jiang W., Sánchez A.G., Pavón I.L., Boubendir A., Schotten H.D. Toward an Open, Intelligent, and End-to-End Architectural Framework for Network Slicing in 6G Communication Systems. IEEE Open J. Commun. Soc. 2023;4:1615–1658. doi: 10.1109/OJCOMS.2023.3294445. [DOI] [Google Scholar]
- 22.Taurone F., Lucani D., Fehér M., Zhang Q. Change a Bit to Save Bytes: Compression for Floating Point Time-Series Data; Proceedings of the IEEE International Conference on Communications (ICC); Rome, Italy. 28 May–1 June 2023; [DOI] [Google Scholar]
- 23.Zeng Y., Calvo-Palomino R., Giustiniano D., Bovet G., Banerjee S. Adaptive Uplink Data Compression in Spectrum Crowdsensing Systems. IEEE/ACM Trans. Netw. 2023;31:2207–2221. doi: 10.1109/TNET.2023.3239378. [DOI] [Google Scholar]
- 24.Abbasi M., Plaza M., Prieto J., Corchado J.M. Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions. IEEE Access. 2022;10:97197–97216. doi: 10.1109/ACCESS.2022.3205351. [DOI] [Google Scholar]
- 25.Ferens M., Dushku E., Kosta S. Securing PUFs Against ML Modeling Attacks via an Efficient Challenge-Response Approach; Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); Hoboken, NJ, USA. 20 May 2023; [DOI] [Google Scholar]
- 26.Cao Y., Zhao Y., Wang Q., Zhang J., Ng S.X., Hanzo L. The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet. IEEE Commun. Surv. Tutor. 2022;24:839–894. doi: 10.1109/COMST.2022.3144219. [DOI] [Google Scholar]
- 27.Rubio García C., Rommel S., Takarabt S., Vegas Olmos J.J., Guilley S., Nguyen P., Tafur Monroy I. Quantum-resistant Transport Layer Security. Comput. Commun. 2023;213:345–358. doi: 10.1016/j.comcom.2023.11.010. [DOI] [Google Scholar]
- 28.Waleed M., Kamal T., Um T.W., Hafeez A., Habib B., Skouby K.E. Unlocking Insights in IoT-Based Patient Monitoring: Methods for Encompassing Large-Data Challenges. Sensors. 2023;23:6760. doi: 10.3390/s23156760. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 29.Abbasi M., Prieto J., Shahraki A., Corchado J.M. Industrial data monetization: A blockchain-based industrial IoT data trading system. Internet Things. 2023;24:100959. doi: 10.1016/j.iot.2023.100959. [DOI] [Google Scholar]