Advertisement

边缘计算

    Not found 边缘计算

    边缘计算

    Default Latest Most Read
    Please wait a minute...
    For Selected: Toggle Thumbnails
    A survey of mobile edge computing
    Zishu LI,Renchao XIE,Li SUN,Tao HUANG
    Telecommunications Science    2018, 34 (1): 87-101.   DOI: 10.11959/j.issn.1000-0801.2018011
    Abstract5046)   HTML553)    PDF(pc) (1331KB)(5465)       Save

    Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Cited: Baidu(30)
    Task offloading and resource allocation in vehicle heterogeneous networks with MEC
    Haibo ZHANG,Qiuji LUAN,Jiang ZHU,Fangwei LI
    Chinese Journal on Internet of Things    2018, 2 (3): 36-43.   DOI: 10.11959/j.issn.2096-3750.2018.00062
    Abstract4404)   HTML76)    PDF(pc) (1382KB)(1968)       Save

    Based on the advantages of high-bandwidth and low-latency brought by mobile edge computing (MEC),which could provide IT service environment and cloud computing capability,combined with the long-term evolution unlicensed (LTE-U) technology,the task offloading decision and resource allocation issues in vehicle heterogeneous network were studied.Considering the link differentiation requirements,which were the high capacity of vehicle-to-roadside unit (V2I) links and the super reliability of vehicle-to-vehicle (V2V) links,quality of service (QoS) was modeled as the combination of capacity and latency.Firstly,the improved K-means algorithm was used to cluster the request vehicles according to different QoS to determine the communication mode.Secondly,the LTE-U technology based on non-competition period (CFP) which was combined with carrier aggregation (CA) technology,and the distribution Q-Learning algorithm were adopted to allocate the channel and power.The simulation results show that the proposed mechanism can maximize the V2I link traversal capacity while ensuring the reliability of the V2I link.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on data security and privacy-preserving for the research of edge computing
    Jiale ZHANG,Yanchao ZHAO,Bing CHEN,Feng HU,Kun ZHU
    Journal on Communications    2018, 39 (3): 1-21.   DOI: 10.11959/j.issn.1000-436x.2018037
    Abstract3055)   HTML319)    PDF(pc) (857KB)(9171)       Save

    With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on computation offloading in mobile edge computing
    Renchao XIE,Xiaofei LIAN,Qingmin JIA,Tao HUANG,Yunjie LIU
    Journal on Communications    2018, 39 (11): 138-155.   DOI: 10.11959/j.issn.1000-436x.2018215
    Abstract2902)   HTML373)    PDF(pc) (1284KB)(9630)       Save

    Computation offloading in mobile edge computing would transfer the resource intensive computational tasks to the edge network.It can not only solve the shortage of mobile user equipment in resource storage,computation performance and energy efficiency,but also deal with the problem of resource occupation,high latency and network load compared to cloud computing.Firstly the architecture of MEC was introduce and a comparative analysis was made according to various deployment schemes.Then the key technologies of computation offloading was studied from three aspects of decision on computation offloading,allocation of computing resource within MEC and system implement of MEC.Based on the analysis of MEC deployment scheme in 5G,two optimization schemes on computation offloading was proposed in 5G MEC.Finally,the current challenges in the mobility management was summarized,interference management and security of computation offloading in MEC.

    Table and Figures | Reference | Related Articles | Metrics
    Architecture,challenges and applications of edge computing
    Linzhe LI, Peilei ZHOU, Peng CHENG, Zhiguo SHI
    Big Data Research    2019, 5 (2): 3-16.   DOI: 10.11959/j.issn.2096-0271.2019010
    Abstract2538)   HTML841)    PDF(pc) (1661KB)(2708)       Save

    Edge computing is a new type of computing models that performs computing tasks at the edge of the network.Compared with cloud computing,it can respond to user’s needs more quickly and reliably.Starting from the shortcomings of cloud computing,the concept and general architecture of edge computing were illustrated,and then two reference frameworks proposed by industry alliances were elaborated.Four challenges of edge computing and their latest research progress were summarized.With the development of theory and technology related to edge computing,it will become a key technology to promote the upgrade of Internet of things (IoT) services.For this reason,two applications of edge computing in manufacturing and security monitoring were introduced.

    Table and Figures | Reference | Related Articles | Metrics
    Autoencoder neural network-based abnormal data detection in edge computing enabled large-scale IoT systems
    Tianqi YU,Yongxu ZHU,Xianbin WANG
    Chinese Journal on Internet of Things    2018, 2 (4): 14-21.   DOI: 10.11959/j.issn.2096-3750.2018.00076
    Abstract2507)   HTML62)    PDF(pc) (1525KB)(1744)       Save

    Given the advantages of low cost and easy deployment,large-scale Internet of things (IoT) has been deployed for environment monitoring pervasively.Within such systems,cloud platform is typically utilized as a remote data and control center.However,tremendous amount of data uploading and processing induce huge challenges on bandwidth load and real-time data gathering.In order to overcome these challenges,edge computing enabled IoT system architecture was proposed for environmental monitoring.As the intermediate layer,local processing could be supported for end devices with low latency and assist with preliminary analysis to offload computational tasks from cloud and the amount of data uploading could be reduced.Based on this system architecture,an autoencoder neural network-based abnormal data detection scheme was developed newly.Performance evaluation has been conducted based on the practical oceanic atmospheric data.Simulation results indicate that the proposed scheme can accurately detect the abnormal data by fully exploiting the spatial data correlation.

    Table and Figures | Reference | Related Articles | Metrics
    Edge computing privacy protection method based on blockchain and federated learning
    Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU
    Journal on Communications    2021, 42 (11): 28-40.   DOI: 10.11959/j.issn.1000-436x.2021190
    Abstract2331)   HTML495)    PDF(pc) (986KB)(2204)       Save

    Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.

    Table and Figures | Reference | Related Articles | Metrics
    Computing network:a new multi-access edge computing
    Bo LEI, Zengyi LIU, Xuliang WANG, Mingchuan ·ANG, ·unqing CHEN
    Telecommunications Science    2019, 35 (9): 44-51.   DOI: 10.11959/j.issn.1000-0801.2019209
    Abstract2265)   HTML261)    PDF(pc) (959KB)(5168)       Save

    Edge computing has become an important innovative business model in the 5G era,especially its low latency characteristics,which are considered to be unavailable in traditional solutions.Therefore,edge computing can provide more service capabilities and more application scenarios.However,the synergy of computing resources between edge computing and cloud computing has become a new technical problem,so it is necessary to realize cloud network collaboration,cloud edge collaboration and even edge collaboration between edge computing,cloud computing and network,so as to achieve the optimization of resource utilization.A computing network solution based on cloud,network and edge depth fusion was introduced,and a typical system for AI application was proposed,which could effectively cope with the future.

    Table and Figures | Reference | Related Articles | Metrics
    Edge intelligence:a new nexus of edge computing and artificial intelligence
    Zhi ZHOU, Shuai YU, Xu CHEN
    Big Data Research    2019, 5 (2): 53-63.   DOI: 10.11959/j.issn.2096-0271.2019013
    Abstract1944)   HTML271)    PDF(pc) (2589KB)(1889)       Save

    Artificial intelligence (AI) and edge computing (EC) represent two of today’s most popular technologies.There is a great potential to coordinate these two emerging techniques to facilitate the further advent of both sides.Through three research cases,the profound benefits were demonstrated when AI and EC synergize.Specifically,from the perspective of EC for AI,to efficiently run deep learning at the network edge,a collaborative and on-demand deep neural network (DNN) co-inference framework with device-edge synergy was proposed.By applying DNN partitioning and right-sizing,it minimizes the inference latency under target accuracy.On the other hand,from the perspective of AI for EC,for the dynamical placement of edge computing services,two methods were proposed:an online-learning based adaptive service migration strategy and a factor graph model driven predictive service migration technique.

    Table and Figures | Reference | Related Articles | Metrics
    Task collaborative offloading scheme in vehicle multi-access edge computing network
    Guanhua QIAO,Supeng LENG,Hao LIU,Kaisheng HUANG,Fan WU
    Chinese Journal on Internet of Things    2019, 3 (1): 51-59.   DOI: 10.11959/j.issn.2096-3750.2019.00089
    Abstract1916)   HTML33)    PDF(pc) (3609KB)(1299)       Save

    In order to solve the problem that traditional mobile edge computing network can’t be straightforwardly applied to the Internet of vehicles (IoV) due to high speed mobility and dynamic network topology,a vehicular edge multi-access computing network (VE-MACN) was introduced to realize collaborative computing offloading between roadside units and smart vehicles.In this context,the collaborative computation offloading was formulated as a joint multi-access model selection and task assignment problem to realize the good balance between long-term system utility,diverse needs of IoV applications and energy consumption.Considering the complex joint optimization problem,a deep reinforcement learning-based collaborative computing offloading scheme was designed to overcome the curse of dimensionality for Q-learning algorithm.The simulation results demonstrate that the feasibility and effectiveness of proposed offloading scheme.

    Table and Figures | Reference | Related Articles | Metrics
    Application of EdgeFlow mobile edge computing in Internet of things
    Shuchang CONG,Chao YAO,Chao YAO,Pengfei WANG,Zijie ZHENG
    Chinese Journal on Internet of Things    2019, 3 (1): 90-96.   DOI: 10.11959/j.issn.2096-3750.2019.00098
    Abstract1767)   HTML28)    PDF(pc) (2510KB)(1392)       Save

    In order to meet the requirements of higher computing speed,lower communication delay and higher access density in the future Internet of things,a computational framework of EdgeFlow for mobile edge computing and a task unloading algorithm considering blocking and non-blocking state were proposed.The simulation experiments on the universal software radio platform show that the computational efficiency can be improved significantly and the communication delay can be reduced by EdgeFlow.It points out a new development direction,lays a theoretical and practical foundation for solving the problem of higher computational requirements of the Internet of things.And it will be widely used in the Internet of things scenarios.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on edge computing technology for autonomous driving
    Pin LYU, Jia XU, Taoshen LI, Wenbiao XU
    Journal on Communications    2021, 42 (3): 190-208.   DOI: 10.11959/j.issn.1000-436x.2021045
    Abstract1754)   HTML359)    PDF(pc) (763KB)(2090)       Save

    Edge computing plays an extremely important role in the environment perception and data processing of autonomous driving.Autonomous driving vehicles can expand their perception scope by obtaining environmental information from edge nodes, and can also deal with the problem of insufficient computing resources by offloading tasks to edge nodes.Compared with cloud computing, edge computing avoids high latency caused by long-distance data transmission, and provides autonomous driving vehicles with faster responses, and relieves the traffic load of the backbone network.Firstly, the edge computing-based cooperative perception and task offloading technologies for autonomous vehicles were introduced firstly, and related challenging issues were also proposed.Then the state-of-the-art of cooperative perception and task offloading technologies were analyzed and summarized.Finally, the problems need to be further studied in this field were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Mobile edge computing and application in traffic offloading
    Jianmin ZHANG,Weiliang XIE,Fengyi YANG,Zhouyun WU,Liang XIE
    Telecommunications Science    2016, 32 (7): 132-143.   DOI: 10.11959/j.issn.1000-0801.2016165
    Abstract1488)   HTML91)    PDF(pc) (1258KB)(3658)       Save

    Mobile edge computing(MEC)makes it possible to deploy and provide service locally,which is close to the users,by enabling the IT and cloud computation capacity at the radio access network (RAN).Thus,MEC can improve the quality of experience (QoE) by reducing the latency,and decrease the network operation cost through reducing backhaul capacity requirement.Meanwhile,based on the network context information (location,network traffic load,radio information,etc) exposure to applications and services,MEC can further improve the QoE of user and provide the platform to third-party partners for application and service innovation.Besides the introduction of MEC,the detailed MEC platform was presented.Furthermore,the traffic offloading solution based on MEC was proposed and compared with the solution of local IP access and selected IP traffic offload (LIPA/SIPTO).In addition,the problems and challenges of the MEC were also discussed in detail.

    Table and Figures | Reference | Related Articles | Metrics
    Cited: Baidu(9)
    Recovery mechanism of large-scale damaged edge computing network in industrial Internet of things
    Hui TIAN, Hao WU, Yang TIAN, Jianyang REN, Yajuan CUI, Wenbao AI, Jianhua YUAN
    Journal on Communications    2021, 42 (4): 89-99.   DOI: 10.11959/j.issn.1000-436x.20211100
    Abstract1405)   HTML545)    PDF(pc) (870KB)(1361)       Save

    Given the limited resources at early stages for recovery, a failure recovery mechanism of the edge computing network considering both computational demands and repair costs was proposed, which intends to tackle the problem of the high probability of large-scale cascading failure caused by the interdependence between the edge computing network and other subnetworks in industrial Internet of things (IIoT).Considering the network structure (topology and link capacity) and network dynamics (computational demands), a joint link recovery selection and computation migration optimization problem was formulated under the conservation of node computing requirements.By leveraging the Benders decomposition algorithm, the NP-hard problem was transformed into a main problem and a sub-problem, which were interdependent and could be solved in polynomial time through the approximation of cutting planes.A local branching method was further introduced to guarantee the non-increasing nature of the Benders upper bound, thus accelerating the convergence of Benders decomposition.Simulation results demonstrate that the proposed algorithm outperforms the conventional topology-based recovery algorithm in system utility, and can perform well in multiple scenarios.

    Table and Figures | Reference | Related Articles | Metrics
    Research on mobile edge computing and caching in massive wireless communication network
    Yongming HUANG, Chong ZHENG, Zhengming ZHANG, Xiaohu YOU
    Journal on Communications    2021, 42 (4): 44-61.   DOI: 10.11959/j.issn.1000-436x.2021096
    Abstract1307)   HTML280)    PDF(pc) (1287KB)(1646)       Save

    For the large-scale network mobile edge computing and caching technology of future 6G mobile communications, firstly, the architectures and principles of mobile edge computing and caching in large-scale wireless networks were introduced, and the necessity and universality were clarified.Then, from the perspective of the five key issues in the mobile edge computing and caching enabled large-scale wireless network, including computing offloading, edge caching, multi-dimensional resource allocation, user association and privacy protection, the recent researches and further pointed out the future development trends and research directions were reviewed and analyzed.Finally, for the privacy preservation issue, a federated learning based privacy-preserving scheme was proposed.Simulation results show that the proposed scheme can simultaneously preserve user privacy and improve the quality of service.

    Table and Figures | Reference | Related Articles | Metrics
    5G edge computing technology and application prospects
    MA Hongyuan,XIAO Ziyu,BU Zhonggui,ZHAO Yuan
    Telecommunications Science    2019, 35 (6): 114-123.   DOI: 10.11959/j.issn.1000-0801.2019168
    Abstract1204)   HTML176)    PDF(pc) (1071KB)(2751)       Save

    Edge computing is a method of processing data physically close to where data is generated,and it is one of the key technologies of 5G.The development of network technology and the demand of business applications have jointly promoted the maturity of 5G edge computing.The 5G edge computing technology system was elaborated through the perspective of edge infrastructure,edge computing network and edge platform,and the 5G edge computing application was prospected.

    Table and Figures | Reference | Related Articles | Metrics
    Computation offloading and resource management scheme in mobile edge computing
    Qiuping LI,Junhui ZHAO,Yi GONG
    Telecommunications Science    2019, 35 (3): 36-46.   DOI: 10.11959/j.issn.1000-0801.2019060
    Abstract1186)   HTML116)    PDF(pc) (1918KB)(1847)       Save

    Mobile edge computing (MEC) is an innovative computing paradigm.Offloading computing tasks to MEC server can effectively solve the contradiction between resource-constrained of mobile user and computing-intensive applications.Moreover,it can meet the delay of computing task and reduce energy consumption of mobile user.The current research results and achievements of computation offloading scheme in MEC system were summarized and the existing problems and challenges were analyzed.Furthermore,the development directions of MEC in the future were explored.

    Table and Figures | Reference | Related Articles | Metrics
    Edge computing and network slicing technology in 5G
    Hongyu XIANG,Yangwen XIAO,Xian ZHANG,Zhuying PIAO,Mugen PENG
    Telecommunications Science    2017, 33 (6): 54-63.   DOI: 10.11959/j.issn.1000-0801.2017200
    Abstract1185)   HTML74)    PDF(pc) (1109KB)(6181)       Save

    As a cost-efficient way to meet the wide range of use cases that the fifth generation wireless network will provide,network slicing and edge computing have been advocated by both academia and industry.In the concept of network slicing,the network entities are sliced into several logical networks to provide the requested services for different use cases.The edge computing pushes the frontier of computing applications,data,and services away from centralized nodes to the logical extremes of a network and even the user equipments,which can improve the traditional mobile broadband service capability,and handle with the emerging machine type service.The edge computing based radio access network slicing was proposed as a combination of edge computing and network slicing.The radio access network slicing can meet the diverse use cases and business models in 5G,and enable operators to flexibly provide personalized network services based on third-party need and network situation in a cost-efficient way.

    Table and Figures | Reference | Related Articles | Metrics
    Cited: Baidu(1)
    Research on energy management of multi-user mobile edge computing offloading
    Luyao WANG,Wenqian ZHANG,Guanglin ZHANG
    Chinese Journal on Internet of Things    2019, 3 (1): 73-81.   DOI: 10.11959/j.issn.2096-3750.2019.00091
    Abstract1085)   HTML24)    PDF(pc) (1300KB)(1097)       Save

    In mobile edge computing system,the quality of computing experience can be improved greatly by offloading computing tasks from mobile devices to mobile edge computing servers.Consider incorporating renewable energy into a multi-user mobile edge system.Moreover,a battery as an energy harvesting device was added to the model to harvest energy and storage.The task allocation strategy in mobile edge computing system was formulated through the resource management algorithm based on reinforcement learning,which achieved the cost minimization of mobile devices (including delay cost and computing cost).The simulation results show that the proposed algorithm significantly minimizes the cost of mobile devices compared with other algorithms.

    Table and Figures | Reference | Related Articles | Metrics
    A survey on edge computing offloading
    Youkang ZHU,Guangxue YUE,Xiaohui YANG,Jiansheng LIU
    Telecommunications Science    2019, 35 (4): 74-94.   DOI: 10.11959/j.issn.1000-0801.2019059
    Abstract1013)   HTML107)    PDF(pc) (1575KB)(1467)       Save

    Edge computing integrate the computing,storage and other resources on the edge of the network into a unified user service platform.According to the principle of nearest service,the network edge node task request is timely and correspondingly processed.Computational migration is a key issue in edge computing due to limited edge node capabilities,resources,bandwidth,and energy.The causes,evolution and development trends of mobile edge computing were reviewed from the distributed computing,pervasive computing,cloud computing to edge computing as the main line.The characteristics of computing migration at each stage were compared and analyzed,and the classical models were reviewed.The latest research progress and application fields of edge computing were focused on,mobile edge computing models based on energy optimization management were researched and compared.Finally,a time division multiple access based multi-user edge mobile terminal computing migration strategy system for LTE applications was proposed.

    Table and Figures | Reference | Related Articles | Metrics
    Cloud native based edge computing: vision and challenges
    Deze ZENG, Lvhao CHEN, Lin GU, Yuepeng LI
    Chinese Journal on Internet of Things    2021, 5 (2): 7-17.   DOI: 10.11959/j.issn.2096-3750.2021.00206
    Abstract944)   HTML134)    PDF(pc) (1137KB)(1147)       Save

    Cloud native computing, featured by low-cost container technology, well fits edge computing.It was proposed to apply cloud native computing to make edge computing resource management and control transparent to application development and operation.Compared with cloud computing, edge computing resources are widely distributed, highly heterogeneous, and fragmented, which called for collaborative resource management and control.According to the development status of cloud native related technologies, through the integration of future networking technologies such as soft were defined network and network function virtualization, a full-stack cloud native based edge computing architecture was proposed.Then, considering the hierarchical characteristics of containers, a low-overhead container deployment optimization problem for resource-limited edge computing was studied.Finally, the development challenges faced by cloud native based edge computing were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Security of intelligent edge computing:a survey
    Xingshuo AN, Guixing CAO, Li MIAO, Shubo REN, Fuhong LIN
    Telecommunications Science    2018, 34 (7): 135-147.   DOI: 10.11959/j.issn.1000-0801.2018181
    Abstract936)   HTML52)    PDF(pc) (3108KB)(1325)       Save

    With the rise of edge computing,more and more attentions have been paid to security issues of edge computing.The basic concepts,system architecture and the relationship between edge computing and other computing paradigms were introduced.Then the security threats to edge computing were analyzed,and the security technology of edge computing was discussed for these security threats.Finally,the technologies of intrusion detection,access control,defense strategy and key management in edge computing were summarized and the further research directions were pointed out.

    Table and Figures | Reference | Related Articles | Metrics
    Federated learning based intelligent edge computing technique for video surveillance
    Yu ZHAO,Jie YANG,Miao LIU,Jinlong SUN,Guan GUI
    Journal on Communications    2020, 41 (10): 109-115.   DOI: 10.11959/j.issn.1000-436x.2020192
    Abstract930)   HTML118)    PDF(pc) (1329KB)(2600)       Save

    With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.

    Table and Figures | Reference | Related Articles | Metrics
    Edge computing enabled smart grid
    Cong ZHANG, Xiaoyi FAN, Xiaoten LIU, Haitian PANG, Lifeng SUN, Jiangchuan LIU
    Big Data Research    2019, 5 (2): 64-78.   DOI: 10.11959/j.issn.2096-0271.2019014
    Abstract913)   HTML145)    PDF(pc) (1550KB)(1650)       Save

    How to mitigate such pressure has become a critical challenge for global grid enterprises.Empowered by the development of IoT techniques,high-speed communications,and AI-chips,traditional grid enterprises are trying to adopt these new techniques to solve the challenge,especially in heterogeneous data collection,energy scheduling,and AI-enabled monitoring.Firstly,the background of smart grid and the history of edge computing were introduced.Then,edge computing enabled solutions were illustrated in three typical grid scenarios.Finally,two edge computing platforms at home and abroad were introduced.The main technologies and application scenarios of them were also analyzed.

    Table and Figures | Reference | Related Articles | Metrics
    Joint intelligent optimization of task offloading and service caching for vehicular edge computing
    Lei LIU, Chen CHEN, Jie FENG, Qingqi PEI, Ci HE, Zhibin DOU
    Journal on Communications    2021, 42 (1): 18-26.   DOI: 10.11959/j.issn.1000-436x.2021017
    Abstract865)   HTML140)    PDF(pc) (970KB)(1106)       Save

    Given the contradiction between limited network resources and massive user demands in Internet of vehicles, an intelligent vehicular edge computing network architecture was proposed to achieve the comprehensive cooperation and intelligent management of network resources.Based on this architecture, a joint optimization scheme of task offloading and service caching was furtherly devised, which formulated an optimization problem about how to offload tasks and allocate computation and cache resources.In view of the dynamics, randomness and time variation of vehicular networks, an asynchronous distributed reinforcement learning algorithm was employed to obtain the optimal task offloading and resource management policy.Simulation results demonstrate that the proposed algorithm achieves significant performance improvement in comparison with the other schemes.

    Table and Figures | Reference | Related Articles | Metrics
    Heterogeneous multi-layer mobile edge computing for 6G
    Pengfei WANG,Boya DI,Lingyang SONG,Zhu HAN
    Chinese Journal on Internet of Things    2020, 4 (1): 121-130.   DOI: 10.11959/j.issn.2096-3750.2020.00147
    Abstract842)   HTML96)    PDF(pc) (2803KB)(798)       Save

    With the development of the Internet of things,multiple real-time applications will emerge in future 6G communication network.Driven by demands on low-latency services of multiple real-time applications,mobile edge computing (MEC) will become an important technology to improve the user experience and reduce the network cost.However,the computing capacity of a single MEC server is limited,which induces that it is difficult to meet the low-latency requirement of data processing for the computation-intensive applications.A heterogeneous multi-layer mobile edge computing (HetMEC) network architecture was proposed to jointly utilize the computing and transmission resources of both the cloud computing center and multi-layer MEC servers.By reasonably dividing and offloading computing tasks,reliable and efficient computing services were provided for edge applications.Simulation results show that the proposed algorithm could effectively reduce the processing latency,improve the network processing rate and robustness.

    Table and Figures | Reference | Related Articles | Metrics
    State-of-the-art survey on resource optimization in edge computing
    Zhihao QU, Baoliu YE, Guihai CHEN, Bin TANG, Chenghao GUO
    Big Data Research    2019, 5 (2): 17-33.   DOI: 10.11959/j.issn.2096-0271.2019011
    Abstract779)   HTML115)    PDF(pc) (2153KB)(954)       Save

    The traditional centralized architecture,known as cloud computing,cannot accommodate such user demands in an efficient and timely manner.To cope with this problem,edge computing architectures have been proposed with the core concept of that“data processing should be close to the data source”.Firstly,paradigms of edge computing was introduced,including micro data center,cloudlet,fog computing,and mobile edge computing,and the advantages of edge computing from the perspective of resource integration was discussed.Then,related works of resource optimization in edge computing was reviewed and summarized,and these works was discussed via three directions,i.e.,computation offloading,distributed caching and high performance transmission,corresponding to core resources as computing,storage and communication.Finally,trends of development and future directions were presented as well.

    Table and Figures | Reference | Related Articles | Metrics
    5G edge computing development and application for industrial internet
    Chengyu ZHANG, Hongwu LI, Yang QU, Jinwu WEI
    Telecommunications Science    2021, 37 (1): 129-136.   DOI: 10.11959/j.issn.1000-0801.2021026
    Abstract739)   HTML165)    PDF(pc) (839KB)(927)       Save

    The modern communication network technology represented by 5G and the accompanying mobile edge computing technology play a crucial role in the connection of the industrial internet, closely integrating production factors and exerting the value of collaborative operations.By describing the basic development status and technical characteristics of 5G edge computing, the application method for the industrial internet field and the comparison with the traditional model were explained, a reference implementation solution for industry services was proposed, and the expected application scenarios were summarized.

    Table and Figures | Reference | Related Articles | Metrics
    Resource allocation in NOMA heterogeneous network based on MEC
    Haijun ZHANG,Zizheng ZHANG,Keping LONG
    Journal on Communications    2020, 41 (4): 27-33.   DOI: 10.11959/j.issn.1000-436x.2020069
    Abstract736)   HTML152)    PDF(pc) (722KB)(1013)       Save

    Aiming at maximizing the cache revenue,a joint user association and power allocation algorithm was proposed for the matching of base stations with users and power allocation in a NOMA heterogeneous network with caches,a NOMA joint optimization algorithm which was achieved by combing with message passing and DC programming was proposed.First,the constraints were incorporated into the objective function,and the user association result was obtained by calculating the marginal of the message passing between the function node and the variable node in the new optimization problem.Then,the original optimization problem was transformed into the form of the difference between two convex functions,and allocate power resources through DC programming.Finally,the final user association and power allocation results are obtained through iterative calculations.Simulation results prove that the proposed algorithm effectively improves network performance.

    Table and Figures | Reference | Related Articles | Metrics
    Data management based on blockchain and edge computing for Internet of things
    Guanjie CHENG,Zhengjie HUANG,Shuiguang DENG
    Chinese Journal on Internet of Things    2020, 4 (2): 1-9.   DOI: 10.11959/j.issn.2096-3750.2020.00165
    Abstract723)   HTML134)    PDF(pc) (1591KB)(1063)       Save

    The popularity of smart devices has driven the development of the application of Internet of things (IoT) technology,and the resulting massive amount of IoT data has brought challenges to traditional centralized data management methods,such as performance,privacy,and security.Therefore,a data management framework of IoT based on blockchain and edge computing was proposed to support the distributed IoT data management.The distributed storage and access control could be provided by the framework for the IoT data.At the same time,a set of the built-in encryption scheme was designed to protect the data security and privacy and safeguard the data ownership.By introducing edge computing,the scalability bottleneck of the blockchain the system was relieved.The processes of data storage and data access based on this framework were given,and the algorithm of the system implementation based on the smart contract technology was explained in detail.Experiments show that the IoT data management system based on this framework outperforms the traditional cloud-based data management systems.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on open source edge computing platforms
    Dier GU, Hua LU, Renchao XIE, Tao HUANG
    Chinese Journal of Network and Information Security    2021, 7 (2): 22-34.   DOI: 10.11959/j.issn.2096-109x.2021020
    Abstract660)   HTML92)    PDF(pc) (6383KB)(1164)       Save

    Firstly, the basic concept of edge computing (EC) and its current state of research were introduced.Moreover, the design requirements of edge computing platforms from multiple perspectives were discussed.Then, four typical open source platforms were presented in detail, and their similarities and differences in terms of application areas, deployment methods were analyzed.Later, with regard to two typical use cases, their installations and advantages were summarized and analyzed.Finally, key challenges such as the cooperation among edge computing platforms, security and standardization were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Research on application of edge computing system based on KubeEdge
    Hang ZHAO, Sheng LIU, Kun LUO, Shichao CHEN, Linghui KONG, Fan JIA
    Chinese Journal of Intelligent Science and Technology    2022, 4 (1): 118-128.   DOI: 10.11959/j.issn.2096-6652.202201
    Abstract654)   HTML63)    PDF(pc) (2220KB)(719)       Save

    With the increasing development of Internet of things, traditional data processing methods based on cloud computing have shown many problems, such as high bandwidth occupation and time delay.Edge computing can be a supplement for cloud computing with the characteristics of low latency and high reliability to process data.The KubeEdge edge computing system and its application were mainly discussed and analyzed.Firstly, the system architecture, functions, and key technologies of KubeEdge were introduced.Secondly, the KubeEdge was applied to the parts assembly scenario with dual-arm cooperative robot, and the functions and performances of a cloud-edge collaboration system based on KubeEdge for the robot assembly application were analyzed and tested.The experimental results show that the system can satisfy the functional and application requirements of the scenario, which also provides basic reference and guidance for practical applications of KubeEdge.

    Table and Figures | Reference | Related Articles | Metrics
    Cloud native robot system based on edge computing
    Dawei WANG,Zhuo WANG,Peng WANG,Zhigang WANG,Haitao WANG
    Chinese Journal of Intelligent Science and Technology    2020, 2 (3): 275-283.   DOI: 10.11959/j.issn.2096-6652.202030
    Abstract649)   HTML78)    PDF(pc) (2651KB)(1214)       Save

    With the rapid development of artificial intelligence,the global robot market continues to grow quickly,and the capabilities of robots have evolved from performing fixed operations to the ability to autonomously sense,understand and make decisions.However,to achieve large-scale application of robots,robots need to have powerful computing capabilities and low deployment costs under the constraints of limited power consumption.Using edge computing to provide more cost-effective services,enhance the computing power of the robot body,and achieve large-scale deployment is the key to achieving this goal.The challenges faced by robot systems with the edge enhancement were analyzed,the concept of cloud-native robot systems based on edge computing was proposed,and four feasible technical solutions for implementing the system were discusses.The cloud-native robot system is the inevitable direction for the development of robot systems from intelligent systems based on robot ontology to cloud-edge-end fusion multi-robot collaborative intelligent systems and the key technology for promoting the large-scale application of robots.

    Table and Figures | Reference | Related Articles | Metrics
    Research on intelligent computing offloading model based on reputation value in mobile edge computing
    Jin QI,Hairong SUN,Kun GONG,Bin XU,Shunyi ZHANG,Yanfei SUN
    Journal on Communications    2020, 41 (7): 141-151.   DOI: 10.11959/j.issn.1000-436x.2020105
    Abstract627)   HTML81)    PDF(pc) (1026KB)(1038)       Save

    Aiming at the problem of high-latency,high-energy-consumption,and low-reliability mobile caused by computing-intensive and delay-sensitive emerging mobile applications in the explosive growth of IoT smart mobile terminals in the mobile edge computing environment,an offload decision-making model where delay and energy consumption were comprehensively included,and a computing resource game allocation model based on reputation that took into account was proposed,then improved particle swarm algorithm and the method of Lagrange multipliers were used respectively to solve models.Simulation results show that the proposed method can meet the service requirements of emerging intelligent applications for low latency,low energy consumption and high reliability,and effectively implement the overall optimized allocation of computing offload resources.

    Table and Figures | Reference | Related Articles | Metrics
    Research on incentive mechanism for mobile intelligent edge computing
    Shuyun LUO,Yuzhou WEN,Weiqiang XU,Shenghong ZHU
    Chinese Journal on Internet of Things    2019, 3 (2): 80-88.   DOI: 10.11959/j.issn.2096-3750.2019.00101
    Abstract570)   HTML28)    PDF(pc) (7451KB)(301)       Save

    As a new architecture,mobile edge computing gives edge users stronger capabilities of computing,storage and communication,but it needs reasonable incentives mechanism to motivate edge users to provide resources.In terms of the three typical scenarios of mobile intelligent edge computing:computation offloading,edge caching and data collection,the incentive mechanism in the above scenarios was studied at first,then the core scientific problems were proposed that need to be solved in the incentive mechanism design of mobile intelligent edge computing from three perspectives of service quality,network quality and data quality.Finally,the technical challenges in the process of solving the above problems were analysed deeply and the corresponding feasible solutions were given.

    Table and Figures | Reference | Related Articles | Metrics
    Algorithm design on energy efficiency maximization for UAV-assisted edge computing
    Qihui WU,Wei WU
    Journal on Communications    2020, 41 (10): 15-24.   DOI: 10.11959/j.issn.1000-436x.2020204
    Abstract554)   HTML119)    PDF(pc) (855KB)(1394)       Save

    For the unmanned aerial vehicle (UAV)-assisted edge computing system,a two-stage alternative algorithm was proposed to solve the formulated complex non-convex problem.Firstly,the formulated non-linear fractional programming problem was reformulated to the equivalent parametric problem by using Dinkelbach method.Secondly,two sub-problems were further considered based on it.By employing the Lagrange duality method,the closed-form solutions for the central processing unit frequencies and the number of data bits were derived.Finally,based on the solutions obtained,the conditions that the source node prefers to offload/share its data and the relay chooses to forward the computation results,as well as the approaches to achieve high energy efficiency were revealed.Numerical results demonstrate that the proposed design can achieve a performance improvement of up to 20 times over the conventional schemes.

    Table and Figures | Reference | Related Articles | Metrics
    A survey on the security technology of edge computing
    Jie LING, Jiahui CHEN, Yu LUO, Siliang ZHANG
    Big Data Research    2019, 5 (2): 34-52.   DOI: 10.11959/j.issn.2096-0271.2019012
    Abstract551)   HTML91)    PDF(pc) (1579KB)(671)       Save

    With the continuous development of Internet of things applications,a large number of mobile terminal devices participate in service computing.Traditional cloud computing models cannot adapt to the rapid growth of data generated by network edge devices,and edge computing models emerge and become a research hotspot in recent years.The concept of edge computing and the reference model of edge computing in the Internet of things were introduced,the vulnerabilities of edge devices and the main research results of cryptographic security technology in edge computing were summarized,and that symmetric cryptography technology is not suitable for communication between edge devices,and identity-based cryptography technology is more suitable for communication between edge devices and edge devices was pointed out.Paired-based cryptography is more suitable for the communication between edge devices and base stations.The application of two post-quantum cryptography technologies in edge devices was discussed.Finally,some suggestions on the research of edge computing security technology were put forward.

    Table and Figures | Reference | Related Articles | Metrics
    Encrypted image retrieval in multi-key settings based on edge computing
    Yingying LI,Jianfeng MA,Yinbin MIAO
    Journal on Communications    2020, 41 (4): 14-26.   DOI: 10.11959/j.issn.1000-436x.2020086
    Abstract535)   HTML104)    PDF(pc) (1830KB)(878)       Save

    Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.

    Table and Figures | Reference | Related Articles | Metrics
    Research on security defense of mobile edge computing
    Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI
    Chinese Journal of Network and Information Security    2021, 7 (1): 130-142.   DOI: 10.11959/j.issn.2096-109x.2021014
    Abstract524)   HTML86)    PDF(pc) (2031KB)(702)       Save

    Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Review on resources allocation and pricing methods in mobile edge computing
    Lushan ZOU, Xiaowen HUANG, Jingmin YANG, Yifeng ZHENG, Guanglin ZHANG, Wenjie ZHANG
    Telecommunications Science    2022, 38 (3): 113-132.   DOI: 10.11959/j.issn.1000-0801.2022022
    Abstract500)   HTML57)    PDF(pc) (1384KB)(471)       Save

    Mobile edge computing (MEC) has ability of reducing network load and transmission delay, and improving user service experience by offloading computing tasks to edge servers.Therefore, MEC has attracted extensive attention and become a key technology of 5G.As one of the main issues of MEC, resource allocation has great significance in improving energy efficiency, shortening task delay and reducing cost.Firstly, the basic concept, reference architecture and technical advantages of MEC were introduced.Then, the up-to-date achievements of resources allocation and pricing strategies were summarized from both technical and economic aspects.Finally, some possible problems and challenges associated with resource allocation and pricing strategies in MEC were discussed, and the enabling methods to address these challenges were also proposed to provide reference for subsequent research and development.

    Table and Figures | Reference | Related Articles | Metrics