RJMCS 2022 0293 0021
RJMCS 2022 0293 0021
net/publication/361006242
CITATIONS READS
0 642
4 authors:
All content following this page was uploaded by Onome Blaise Ohwo on 01 June 2022.
ABSTRACT
Edge computing is currently evolving how information and data is being
*Correspondence to Author:
processed, stored and also delivered to millions of devices digitally
Ohwo Blaise
connected to the cyber-space. The rise of Internet of Things we now have
various devices actively communicating and also sharing, delivering Department of Computer Science,
information. Edge computing brings computation and data storage closer Babcock University
to the devices where it’s being gathered, rather than relying on a central
location that can be thousands of miles away. This is done so that data, [email protected]
especially real-time data, does not suffer latency issues that can affect an
application’s performance. This paper presents a review of edge How to cite this article:
computing technology and how it has evolved the was information is Ohwo Blaise; Oyebode Aduragbemi;
currently being processed. Ayanwola, Thomas; Awodele Oludele
Edge Computing: A Literature Review
Keywords: Edge Computing, Internet of Things, Cloud computing Research Journal of Mathematics and
Computer Science 2022; 1:03.
https://escipub.com/research-journal-of-mathematics-and-computer-science/ 1
Accepted article, Online first, for proof onl
Ohwo, B, et al., RJMCS, 2022; 1:03
Introduction Chandramohan and Senthilkumaran (2019) extended the work
Computing technologies has evolved over the decades from carried out in traditional methods, by integrating the cloud layer,
where it initially began, processing power and capabilities Automatic Guided Vehicles (AGV), Industrial Wireless
have evolved from being able to perform a single task as a networks (IWN) and Industrial robots through Edge Computing.
time to process several task in an instance. The advent of The proposed framework demonstrates that the active RFID-
distributed computing capable of parallel processing has enabled AGV and industrial robots can be used to exploit
made it possible to process several task giving rise to effective resource management under the EC-based IIoT
computers with multiprocessing capabilities. These architecture, subsequently, improving the conveyor efficiency
advancement in distributed computing as led to a drastic and overall energy consumption.
decline in prices of computing power and also storage Edge computing is a distributed computing paradigm that
capabilities, also coupled with the advances in clouding encompasses data computing and storage and is performed close
computing, this also further led to more price decline to the user, efficiently guaranteeing faster response time.
ultimately making computing cheaper especially for Small Moreover, the concept of the distributed edge cloud raises
and Medium-Sized Enterprises (SME’s). Edge computing is several interesting open issues, e.g., failure recovery and
the model that extends cloud computing services to the edge security. Costa and Beko (2019) proposed a system
of the network. This model aims to move decision-making composed of edge nodes and multiple cloud instances, as well
operations as close as possible to data sources since it acts as a voting mechanism.
as an intermediate layer connecting cloud data centres to At sea, most of the tracking systems use satellite
edge devices/sensors. Transferring all the data from the communications, which have high associated costs. This leads
network edge to the cloud data centres for processing may to a less frequent transmission of data, which reduces the
create a latency problem and outstrip the network’s reliability of the vessel location. Ferreira and Martins (2019)
bandwidth capacity. proposed an edge computing approach on a local Vessel
At its basic level, edge computing brings computation and Monitoring System. Findings show substantial communication
data storage closer to the devices where it’s being gathered, savings from 70% to 90% as only abnormal vessel behaviour is
rather than relying on a central location that can be transmitted.
thousands of miles away. This is done so that data, Cloud computing, which includes a wide variety of cloud
especially real-time data, does not suffer latency issues that services, has experienced explosive growth in recent years and
can affect an application’s performance. In addition, cloud servers are replacing traditional physical servers on a
companies can save money by having the processing done global scale. However, some emerging businesses such as
locally, reducing the amount of data that needs to be Augmented Reality have made the traditional centralized cloud
processed in a centralized or cloud-based location. Edge computing exposes some shortcomings. Yan and Qiao (2019)
computing was developed due to the exponential growth of proposed a novel idea of edge computing in the field of Web
IoT devices, which connect to the internet for either Augmented Reality. Experiments demonstrate that edge servers
receiving information from the cloud or delivering data back have the capability of real-time complex computing with high
to the cloud. And many IoT devices generate enormous efficiency and stability. To achieve better results, the
amounts of data during the course of their operations. combination of 5G communication technology and edge
computing is necessary.
Literature Review As one of the information industry’s future development
This section presents various literatures reviewed in the directions, the Internet of Things (IoT) has been widely used. In
field of edge computing to create an understanding of the order to reduce the pressure on the network caused by the long
extent to which it has been applied, how it has been applied, distance between the processing platform and the terminal, edge
and the results of these applications. These are geared computing provides a new paradigm for IoT applications. Wang,
towards increasing the knowledge domain of edge Yang, Guo, and Qu (2019) transformed the traditional satellite
computing. into a space edge computing node. Through the modeling
This study investigates how real-time IoT applications analysis and simulation experiments of the application scenarios,
benefit from edge computing. Specifically, how edge the results show that the space edge computing system takes less
computing and cloud computing can be nicely integrated to time and consumes less energy than the traditional satellite
build a smart campus environment. Lin, Shieh, and Lin constellation.
(2019) proposed an edge IoT computing system called Interestingly, blockchain based techniques offer strong
DromTalk for dormitory applications. The evaluation of the countermeasures to protect data from tampering while
response time performance showed that smartphones can supporting the distributed nature of the IoT. However, the
effectively control the dormitory appliances with good user enormous amount of energy consumption required to verify
experience. Also, the fairness issue, study indicated that the each block of data make it difficult to use with resource-
fairness rule for ‘first-press–first-serve’ is satisfactorily constrained IoT devices and with real-time IoT applications.
followed. Jayasinghe, Lee, MacDermott, and Rhee (2019) proposed a
The proliferation of Industrial Internet of Things (IIoT) novel privacy preserving blockchain called TrustChain.
introduces the concept of a smarter production environment. TrustChain empowers the edge computing architecture of IoT
Therefore, with the rapid development of IIoT technology, due to its survivability with low computing and storage
the proposed work incorporates Edge Computing (EC). resources which is not the case with traditional approaches.
https://escipub.com/research-journal-of-mathematics-and-computer-science/ 2
Ohwo, B, et al., RJMCS, 2022; 1:03
The emerging vehicular applications and the exponential develop adaptive mechanisms to the specifics of the Internet of
growing data have naturally led to the increased needs of Things (IoT) and ubiquitous computing ecosystems, the
communication, computation and storage resources, and problem of creating yet full-fledged, easy to handle and efficient
also to strict performance requirements on response time ontology-driven Edge Computing still remains unsolved.
and network bandwidth. In order to deal with these Ryabinin and Chuprina (2020) proposed a new approach to
challenges, Mobile Edge Computing (MEC) is regarded as utilize ontology reasoning mechanism. The ontology-driven
a promising solution. Liu, Chen, Pei, Maharjan, and Zhang approach ensures adaptivity of devices and introduces semantic
(2019) carried out a comprehensive survey of state-of-the- power to the ubiquitous computing systems.
art research on Vehicular Edge Computing (VEC). By the To efficiently carry out edge Emergency Demand Response via
seamless merging of vehicular networks and Mobile Edge cloudlet cluster control, two fundamental problems need to be
Computing, Vehicular Edge Computing extends the addressed: how to incentivize the participation of cloudlet
function of cloud to the edge of networks, bringing rich clusters and how to schedule and allocate workloads in each
resources in close proximity to vehicles. cluster to satisfy requirements. Song, Zhou, Qin, Lui, & Li
From self-driving cars to smart city sensors, billions of (2020) proposed a two-stage control scheme, consisting of an
devices will be connected to networks in the next few years. auction mechanism and an online task scheduling algorithm.
These devices will collect vast amounts of data which needs And utilized the primal-dual optimization theory to prove that
to be processed in real-time, overwhelming centralized the proposed control scheme is truthful, individually rational,
cloud architectures. Munn (2020) critically investigates the runs in polynomial time, and achieves near-optimal
privacy implications of edge computing. The researcher performance.
argued that edge affordances establish a fundamental new Upcoming 5G technology and the demand for near real-time
‘privacy condition’ while sidestepping the safeguards response services raise the need for optimizing current IoT
associated with the ‘privacy proper’ of personal data use. solutions. The aim of this paper is to model and execute the
Responding effectively to these challenges will mean performance analysis of network structures suitable for Edge
rethinking person-based approaches to privacy at both Computing in IoT. Skirelis and Navakauskas (2020)
regulatory and citizen-led levels. presented an Edge Computing service simulation setup on
Edge Computing is a new distributed Cloud Computing known and newly derived network topologies with different
paradigm in which computing and storage capabilities are complexity varying network bandwidth and network delay
pushed to the topological edge of a network. However, parameters. The experimental investigation has revealed that the
various standards and implementations are promoted by IoT configuration network is more sensitive to network
different initiatives. Hamm, Willner, & Schieferdecker topology, while the Internet configuration is more sensitive to
(2020) provided two main contributions: firstly, how current network parameters.
initiatives are characterized, and secondly, a roadmap for Although the computing power of mobile terminals is getting
sustainable Edge Computing. Findings show that most higher and the traditional cloud computing model has higher
initiatives are internationally organized software computing power, it is often accompanied by higher latency and
development projects; important branches are currently cannot meet the needs of users. Zhang, Li, Peng, & Pei (2021)
telecom and industrial sectors; most addressed is the proposed a multi-agent load balancing distribution based on
network virtualization layer. The roadmap reveals deep reinforcement learning DTOMALB. Simulations
numerous chances and risks of Edge Computing related to show that the algorithm has a certain adaptability compared to
sustainable development. the traditional algorithm in the scenario of multi-user single cell,
As the next generation of the wireless communication and reduces the complexity of the algorithm compared to the
technology, the fifth-generation communication (5G) would centralized algorithm, and reduces the average response delay
bring revolutionary changes to our life. Tongyu (2020) first of the overall user. As well as balance the load of each edge
introduced the common application scenarios of 5G, review computing server, improve the robustness and scalability of the
the basic concepts of new computing models such as cloud system.
computing, edge computing, and fog computing, and then In recent years, with the emergence of many Internet of Things
consider and analyze these new calculations in combination applications such as smart homes, smart city, and connected
with 5G application requirements. In the 5G era, edge vehicles, the amount of network edge data increases rapidly.
computing will make a big difference and will greatly Now, edge computing for Internet of things has attracted the
promote the application and development of 5G. research interest of many researchers. Wang, Zhang, Wang, Liu,
Although there are many solutions for offloading in MEC, & Wang (2021) performed a bibliometric analysis of edge
most usually only employ one MEC server for improving computing for Internet of Things using the Web of Science
mobile device energy consumption and execution time. (WoS) Core Collection dataset. Results can be summarized as
Rahati-Quchania, Abrishamia, and Feizi (2020) proposed an follows: the most influential literature was written by Shi. IEEE
assignment mechanism called school choice. The proposed Access and IEEE Internet of things are the two leading journals
solution achieves minimal price and energy consumption with the most published literature studies and most cited.
under latency constraints. Numerical results demonstrate According to Price’s Law, there are 466 EC-IoT core authors in
that the proposed algorithm can attain efficient and the world, with Zhang as most productive author, and
successful computation offloading. Satyanarayanan as most cited author. On the whole, the number
Despite the ontology-driven solutions are widely used to of EC-IoT literature studies published and literature studies
https://escipub.com/research-journal-of-mathematics-and-computer-science/ 3
Ohwo, B, et al., RJMCS, 2022; 1:03
cited are on the rise. enable the cost-effective, efficient, and reliable two-way energy
With the increasing amount of data generated by users and and information flow in Smart Grid because it provides
devices in IoT, security and privacy issues in the edge computation and storage resources at the edge of the network.
computing environment have become concerns. Zhang, et
al (2021) proposed a trusted edge platform to integrate the The centralized cloud computing model has been gradually hard
edge computing framework and blockchain network for to accommodate the resulting massive data treating
building an edge security environment. The intelligent requirements. However, the emerging edge computing provides
applications on the platform can promptly respond to a new technical means to solve this problem. Li, Zhang, Li, &
requests from terminals. This work shows that the proposed Zhou (2021) proposed an intelligent library system architecture
trusted edge platform is a promising approach. It can based on edge computing. The architecture can reduce the
provide portable, scalable, and fine-grained security minimum delay and network bandwidth pressure of Library
mechanisms for integrating edge computing. intelligent service, thus saving the data processing cost of
As a resource isolation technology for edge nodes, container Intelligent Library.
virtualization has been widely used. However, under the The emergence of edge computing technology brings new
condition of unstable network connections in edge development direction to the construction of power grid industry.
environments, there are some shortcomings on native At present, the combination of power grid and edge computing
docker container, such as large amount of image data may face new security risks. Jiang, et al. (2021) analyzed the
transmission, network interruption and retransmission cost, security risks that may occur in grid edge computing. This
which affect the quality of edge services. Zhang, Liu, & research mainly studied the possible security risks of power grid
Wang (2021) proposed an Images Distribution Method edge computing, constructed the security risk analysis model of
based on Deduplication (IDM-Dedup) . The experimental power grid edge computing from three directions, and
results show that IDM-Dedup is more effective than native introduced the security risk defence of power grid edge
docker container method. This improves the transmission computing.
efficiency of container images and reduces the time to Task offloading incurs extra communication latency and energy
deploy and migrate edge services. cost, and extensive efforts have focused on offloading schemes.
In the Mobile Edge Computing system (MEC), by caching Many metrics of the system utility are defined to achieve
computing services from the cloud center to the network satisfactory quality of experience. However, most existing
edge, MEC can provide users with more services, and also works overlook the balance between throughput and fairness. Bi,
be able to make greater use of network resources and Liu, Ren, & Tan (2021) proposed a gradient-based approach for
improve system performance. However, which services to utility-aware task offloading. Experimental results show that the
cache at edge nodes and how to cache these services have proposed algorithms can achieve effective performance in utility
become an important challenge of the research. Wu, Wang, and accuracy.
Yuan, and Xie (2021) proposed a novel service caching
algorithm. In addition, designed a novel cache replacement Methodology
algorithm that successfully predict future requests by In this section, 25 literatures in edge computing will be reviewed
analyzing historical data, thereby greatly improves the and analyzed for trend to create a roadmap to the current
cache hit rate. Finally, experiments prove that the proposed research areas. Theses literatures were randomly selected from
algorithms have greatly improved system performance and top ranking journals and databases ranging 2018 - 2021.
hit rate. Firstly, the literatures will be shared into various categorizes to
The goal is to minimize the energy consumption of the highlight the area getting the most attention from researchers as
overall system, comprising multiple User Equipment (UE), shown in Table 1.
an access point (AP), and an edge server (ES), under
constraints on the end-to-end service delay and the packet Table 1: Categorization of Reviewed Literatures
error rate performance over the wireless interface. Merluzzi, Categories Literature Reviewed
Pietro, Lorenzo, Strinati, and Barbarossa (2021) proposed Review (Liu, Chen, Pei, Maharjan, & Zhang,
an online algorithm for dynamic and optimal orchestration 2019) (Munn, 2020) (Hamm, Willner, &
called Discontinuous Mobile Edge Computing (D-MEC). Schieferdecker, 2020) (Tongyu, 2020)
Numerical results illustrate the performance gain offered by (Wang, Zhang, Wang, Liu, & Wang,
the proposed online strategy, and how a holistic view of the
2021) (Mehmood, et al., 2021) (Jiang, et
system can be beneficial for all agents and for the global
al., 2021)
energy consumption.
Sending this massive amount of data directly to the cloud Resource (Rahati-Quchania, Abrishamia, & Feizi,
will create problems of latency, security, privacy, and high Allocation and 2020) (Song, Zhou, Qin, Lui, & Li, 2020)
bandwidth utilization. This issue is addressed by edge optimization (Zhang, Li, Peng, & Pei, 2021) (Wu,
computing (EC). In EC, the data are processed at the edge Wang, Yuan, & Xie, 2021) (Bi, Liu, Ren,
of the network that is near the embedded gadgets. Mehmood, & Tan, 2021)
et al. (2021) presented a comprehensive review of the smart Security and (Jayasinghe, Lee, MacDermott, & Rhee,
grid systems, based on IoT and Edge Computing. Edge Privacy 2019) (Zhang, et al., 2021)
Computing is envisioned as a provisioning solution to
https://escipub.com/research-journal-of-mathematics-and-computer-science/ 4
Ohwo, B, et al., RJMCS, 2022; 1:03
Applications (Lin, Shieh, & Lin, 2019) (Chandramohan application
& Senthilkumaran, 2019) (Costa & Beko, requirements.
2019) (Ferreira & Martins, 2019) (Yan & (Wang, Zhang, A bibliometric
Qiao, 2019) (Wang, Yang, Guo, & Qu, Wang, Liu, & analysis of edge
2019) (Ryabinin & Chuprina, 2020) Wang, 2021) computing for
(Skirelis & Navakauskas, 2020) (Zhang, Internet of things was
performed using the
Liu, & Wang, 2021) (Li, Zhang, Li, &
Web of Science
Zhou, 2021)
(WoS) Core
Energy (Merluzzi, Pietro, Lorenzo, Strinati, & Collection dataset
Consumption Barbarossa, 2021) (Mehmood, et al., A comprehensive
2021) review of the smart
Secondly, the categorization of reviewed literatures will be grid systems, based
further broken to highlight the various capacities that edge on IoT and Edge
computing has been applied as shown in Table 2 – Table 4. Computing.
(Jiang, et al., This paper analysed
Table 2: Reviewed Literatures Based on category: 2021) the security risks that
Review may occur in grid
Category Literature Methodology edge computing
Reviewed
Review (Liu, Chen, Pei, A comprehensive Table 3: Reviewed Literatures Based on category: Resource
Maharjan, & survey of state-of-the- Allocation, Energy Consumption and Security and Privacy
Zhang, 2019) art research on Categories Literature Methodology
Vehicular Edge Reviewed
Computing (VEC) Resource (Rahati- An assignment
(Munn, 2020) This article critically Allocation Quchania, mechanism called
investigates the and Abrishamia, & school choice
privacy implications Optimization Feizi, 2020)
of edge computing (Song, Zhou, A two-stage control
(Hamm, Willner, This research Qin, Lui, & Li, scheme, consisting of
& Schieferdecker, provides two main 2020) an auction mechanism
2020) contributions to the and an online task
field, by presenting, scheduling algorithm
firstly, how current (Zhang, Li, Peng, A multi-agent load
initiatives are & Pei, 2021) balancing distribution
characterized, and based on deep
secondly, a roadmap reinforcement learning
for sustainable Edge DTOMALB
Computing relating (Wu, Wang, A novel service caching
three dimensions of Yuan, & Xie, algorithm
sustainable 2021)
development to four (Bi, Liu, Ren, & A gradient-based
cross-concerns of Tan, 2021) approach for utility-
Edge Computing aware task offloading
(Tongyu, 2020) First introduce the Energy (Merluzzi, Pietro, An online algorithm for
common application Consumption Lorenzo, Strinati, dynamic and optimal
scenarios of 5G, & Barbarossa, orchestration called
review the basic 2021) Discontinuous Mobile
concepts of new Edge Computing (D-
computing models MEC).
such as cloud Security and (Jayasinghe, Lee, A novel privacy
computing, edge Privacy MacDermott, & preserving blockchain
computing, and fog Rhee, 2019) called TrustChain
computing, and then
(Zhang, et al., A trusted edge platform
consider and analyze
2021) to integrate the edge
these new
computing framework
calculations in
and blockchain network
combination with 5G
https://escipub.com/research-journal-of-mathematics-and-computer-science/ 5
Ohwo, B, et al., RJMCS, 2022; 1:03
for building an edge (Zhang, Liu, & An Images
security environment. Wang, 2021) Distribution
Method based on
Table 4: Reviewed Literatures Based on category: Deduplication
Application (IDM-Dedup)
Categories Literature Methodology (Li, Zhang, Li, & An Intelligent
Reviewed Zhou, 2021) library system
Applications (Lin, Shieh, & An edge IoT architecture based
Lin, 2019) computing system on edge computing.
called DromTalk
for dormitory Discussion of Findings
applications In this section, the findings of the analysis carried out on the 25
(Chandramohan & This paper extends reviewed literatures is discussed. Table 1 illustrates the
Senthilkumaran, the work carried out categorization of the various reviewed literatures based on their
2019) in traditional idea/theme and to highlight the areas getting more attention
methods, by from researchers. Table 2 illustrates an increasing trend in
integrating the review researches which addresses key issues in edge
cloud layer, computing. This can help provide key understanding of edge
Automatic Guided computing concepts and how it helps improve the limitations
Vehicles (AGV), inherent in cloud computing. Table 3 illustrates the need to
Industrial Wireless increase research in the areas of resource allocation and
networks (IWN) optimization, energy consumption, and security and privacy.
and Industrial Due to the dynamic nature of edge environment, there is need to
robots through ensure adequate security for resources, optimal resource
Edge Computing allocation and efficient energy consumption. Thus, providing
(Costa & Beko, A system composed potential solutions to these issues can improve the adoption and
2019) of edge nodes and application of edge computing. Table 4 illustrates that there is
multiple cloud an increasing trend in edge computing application across
instances, as well as different sectors. As edge computing continues to evolve and
a voting enable intelligence at the network edge, it will find application
mechanism. in almost all areas of our lives.
(Ferreira & An edge computing Furthermore, these reviewed literatures were insightful and was
Martins, 2019) approach on a local able to elucidate on edge computing. As well as provides new
Vessel Monitoring and novel ways to improving edge computing application.
System Although, some of the methods employed were able to meet the
(Yan & Qiao, A novel idea of required goal; but some are still faced with gaps that requires
2019) edge computing in further research. The following are the challenges identified
the field of Web from the reviewed literatures
Augmented Reality The need to combine 5G communication technology
(Wang, Yang, Transform the and edge computing is necessary, to achieve better
Guo, & Qu, 2019) traditional satellite result.
into a space edge Vehicular Edge Computing is faced with several new
computing node challenges because of the intrinsic features of vehicular
(Ryabinin & A new approach to networks, including fast mobility of vehicles and harsh
Chuprina, 2020) utilize ontology channel environments. Although many efforts have
reasoning been done in VEC, there still lacks a survey on the
mechanism
research of VEC.
(Skirelis & The paper presents
Navakauskas, Edge Computing Further research is needed, in order to confirm the
2020) service simulation results of these practical experiments on real hardware.
setup on known and The limitations mainly focus on model training, which
newly derived can be improved from the offline training level.
network topologies While the reported work meets practical applications,
with different there is still a long way to provide a complete
complexity varying decentralized and light-weight security solution to
network bandwidth integrate edge computing and blockchain.
and network delay
parameters.
https://escipub.com/research-journal-of-mathematics-and-computer-science/ 6
Ohwo, B, et al., RJMCS, 2022; 1:03
Edge computing is still in the exploratory stage, and Technology (IJEAT), 9(2), 2890-2894.
its related security problems still need to be doi:https://doi.org/10.35940/ijeat.B3868.129219
explored and solved. 3. Costa, P. A., & Beko, M. (2019). Dependable and Secure
Based on these identified challenges, here are some Voting Mechanism in Edge Computing. future internet, 1-
suggestions for edge computing improvement: 11. doi:https://doi.org/10.3390/fi11120262
Standardized protocols and vendor independent 4. Ferreira, J. C., & Martins, A. L. (2019). Edge Computing
devices should be considered to bridge the Approach for Vessel Monitoring System. Energies, 1-15.
doi:https://doi.org/10.3390/en12163087
interoperability issues
5. Hamm, A., Willner, A., & Schieferdecker, I. (2020). Edge
More research should be carried out combining 5G Computing: A Comprehensive Survey of Current
applications and edge computing as well as Initiatives and a Roadmap for a Sustainable Edge
Vehicular Edge Computing. Computing Development. 15th International Conference
More real-life experimentations should be carried on Wirtschaftsinformatik, (pp. 1-15). Potsdam, Germany.
out to help create a better understanding of edge 6. Jayasinghe, U., Lee, G. M., MacDermott, Á., & Rhee, W.
computing applications. S. (2019). TrustChain: A Privacy Preserving Blockchain
Adaptive security models should be considered to with Edge Computing. Wireless Communications and
secure the dynamic edge environment to meet the Mobile Computing, 1-18.
changing security requirements. doi:https://doi.org/10.1155/2019/2014697
7. Jiang, Y., Zhang, Y., Xu, A., Kuang, X., Meng, J., Chen,
In terms of resource allocation, optimization and L., & Ma, B. (2021). Security Risk Analysis of Grid Edge
task off-loading, game theory should be considered Computing. 8th Annual International Conference on Geo-
as a viable alternative. Spatial Knowledge and Intelligence (pp. 1-7). IOP
Low energy devices should be considered at edge Publishing. doi:https://doi.org/10.1088/1755-
nodes to improve energy consumption. 1315/693/1/012034
8. Li, M., Zhang, Y., Li, G., & Zhou, M. (2021). Intelligent
Conclusion Library Architecture Based on Edge Computing. CCIIS
This research is a literature review in edge computing, 2021 (pp. 1-6). IOP Publishing.
which is a disruptive technology driven by the progression doi:https://doi.or/10.1088/1742-6596/1927/1/012018
of Internet of Things, which allows devices to permanently 9. Lin, Y.-B., Shieh, M.-Z., & Lin, Y.-W. (2019). DormTalk:
connected to the Internet and constantly generate data in real edge computing for the dormitory applications on campus.
time. And cloud computing has been a key enabler of Special Issue: Edge Network Computing for Big Data
Internet of Thigs. But the increasing need for connected Systems over Internet of Things, 8(3), 179-186.
sensor and actuator devices, heterogenous data storage, and doi:https://doi.org/10.1049/iet-net.2018.5178
real-time response have given rise to Edge Computing. The 10. Liu, L., Chen, C., Pei, Q., Maharjan, S., & Zhang, Y.
main advantages of edge computing include: real-time data (2019). Vehicular Edge Computing and Networking: A
analysis at the edge nodes or user device; decreased Survey. Journal of Latex Class Files, 1-19.
operating costs, data transmission between edge and cloud; 11. Mehmood, M. Y., Oad, A., Abrar, M., Munir, H. M., Hasan,
increases performance by reducing network latency; and S. F., Muqeet, H. A., & Golilarz, N. A. (2021). Edge
finally allows security integration. Considering these Computing for IoT-Enabled Smart Grid. Security and
advantages and the predominant rise of 5G networks, Communication Networks, 1-16.
provides huge bandwidth with built in application and doi:https://doi.org/10.1155/2021/5524025
interrelation between similar devices. Such interrelation 12. Merluzzi, M., Pietro, N. d., Lorenzo, P. D., Strinati, E. C.,
between devices is reliant on edge computing nodes as data & Barbarossa, S. (2021). Discontinuous Mobile Edge
cannot be transmitted for an extended period of time over Computing. 1-30.
the network protocol. Finally, Edge computing require a 13. Munn, L. (2020). Staying at the Edge of Privacy: Edge
steady and exceptional security module with high Computing and Impersonal Extraction. Media and
configuration for authentication, authorization and Communication, 8(2), 270–279.
identification of edge computing devices in real time doi:https://doi.org/10.17645/mac.v8i2.2761
application. 14. Rahati-Quchania, M., Abrishamia, S., & Feizi, M. (2020).
1-36.
References 15. Ryabinin, K., & Chuprina, S. (2020). Ontology-Driven
1. Bi, R., Liu, Q., Ren, J., & Tan, G. (2021). Utility Edge Computing. ICCS 2020 (pp. 312-325). Switzerland:
Aware Offloading for Mobile-Edge Computing. Springer Nature. doi:https://doi.org/10.1007/978-3-030-
Tsinghua Science and Technology, 26(2), 239–250. 50436-6_23
doi:https://doi.org/10.26599/TST.2019.9010062 16. Skirelis, J., & Navakauskas, D. (2020). Performance
2. Chandramohan, S., & Senthilkumaran, M. (2019). A Analysis of Edge Computing in IoT. ELEKTRONIKA IR
Self-Configurable Edge Computing for Industrial IoT. ELEKTROTECHNIKA, 26(1), 72-77.
International Journal of Engineering and Advanced doi:https://doi.org/10.5755/j01.eie.26.1.23235
17. Song, Z., Zhou, R., Qin, S. Z., Lui, J. C., & Li, Z. (2020).
https://escipub.com/research-journal-of-mathematics-and-computer-science/ 7
Ohwo, B, et al., RJMCS, 2022; 1:03
Emergency demand response in edge computing.
EURASIP Journal onWireless Communications and
Networking, 1-24. doi:https://doi.org/10.1186/s13638-
020-01789-z
18. Tongyu, W. (2020). Application of Edge Computing
in 5g Communications. MEMA 2019 (pp. 1-7). IOP
Publishing. doi:https://doi.org/10.1088/1757-
899X/740/1/012130
19. Wang, Y., Yang, J., Guo, X., & Qu, Z. (2019). Satellite
Edge Computing for the Internet of Things. Sensors, 1-
16. doi:https://doi.org/10.3390/s19204375
20. Wang, Y., Zhang, F., Wang, J., Liu, L., & Wang, B.
(2021). A Bibliometric Analysis of Edge Computing
for Internet of Things. Security and Communication
Networks, 1-10.
doi:https://doi.org/10.1155/2021/5563868
21. Wu, X., Wang, Y., Yuan, S., & Xie, P. (2021). A
service caching method for mobile edge computing.
CITIC 2021 (pp. 1-8). IOP Publishing.
doi:https://doi.org/10.1088/1742-6596/2005/1/012060
22. Yan, H., & Qiao, X. (2019). Research and
Implementation of Edge Computing in Web AR.
SAMSE 2018 (pp. 1-6). IOP Publishing.
doi:https://doi.org/10.1088/1757-899X/490/4/042037
23. Zhang, J., Liu, B., & Wang, X. (2021). A Container
Deployment Optimization Method for Edge
Computing. CCIIS 2021 (pp. 1-6). IOP Publishing.
doi:https://doi.org/10.1088/1742-6596/1927/1/012017
24. Zhang, J., Lu, C., Cheng, G., Guo, T., Kang, J., Zhang,
X., . . . Yan, X. (2021). A Blockchain-Based Trusted
Edge Platform in Edge Computing Environment.
Sensors, 1-16. doi:https://doi.org/10.3390/s21062126
25. Zhang, Z., Li, C., Peng, S., & Pei, X. (2021). A new
task offloading algorithm in edge computing. Journal
on Wireless Communications and Networking, 1-21.
doi:https://doi.org/10.1186/s13638-021-01895-6
https://escipub.com/research-journal-of-mathematics-and-computer-science/ 8