EdgeIoT MobileEdgeComputingfortheInternetofThings
EdgeIoT MobileEdgeComputingfortheInternetofThings
net/publication/312056813
CITATION
S READS
673 9,288
2 authors:
Xiang Sun
Nirwan Ansari
University of New Mexico
New Jersey Institute of Technology
75 PUBLICATIONS 2,189
CITATIONS 796 PUBLICATIONS 27,457 CITATIONS
All content following this page was uploaded by Xiang Sun on 13 October 2017.
In order to overcome
the scalability problem ABSTRACT there will be 50 to 100 billion smart devices
con- nected to the Internet by 2020 [1]). Also,
of the traditional Internet
In order to overcome the scalability problem Cisco has predicted that the devices connected
of Things architecture of the traditional Internet of Things architecture to the Internet will generate 507.5 ZB/year by
(i.e., data streams (i.e., data streams generated from distributed 2019 [2]. Meanwhile, due to the flexible and
generated from the IoT devices are transmitted to the remote cloud efficient resource provisioning in the cloud [3],
distributed IoT devices via the Internet for further analysis), this arti- the big IoT data generated from the distributed
are transmitted to the cle proposes a novel approach to mobile edge IoT devic- es are transmitted to the remote
remote cloud via the computing for the IoT architecture, edgeIoT, to cloud, a smart “brain” for processing big data,
Internet for further handle the data streams at the mobile edge. via the Internet in the traditional IoT architecture
analysis), the authors Spe- cifically, each BS is connected to a fog [4, 5], as shown in Fig. 1. However, the Internet
node, which provides computing resources is not scalable and efficient enough to handle
propose edgeIoT, a locally. On the top of the fog nodes, the SDN- IoT big data. Mean- while, transferring the big
novel approach to based cellular core is designed to facilitate data is expensive, con- suming a huge amount
mobile edge computing packet forwarding among fog nodes. of bandwidth, energy, and time. Second, since
for the IoT architecture, Meanwhile, we propose a hierarchical fog the IoT big data streams are transmitted to the
intended to handle the computing architecture in each fog node to cloud in high volume and at fast velocity, it is
data streams at the provide flexible IoT services while maintaining necessary to design an efficient data
mobile edge. user privacy: each user’s IoT devices are processing architecture to explore the valu- able
associated with a proxy VM (located in a fog information in real time. Third, user privacy
node), which collects, classifies, and analyzes remains a challenging unsolved issue; that is, in
the devices’ raw data streams, converts them order to obtain services and benefits, users
into metadata, and transmits the metadata to should share their sensed data with IoT service
the cor- responding application VMs (which are providers, and these sensed data may contain
owned by IoT service providers). Each users’ person- al information. Thus, it is critical
application VM receives the corresponding to design a data sharing framework so that
metadata from differ- ent proxy VMs and users can acquire IoT services while their
provides its service to users. In addition, a privacy is guaranteed. In this article, we
novel proxy VM migration scheme is proposed propose an efficient and flexible IoT
to minimize the traffic in the SDN- based core. architecture, edgeIoT, by leveraging fog
comput- ing and software defined networking
INTRODUCTION (SDN) to collect, classify, and analyze the IoT
Today, a tremendous number of smart devic- data streams at the mobile edge. The article
es and objects are embedded with sensors, makes the follow- ing contributions:
enabling them to sense real-time information • We propose edgeIoT by bringing the com-
from the environment. This phenomenon has puting resources close to IoT devices so
culminated in the intriguing concept of the Inter- that the traffic in the core network can be
net of Things (IoT) in which all smart things, allevi- ated and the end-to-end (E2E) delay
such as smart cars, wearable devices, laptops, between computing resources and IoT
sensors, and industrial and utility components, devices is mini- mized.
are connected via a network of networks and • We design a hierarchical fog computing
empowered with data analytics that are forever architecture to provide flexible and
changing the way we work, live, and play. In the scalable computing resource provisioning
past few years, many startups have embraced for each user as well as each IoT service
and actualized the concept of IoT in areas provider.
including smart homes/buildings, smart cities, • We propose and evaluate a novel proxy
intelligent healthcare, smart traffic, smart envi- vir- tual machine (VM) migration scheme to
ronments, and so on. Although IoT can poten- min- imize the traffic in the core network.
tially benefit all of society, many technical The rest of the article is structured as fol-
issues remain to be addressed. lows. We introduce a new mobile edge com-
First, the data streams generated by the IoT puting for IoT architecture (i.e., edgeIoT), and
Digital Object Identifier: devices are high in volume and at fast velocity explain its efficiency and flexibility; we unveil
(the European Commission has predicted that the challenges in designing the edgeIoT archi-
tecture and propose some possible solutions;
we conclude the article.
... Internet
Smartphone Smart home
Wearable Surveillance
device device
••••••
Sensor
FIGURE 1. The traditional IoT architecture. band IoT communications. Thus, a multi-interface BS can be considered as
a wireless gateway to
deconsolidation
...
of the WiFi(802.11ah):
Bluetooth low energy: Support devices with low data rate,
original proxy VM into Support devices with high data long transmission range, small and
rate and short transmission range. infrequent data transmission, and non-
two separate proxy critical delay.
VMs, each of which
serves a subset of the
registered IoT devices
from the original proxy
VM; conversely, proxy Millimeter-wave and massive Low-power wide area network Narrowband IoT:
VM composition refers MIMO technologies: (LPWAN): Support devices Support devices with long transmission
Support devices with high data rate with low mobility, low power, range, low data rate, and long battery
to the consolidation of transmission. and low cost in a wide area life requirements.
network.
VM.
by the sensors deployed in a smart home. Ana-
lyzing such humongous data can benefit not only
the user her/himself but also all of society. For
instance, analyzing the photos/videos taken by
devices can identify and track a terrorist. Specif-
ically, the application provider sends a photo of
the terrorist to each fog node, and each fog node
locally performs face matching to compare the
terrorist’s photo with the photos/videos taken by
local devices. If matched, the fog node will upload
the corresponding photos/videos to the cloud for
further processing. Thus, it seems that users have
to share their personal data in order to provision
such services. The main challenge is to maintain
user privacy in provisioning such services.
To tackle this challenge, we propose a hier-
archical fog computing architecture. As shown in
Fig. 4, each user1 is associated with a proxy VM,
which is considered as the user’s private VM
(located in a nearby fog node) that pro- vides
flexible computing and storage resources. IoT
devices belonging to the user are registered to
the user’s proxy VM, which collects the raw data
streams generated from its registered devic- es
via a multi-interface BS, classifies them into
different groups based on the type of data (i.e.,
structurize the raw data steams), generates the
metadata by analyzing the corresponding data
streams, and sends the metadata to the corre-
sponding application VM. Note that the metadata
contains valuable information generated from the
raw data streams without violating user privacy.
For instance, in the terrorist detection application,
only the locations and timestamps of the matched
photos/videos, rather than the original photos/
1 A user can be a person videos, are uploaded to the application VM. The
who owns various private
IoT devices, an
application VM, which is owned by the IoT ser-
entity/company that vice provider, offers the semantic model for gen-
deploys a set of IoT erating the metadata by each proxy VM (e.g., the
devices in the area, such face matching algorithm in the terrorist detection
as the surveillance
cameras, or a group of
application), receives the metadata from differ-
users who trust each other ent proxy VMs, and provides services to users.
and share the same proxy
Local application VM deployment refers to the matching algorithm in order to compare recent
deployment of an application VM in the fog photos/videos captured by the proxy VMs’ reg-
node to analyze the metadata generated by the istered devices to the photos of lost children/
local proxy VMs;2 for instance, in the ParkNet terrorists, and return the locations and time
applica- tion [10], which helps users find stamps of the photos/videos if found.
available parking spots in the urban area, each
local proxy VM col- lects the sensed data HOw TO IMplEMENT EDGEIOT ApplICATIONS
streams from its smart cars (note that each If a user is interested in one IoT application
smart car is equipped with a GPS receiver and (e.g., the ParkNet application), they can
a passenger-side-facing ultrasonic range finder download and install this app in their smart
to generate the location and park- ing spot car/mobile phone. Accordingly, the user’s proxy
occupancy information) and generates the VM will install the semantic model (which
metadata, which identify the available parking calculates the available parking spots based on
spots, to the application VM. The application the sensed data) provid- ed by the ParkNet
VM will inform and assign the available parking application, and the semantic model in the
spots to the local smart cars. user’s proxy VM would have permis- sion to
Remote application VM deployment refers access the sensed data generated by the GPS
to the deployment of an application VM in the receiver and the passenger-side-facing ultra-
remote cloud to analyze the metadata generat- sonic range finder equipped in the user’s smart
ed by the proxy VMs from different fog nodes. car. As a reward, the user can request to find
This deployment is necessary if an application and reserve an available parking spot via the
VM needs information from a large area, such ParkNet application.
as traffic rerouting applications. Specifically, the
goal of the application is to detect the traffic CHAllENGES IN IMplEMENTING EDGEIOT
hotspots and select the best routing (i.e., the In this section, we point out some challenges in
shortest time to reach the destination) for users. implementing the proposed edgeIoT architecture
In order to detect the traffic hotspots, each and the corresponding solutions.
smart car is equipped with sensors to measure
the location and speed of the car. The sensed IDENTIFICATIONS BETwEEN
data streams are transmitted to the proxy VMs, IOT DEvICES AND THEIR pROxy vMS
which locally analyze the data streams and Initially, each user’s IoT devices should be iden-
gen- erate the metadata indicating the traffic tified/registered by its proxy VM. The proxy VM
conges- tion degree of the location. The central should know the IDs3 of all the user’s devices
server in the remote cloud receives the and their corresponding characteristics (i.e.,
metadata from the proxy VMs and selects the static or mobile devices, smart sensors sensing
best route for each user. data or actuators responding with actions, the
Add-on application VM deployment (i.e., types of sensed data, etc.). On the other hand,
event-triggered application VM deployment) the user’s IoT devices should also be informed
implies that an application VM can be locally of the ID of the proxy VM so that sensor devices
created by some events, such as the terrorist can transmit the private information to the
detection application and the find-missing-chil- correct proxy VM or actuator devices can
dren application [11]. The events, like lost receive commands from the correct proxy VM.
children and terrorist activities detection, are Each mobile IoT device’s proxy VM may
reported in a specific area, and the applications vary over time due to the
need to identify and track the lost children/ decomposition/compo- sition processes. Thus,
terrorists. Then the applications will be creat- the proxy VM needs to inform its registered
ed in each fog node in the area and request mobile IoT devices when the
each proxy VM in the fog node to run the face decomposition/composition processes are
Classified data
streams Proxy Proxy Proxy User data layer
VM VM VM
Classifier
Raw data
Raw data
Raw data
streams
streams
streams
Raw data
streams
Device profile Registered device list
database ...
aggregate the
Proxy VM 2
SDN-based
cellular core Semantic Semantic
model model
Registered device list
Proxy VM 1 ...
Semantic Semantic Semantic Semantic
model model model model BS 2
Registered device list
...
BS 1
User
Percentage of UE
2500 0.6
0.5
2000
0.4
1500
0.3
1000 0.2
Cumulative occurancy probability >
500 0.1 90% Cumulative occurancy probability
> 95% Cumulative occurancy
0.0 probability > 99%
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
rdata (Mb/s) Number of locations
(a)
(b)
FIGURE 6. Simulation results: a) total traffic in the SDN-based cellular core vs. the average data rate of mobile IoT devices (given = 500
kb); b) the statistical results of the user mobility trace.