Edge Computing For Internet of Everything
Edge Computing For Internet of Everything
Abstract—In this era of the Internet of Everything (IoE), billion units by 2025, a significant increase from the 13.8
edge computing has emerged as the critical enabling technology billion units expected in 2021. This indicates that sensors,
to solve a series of issues caused by an increasing amount of actuators, and other intelligent devices will generate massive
interconnected devices and large-scale data transmission. How-
ever, the deficiencies of edge computing paradigm are gradually data at a fast speed, and these massive data need to be further
being magnified in the context of IoE, especially in terms of processed. However, the core network bandwidth is becoming
service migration, security and privacy preservation, deployment the bottleneck when moving all computing tasks to the cloud
issues of edge node. These issues can not be well addressed servers in cloud computing. Moreover, cloud computing is
by conventional approaches. Thanks to the rapid development hard to meet the demands of low cost, high performance,
of upcoming technologies, such as artificial intelligence (AI),
blockchain, and microservices, novel and more effective solutions and ultra-low latency of some time-sensitive applications (e.g.,
have emerged and been applied to solve existing challenges. interactive cloud applications and cooperative autonomous
In addition, edge computing can be deeply integrated with driving) due to its property of centralization. In this context,
technologies in other domains (e.g., AI, blockchain, 6G and edge computing is proposed as a promising means to solve
digital twin) through interdisciplinary intersection and practice, the shortcomings in cloud computing. Edge computing adopts
releasing the potential for mutual benefit. These promising
integrations need to be further explored and researched. In an open platform with core network capabilities, computing
addition, edge computing provides strong support in applications resources, and data storage to provide users with nearest-end
scenarios such as remote working, new physical retail industries, services, which is regarded as the critical enabling technology
and digital advertising, which has greatly changed the way we towards the 5G era. Edge computing is not a substitute for
live, work and study. In this paper, we present an up-to-date cloud computing but a supplement and expansion, which is
survey of edge computing research. In addition to introducing
the definition, model and characteristics of edge computing, we ideal for real-time data analysis and intelligent processing.
discuss a set of key issues in edge computing and novel solutions In recent years, this world has witnessed the dawning of
supported by emerging technologies in IoE era. Furthermore, we the Internet of Everything (IoE) era. People, process, data,
explore the potential and promising trends from the perspective and things are intelligently connected to the Internet and
of technology integration. Finally, new application scenarios and continuously create the value. However, IoE are magnifying
the final form of edge computing are discussed.
the inherent limitations of the existing computing models,
Index Terms—Edge computing, 6G, artificial intelligence, especially edge computing. Some issues of edge computing
blockchain, microservices, digital twin. architecture, including service migration, security and privacy
preservation, deployment issues of edge node, are difficult
I. I NTRODUCTION to be efficiently addressed by using conventional methods.
Thanks to the rapid development of upcoming technologies,
©2022 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to p
IEEE INTERNET OF THINGS JOURNAL 2
of many research opportunities has resulted in a highly active promising trends from the perspective of convergencing edge
area. In addition to solving the challenges mentioned above, computing paradigm with other emerging technologies in IoE
the convergence of edge computing and some technologies era.
(some of them mentioned above), including artificial intelli- The rest of this paper is organized as follows. In section II,
gence (AI), blockchain, 6G, and digital twin driven by other we berifly present the overview of edge computing, including
technologies, can fully unleash their potential and benefit definition, five important concepts, and characteristics. Section
from each other. The mutual benefit of integration between III describes several sigificiant challenges of edge computing
different disciplines deserves further exploration and research. and corresponding solutions supported by integrating with
Moreover, new application scenarios have also emerged, es- upcoming technologies. Our work is focused on section IV,
pecially in the COVID-19 pandemic era, gradually changing where we explore the mutual benefits of the integration of
our daily lives, including remote-working, the new physical emerging technologies and edge computing, discuss some new
retail industry, and digital advertising. Although a number application scenarios and finally propose the final development
of efforts have been conducted, the discussion about novel form of edge computing paradigm. Finally, we conclude our
solutions to existing challenges of edge computing and future work in section V.
directions supported by emerging technologies are missing in
other surveys. II. OVERVIEW OF E DGE C OMPUTING
In this work, we summarize existing efforts and previous In this section, a brief overview of several edge computing
work and present our view on future directions of this research concepts, including mobile cloud computing (MCC), mobile
field. We try to provide a state-of-the-art survey of edge edge computing (MEC), fog computing, cloudlet computing
computing, focusing on existing challenges and a series of and the most popular collaborative cloud-edge-end framework
opportunities from the perspective of integration with emerg- in recent years, is presented.
ing technologies in the IoE era. The main contributions of this
paper are outlined as follows:
A. Paradigms of Edge Computing
• We summary several key challenges in edge computing
In a conventional cloud-centric model, data collected by
including service migration, security and privacy preser-
various terminal devices such as photos, videos and the
vation, and deployment issues of edge node. Meanwhile,
surrounding environment must be transferred to the cloud
the novel solutions supported by emerging technologies
center for processing and then the results are sent back
(e.g., deep learning, blockchain, microservices) are dis-
[16]. The increasing amount of terminal devices and large-
cussed.
scale data transmission have posed a significant challenge
• We further point out the promising prospects from
to cloud computing, especially efficiency, energy usage and
the technology integration perspective, including AI,
latency issues. The emergence of edge computing has the
blockchain, 6G and digital twin, and explore their po-
potential to deal with these challenges. Satyanarayanan et al.
tential and mutual benefit.
[17] define edge computing as a new computing model that
• The new application scenarios supported by edge com-
deploys computing and storage resources (such as cloudlets,
puting, especially in the COVID-19 pandemic, including
microdata centers and fog nodes) at the edge of the network
remote-working, new physical retail industry, and digital
closer to mobile devices or sensors. The ”edge” is regarded
advertising are discussed. We further propose the edgeless
as any computing resource and network between cloud and
computing, which is the ultimate form of edge computing.
terminal devices [12]. Generally speaking, the structure of
Related surveys. One of the most important literature edge computing is generally divided into three layers: terminal
surveys of this field is the work by Shi et al. [12]. Their layer, edge layer, and cloud layer. This hierarchy depicts the
work gave a formal definition of edge computing in academia computational capabilities of edge computing elements and
and pointed out the challenges. However, their proposed their properties, as shown in Fig. 1.
solutions to the existing challenges of edge computing are Despite the rapid development of edge computing, the edge
traditional. They did not examine the opportunities brought by computing community has yet to come to an agreement on
emerging technologies. Khan et al. [13] highlighted the core its standardized definitions, architectures, and protocols [18].
applications and importance of edge computing in real life There have been various architectures at the edge, includ-
scenarios. Nevertheless, their work did not adequately discuss ing MCC, MEC, fog computing, and cloudlet computing.
the possibilities provided by upcoming technologies and future Although their concepts overlap and the boundaries are not
trends of edge computing. Varghese et al. [14] discussed the particularly obvious, we still have appropriate characteristics
opportunities and challenges in this area, but the two parts are to distinguish them. Table I and Table II depict the main
discussed separately and are not fully connected. Carvalho et comparisons amongst them, including attribute and feature.
al. [15] provided another up-to-date survey of the field. Their It’s worth noting that when MCC employs cloudlet as part of
work focused on use cases for each edge computing architec- its design, the qualities are identical to those listed in the corre-
ture and future research directions. A discussion of combining sponding column. Moreover, cloud-edge-end collaboration has
edge computing with technologies from other disciplines is emerged as the most popular operational framework for edge
missing therein. We particularly conduct in-depth discussions computing in recent years. In our work, this group of emerging
on novel solutions to existing challenges in this field as well as technologies is uniformly referred to as “edge computing.”
IEEE INTERNET OF THINGS JOURNAL 3
proposed IIoT–edge–cloud computing model based on multi- placing a greater demand on network capacity. The high net-
hop computation-offloading for resource-intensive applications work bandwidth consumption means high energy exhaustion
(e.g., 3D sensing, AI processing, big data analytics), with the because a significant amount of electric power to deliver data
goal of reducing energy consumption and processing delay. is required [40]. The emergence of edge computing could
For strengthening 5G heterogeneous network (HetNet) secu- help solve this tricky issue by processing more data utilization
rity, Wei et al. [38] proposed a federated learning empowered changes. By building a group of coordination and management
cloud-edge-end cooperation model. The security is guaranteed system of distributed data centers, edge data centers ensure
by equipping node with an attack detection mechanism at the effective resources utilization. Instead of running 24/7 like
end, edge, and the cloud of 5G HetNet. a cloud data center, resources will become dormant when
they are not needed. Additionally, sensors and IoT devices are
being utilized to monitor energy use, assess energy levels in
B. Edge Computing Characteristics
real time, and provide a real-time perspective of consumption,
Edge computing has some notable features compared to enabling organizations to make dynamic modifications to en-
the cloud computing paradigm. Specially, we discuss three ergy supplement and demand. Meanwhile, cooling data centers
main characteristics that makes up for cloud computing in requires a certain amount of energy. Due to the decreased size
the context of processing massive data, including low latency and output of edge data centers, the tiny data center’s overall
computing, more efficient energy consumption, and transferred energy consumption will decrease proportionately.
computing power. 3) Transferred Computing Power: The emergence of intel-
1) Low Latency Computing: The advantage of the cen- ligent devices such as virtual reality glasses and face recogni-
tralized architecture of cloud computing is that it is easy tion applications altered our way of life profoundly. However,
to manage and maintain. However, it is no longer the opti- these IoT devices and applications have some constraints
mal strategy for geographically distributed applications. Some in battery life and computing power while executing some
popular location-based social networking applications (e.g., complex activities [14]. While moving computing tasks to the
Foursquare, Mingle and Google Now) require computing remote cloud has proven to be a useful solution, the challenge
power closer to the data source to optimize system efficiency of execution delays due to data exchange has always been
and user experience [14]. Edge devices generate numerous present. Edge computing aims to offload heavy processing
data streams, and it is impossible to make real-time decisions from mobile devices to network edge infrastructures such as
when analytics is conducted on a remote cloud. For example, tiny cell base stations with computing and storage capacity,
Boeing 787 generates 5 Gigabytes of data every second therefore improving the user experience dramatically. By of-
[12]. The bandwidth between the aircraft and other satellite fering communication capability from Radio Access Network
equipment or base stations can not withstand such a large (RAN) and making computation resources closer to users,
amount of data due to long request-to-response links. Consider it has the potential to significantly reduce latency, prevent
self-driving cars from Google as another example. A variety of network congestion and extend the battery lifetime of terminal
sensors and cameras capture traffic information in real-time, devices.
generating nearly 1 GB of data per second for complex data
processing and driving decisions. Moreover, Americans drive III. C HALLENGES
an average of 600 hours a year, equivalent to 2.16 million Despite the benefits and promising prospect of edge comput-
seconds or about 2 Petabytes of data per vehicle per year ing, there are still many key issues remaining to be addressed.
[12]. It is almost inconceivable that all data must be sent Especially in IoE era, these major challenges are gradually
to the cloud for processing before responding to the results. being amplified. This section discusses several research chal-
The response time will be extraordinarily long and become a lenges followed by partial solutions supported by emerging
bottleneck. Certain time-sensitive applications suffer the same technologies such as deep learning (DL) technology [41],
issue and impose strict limits on latency between edge devices blockchain technology, and microservices.
and cloud servers. Deploying some of the processing power
closer to the user is an effective way to solve the issues in
the above scenarios. The adoption of edge computing has A. Service Migration
the potential to minimize processing latency and network Application mobility is one of the significant factors that
bandwidth requirements. should be taken into account. Although mobility increases the
2) Efficient Energy Consumption: With the rapid devel- flexibility of applications, it brings new challenges. Computing
opment of computing models (e.g., cloud computing), the resources in mobile applications may switch between multiple
network bandwidth consumption of novel applications (e.g., devices as users move [42]. Resource switching requires
video analytics) has increased sharply in recent years. Ac- migrating the currently running service to another device. The
cording to the Cisco Visual Networking Index research [39], major issues concerning service migration are summarized
video streaming services (e.g., YouTube, Hulu, and Netflix) are below:
expected to consume 79 percent of total network bandwidth • How to appropriately select the edge server to migrate
in 2022. High-bandwidth applications, such as online gaming, the service is a significant issue. The service scope of
Ultra-High-Definition (UHD), or 4K video streaming, require multiple edge servers may overlap. Hence, if a user moves
a broadband connection with a speed of at least 5 Mbit/s, into a specific area within the service area of multiple
IEEE INTERNET OF THINGS JOURNAL 5
MDP is based on simple theoretical assumptions, which is the terminal equipment can directly communicate with
subject to the complex condition and a large amount of various any MEC node. However, IoT devices may not be aware
parameters. This feature limits the applicability of mathemat- of the existence of the MEC network, which makes
ical models to service migration. Recently, AI technology, symmetric encryption technology unable to be used to
especially DL, has provided a promising solution for service encrypt messages sent by IoT devices. The same is true
migration decisions by considering complex factors, such as for asymmetric key cryptography technology. Secondly,
heterogeneity of node equippments, the dynamic of network the MEC nodes involved in multiple paths cannot be fully
environment, and real-time requirements of users’ rapid move- trusted, so communication between MEC nodes requires
ment. DL technology, especially RL can continuously learn end-to-end security.
from a large amount of historical data, constantly interact with • Service placement is an important research direction in
dynamic environments and respond quickly to changes [5], MEC, which aims to explore an optimal scheme to
[44]. Especially, RL is able to perceive its environment, take improve mobile users’ quality of service (QoS) [48].
corresponding actions, identify the optimal action to maximize Existing service placement strategies, in particular, are
reward in a given scenario. State, action, and reward are based on the degree to which customers value services.
three key elements in whole process. When MEC and RL However, the degree of customer perference may involves
are integrated, the decision issue of service migration can be some sensitive personal information such as history data,
alleviated. Hence, three key elements above mentioned have locations, and customized needs. Hence, implementing
the new representations in MEC network. The first is “state”, an effective privacy preservation scheme is a challenging
which is able to denote the state of the MEC server that user task.
equippments are currently covered. Next, “action” refers to a Various edge services put forward new needs for adequate
list of all available servers to which the current VM can be privacy protection. Aside from designing an efficient strategy
transferred. The final is “reward”, which refers to the mobile of preserving privacy information, it is vital to consider
user chooses an action mentioned above and gets the final how to combine the traditional privacy protection with the
reward. The ultimate goal is to minimize objective function’s characteristics of edge data processing in a diversified service
value and Q-learning algorithm is utilized to maximize the environment. Moreover, if some emerging technologies (e.g.,
reward of migration. Hence, there are more rewards for action federated learning, blockchain) and edge computing are well-
with lower communication costs and migration costs of user integrated, they can offer great potential for addressing the
equipment at the MEC network. aforementioned partial challenges concerning security and
privacy.
B. Security and Privacy Perservation Incorporating federated learning into edge computing.
In traditional machine learning methods, the training data must
Compared to the cloud computing paradigm, edge comput- be centralized on a single machine or in a cloud center. As
ing can avoid the abuse and theft of users’ privacy data on a distributed DL technology, federated learning [49]–[53] en-
long transmission links by processing partial data at the edge ables users to collaboratively train an algorithm while keeping
of the network. However, new security and privacy challenges local data samples on the devices. The various data generated
have emerged due to the access of multi-class and multi-device by the user equipment (e.g., wireless channel quality, battery
devices in edge networks. The challenges can be denoted as: life, and energy consumption) and edge nodes (e.g., computing
• Edge computing devices are usually close to the user. load, wireless communication quality, task queue) are utilized
Therefore, MEC nodes adjacent to the user may collect as raw training data for model input. Federated learning
sensitive information [45], [46], including the user’s avoids the privacy leakage problem caused by uploading these
identity, location information and application usage. Take sensitive data to the cloud center, only submitting learned
the smart home system as an example. The hackers model weights to update [54]. In dealing with the challenges
can easily track electricity usage to identify whether a of service placement in MEC, federated learning allows users
house is unoccupied, which increases the possibility of to send the trained results instead of uploading all the users’
items being stolen in the house. Furthermore, centralized privacy data, such as perference information, to the cloud
control becomes extremely difficult due to the discrete center. User privacy information is well protected in this way.
nature of MEC nodes. Integration with blockchain technology. Blockchain is a
• Traditional approaches of security and privacy protection, distributed ledger technology that does not require centralized
such as certificates and Public Key Infrastructure (PKI) control and is protected by encryption technology [55], [56].
authentication, may not be suitable for being used on It provides a secure, transparent, and non-tamperable platform
edge infrastructures [47]. In dynamic changes of MEC for network data communication, sharing, and transactions.
nodes, nodes must mutually verify the newly formed Furthermore, the blockchain guarantees the automatic exe-
MEC network. In addition, MEC nodes also need to cution of predefined rules and terms by intelligent contract
restrict or reject service requests from malicious and technology, and protects data privacy and account security by
compromised nodes. the asymmetric encryption algorithm.
• The device communication in the MEC network mainly The blockchain here refers to the ability of network partici-
includes the communication between the IoT devices and pants to record in the distributed billing system. The core parts
the MEC nodes and between the MEC nodes. Firstly, of blockchain, such as consensus protocol, ledger topology,
IEEE INTERNET OF THINGS JOURNAL 7
and incentives, will be extended in integrated systems to in edge computing. The operators are able to offer different
accommodate different levels of edge computing systems and services such as local offloading services, edge computer room
combinations [8]. The integration covers the fundamental rental, unified IaaS capabilities when facing various corporate
layers of blockchain and major capabilities of edge computing, customers. Different with large enterprises, operators provide
which provides more secure large-scale data storage and unified planning and deployment of IaaS and PaaS platforms
effective computing without the need for costly encryption for small and medium-sized enterprises, which applies to
overheads. Block chain technology can realize security au- situations where edge nodes are scarce, and the payoff of
thentication, secure data storage and secure computing to management is limited [61]. However, the third-party PaaS
protect the security and privacy of edge network. On one platform and the management of third-party applications in
hand, blockchain technology allows each user to maintain their the edge system need further exploration and improvement.
own changeable keys, which is convenient for users to offer
The fourth is reliability assurance. Protecting the physical
access and manage data without the involvement of any third
environment of edge nodes is also challenging due to the
parties [8]. On the other hand, coordination on the peer-to-
lack of effective measures [62], including data backup, data
peer basis is allowed by blockchain’s pseudonymous property,
recovery, and audit measures. Compared with storing data
and metadata (e.g., source, destination, and content) will not
in a stable cloud computing environment, the attackers may
be disclosed to anyone.
modify or delete the user data on the edge node to destroy
some evidence. Take the traffic supervision scenario as an
C. Deployment Issues example [58], [63]–[65]. The high-precision camera on the
There are still many challenges in the deployment of edge road records the normal and abnormal conditions, trajectory
computing nodes such as business selection, investment re- data, and illegal records of the vehicles. In a traffic accident,
turns, and operating model. By introducing the microservices these data are the critical evidence to find criminal attacks.
technique, the challenge concerning deployment of application The offenders can get away with the law by attacking data on
packages will be effictively alleviated. edge nodes. Similarly, household consumption stored in edge
nodes and personal health information in electronic medical
Business needs and scenario selection is the first issue that
systems may also become the target of attacks. Moreover,
needs to be considered in the deployment scenario, especially
extreme weather conditions (e.g., snowstorms, strong wind)
in the 5G era. Whether it is edge computing for individual
will lead to immeasurable damage of edge data, which is
users in the enhanced Mobile Broadband (eMBB) scenario, or
unacceptable for enterprises and customers. The edge nodes
edge computing for vertical field (e.g., live games, Internet of
also can not provide adequate measures to recover data. When
vehicles [57], [58], smart manufacturing), deployment needs
constructing the entire edge system, it is necessary to leverage
to fully consider the capacity and the feasibility of the business
infrastructures coordination to ensure physical reliability and
scenario.
utilize multiple backup measures to ensure data reliability.
The second is network index and investment returns. The
main stakeholder [59] in the edge ecosystem is classified into The final one is the deployment issue of application pack-
two categories: infrastructure owners and software developers. ages. The virtualization technology, such as container, aims
The first one usually refers to operators and cloud providers at distributing packaged applications as low-overhead virtual
such as Google Cloud and Amazon Cloud. They are responsi- machines (VMs) to edge servers [66]. However, it is not trivial
ble for collecting and storing data, maintaining and managing to decompose monolithic cloud applications into distributed
software and hardware facilities [60]. This business pattern packages and install them into hierarchical IoT system topolo-
is transparent to users, and subscribers only need to pay for gies, especially to meet applications’ specific demands (e.g.,
the service without knowing the technical details. The latter QoS, performance). Therefore, it is necessary to introduce
mainly includes content providers and startups companies. novel programming paradigms that integrate the various as-
They support the deployment of edge servers, create added- pects of IoT system architecture layers to facilitate distributed
value applications and help enrich and expand the innovative software development. Microservices is a promising approach
services. Technology without economic benefits is hard to for modularizing applications and services at the process level.
sustain. In an edge computing system, the maintenance of A single application is decomposed into non-interfering atomic
hardware and software is particularly challenging due to the services in a microservices architecture. Each service unit
geographical dispersion of edge nodes. Whether the cloud that performs a specific task, consumes only a tiny amount
service provider or the content provider pays for maintenance of computing resources in order to software developers can
and management expenses must be considered. Furthermore, quickly build it. These units are operated, updated, and de-
it is also necessary to effectively reduce the cost of users’ ployed independently so that the developer team can carry out
network usage. The closer the computing resources is to the the continuous delivery of functions. The general applications
edge of the network, the better experience for users. However, are divided into several small modules and deployed to the
it will leads to the decrease of access users, the reduction of edge nodes [11]. Each module can compute, store and utilize
network edge revenue and the increase of the total cost. the network resources without affecting other modules. The
The third is the operating model and management. Infras- convergence of distributed IoT and microservices will facilitate
tructure as a service (IaaS), Platform as a service (PaaS), and package deployment optimization for service delivery and
Software as a service (SaaS) in cloud computing also exist address the deployment challenges of application packages.
IEEE INTERNET OF THINGS JOURNAL 8
process, and the transmission rate is slow, only 100 Mbps. • Working in Post-epidemic Era. The outbreak of
Even 5G networks with speeds of up to 20 Gbps cannot meet COVID-19 has had a profound impact on the way we live
the needs of future emergencies. For example, the deterioration and the operating model of human society [95]. It will not
of critical patients requires immediate feedback. The social be resolved fast and will continue for a long time. Around
distance and isolated persons in the floating population also 300 million people have been infected with coronavirus
need to be monitored in real-time. In these critical scenarios, worldwide to date, with over 4 million deaths. Not only
6G can provide a microsecond response [92] to deal with human beings, but all walks of life are also experienc-
challenges. Meanwhile, the deployment of edge computing ing unprecedented tests. The weaknesses of the Internet
in the 6G network will improve the system performance, architecture that we rely on every day are completely
realize core network traffic optimization, and provide a novel exposed under epidemic. Enterprises must also respond to
network service. Furthermore, compared with cloud service the ever-changing business world and promote the long-
providers such as Amazon and Google, operators in edge term transition to intelligent edge computing solutions
computing systems will have more advantages in computing to cope with the post-epidemic era. Firstly, significant
and communication resources, which allows them to regain changes have taken place in the way employees work.
their market position and increase the added value of their We call it the “Remote Revolution”. Remote collaboration
services in 6G era. and home office have become the norm. Both consumers
4) Digital Twin: The Digital Twin (DT) originated from and companies are looking for positive ways to meet
the NASA project of the US Department of Defense, which office requirements during the quarantine period. Most
is utilized to maintain and guarantee the health of aerospace of the virtual desktop infrastructure (VDI) hosted in the
vehicles by virtualization technology. It makes full use of vari- cloud allows any device to access it at any time. However,
ous physical models and combines sensor data, algorithms and VDI architecture has some shortcomings, including High
decision analysis to realize real-time virtual mapping of the construction cost and over-reliance on network environ-
physical world on the information platform, thereby reflecting ment. By introducing some implementation schemes of
the entire life cycle of the corresponding physical entity [93], edge computing architecture, such as Intelligent Desktop
[94]. A series of enabling technologies (e.g., AI, blockchain, Virtualization (IDV) and Virtual OS Infrastructure (VOI),
6G) drive digital twins to support some application scenarios employees may more efficiently utilize their devices at
such as smart home, smart city, and smart transportation. home, resulting in cost savings, less hardware needs, and
Fig. 4 shows the applications of digital twins. Digital twin more flexible operation [96]. Different from VDI, which
network (DTN) [31] is a network of many-to-many mappings concentrates all desktop computing resources in the data
formed from many one-to-one DTs, which aims to enable center and sends interfaces to terminal devices, edge com-
the dynamic interaction and coordinated evolution of a large puting takes a more decentralized approach to meeting
number of physical and virtual objects. By linking several DT operational technological requirements while simplifying
nodes in DTN, physical objects and virtual twins are able to administration and deployment functions. Edge comput-
interact, cooperate, exchange information, perform activities, ing solutions enable IT to manage and protect desktop
and establish an information-sharing network. images and devices while maintaining high performance,
Physical to physical (P2P) and physical to virtual (P2V) mobility, and flexibility for users. Thanks to the rapid
communication in DTN network require ultra-low sensor development of edge computing paradigm, organizations
delay, data processing delay, and feedback delay in some may rapidly and inexpensively introduce desktop virtual-
time-sensitive application scenarios such as medication control ization without investing in infrastructure.
and remote surgery. The convergence with edge computing is • Physical Retail Industry. Edge computing shows ex-
empowered to alleviate this issue. The cloud-edge-end frame- traordinary marketing potential in user personalization
work offloads the computing tasks of the twin terminal to the and in-depth positioning and provides users with an un-
edge network, which mainly solves the device’s shortcomings precedented digital product experience. In order to meet
in terms of resource storage, computing performance, and social distancing requirements and comply with epidemic
energy efficiency. Cooperative cloud-edge-end computing is prevention policies, the physical retail industry has been
able to provide DTN with low-latency computation, increased hit like never before. It is undergoing a transformation
computational ability with constrained resources, and con- to survive and compete with the online retail industry.
tinuous update. Processing and analyzing closer to the edge The ways of self-help include building a real-time supply
will reduce the communication delay of mutual mapping in chain, forming a fully automatic manufacturing chain and
physical space and virtual space. Digital twins systems based providing customers with a personalized shopping expe-
on edge deployment will have greater flexibility in defining, rience. By deploying edge computing systems, brick-and-
developing, and utilizing real-time IoT systems. mortar retailers [97] are committed to enabling customers
to seamlessly transition from the physical to the digital
experience via new channel technology. The store may
B. New Application Scenarios offer a virtual reality experience to attract additional con-
The emergence of edge computing paradigm has supported sumers, as well as real-time inventory data presented on
the new applicaiton scenarios, including remote-working, the touch displays. Moreover, if a customer does not have a
physical retail industry, and digital advertising. favorite product, the system will intelligently recommend
IEEE INTERNET OF THINGS JOURNAL 11
less traffic it carries. The vision that can be handled quickly [14] B. Varghese, N. Wang, S. Barbhuiya, P. Kilpatrick, and D. S. Nikolopou-
anywhere will surely be realized in the future. los, “Challenges and Opportunities in Edge Computing,” in 2016 IEEE
International Conference on Smart Cloud (SmartCloud), 2016, pp. 20–
26.
V. C ONCLUSION [15] G. Carvalho, B. Cabral, V. Pereira, and J. Bernardino, “Edge computing:
current trends, research challenges and future directions,” Computing,
Today, edge computing is one of the most effective solutions vol. 103, no. 5, pp. 993–1023, 2021.
to address some challenges associated with enormous volumes [16] L. Jiao, R. Friedman, X. Fu, S. Secci, Z. Smoreda, and H. Tschofenig,
of data that various industries generate and consume every “Cloud-based computation offloading for mobile devices: State of the
art, challenges and opportunities,” in 2013 Future Network Mobile
day. In this work, we have described the brief overview of Summit, 2013, pp. 1–11.
edge computing; discussed the main existing challenges in [17] M. Satyanarayanan, “The Emergence of Edge Computing,” Computer,
edge computing and novel solutions supported by emerging vol. 50, no. 1, pp. 30–39, 2017.
[18] K. Bilal, O. Khalid, A. Erbad, and S. U. Khan, “Potentials, trends, and
technologies; and explored the possibility of technologies in- prospects in edge technologies: Fog, cloudlet, mobile edge, and micro
tegration, finally discussed several new applications scenarios data centers,” Computer Networks, vol. 130, pp. 94–120, 2018.
and proposed the final form of edge computing. We believe [19] F. Xia, B. Jedari, L. T. Yang, J. Ma, and R. Huang, “A signaling game
for uncertain data delivery in selfish mobile social networks,” IEEE
that the future of edge computing lies in the organic integration Transactions on Computational Social Systems, vol. 3, no. 2, pp. 100–
with emerging technologies. Convergence will transform man- 112, 2016.
ufacturing and services, create actionable business intelligence, [20] F. Xia, A. M. Ahmed, L. T. Yang, J. Ma, and J. J. Rodrigues, “Exploiting
social relationship to enable efficient replica allocation in ad-hoc social
and develop flexible business ecosystems. networks,” IEEE Transactions on Parallel and Distributed Systems,
vol. 25, no. 12, pp. 3167–3176, 2014.
R EFERENCES [21] S. Yi, C. Li, and Q. Li, “A Survey of Fog Computing: Concepts,
Applications and Issues.” Association for Computing Machinery, 2015,
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and p. 37–42.
M. Ayyash, “Internet of Things: A Survey on Enabling Technologies, [22] M. Othman, F. Xia, A. N. Khan et al., “Context-aware mobile cloud
Protocols, and Applications,” IEEE Communications Surveys & Tutori- computing and its challenges,” IEEE Cloud Computing, vol. 2, no. 3,
als, vol. 17, no. 4, pp. 2347–2376, 2015. pp. 42–49, 2015.
[2] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A Survey [23] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, “Mobile edge
on Internet of Things: Architecture, Enabling Technologies, Security computing—A key technology towards 5G,” ETSI white paper, vol. 11,
and Privacy, and Applications,” IEEE Internet of Things Journal, vol. 4, no. 11, pp. 1–16, 2015.
no. 5, pp. 1125–1142, 2017. [24] P. Mach and Z. Becvar, “Mobile Edge Computing: A Survey on Archi-
[3] L. S. Vailshery, “Internet of things (iot) and non-iot tecture and Computation Offloading,” IEEE Communications Surveys &
active device connections worldwide from 2010 to 2025,” Tutorials, vol. 19, no. 3, pp. 1628–1656, 2017.
Website, 2021, https://www.statista.com/statistics/1101442/ [25] M. Patel, B. Naughton, C. Chan, N. Sprecher, S. Abeta, A. Neal et al.,
iot-number-of-connected-devices-worldwide/. “Mobile-edge computing introductory technical white paper,” White
[4] X. Wang, Y. Han, V. C. M. Leung, D. Niyato, X. Yan, and X. Chen, paper, mobile-edge computing (MEC) industry initiative, vol. 29, pp.
“Convergence of Edge Computing and Deep Learning: A Comprehen- 854–864, 2014.
sive Survey,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, [26] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A Survey
pp. 869–904, 2020. on Mobile Edge Computing: The Communication Perspective,” IEEE
[5] N. C. Luong, D. T. Hoang, S. Gong, D. Niyato, P. Wang, Y.-C. Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2322–2358,
Liang, and D. I. Kim, “Applications of Deep Reinforcement Learning 2017.
in Communications and Networking: A Survey,” IEEE Communications [27] L. M. Vaquero and L. Rodero-Merino, “Finding Your Way in the
Surveys & Tutorials, vol. 21, no. 4, pp. 3133–3174, 2019. Fog: Towards a Comprehensive Definition of Fog Computing,” ACM
[6] D. C. Nguyen, M. Ding, Q.-V. Pham, P. N. Pathirana, L. B. Le, SIGCOMM computer communication Review, vol. 44, no. 5, pp. 27–32,
A. Seneviratne, J. Li, D. Niyato, and H. V. Poor, “Federated Learning 2014.
Meets Blockchain in Edge Computing: Opportunities and Challenges,” [28] M. Chiang, S. Ha, F. Risso, T. Zhang, and I. Chih-Lin, “Clarifying
IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12 806–12 825, 2021. Fog Computing and Networking: 10 Questions and Answers,” IEEE
[7] S. Lin, G. Yang, and J. Zhang, “A Collaborative Learning Framework via Communications Magazine, vol. 55, no. 4, pp. 18–20, 2017.
Federated Meta-Learning,” in 2020 IEEE 40th International Conference [29] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, “The Case for
on Distributed Computing Systems (ICDCS). IEEE, 2020, pp. 289–299. VM-Based Cloudlets in Mobile Computing,” IEEE pervasive Comput-
[8] R. Yang, F. R. Yu, P. Si, Z. Yang, and Y. Zhang, “Integrated Blockchain ing, vol. 8, no. 4, pp. 14–23, 2009.
and Edge Computing Systems: A Survey, Some Research Issues and [30] S. Nithya, M. Sangeetha, K. A. Prethi, K. S. Sahoo, S. K. Panda,
Challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, and A. H. Gandomi, “SDCF: A Software-Defined Cyber Foraging
pp. 1508–1532, 2019. Framework for Cloudlet Environment,” IEEE Transactions on Network
[9] A. Fitwi, Y. Chen, and S. Zhu, “A Lightweight Blockchain-Based and Service Management, vol. 17, no. 4, pp. 2423–2435, 2020.
Privacy Protection for Smart Surveillance at the Edge,” in 2019 IEEE [31] Y. Wu, K. Zhang, and Y. Zhang, “Digital Twin Networks: A Survey,”
International Conference on Blockchain (Blockchain), 2019, pp. 552– IEEE Internet of Things Journal, vol. 8, no. 18, pp. 13 789–13 804, 2021.
555. [32] Q. Luo, S. Hu, C. Li, G. Li, and W. Shi, “Resource Scheduling in Edge
[10] H. Guo, W. Li, M. Nejad, and C.-C. Shen, “Access Control for Electronic Computing: A Survey,” IEEE Communications Surveys & Tutorials,
Health Records with Hybrid Blockchain-Edge Architecture,” in 2019 vol. 23, no. 4, pp. 2131–2165, 2021.
IEEE International Conference on Blockchain (Blockchain), 2019, pp. [33] F. Xia, J. Wang, X. Kong, D. Zhang, and Z. Wang, “Ranking station im-
44–51. portance with human mobility patterns using subway network datasets,”
[11] F. Guo, B. Tang, M. Tang, H. Zhao, and W. Liang, “Microservice IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 7,
Selection in Edge-Cloud Collaborative Environment: A Deep Reinforce- pp. 2840–2852, 2020.
ment Learning Approach,” in 2021 8th IEEE International Conference [34] C. Chen, Q. Liu, X. Wang, C. Liao, and D. Zhang, “semi-traj2graph:
on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE Identifying fine-grained driving style with gps trajectory data via multi-
International Conference on Edge Computing and Scalable Cloud task learning,” IEEE Transactions on Big Data, 2021.
(EdgeCom), 2021, pp. 24–29. [35] C. Chen, S. Jiao, S. Zhang, W. Liu, L. Feng, and Y. Wang, “Tripimputor:
[12] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge Computing: Vision Real-time imputing taxi trip purpose leveraging multi-sourced urban
and Challenges,” IEEE internet of things journal, vol. 3, no. 5, pp. 637– data,” IEEE Transactions on Intelligent Transportation Systems, vol. 19,
646, 2016. no. 10, pp. 3292–3304, 2018.
[13] W. Z. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, “Edge [36] A. Tolba, “A two-level traffic smoothing method for efficient cloud-iot
computing: A survey,” Future Generation Computer Systems, vol. 97, communications,” Peer-to-Peer Networking and Applications, vol. 14,
pp. 219–235, 2019. no. 5, pp. 2743–2756, 2021.
IEEE INTERNET OF THINGS JOURNAL 13
[37] Z. Hong, W. Chen, H. Huang, S. Guo, and Z. Zheng, “Multi-Hop Computing: from standard to actual infrastructure deployment and
Cooperative Computation Offloading for Industrial IoT–Edge–Cloud software development,” ETSI White paper, pp. 1–41, 2019.
Computing Environments,” IEEE Transactions on Parallel and Dis- [60] R. Bruschi, F. Davoli, G. Lamanna, C. Lombardo, S. Mangialardi, and
tributed Systems, vol. 30, no. 12, pp. 2759–2774, 2019. J. F. Pajo, “Enabling Edge Computing Deployment in 4G and Beyond,”
[38] Y. Wei, S. Zhou, S. Leng, S. Maharjan, and Y. Zhang, “Federated in 2020 6th IEEE Conference on Network Softwarization (NetSoft).
Learning Empowered End-Edge-Cloud Cooperation for 5G HetNet IEEE, 2020, pp. 237–241.
Security,” IEEE Network, vol. 35, no. 2, pp. 88–94, 2021. [61] H. Song, R. Dautov, N. Ferry, A. Solberg, and F. Fleurey, “Model-based
[39] C. Team, “Cisco annual internet report (2018–2023) white paper,” fleet deployment of edge computing applications,” in Proceedings of the
Website, 2020, https://www.cisco.com/c/en/us/solutions/collateral/ 23rd ACM/IEEE International Conference on Model Driven Engineering
executive-perspectives/annual-internet-report/white-paper-c11-741490. Languages and Systems, 2020, pp. 132–142.
html. [62] K. Okafor, “Dynamic reliability modeling of cyber-physical edge com-
[40] J. Mocnej, M. Miškuf, P. Papcun, and I. Zolotová, “Impact of edge com- puting network,” International Journal of Computers and Applications,
puting paradigm on energy consumption in IoT,” IFAC-PapersOnLine, vol. 43, no. 7, pp. 612–622, 2021.
vol. 51, no. 6, pp. 162–167, 2018. [63] X. Kong, M. Li, T. Tang, K. Tian, L. Moreira-Matias, and F. Xia, “Shared
[41] X. Su, S. Xue, F. Liu, J. Wu, J. Yang, C. Zhou, W. Hu, C. Paris, subway shuttle bus route planning based on transport data analytics,”
S. Nepal, D. Jin, Q. Z. Sheng, and P. S. Yu, “A comprehensive survey on IEEE Transactions on Automation Science and Engineering, vol. 15,
community detection with deep learning,” IEEE Transactions on Neural no. 4, pp. 1507–1520, 2018.
Networks and Learning Systems, 2022. [64] X. Kong, M. Li, K. Ma, K. Tian, M. Wang, Z. Ning, and F. Xia, “Big
[42] K. Cao, Y. Liu, G. Meng, and Q. Sun, “An Overview on Edge Computing trajectory data: A survey of applications and services,” IEEE Access,
Research,” IEEE access, vol. 8, pp. 85 714–85 728, 2020. vol. 6, pp. 58 295–58 306, 2018.
[43] Y. Siriwardhana, P. Porambage, M. Liyanage, and M. Ylianttila, “A Sur- [65] X. Kong, X. Liu, B. Jedari, M. Li, L. Wan, and F. Xia, “Mobile
vey on Mobile Augmented Reality With 5G Mobile Edge Computing: crowdsourcing in smart cities: Technologies, applications, and future
Architectures, Applications, and Technical Aspects,” IEEE Communica- challenges,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8095–
tions Surveys & Tutorials, vol. 23, no. 2, pp. 1160–1192, 2021. 8113, 2019.
[44] X. Kong, B. Zhu, G. Shen, T. C. Workneh, Z. Ji, Y. Chen, and Z. Liu, [66] T. Leppanen, C. Savaglio, L. Loven, T. Jarvenpaa, R. Ehsani, E. Pelto-
“Spatial-temporal-cost combination based taxi driving fraud detection nen, G. Fortino, and J. Riekki, “Edge-Based Microservices Architecture
for collaborative internet of vehicles,” IEEE Transactions on Industrial for Internet of Things: Mobility Analysis Case Study,” in 2019 IEEE
Informatics, vol. 18, no. 5, pp. 3426–3436, 2021. Global Communications Conference (GLOBECOM), 2019, pp. 1–7.
[45] B. H. Husain, S. Askar et al., “Survey on Edge Computing Security,” [67] C. Pemberton, “3 ai trends for enterprise computing,” 2017, https://www.
International Journal of Science and Business, vol. 5, no. 3, pp. 52–60, gartner.com/smarterwithgartner/3-ai-trends-for-enterprise-computing.
2021. [68] Z. Chang, S. Liu, X. Xiong, Z. Cai, and G. Tu, “A Survey of
[46] L. Gao, T. H. Luan, B. Gu, Y. Qu, and Y. Xiang, Privacy-Preserving in Recent Advances in Edge-Computing-Powered Artificial Intelligence of
Edge Computing. Springer, 2021. Things,” IEEE Internet of Things Journal, vol. 8, no. 18, pp. 13 849–
[47] P. Ranaweera, A. D. Jurcut, and M. Liyanage, “Survey on Multi-Access 13 875, 2021.
Edge Computing Security and Privacy,” IEEE Communications Surveys
[69] F. Xia, J. Liu, H. Nie, Y. Fu, L. Wan, and X. Kong, “Random Walks:
& Tutorials, vol. 23, no. 2, pp. 1078–1124, 2021.
A Review of Algorithms and Applications,” IEEE Transactions on
[48] F. Xia, L. Liu, B. Jedari, and S. K. Das, “Pis: A multi-dimensional
Emerging Topics in Computational Intelligence, vol. 4, no. 2, pp. 95–
routing protocol for socially-aware networking,” IEEE Transactions on
107, 2020.
Mobile Computing, vol. 15, no. 11, pp. 2825–2836, 2016.
[70] X. Kong, K. Wang, S. Wang, X. Wang, X. Jiang, Y. Guo, G. Shen,
[49] D. Ye, R. Yu, M. Pan, and Z. Han, “Federated Learning in Vehicular
X. Chen, and Q. Ni, “Real-Time Mask Identification for COVID-19:
Edge Computing: A Selective Model Aggregation Approach,” IEEE
An Edge-Computing-Based Deep Learning Framework,” IEEE Internet
Access, vol. 8, pp. 23 920–23 935, 2020.
of Things Journal, vol. 8, no. 21, pp. 15 929–15 938, 2021.
[50] X. Kong, K. Wang, M. Hou, X. Hao, G. Shen, X. Chen, and F. Xia,
“A Federated Learning-Based License Plate Recognition Scheme for [71] X. Kong, S. Tong, H. Gao, G. Shen, K. Wang, M. Collotta, I. You,
5G-Enabled Internet of Vehicles,” IEEE Transactions on Industrial and S. K. Das, “Mobile edge cooperation optimization for wearable
Informatics, vol. 17, no. 12, pp. 8523–8530, 2021. internet of things: a network representation-based framework,” IEEE
[51] L. U. Khan, W. Saad, Z. Han, E. Hossain, and C. S. Hong, “Federated Transactions on Industrial Informatics, vol. 17, no. 7, pp. 5050–5058,
Learning for Internet of Things: Recent Advances, Taxonomy, and Open 2020.
Challenges,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, [72] X. Kong, G. Duan, M. Hou, G. Shen, H. Wang, X. Yan, and M. Collotta,
pp. 1759–1799, 2021. “Deep reinforcement learning based energy efficient edge computing for
[52] X. Zhou, W. Liang, J. Ma, Z. Yan, and K. I.-K. Wang, “2d federated internet of vehicles,” IEEE Transactions on Industrial Informatics, 2022.
learning for personalized human activity recognition in cyber-physical- [73] A. K. Ghadiyaram et al., “A Compendium On Edge Computing Where
social systems,” IEEE Transactions on Network Science and Engineer- Ai Can Meet,” Turkish Journal of Computer and Mathematics Education
ing, 2022. (TURCOMAT), vol. 12, no. 10, pp. 4118–4126, 2021.
[53] A. Li, J. Sun, B. Wang, L. Duan, S. Li, Y. Chen, and H. Li, “Lotteryfl: [74] F. Xia, K. Sun, S. Yu, A. Aziz, L. Wan, S. Pan, and H. Liu, “Graph
Empower edge intelligence with personalized and communication- learning: A survey,” IEEE Transactions on Artificial Intelligence, vol. 2,
efficient federated learning,” in 2021 IEEE/ACM Symposium on Edge no. 2, pp. 109–127, 2021.
Computing (SEC). IEEE, 2021, pp. 68–79. [75] X. Kong, Q. Chen, M. Hou, A. Rahim, K. Ma, and F. Xia, “Rmgen:
[54] W. Y. B. Lim, N. C. Luong, D. T. Hoang, Y. Jiao, Y.-C. Liang, Q. Yang, A tri-layer vehicular trajectory data generation model exploring urban
D. Niyato, and C. Miao, “Federated Learning in Mobile Edge Networks: region division and mobility pattern,” IEEE Transactions on Vehicular
A Comprehensive Survey,” IEEE Communications Surveys & Tutorials, Technology, 2022.
vol. 22, no. 3, pp. 2031–2063, 2020. [76] F. Xia and J. Ma, “Building smart communities with cyber-physical
[55] M. Firdaus and K.-H. Rhee, “On Blockchain-Enhanced Secure Data systems,” in Proceedings of 1st international symposium on From digital
Storage and Sharing in Vehicular Edge Computing Networks,” Applied footprints to social and community intelligence, 2011, pp. 1–6.
Sciences, vol. 11, no. 1, p. 414, 2021. [77] M. Hou, J. Ren, D. Zhang, X. Kong, D. Zhang, and F. Xia, “Network
[56] K. S. Bharadwaj, S. Dharanikota, A. Honawad, and K. Chandrasekaran, embedding: Taxonomies, frameworks and applications,” Computer Sci-
“Blockchain Research and Applications: A Systematic Mapping Study,” ence Review, vol. 38, p. 100296, 2020.
IC-BCT 2019, pp. 141–159, 2020. [78] F. Xia, L. Liu, J. Li, A. M. Ahmed, L. T. Yang, and J. Ma, “Beeinfo:
[57] A. Tolba, “Content accessibility preference approach for improving Interest-based forwarding using artificial bee colony for socially aware
service optimality in internet of vehicles,” Computer Networks, vol. 152, networking,” IEEE Transactions on Vehicular Technology, vol. 64, no. 3,
pp. 78–86, 2019. pp. 1188–1200, 2014.
[58] W. Wang, F. Xia, H. Nie, Z. Chen, Z. Gong, X. Kong, and W. Wei, [79] D. Wu, X. Han, Z. Yang, and R. Wang, “Exploiting Transfer Learning for
“Vehicle trajectory clustering based on dynamic representation learning Emotion Recognition Under Cloud-Edge-Client Collaborations,” IEEE
of internet of vehicles,” IEEE Transactions on Intelligent Transportation Journal on Selected Areas in Communications, vol. 39, no. 2, pp. 479–
Systems, vol. 22, no. 6, pp. 3567–3576, 2020. 490, 2020.
[59] D. Sabella, A. Alleman, E. Liao, M. Filippou, Z. Ding, L. G. Baltar, [80] A. Sufian, C. You, and M. Dong, “A Deep Transfer Learning-based
S. Srikanteswara, K. Bhuyan, O. Oyman, G. Schatzberg et al., “Edge Edge Computing Method for Home Health Monitoring,” in 2021 55th
IEEE INTERNET OF THINGS JOURNAL 14
Annual Conference on Information Sciences and Systems (CISS), 2021, Technica Corviniensis-Bulletin of Engineering, vol. 13, no. 2, pp. 41–
pp. 1–6. 45, 2020.
[81] X. Liu, W. Yu, F. Liang, D. Griffith, and N. Golmie, “Toward Deep [99] H. Lee and C.-H. Cho, “Digital advertising: present and future
Transfer Learning in Industrial Internet of Things,” IEEE Internet of prospects,” International Journal of Advertising, vol. 39, no. 3, pp. 332–
Things Journal, vol. 8, no. 15, pp. 12 163–12 175, 2021. 341, 2020.
[82] Y. Zhou, M. Han, J. He, L. Liu, X. Xu, and X. Gao, “Abnormal Activity Xiangjie Kong (M’13-SM’17) received the B.Sc.
Detection in Edge Computing: A Transfer Learning Approach,” in 2020 and Ph.D. degrees from Zhejiang University,
International Conference on Computing, Networking and Communica- Hangzhou, China. He is currently a Professor with
tions (ICNC), 2020, pp. 107–111. College of Computer Science and Technology, Zhe-
[83] A. Sufian, A. Ghosh, A. S. Sadiq, and F. Smarandache, “A Survey on jiang University of Technology. Previously, he was
Deep Transfer Learning to Edge Computing for Mitigating the COVID- an Associate Professor with the School of Software,
19 Pandemic,” Journal of Systems Architecture, vol. 108, p. 101830, Dalian University of Technology, China. He has
2020. published over 160 scientific papers in international
[84] S. Islam, S. Badsha, S. Sengupta, H. La, I. Khalil, and M. Atiquzzaman, journals and conferences. His research interests in-
“Blockchain-Enabled Intelligent Vehicular Edge Computing,” IEEE Net- clude mobile computing, network science, and data
work, vol. 35, no. 3, pp. 125–131, 2021. science. He is a Senior Member of IEEE.
[85] T. Li, Y. Fang, Z. Jian, X. Xie, Y. Lu, and G. Wang, “ATOM:
architectural support and optimization mechanism for smart contract fast
update and execution in blockchain-based iot,” IEEE Internet Things J.,
vol. 9, no. 11, pp. 7959–7971, 2022.
[86] S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi, “Blockchain meets edge
Yuhan Wu received the B.Sc. degree in network en-
computing: A distributed and trusted authentication system,” IEEE
gineering from the Heilongjiang University, Harbin,
Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1972–1983,
China, in 2019. He is currently pursuing the master’s
2019.
degree with the School of Software, Dalian Uni-
[87] Y. Qu, L. Gao, T. H. Luan, Y. Xiang, S. Yu, B. Li, and G. Zheng,
versity of Technology, Dalian, China. His current
“Decentralized privacy using blockchain-enabled federated learning in
research interests include transfer learning, graph
fog computing,” IEEE Internet of Things Journal, vol. 7, no. 6, pp.
neural networks, and edge computing.
5171–5183, 2020.
[88] Y. Du, Z. Wang, and V. Leung, “Blockchain-Enabled Edge Intelligence
for IoT: Background, Emerging Trends and Open Issues,” Future Inter-
net, vol. 13, no. 2, p. 48, 2021.
[89] V. C. Leung, X. Wang, F. R. Yu, D. Niyato, T. Taleb, and S. Pack, “Guest
Editorial: Special Issue on Blockchain and Edge Computing Techniques
for Emerging IoT Applications,” IEEE Internet of Things Journal, vol. 8,
no. 4, pp. 2082–2086, 2021.
[90] A. Awad Abdellatif, L. Samara, A. Mohamed, A. Erbad, C. F. Chi- Hui Wang received the B.Sc. degree in cyber en-
asserini, M. Guizani, M. D. O’Connor, and J. Laughton, “MEdge-Chain: gineering from the Shandong Jianzhu University ,
Leveraging Edge Computing and Blockchain for Efficient Medical Data Jinan, China, in 2020. He is currently pursuing the
Exchange,” IEEE Internet of Things Journal, vol. 8, no. 21, pp. 15 762– master’s degree with the School of Software, Dalian
15 775, 2021. University of Technology, Dalian, China. His current
[91] J. Cao, W. Feng, N. Ge, and J. Lu, “Delay Characterization of Mobile- research interests include federated learning, graph
Edge Computing for 6G Time-Sensitive Services,” IEEE Internet of neural networks, and edge computing.
Things Journal, vol. 8, no. 5, pp. 3758–3773, 2020.
[92] H. H. H. Mahmoud, A. A. Amer, and T. Ismail, “6G: A compre-
hensive survey on technologies, applications, challenges, and research
problems,” Transactions on Emerging Telecommunications Technologies,
vol. 32, no. 4, p. e4233, 2021.
[93] X. Chen, M. Hou, T. Tang, A. Kaur, and F. Xia, “Digital twin mobility
profiling: A spatio-temporal graph learning approach,” in The 7th IEEE
International Conference on Data Science and Systems (DSS), Haikou, Feng Xia (M’07-SM’12) received the BSc and
China. IEEE, 2021. PhD degrees from Zhejiang University, Hangzhou,
[94] Z. Jiang, Y. Guo, and Z. Wang, “Digital twin to improve the virtual- China. He was Full Professor and Associate Dean
real integration of industrial IoT,” Journal of Industrial Information (Research) in School of Software, Dalian University
Integration, vol. 22, p. 100196, 2021. of Technology, China. He is Associate Professor
[95] P. Zhang, C. Wang, N. Kumar, C. Jiang, Q. Lu, K.-K. R. Choo, and and former Discipline Leader (IT) in Institute of
J. J. Rodrigues, “Artificial Intelligence Technologies for COVID-19-Like Innovation, Science and Sustainability, Federation
Epidemics: Methods and Challenges,” IEEE Network, vol. 35, no. 3, pp. University Australia. Dr. Xia has published 2 books
27–33, 2021. and over 300 scientific papers in international jour-
[96] A. R. Watson, R. Wah, and R. Thamman, “The Value of Remote nals and conferences (such as IEEE TAI, TKDE,
Monitoring for the COVID-19 Pandemic,” Telemedicine and e-Health, TNNLS, TBD, TCSS, TNSE, TETCI, TC, TMC,
vol. 26, no. 9, pp. 1110–1112, 2020. TPDS, TETC, THMS, TVT, TITS, TASE, ACM TKDD, TIST, TWEB,
[97] A. Biswas, A. Jain et al., “Survey on Edge Computing–Key Technology TOMM, WWW, AAAI, SIGIR, CIKM, JCDL, EMNLP, and INFOCOM). His
in Retail Industry,” in Computer Networks and Inventive Communication research interests include data science, artificial intelligence, graph learning,
Technologies. Springer, 2021, pp. 97–106. anomaly detection, and systems engineering. He is a Senior Member of IEEE
[98] P. Verma, “Edge computing: challenges for real time analytics,” Acta and ACM.