Perlustration into Multi-access Edge Computing: A Prospective Approach

  • Conference paper
  • First Online:
Intelligent Systems and Sustainable Computing (ICISSC 2022)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 363))

  • 152 Accesses

Abstract

As of today, the amount of information generated is beyond imagination as transactions are taking place in millions and trillions by people and the sensors connected over the internet. A comparable volume of data is generated just by people on daily basis. Large-scale applications have become part of our life because of the revolutionary paradigm, known as the Internet of Things (IoT). Intelligence equipped millions of devices are deployed in complex networks in order to provide functions such as communication, monitoring and control of critical infrastructure. Henceforth, this tremendous growth of IoT devices and the resulting massive amount of information that was generated at network edge has further strained the highly developed intrinsic cloud computing paradigm because of occupancy of bandwidth and resource constraints. Thus, Multi-access edge computing (MEC) has emerged as an upheaval methodology to bring storage and computation in the proximity of end user, leading to the so-called MEC-enabled IoT Multi-access edge computing. It is a sort of network-based design that hypothesizes IT service deployments in affiliation with cloud computing capabilities at the network edge. The goal of MEC is to diminish latency and at the same time to ensure efficient network operations and service delivery, along with enhanced customer experience. Multi-access edge computing (also known as mobile edge computing) anchorage mobility, cloud services, and edge computing to proffer and relocate application hosts from central data centers to the network edge. This brings dual benefit of applications closer to end users and compute services closer to application data. European Telecommunications Standards Institute (ETSI) is pioneer in creating the specialized standards both in terms of technical and architectural perspective for multi-access edge computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. ETSI-NFV-ISG. Network functions virtualisation (NFV) security: cataloguing security features in management software (2015), https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/002/01.01.01_60/gs_NFVSEC002v010101p.pdf. Accessed 16 May 2019

  2. G. Li et al., Fuzzy theory based security service chaining for sustainable mobile-edge computing. Mobile Inf. Syst. Art. no. 8098394 (2017). https://doi.org/10.1155/2017/8098394

  3. J. Ni, X. Lin, X.S. Shen, Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE J. Sel. Areas Commun. 36(3), 644–657 (2018)

    Article  Google Scholar 

  4. S. Lal, T. Taleb, A. Dutta, NFV: security threats and best practices. IEEE Commun. Mag. 55(8), 211–217 (2017)

    Article  Google Scholar 

  5. T. Kumar, P. Porambage, I. Ahmad, M. Liyanage, E. Harjula, M. Ylianttila, Securing gadget-free digital services. Computer 51(11), 66–77 (2018)

    Article  Google Scholar 

  6. J. Moura, D. Hutchison, Game theory for multi-access edge computing: Survey, use cases, and future trends. IEEE Commun. Surv. Tuts. 21(1), pp. 260–288, 1st Quart. (2018)

    Google Scholar 

  7. 5GPPP-Security-WG. 5G PPP phase 1 security landscape (2017), https://5g-ppp.eu/wp-content/uploads/2014/02/5G-PPP_WhitePaper_Phase-1-Security-Landscape_June-2017.pdf. Accessed 11 Nov 2019

  8. Y. Mao, C. You, J. Zhang, K. Huang, K.B. Letaief, A survey on mobile edge computing: the communication perspective. IEEE Commun. Surveys Tuts. 19(4), 2322–2358, 1st Quart. (2017)

    Google Scholar 

  9. P. Porambage, J. Okwuibe, M. Liyanage, M. Ylianttila, T. Taleb, Survey on multi-access edge computing for Internet of Things realization. IEEE Commun. Surv. Tuts. 20(4), 2961–2991, 4th Quart. (2018)

    Google Scholar 

  10. P.S. Ranaweera, M. Liyanage, A.D. Jurcut, Novel MEC based approaches for smart hospitals to Combat COVID-19 pandemic. IEEE Consum. Electron. Mag. 10(2), 80–91 (2021)

    Article  Google Scholar 

  11. Molina Zarca, J.B. Bernabe, R. Trapero, D. Rivera, J. Villalobos, A. Skarmeta, S. Bianchi, A. Zafeiropoulos, P. Gouvas, Security management architecture for NFV/SDN-aware IoT systems. IEEE Internet Things J. 6(5), 8005–8020 (2019)

    Google Scholar 

  12. C. Lorenz, D. Hock, J. Scherer, R. Durner, W. Kellerer, S. Gebert, N. Gray, T. Zinner, P. Tran-Gia, An SDN/NFV-enabled enterprise network architecture offering fine-grained security policy enforcement. IEEE Commun. Mag. 55(3), 217–223 (2017)

    Article  Google Scholar 

  13. C.K.M. Lee, Y.Z. Huo, S.Z. Zhang, K.K.H. Ng, Design of a smart manufacturing system with the application of multi-access edge computing and blockchain technology. IEEE Access 8, 28659–28667 (2020). X. Diao, J. Zheng, Y. Wu, Y. Cai, Joint computing resource, power, andchannelallocationsforD2D-assistedandNOMA-basedmobileedge computing. IEEE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. B. Jagannadha Rao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kavali, L.M., Kalpana, P., Srinivasa Naveen Kumar, G., Jagannadha Rao, D.B. (2023). Perlustration into Multi-access Edge Computing: A Prospective Approach. In: Reddy, V.S., Prasad, V.K., Wang, J., Rao Dasari, N.M. (eds) Intelligent Systems and Sustainable Computing. ICISSC 2022. Smart Innovation, Systems and Technologies, vol 363. Springer, Singapore. https://doi.org/10.1007/978-981-99-4717-1_47

Download citation

Publish with us

Policies and ethics

Navigation