Information-Centric Networking With Edge Computing For Iot: Research Challenges and Future Directions
Information-Centric Networking With Edge Computing For Iot: Research Challenges and Future Directions
net/publication/329391382
CITATIONS READS
68 4,937
3 authors:
Byung-Seo Kim
Hongik University at Sejong Campus
132 PUBLICATIONS 2,016 CITATIONS
SEE PROFILE
All content following this page was uploaded by Rehmat Ullah on 18 December 2018.
Received November 20, 2018, accepted November 28, 2018, date of publication December 3, 2018,
date of current version December 27, 2018.
Digital Object Identifier 10.1109/ACCESS.2018.2884536
ABSTRACT Cloud computing is a paradigm that offers storage, computation, and software services on
demand in the Cloud and far from end users. These services and computations are then extended to the Edge
of the network with the Edge computing paradigm. This paradigm offers computation, data, and application
services in close proximity of end users. Future Internet architectures will result in a fast information
response time, and low latency will be a main feature of evolving 5th generation (5G) radio networks.
To ensure the widespread adoption of 5G applications, low latency, security, mobility, and scalable content
distribution support is required. Information-centric networking (ICN) is a newly proposed future Internet
paradigm in which communication is based on content names irrespective of their locations. At the same
time, ICN promises efficient content delivery, mobility support, scalability, and security for content. The
Edge computing and ICN provide an opportunity to reduce latency, support mobility, security, and scalability.
In this paper, discussions on Edge computing with ICN are provided. In detail, the Edge computing proposals,
use cases, differences among Edge computing proposals and drivers for Edge computing are investigated.
The Edge computing standardization, research, and industry/vendors collaboration overview are studied.
Applications of ICN integration in Edge computing and their advantages and limitations are highlighted.
We conclude our paper by describing potential directions for future research in the field of ICN over Edge
computing.
INDEX TERMS Internet of things, Information centric networking, cloud computing, edge computing,
caching, naming, ICN-IoT security services, self-certification, location-awareness, offloading, latency.
requires increase capacity and lower latency. Edge some specific Edge location near to the subscribers. Appli-
computing will be useful in reducing the latency which cations with highly fluctuating network loads, a mobile Edge
is introduced by the backhaul. Physical distance of will definitely maximize the performance. However, shifting
backhaul result in high latency. To maximize the uti- Edge location according to the traffic characteristic is quite
lization of existing resources, Edge computing can play difficult to achieve [18].
a major role [18]. We explained the Edge computing paradigm so far. Con-
2) Using Edge computing the operators would move all sequently, we will explain different proposals related to the
the centralized hardware near to the end user(s). This Edge computing paradigm. A taxonomy of Edge computing
would result in the reduction of latency and efficient is shown in Figure 3.
utilization of bandwidth [18].
3) The benefits such as lower latency, location awareness, III. EDGE COMPUTING PROPOSALS
security and reduction in the core network traffic can be In this section, we will discuss in detail about various pro-
achieved if the Edge location is chosen appropriately posals which comes under the umbrella of Edge comput-
and right content is stored at the Edge. In case these ing paradigm. Initially we will discuss about Mobile Cloud
conditions are not met, the cost and complication may Computing (MCC), since it is the first initiatives in Edge
be increased with high price. computing, and then consequently we will discuss other Edge
4) Traffic is increasing day by day specifically video traf- computing proposals.
fic than other traffic. According to Cisco, video traffic
is 60% today, and would be 78% by 2021 [19]. Accord- A. MOBILE CLOUD COMPUTING
ing to estimates of Ericsson, the video traffic was 50% Due to proliferation of the mobile devices, mobile com-
in 2016, and would likely increase to 75% in 2022 [20]. puting terminologies have appeared to provide services to
Video has become an integral component of social mobile users. Mobile devices have limited resources and
media. The enormous increase and use of video traffic cannot provide demanded benefits and services to users.
give an important role to latency to showcase the user Nowadays, while mobile devices are rich in resources, they
experience. Therefore, the video traffic has been one of cannot still reach to the level of servers [21], [27]. Due to
the key drivers for Edge computing resource-constrained nature, mobile devices need to offload
tasks to cloud data centers for empowering various oper-
C. IMPORTANCE OF EDGE LOCATION ations. MCC offers offloading mechanism for the mobile
The most crucial question so far is: where exactly the location devices by integrating mobile Internet, mobile computing,
of Edge is.? From the Edge, we are meaning that process- and CC into a combined system [21]. CC is a service model
ing, storage, and control units move to the server(s) which where computing services are delivered over a network on
are located at the Edge of the network. However, it is very demand independently from device type and location [22].
important to determine the potential Edge locations. Edge MCC facilitate the offloading process in a distributed way
location can bring performance improvement and financial from a computer to a centralized server. MCC provides
benefits to the service providers and stakeholders. If the resources in terms of storage and computation to mobile
Edge location is too far from the centralized core and too users. This goal can be accomplished by bringing resources
close to the subscriber, the Edge computing may become closer to the proximity of end users [7]. Hence, Edge servers
expensive and complex. Edge location may vary according would improve the performance of MCC environments in
to application requirements. All the location-based contents terms of energy consumption, latency, and congestion. Some
should be hosted at some aggregation point. For example, of the motivations of MCC are given as follows [23]:
the services providers can choose an Edge location based 1) To prolong the network life time in term of energy
on the subscriber’s interest of videos. All the videos which consumption
are highly requested by subscribers should be cached at 2) Diverse application services
B. CLOUDLET
Cloudlet [25] has been introduced as an extension of MCC
and is considered as one of the keys enabling technologies for
MCC [26]. Cloudlet is a part of MCC that overcomes the high
WAN latencies. Offloading to the cloud is not always a solu-
tion, because of high WAN latencies. Real-time applications FIGURE 5. An example of Cloudlet [78].
need low latency and may not be achieved by offloading tasks
to the cloud. Tasks running on mobile devices may require
high computation and lower latency. However, the limitation Figure 6 depicts the Cloudlet reference architecture. The
of mobile device cannot fulfil these requirements. Therefore, main elements of the architecture are Mobile Client and
to provide computation power and to meet lower latency Cloudlet Host. A Discovery Service is a component run-
requirements, these tasks can be offloaded to the Cloudlet ning in the Cloudlet host and publishes Cloudlet meta-
instead of Cloud servers. Cloudlet is kind of small cloud data (IP address and port number). The mobile client uses
server located between mobile device and central cloud. IP address and port number for the specification of Cloudlet
Cloudlets are placed nearby to mobile devices with single- and to offload the computation. Once the Cloudlet is deter-
hop proximity and works as virtual-machine (VM). In the ini- mined for offloading, the mobile client sends the application
tialization phase, the framework requires the cloning (replica) code to the Cloudlet server. The Cloudlet server deploys the
of the mobile device application processing environment to a application code in the guest VM. Once deployment is done,
remote host. The entire application is offloaded using VM as the execution of the application is launched.
an offloading mechanism. The VM isolates the guest software Cloud servers are accessible via WAN technologies that
from the actual Cloudlet environment. The mobile device causes the latency issues for some applications. To overcome
serves just as user interface, whereas the actual applica- the latency issue in WANs, Cloudlet can be used by offloading
tion processing is performed on the Cloudlet infrastructure. mechanisms to nearby Cloudlet. Moreover, issues like energy
Figure 5 illustrates, that Cloudlets are distributed Internet can be addressed by Cloudlet [28]. Energy can be saved by
infrastructure components. Instead of accessing the distant offloading all the tasks to nearby resource rich Cloudlet rather
cloud servers, the nearby mobile devices can exploit the stor- than sending to the main cloud. Bandwidth is also a factor of
age and computation resources of Cloudlets. Such Cloudlets delay. Cloudlet could also help regarding bandwidth because
are deployed at public places such as coffee shops. wireless LAN bandwidth is typically two orders of magnitude
delay and high response time. Using Edge computing at base A. DEPLOYMENT LOCATION
station brings computation capability, and cache capability at The specifications of MEC states that MEC servers should
the Edge of network in close proximity to end users. be co-located with the cellular network base station. On the
other hand, Fog servers are generally provided by private
F. NO LONGER MOBILE EDGE COMPUTING environment such as shopkeeper etc. However, they can be
As previously discussed the term MEC was coined by ETSI deployed as routers and gateways in Internet service provider
in 2014 with a white paper authored by Huawei, IBM, Intel, (ISP) infrastructure. Cloudlet can be deployed in a distributed
Nokia, NTT DOCOMO, and Vodafone [50]. ETSI main way. Said otherwise, there is not exact location or vendor
objective is to shift storage, processing, and control to the for the deployment of Cloudlets. MEC server is reachable
Edge of network. While the term specifically referred to via third generation/Long-Term Evolution (3G/LTE) base
mobile networks initially, now ETSI’s scope covers both station. Therefore, MEC has the largest coverage area among
mobile and fixed networks. The MEC acronym no longer the Edge computing proposals. However, Fog servers and
refers to ‘‘Mobile Edge Computing’’ and instead stands Cloudlets are accessible via wireless access point (AP) whose
for ‘‘Multiple-access Edge Computing’’ [18]. The extension coverage area is much smaller than 3G/LTE. Mostly the
includes non-cellular technologies and now Wi-Fi is included Cloudlet study emphasis on Wi-Fi as an access technology.
within MEC’s scope. Most of the mobile operators uses Wi-Fi However, Cloudlet is not limited and can be applied in other
and most of the traffic accounts for Wi-Fi network on mobile wireless technologies [50]. Furthermore, Worldwide Interop-
devices. Hence, this is a very good inclusion for mobile erability for Microwave Access (WiMAX), is also supported
networks. by Cloudlet and may be utilized for communication between
Cloudlets [52]. Due to technological enhancement in cellu-
1) MEC PROGRESS SO FAR lar networks, the operators emphasis on MEC technology.
The ETSI MEC progress is illustrated in Figure 10. The In other words, future cellular networks are more commonly
basic specifications are released by MEC during the first referred to MEC instead of any other Edge Computing pro-
stage (2015-2017). During the second terms (2017-2018) posal. Hence, for cellular networks, MEC is the de-facto Edge
the agenda was to extend it to mobile networks and to computing technology. The reason is that Cloudlet and Fog
strengthen the collaboration with other Edge computing ini- computing have short range communication such as Blue-
tiatives. Along with the standardization and industry body dif- tooth and Wi-Fi and hence cannot reach to the level of MEC.
ferent business and deployment models should be explored,
such a private owners, enterprises, and providers. Enhance- B. DEVICES AND USERS
ments in QoE are very important. From 2018 onwards the Mostly studies related to Edge computing specifically Fog
ETSI planned to deploy MEC across different operators. computing addresses the use cases of IoT and vehicle-to-
However, in practical it shall take time before commercial vehicle (V2V) communication. For this reason, the users
release [18], [19]. and devices in Fog computing is expected higher than the
Cloudlet. However, Cloudlet covers the IoT devices but not
IV. DIFFERENCES BETWEEN EDGE COMPUTING V2V communication. The users of MEC is much smaller
PROPOSALS because MEC only focuses on subscribers and providers in
In the previous sections, we discussed in detail about Edge cellular environment.
computing proposals. Since the vital role of Edge computing
is to bring computational resources to the Edge of network. C. TRAFFIC PATTERNS
However, implementation specification differs at different Due to huge number of users served in IoT and the traffic
aspects for each proposal. In this section, we discuss the key generated from all the users and diverse devices affect the
differences among all Edge computing proposals in depth. traffic patterns at the Edge eventually. The traffic or data gen-
The fundamental objective of MEC is exploiting the capac- erated from Fog enabled servers and Cloudlet are continues
ity of conventional cloud at the Edge for accomplishing data generated from sensors while the traffic of MEC servers
TABLE 2. Features comparison of conventional cloud systems and edge computing proposals.
are intendment and non-continuous. The reason is the pricing ETSI Industry Specification Groups (ISGs)and MEC Proof of
polices and targeted use cases of cellular networks [54]. Concept (PoC) Framework [55].
Edge computing use cases varies due to users, server
deployment and vendors. The main objective of Cloudlet is
D. DEPLOYMENT COST
to reduce the delay for real-time applications such as AR/VR.
Deployment cost is also one of the key factors that varies in
A set of use cases and scenarios has been introduced by ETSI
each proposal. MEC servers is located at the base stations
ISGs in the Group Specification (GS MEC-IEG 004) [49] to
and the cost of server deployment at the base stations are
showcase the role of MEC for the improvement of QoS.
expensive than Cloudlet. The cost of Fog servers is not higher
than MEC because of available devices such as a wireless
V. EDGE COMPUTING USE CASES
AP and a router etc. [43]. Therefore, the Fog server(s) result
This section aims at the protentional benefits of Edge
in a minimum deployment cost than other Edge computing
servers in real-life implementations. In following subsec-
proposals.
tions, we discuss the use cases given in the Edge computing
literature.
E. NUMBER OF SERVERS
MEC servers can be installed at the base stations and hence A. COGNITIVE ASSISTANCE
server density is limited to the base stations. While the Cloudlet is used as an enabler for the real time cognitive
Cloudlet can be installed at any public place such as coffee assistance applications that runs on wearable devices such
shop, shopping mall and restaurants etc. Cloudlets mostly as smart glasses [50]. The main objective of Cloudlet in
uses wireless local area network (WLAN) as an access tech- cognitive assistance is to accomplish task with low response
nology. Therefore, the density of Cloudlet is much higher than time. A Cloudlet framework has been proposed in [57] as a
other Edge computing proposals. Fog server(s) deployment practical implementation.
is average and cannot be installed everywhere like Cloudlet.
The comparison of conventional cloud systems and Edge B. BODY AREA NETWORKS (BANs)
computing has been shown in Table 2. The fundamental role of a BAN is to monitor the collected
In order to enable MEC in innovative use cases, several data with low latency [58]. A huge amount of data is gener-
organizations provide implementations in accordance with ated in BAN that need storage and computational resources.
Moreover, the data which has been generated in BAN is life monitoring system in which the sensors data are transferred
critical and need to be monitored in real-time. The collected to the sink node(s). The data is processed and then transferred
data can be stored and analyzed with low response time to the Cloudlet. A huge amount of diverse data is generated by
using Cloudlet and Fog computing. A huge amount of data IoT devices that need to be aggregated. Cloudlet can be used
is uploaded by sensors in the case of electrocardiography for IoT environments since Cloudlet services can interact
(ECG). In case of instant processing of ECG data, the Fog with IoT devices [4].
servers can be used to process the collected data with low
response time. The data is collected by Fog servers and G. VIDEO ANALYSIS
various operations could be performed such as data filtering Low latency and jitter are required mostly in video steaming.
and data aggregation [59]. This can be achieved by enabling services at the Edge instead
of centralized servers to eliminate the WAN congestion. For
C. HOSTILE ENVIRONMENTS instance, if Fog server is deployed inside a bus or train then
The data generated by sensors in hostile environments such video streaming with low latency can be provided using
as war can be compromised [60] In order to detect adversaries Wi-Fi [43]. Fog servers are storage capable and have com-
in hostile environments, Fog servers can be used to analyze putational resources to analyze video steams [68] . The video
the sensed data of sensors with low latency [61]. processing tasks can be offloaded to the Cloudlet to minimize
delay and jitter to a certain threshold. Moreover, Cloudlet can
D. LANGUAGE PROCESSING also be used in stadiums to replay the video for audience.
Language processing applications required large resources In stadium thousands of users request the video at a time
and continues Internet connection for the better processing and hence resulting in congestion. Therefore, Cloudlet or Fog
of real-time processing [62]. Mobile devices are not good node can be used to offer video streaming services at the Edge
enough to provide all these resources because of limited and closer to users to mitigate the congestion.
capacity. Cloudlet can be used to lower the load on mobile
devices and to provide all the necessary resources. The H. AUGMENTED REALITY
Cloudlet eliminate the WAN for all Cloudlet enabled appli- The proliferation of smart phones and wearable devices
cations. An application named Android smartwatch has been such as smart glasses boosted the popularity of AR appli-
implemented which transfers the collected speech data to the cations [68]. These smart devices are not capable of
Fog servers to be processed [63]. After processing at Fog handling computational complexity. Cloud Computing is bet-
servers, the data is transferred to the cloud servers for further ter option for providing computational power and storage
analysis. capacity. However, AR applications are latency sensitive, and
traditional cloud systems cannot fulfil the required latency
E. SMART GRID NETWORKS requirements. Therefore, Fog computing can be used to fulfil
The Edge computing may be used for the smart grid networks. these requirements such as an increased throughput and lower
In case of Advanced Metering Infrastructures (AMI) the data latency.
may be categorized in different classes such as normal data Let us take an example scenario which takes inspiration
and real-time data [64]. Normal data is transferred periodi- from the pervasive AR scenarios mentioned at [69] and [70].
cally and do not need real-time interactions. In case of real- This example scenario explains the pervasive AR between
time situation such as alarming situation in a grid, the data Carlos and Sally and is discussed as follows.
need to be processed with minimum latency in order to pre- Carlos is informed by his voice assistant to meet Sally and
vent the fire hazards. Therefore, the Fog computing may be then he moves towards his self- driving car. His smart glasses
utilized for load balancing in such cases. Smart grid works mapped the destination map and time of arrival. Upon reach-
on multi-tier architecture and needs both Fog and Cloud ing the destined location, Carlos steps out from his car and
architecture [37]. Main Cloud servers provide services for entered into a busy market. His face identification application
storing the data for months and years and for analyzing large identified Sally in the crowd. Both Carlos and Sally met at a
amount of data. Local data can be processed by Fog nodes as specific location and after meeting their glasses make a visual
well as MEC server(s) [65]. route towards a nearest cafe. Right at this time, Carlos and
Sally both receives an alert message about major earthquake
F. WIRELESS SENSOR NETWORKS AND IoT to happen. After the alert message, the most structurally
Wireless sensors are resource constrained in terms of storage strong spots are highlighted to them within the building, and
and computation resources and unable to perform complex they run toward nearest spots. As the power goes out and
functions except sensing and relaying data [37]. Fog com- parts of the building collapse, Carlos and Sally get separated,
puting can overcome the storage and computation limitations trapped in separate parts of the building. Existing sensors
by offloading user’s tasks. Moreover, wireless networks have connect with their glasses and now visually displayed as
interoperability problems because of heterogenous environ- places where first responders can access video and audio
ments. This problem can also be solved by deploying hetero- feeds. Both Carlos and Sally wait trapped under the rubble
geneous Fog nodes [66]. CitySee [67] is an environmental for the first responders to arrive [70].
In the above scenario, the services are offered with con- the network. Exiting TCP/IP-based solutions have some
tinuous context changing, from Carlos leaving his home, weaknesses when designed to support cloud services at the
to getting into the car, to meeting Sally, experiencing the Edge of network.
earthquake, and reconnecting with her. In this scenario, when Therefore, following are some of the limitations of
the earthquake occurs, pervasive AR is able to operate even TCP-IP based solutions for Edge computing and is discussed
the infrastructure is failed and the local resources has been as follows:
compromised. Therefore, the key requirement such applica-
tions is fast information response time which is unable to A. LATENCY
achieve with the existing host-oriented approach. Therefore, TCP-IP-based approach creates unacceptable latency
it is important to introduce emerging and innovative architec- for many latency-critical mobile applications such as
tural and networking paradigms to accommodate such latency autonomous driving, Realtime online gaming, VR, AR, Tac-
requirements. tile Internet etc. Such applications may require tactile speed
with latency approaching 1ms. Latency cannot be avoided,
I. CONNECTED VEHICLES AND SMART TRAFFIC LIGHTS
of course. However, it can be precisely measured, understood,
High mobility and unreliable wireless connection are the and managed in order to minimize its impact on QoE and
main reasons that affects vehicular communication [70]. The network performance [97].
performance can be improved by installing Fog technol-
ogy for communication between vehicles. Moreover, Fog
B. LACK OF BUILT-IN MECHANISMS TO DISCOVER
technology can also be used in smart cities such as smart
POTENTIAL PROVIDERS
lights to avoid the accidents by communication with each
other [4]. In addition, in road traffic signals scenario a video TCP-IP-based cloud platforms typically implement a Rep-
system can detect an ambulance and can change the traf- resentational State Transfer (REST) model to access cloud
fic lights for opening a way for ambulance. To avoid the resources through Hyper Text Transfer Protocol (HTTP).
road hazards and traffic congestion, an instant communi- HTTP uses Uniform Resource Identifiers (URIs) to identify
cation is needed with the driver of vehicle. Therefore, the the resources via Resource Discovery. When the resource
MEC technology can be used to provide roadside information discovery servers are not available then multicast DNS can be
to travelers by cooperating with sensors [55]. The sensors used for service discovery. The reason is that network layer
at the roadside senses the data and then transfer to MEC and transport layer in TCP/IP are unable to autonomously
servers for further processing. This collected data can be discover the resources defined by the application-layer names
pass on to other vehicles in the range. Using MEC technol- and do not allow application semantics into network layer
ogy the vehicle drivers can be informed of traffic conges- packets. This can be done by moving some of the functionali-
tion, accidents and other road hazards. Beside advantages ties implemented at the application layer (e.g., REST-related)
of MEC in vehicular communication, there are many secu- to the network layer [98].
rity issues such as reporting of fake data by vehicles, trust
and user privacy etc. [71], [72]. Therefore, security and C. DYNAMIC PLACEMENT OF APPLICATIONS AT EDGE
privacy should be considered for the protection of user’s NODES
data [73]. Dynamic placement of applications at Edge nodes and reso-
Even though the Edge computing offer better performances lution of requests to those nodes is a problem in EC. Further-
than cloud, however there are some limitations that needs more, the application software’s that run Edge computation
to be addressed. In the next section, we will discuss the must be first downloaded on the Edge-node, while mobile
limitations of Edge computing. clients request for resources from different locations. Mobil-
ity as well as diversity in user demand makes it very difficult
VI. LIMITATIONS OF EDGE COMPUTING to predict which functions would be requested in the future
The EC paradigm brings computational resources, stor- and from where in the network [99].
age and services from the cloud to the Edge of the net- In recent years ICN was proposed which addresses data
work and therefore closer to the consumers, in order to directly using content identifiers, instead of addressing the
reduce latency. Examples for such capabilities are resources host in the network. This fact allows mobility support
for computational-intensive and time-sensitive opera- by nature, while not maintaining network addresses of
tions or flexible deployment of applications and services. hosts. Moreover, it facilitates features such as in-network
However, the Edge Computing approaches (Specifically processing and caching of data. Therefore, to overcome
Multiple access Edge Computing) is based on virtual the above-mentioned issues, ICN in Edge computing is
machines (VM) and totally based on the host-centric net- promising.
working model (TCP/IP approach). This creates challenges We have discussed Edge computing in depth so far. In the
in data dissemination between the highly mobile users next section, we will discuss the futuristic paradigm called
as well as the addressing issues of domain name sys- ICN that would be used as deployment strategy for Edge
tems (DNS) due to nodes constantly joining and leaving computing.
users the bandwidth will not be affected too much unlike difficult to express only through simple expressions and
unicasting. Therefore, using ICN over Edge computing we acquiring additional function code.
could utilize the bandwidth affectively. In [123], Named Function as a Service (NFaaS) has
been proposed that supports more sophisticated processing
9) BUILT-IN MOBILITY SUPPORT with lightweight virtual machines in the form of named
Consumer Mobility is a built-in feature of ICN due to receiver unikernels. The unikernels are actually the functions/codes.
driven and connectionless data communication nature. When In NDN the content is cached in the Content Store. However,
an end device moves to a new location, it simply needs to in NFaaS an additional data structure call Kernel store has
re-express request for its interested data. However, support been introduced. Every node contains Kernel Store that stores
for producer mobility is still a research problem in ICN. the unikernels. The Kernel store is responsible not only for
Some networks are highly mobile, such as vehicular net- storing functions, but also for making decisions on which
works (VNs). Therefore, if mobile users can only receive functions to run locally. Since the Kernel Store has lots of
the content from the provider (original server), then the functions and which functions to download locally to the node
connection can be lost during the mobility of users. Due is calculated by score function. The score function score all
to interruptions in connectivity, users will re-request the the popular function that is requested more frequently and
content from original server. In ICN the mobility feature the main goal of score function is to identify the uniker-
is inherently supported. The devices can directly commu- nels/functions that are worth downloading locally into the
nicate using service names instead of specific host such as node’s memory.
Netflix.com or Youtube.com. Services are provided by the Amade et al. [2] extended the NDN architecture to turn the
network and does not rely on end to end communication. network edge into a dynamic computing in the IoT domain.
ICN caching provides a copy of the content to all users and The proposed scheme performs distributed in-network
hence mobile users no longer make requests of the original IoT data processing at the network edge, by relying on NDN
server. Therefore, if the mobile users keep moving in network augmentation and named computations. This scheme also
as in VN, then content can be obtained from the nearest cache performs the dynamic execution of services, according to the
instead of going to the original server. Hence, a reduction interests popularity function. In the proposed scheme authors
in delay and support for mobility is achieved. Moreover, have performed minor modification of legacy NDN and used
ICN offers heterogeneous wireless support where mobile a naming scheme that identifies IoT contents and services
devices should be able to transparently use a variety of com- without affecting the NDN routing.
munication technologies [105]. Amadeo et al. [125] proposed an NDN based scheme call
NDNe (NDN at the edge) that supports cloudification at the
edge. In NDNe the existing NDN packet is extended and
B. FEASIBILITY OF ICN DEPLOYMENT ON EDGE
names are used to address, not only ‘‘contents’’, but also
The traditional Internet is based on TCP/IP (host oriented) to identify different types of cloud service (e.g., storage,
network model. Therefore, to replace the TCP/IP model with computation, etc.)
ICN is impractical. However, there is a way to deploy the
ICN partially or overlay such as ICN over IP or IP over ICN. VIII. APPLICATIONS OF ICN INTEGRATION IN EDGE
Deploying ICN on edge service not only can help to miti- COMPUTING
gate the ICN whole-network deployment complexity, but also Future networks such as 5G will result in data rates of multi
makes the network model more flexible. The combination of gigabits per second and will support the scalability of devices.
ICN and EC is able to offer a great combo and such approach 5G systems will support real-time networks to deliver real-
may result in maximum performance. time controls. Latency is the fundamental unit of 5G systems,
and thus the target is to enable low-latency applications such
C. RELATED WORKS ABOUT ICN OVER EDGE COMPUTING as Tactile Internet, autonomous driving, industrial robotics,
There has been no focused attempt to adjust existing pro- and VR/AR applications. All these requirements cannot
posals for Information-Centric Networks to support edge be fulfilled by the existing TCP/IP approach due to host-
computing with the exception of few related works which are oriented approach and fall short for such applications. Indeed,
discussed as follows. ICN principles can directly address the above challenges.
Sifalakis et al. [100] proposed a pioneering scheme call In ICN network, the content is cached along the path. There-
‘‘Named Function Networking’’ (NFN) for the extension of fore, the requested content can be from the source node or the
NDN to the edge computing. In NFN, the name field of inter- other content caching nodes thereby reducing latency. Instead
est packet carry the name of the content as well as expressions of binding security to host node, ICN advocates the security
for named functions. The network is in-charge of computing model for the content. This model focuses more on securing
the result and resolving the forwarding plane of NDN. How- the content not the channel. Moreover, consumer mobility is
ever, NFN is constrained by the number of services/functions natively supported in ICN architecture. In 5G application it
it can support. In many scenarios, nodes require more is possible to have frequent handover events. Since ICN can
sophisticated processing, custom code and libraries, which is natively support mobility through its content-centric design
and stateful forwarding plane, Therefore, an ICN solution in AR, dynamic content is visualized compared with today’s
for consumer mobility would be more appropriate. In addi- static augmentation [87].
tion, 5G networks are expected to utilize multiple interfaces. The existing AR applications are built upon TCP/IP
ICN offers heterogeneous wireless support where mobile protocol stack and rely on cloud computation. To enable
devices should be able to transparently use a variety of com- pervasive AR applications, it is important to explore new
munication technologies simultaneously. computing paradigms, new approaches such as ICN to net-
Following subsections details some of the 5G applications work communications. Though the existing AR applications
as follows: bring utility in specific domains, their reliance on cloud ser-
vice may limit the potentials of AR [89]. Therefore, Edge
A. TACTILE INTERNET computing paradigms, within physical vicinity, could achieve
Low latency and the highest reliability of data with more the required low latency while protecting user privacy. Edge
security for real-time systems, such as real-time gaming, computing paradigms are important in accomplishing perva-
industrial automation etc., will be provided by Tactile Inter- sive AR. To support Edge computing, ICN, can be introduced
net [12]. 5G wireless solutions will fulfil the requirements that how ICN could address the requirements of resource
of wireless communication for 2020 and beyond. There- discovery, multicast support for context-content exchange,
fore, 5G is predictable to support the Tactile Internet at and experimentation with user experience.
the Edge of wireless networks. To reduce the latency and These applications will drive the ICN and Edge computing
bandwidth requirements, content will need to be either local- design in terms of latency, performance, and scalability and
ized or pushed to the Edge of networks [86]. would prove the importance of ICN in Edge computing. The
ICN naming mechanism may result in lower signaling costs
B. INDUSTRIAL AUTOMATION in content retrieval [89].
Various control processes exist and require different data This article intends to show ICN as an important deploy-
rates, reliability, security, and latency [87]. Automation ment strategy for the utilization of ICN mechanisms and
industry applications will be driven by 5G systems. Cur- their key benefits in such environments of Edge computing.
rently, the wired industrial Ethernet is used to control pro- ICN can be beneficial, allowing new concepts to be devel-
cesses. Wireless systems adoption is necessary for flexible oped based on named requests, caching, any-casting, and new
production, which requires guaranteed reliability and low applications to be created, as a true future Internet paradigm.
latency [88].
IX. STANDARDIZATION ACTIVITIES
C. AUTONOMOUS DRIVING Many academic, industry and standard organizations are
Within the context of 5G, autonomous driving is discussed working to address various research topics in Edge net-
as a new phase in mobility. Today’s applications require works and ICN. In the United States, these programs come
latency to be less than 10ms for vehicle safety to avoid under the National Science Foundation (NSF) Future Internet
collisions. Therefore, if the bi-directional data exchange for Architecture initiative (e.g., CCN, NDN, Mobility First, Xia).
the movement in autonomous driving is considered, a latency In Europe, they are under the European Union (EU) Frame-
of millisecond will likely be desired [87]. Highly reliable work programs (through H2020).
and proactive behavior is thus needed in future 5G com- ETSI plays a vital role in the development and imple-
munication systems. However, ICN with Edge computing mentation of telecommunication standards. ETSI is currently
could solve the issue of latency and mobility for autonomous working on the development of standards relating to cloud.
driving. The work of ETSI MEC aims to provide IT and CC capa-
bilities within the RAN. MEC shall enable applications and
D. INDUSTRIAL ROBOTICS services to be hosted on the base station. These applications
Autonomous robotics may react in an irregular manner if and services can benefit from being in close proximity to the
real-time communication fails. Therefore, it may lead to an customer and from receiving local radio-network contextual
unwanted behavior. There are many scenarios in the manu- information [2].
facturing of robotics that necessitate a maximum delay target The ETSI MEC ISG was founded in December 2014 and
of 100µ s and round-trip reaction time of 1ms [88]. In order to the purpose of the ISG is to create a standardized, open
provide such latency, it is of upmost importance to bring the environment which will allow the efficient and seamless inte-
content and resources closer to the user. Moreover, integration gration of applications from vendors, service providers, and
of ICN with Edge computing is a promising approach for third-parties across multi-vendor MEC platforms.
providing real-time communication. MEC ISG has been published the following specifications
so far [56]:
E. VIRTUAL AND AUGMENTED REALITY 1) Foundation specification GS MEC 001 MEC Terminol-
Tactile Internet can prove helpful for VR and AR appli- ogy (2016-03)
cations. Many users mutually perform tasks by perceiving 2) Foundation specification GS MEC 002 MEC; Techni-
objects using simulation tools in VR. On the other hand, cal Requirements (2016-03)
3) Foundation specification GS MEC 003 MEC; Frame- Next Generation Mobile Networks (NGMN) published a
work and Reference Architecture (2016-03) 5G white paper [85] in March 2015. The paper provides
4) GS MEC-IEG 004 MEC; Service Scenarios (2015-11) requirements for 5G and encourages the adoption of new
5) GS MEC-IEG 005 MEC; Proof of Concept Framework emerging technologies. ICN is one of the technology building
(2015-08) blocks considered by NGMN. ICN is described as having
In [79] and [80], Edge computing is demonstrated using the potential to migrate from a host-centric and node centric
OpenStack to bring the cloud closer to the mobile Edge. The model to a content-centric, data-oriented and information-
Open Edge Computing project [31] was created in 2015 to centric model with an intrinsic focus on named information
facilitate prototyping applications that can take advantage objects in network caching and name-based routing.
of Edge computing and engaging with relevant development
communities. X. VENDOR SOLUTIONS
Open Fog Consortium (OpenFog) is founded in In this section, we will discuss about vendors which are
November 2015 by a major industry movers and leading working on the Edge computing solutions. This subsection
academic institutions. The OpenFog Consortium [40] was explains the up to date hardware and software solution related
founded by the following technology industry leaders: ARM, to the Edge computing paradigm so far at the time of writing
Cisco, Dell, Intel, Microsoft and Princeton University in this survey paper.
order to solve the bandwidth, latency and communications
challenges associated with the IoT, Artificial Intelligence,
A. ADLINK TECHNOLOGY
Robotics, the Tactile Internet and other advanced concepts.
3rd Generation Partnership Project (3GPP) [80] recently ADLINK technology [106] is working towards hardware
started the NextGen study item, which aims at defining solutions for Edge devices which are capable of Fog comput-
the 5G system architecture. ICN is not yet being explicitly ing and MEC features. Recently a product has been launched
addressed as a dedicated payload type in the 3GPP system. by ADLINK called SETO-1000 [96] which is a part of the
This is partly due to the fact that the related work on defining MEC architecture. SET0-1000 is designed with the aim to
the ICN protocol and the related mechanisms in Internet provide networking solutions in extreme outdoor environ-
Research Task Force (IRTF) and Internet Engineering Task ment. It is providing CC features within the RAN closer
Force (IETF) are still ongoing. to mobile users. The platform consisting of storage capac-
The key enabler for many ICN use cases is the ability to ity, accessibility to real-time radio and network information.
deploy ICN routers close to the radio network. Information- Moreover, it reduces the backhaul cost and increase network
Centric Research Group (ICNRG) was formed to identify efficiency in terms of delay and bandwidth since the data is
outstanding research challenges for ICN, and to couple processed at the Edge.
ongoing ICN research with solutions that are relevant and ADLINK is a Premier Member of the Intel Inter-
appropriate for evolving the Internet at large [81]. The net of Things Solutions Alliance. Moreover, ADLINK is
work in the ICNRG (in the form of Informational Request contributing in many standardization projects, including
for comments (RFCs), meeting contributions, etc.) is com- Open Compute Project (OCP), ETSI MEC , Network function
pletely documented and accessible through its website at virtualization (NFV), OpenFog Consortium, Telecom Infra
https://trac.tools.ietf.org/group/irtf/trac/wiki/icnrg. Project (TIP), the PCI Industrial Computer Manufacturers
ITU Telecommunication Standardization Sector (ITU-T) Group (PICMG), the PXI Systems Alliance (PXISA) and the
created a group IMT-2020 [82] to study how emerging 5G Standardization Group for Embedded Technologies (SGET).
technologies will interact in future networks. This group
also included studies on high-level network architecture. The B. ADVANTECH
Alliance for Telecommunications Industry Solutions (ATIS) Advantech [107] enables MEC and OpenFog deployments by
board initiated a committee to investigate the Evolution to providing hardware solutions at the outer Edge, and pushes
Content Optimized Networks (eCON) [83]. Although not the processing, storage to the far Edge. Recently, Packetarium
exclusively focused on ICN, most work addressed the overall XLc, which is a virtualized platform has been introduced
ICN opportunity space from a network operator’s perspective. by Advantech for Edge-computing deployments. Moreover,
5G Americas present a 5G white paper [84] which describes it offers solution for 5G networks based on open architec-
some detail ICN architecture, along with ICN benefits and tures and industry standards. According to [107] Packetarium
use cases. ICN is presented as a potential technology for XLc is installed far from centralized data centers, and it
consideration as 5G. The paper suggests that 5G should be can support 9 slots, up to 288 Intel Xeon processor cores.
based on new network architectures and protocols designed Advantech along with Vasona, Brocade, GigaSpaces and
specifically, with support for mobility, security and content Saguna Networks takes part in an ETSI MEC PoC, ‘‘Multi-
caching as fundamental design criteria. ICN as realized in the Service MEC Platform for Advanced Service Delivery’’. The
NDN and Content-Centric Networking (CCNx) programs is PoC illustrates how the infrastructure between a Network
described as a leading architecture that can meet such design Function Virtualization (NFV) and a cloud system can simul-
criteria. taneously support many MEC platforms and applications.
The MEC platform offers operators optimization of RAN the rate and distribution of traffic (over time). The great
performance, particularly, to minimize latency. advantage of open caching, data which is frequently in use,
can be accessed without requesting any action from CDNs,
C. ARTESYN content providers or subscribers, since it is stored at the Edge
Artesyn [108] focuses on virtualized solutions in the RAN of network.
as well as in the core network. Artesyn is also designing
the hardware for next generation networks to facilitate the F. VASONA NETWORKS
transition to 5G. The MaxCore platform has been developed Vasona Networks [111] is working towards Edge computing
for Edge computing. Artesyn, with the support of MaxCore to manage the traffic at the Edge between the mobile core
platform, offers a power efficient, scalable and flexible fully and the RAN, to optimizing RAN performance and QoE. The
integrated suite of cloud-based products. main aim of this technique is to assist mobile operators by
MaxCore is mainly focusing on optimizing performance in providing them better end-user quality and efficient use of
terms of latency and bandwidth, for the environments where network resources.
the subscribers and traffic is in high density. Artesyn has Initial solutions by Vasona, focused on the challenges of
worked on many use cases such as Known-location services video traffic and the requirements of its latency, that mobile
(for government, retail, education and health), IoT applica- operators have to suffer. Standards-based software platforms
tions (for smart cities) and AR. has been developed by Vasona for MEC that could be placed
at an aggregation point between the mobile core and the RAN.
D. INTERDIGITAL Typically, a thousand or more cells can be covered by locating
In order to enable ultra-low latency, real-time and the MEC functionality in an aggregation point.
location-specific traffic optimization and context awareness, Today, Vasona has two products (i.e. Smart AIR and
Interdigital [109] is working towards MEC, to bring storage Smart VISION):
and Processing at the far Edge of user devices. Interdigital 1) Smart AIR is referred as an Edge application controller
actively takes part not only in the ETSI MEC i-e the Open developed at the individual cell level. In the case when
Fog Consortium, open-edge initiatives, groups (for exam- RAN is overflowed, SmartAIR works to control the
ple 3GPP), but also in advanced wireless research (PAWR) individual traffic flows at real time to overcome latency
platforms such as NSF’s Platform and European Commis- and offers efficient network utilization.
sion’s Horizon 2020. Furthermore, in collaboration with Uni- 2) SmartVISION is described as to assist operators to
versity of Essex and Intracom, Interdigital also gets involved analyze RAN performance, by providing them real-
in an ETSI MEC PoC. Interdigital integrates ICN and SDN. time and historical data. SmartVISION has an ability to
According to Interdigital, the paradigm shift of networking obtain information on user activity, content usage and
away from host-to-host communications, to content- and application, for every cell sector. The optimization and
name-based addressing by ICN, is mandatory to satisfy the planning for network performance and expansion can
requirements of 5G’s latency. Furthermore, Interdigital keeps be done based on this information.
focusing on its development and research, to combine the
services and network infrastructure, such as converge of NFV, XI. FUTURE RESEARCH DIRECTIONS FOR
MEC and SDN with the evolution of 4G and the development ICN OVER EDGE COMPUTING
of 5G. In this section our aim is to direct the researchers for the
enhancement of ICN and Edge computing. Although ICN
E. QWILT paradigm promises to provide the required features currently
Qwilt [110] was established in 2010, to facilitate the broad- not addressed by the existing 5G research. Therefore, the fol-
band fixed and wireless services. Qwilt offers optimization lowing question arises: How can ICN be enabled in Edge
both in terms of latency requirements and capacity of high computing? How can ICN be combined and co-optimized
video traffic loads to enhance the QoE. with these networks? Several few issues are described as
In order to optimize the video delivery and to facilitate follows:
real-time applications such as VR and AR, Open Edge Cloud
platform offers content delivery solutions and open caching to A. MORPHING (IN-NETWORK DATA MANIPULATION)
service providers at the network’s Edge. To minimize latency, The Internet of Things (IoT) promises to connect billions of
the Edge Cloud platform enables the storage capabilities and objects to the Internet. It needs to support 50-100 Billion net-
computation as much as possible to the Edge of the network. worked objects, many of which are mobile. A large amount of
The main purpose of Qwilt’s Edge Cloud solution is to data will be generated by things and many applications will be
extend the Content Delivery Networks (CDNs) and content deployed at the Edge to consume these data. IoT is compatible
providers to reduce the costs of transport for efficient deliv- with Edge networks because of its IP nature. However, ICN is
ery. To use the network infrastructure more efficiently, Open not compatible with Edge networks, and hence it is a very
Caching software integrates open caching with analytics and challenging task to handle IoT devices and data at the Edge
media delivery, which allows them efficiently to manage of network using ICN. There are many potential challenges
B. CACHING
Caching is very beneficial to increase the availability of
data and to speed up data retrieval. The cache everything
everywhere approach is not useful, resulting in the wastage
of cache resources and creating a considerable amount of
redundant data in the network. Data replacement policies that
will behave according to the behavior of the content and
interest are needed [92].
Caching creates the following three main questions:
1) WHAT TO CACHE?
It is useless to cache all the content in the network. Therefore,
it is necessary to consider the popularity of content and
determine what content to cache. Many users request the
same content, and therefore unpopular content has a negative
FIGURE 12. Morphing in ICN enabled networks. impact on the utilization of caching.
efficiency. That means that most of the resources in the net- context-sensitive service results [69]. Furthermore, mecha-
work are underutilized. For efficient data dissemination such nisms such as name-based routing and forwarding should
information needs to be transferred from one service instance cope with the mobility of network participants.
to another according to the mobility model of the mobile
node. Such mechanisms need to be supported by QoS mech- F. DISCOVERY AND DELIVERY
anisms, required to differentiate between different types of Name-based routing (NBR) or look-up-based resolution sys-
data and services and to ensure efficient data dissemination. tems (LRSs) are used for content discovery and delivery in
Additionally, such strategies/policies must ensure fairness ICN. With NBR, the interest packet is sent in a manner of
among the different consumers and providers of the services. hop-by-hop transmission by forwarding node(s) by looking
up a name match into their FIB. Once the content is found,
D. SECURITY it follows the reverse path back. With LRS, the interest packet
In ICNs, security features are directly introduced as part of the is sent to a resolution system, which may vary subject to
content itself instead of the transport layer as given in today’s the ICN architecture. Different architectures may have dif-
IP networks. Enabling ICN in Edge networks creates many ferent resolution systems depending on the implementation
issues for security and privacy. ICN over Edge will share data of architecture [21]. Therefore, how data could be discovered
with all users because the ICN node has the capability of any and delivered in paradigm of ICN over the Edge computing?
casting. Due to the anycasting feature of ICN, data will be Hence, a new resolution system may be designed to discover
sent to all future interested users [91]. and deliver data and resources in ICN over the Edge comput-
Moreover, due to network caching, security is increased ing approach.
by the fact that data is expected to stay within untrusted The resource discovery could be of two types 1) Services
caching nodes [69]. This also includes privacy concerns while discovery: (that means which service(s) are running on the
requesting customized service results. In recent years, mech- Edge node and what are the capabilities of each Edge node.
anisms are proposed that are showing security features. How- 2) Resource availability: (that means, what is the current load
ever, such mechanisms are not addressing the requirements of on the Edge nodes and which Edge node is the best node
mobile scenarios. The question is how to exchange encryption for task execution in terms of central processing unit (CPU),
related information across fast changing networks. More- random access memory (RAM), Graphics Processing Unit
over, in case of constrained network, it become very difficult (GPU) etc.) [69].
to implement complex security mechanism. Open research
challenges are the design of schemes that would deal with G. MOBILITY
powerful and also constrained devices in order to ensure The architecture for ICN based Edge computing should sup-
privacy and integrity. port consumer mobility and producer mobility as well. Since
the consumer mobility is inherently supported in ICN, how-
E. NAMING ever, there is much work needed for the producer mobility.
Naming is also an open issue for ICN over Edge networks. Only limited number of works is available dealing with pro-
The use of ICN in Edge computing creates issues, since ducer mobility such as [114]–[116]. However, most of these
ICN access the data and services by name. There is a need works cover fixed networks. Producer mobility needs to be
to introduce the design of novel naming schemes that sup- addressed for Edge computing, since in ICN based Edge
port both Edge and ICN to handle mobility, security, and system, the mobile users themselves might be publishers to
scalability. To be more specific, content and context-based a local audience, supported by Edge nodes for storage and
Naming Schemes could be designed for ICN based Edge computing capacity. Therefore, those mobile devices may
systems [112]. Where context-based naming means the infor- behave like a publisher/producer and may move in the entire
mation on the context i-e location (where are the users) iden- network. Mechanisms are required to address the producer
tity (who are the users), neighbors (who are near them) and mobility of ICN based Edge system.
what are the content choices and so on. In ICN the location,
identity, neighbor etc) could be named and signed pieces of H. NETWORK HETEROGENEITY
content that will reflect that local context. The named content Future networks will support numerous wireless technologies
could be relevant object(s) that may be needed sooner or later. and types of devices. Therefore, a mobile user can move
In addition, from a consumer perspective, there are mul- across diverse networks. However, this mobility will result in
tiple options to request for data such as query for data handoff delay, packet loss, packet duplication, or packet re-
objects or chunks using their name or sequence number. ordering for the period of handoff. This handoff is an issue
When talking about services, querying for results (e.g. in such heterogeneous networks. Future networks such as
function results) becomes difficult. Customized informa- 5G and beyond will need a minimum handoff delay when-
tion or parameters need to be provided by a consumer, for ever mobile users move across different networks. Therefore,
example as part of the naming scheme such as the NFN ICN over Edge computing is an efficient approach to deal
approach. Research activities need to investigate the options with such issues. Now the question arises: How ICN over
to querying the network for computational expensive and Edge computing can be an efficient solution? To answer this,
we explain features of each paradigm and how they will help big data management, mobility, naming, latency, and security.
to solve these issues. In Edge computing, data processing is In this article, we provided a comprehensive survey of ICN
pushed from the Cloud to the Edge of the network to achieve over Edge computing for future networks. The contributions
minimum latency. Thus, Edge computing offers less delay are multi-fold. First, the Edge computing concepts, drivers,
than the Cloud. 5G networks basic requirement is a minimum proposals, limitations and use cases has been provided. Sec-
delay, Therefore, this delay can be reduced more if we apply ond, ICN is highlighted for Edge computing which includes
ICN in Edge computing. How can ICN help? First, ICN is an overview of ICN and motivations to leverage the ICN for
receiver-driven in nature and supports consumer-mobility: Edge computing. In addition, various standardization efforts
unsatisfied requests will be re-issued whenever consumers and software and hardware vendor solutions are presented.
move. Second, host multi-homing is also supported by ICN. Finally, future research directions are provided for ICN over
Therefore, content requests and data delivery can use any Edge computing. We believe this survey will stimulate the
of the interface(s) available at the device [78]. Due to the research community and pave the way towards the empower-
disconnection of consumers and producers, self-consistent ment of future networks in order to achieve the fast response
content, any casting, and in-network-caching, ICN thus time.
proves to reconnect services and devices in heterogeneous
networks [21], [69]. In addition, function in ICN is named REFERENCES
that could be requested at the network layer. Explicitly named [1] A. U. R. Khan, M. Othman, S. A. Madani, and S. U. Khan, ‘‘A survey
of mobile cloud computing application models,’’ IEEE Commun. Surveys
functions can be resolved in network nodes, while network- Tuts., vol. 16, no. 1, pp. 393–413, 1st Quart., 2013.
layer requests (i.e., Interests) can carry input information for [2] M. Amadeo, C. Campolo, A. Molinaro, and G. Ruggeri, ‘‘IoT data pro-
Edge-executable functions [118]. We explained the features cessing at the edge with named data networking,’’ in Proc. Eur. Wireless
Conf., May 2018, pp. 1–6.
of both ICN and Edge computing above; therefore, joint [3] G. Li, J. Wu, J. Li, K. Wang, and T. Ye, ‘‘Service popularity-based smart
optimization will solve the issues of network heterogeneity, resources partitioning for fog computing-enabled industrial Internet of
mobility, and so on. Things,’’ IEEE Trans. Ind. Informat., vol. 14, no. 10, pp. 4702–4711,
Oct. 2018.
I. LOAD BALANCING STRATEGIES FOR REQUESTS ON [4] J. Wu, M. Dong, K. Ota, J. Li, and Z. Guan, ‘‘Big data analysis-based
secure cluster management for optimized control plane in software-
MULTI-INTERFACES defined networks,’’ IEEE Trans. Netw. Serv. Manage., vol. 15, no. 1,
For an efficient content retrieval in ICN based Edge comput- pp. 27–38, Mar. 2018.
[5] G. Li, J. Wu, J. Li, T. Ye, and R. Morello, ‘‘Battery status sensing
ing, the network stack must transparently support simulta- software-defined multicast for V2G regulation in smart grid,’’ IEEE
neous use of multiple interfaces. In TCP/IP this is done via Sensors J., vol. 17, no. 23, pp. 7838–7848, Dec. 2017.
multipath TCP [117], [118]. The problem in multipath TCP [6] A. C. Baktir, A. Ozgovde, and C. Ersoy, ‘‘How can edge computing
benefit from software-defined networking: A survey, use cases, and future
is that we should know in advance that on how many paths directions,’’ IEEE Commun. Surveys Tuts., vol. 19, no. 4, pp. 2359–2391,
we want to load balance our requests. However, ICN provides 4th Quart., 2017.
native support for multi-interface communication. Therefore, [7] M. Ahmadi, N. Khanezaei, S. Manavi, F. F. Moghaddam, and
T. Khodadadi, ‘‘A comparative study of time management and energy
load balancing strategies are required for ICN based Edge
consumption in mobile cloud computing,’’ in Proc. IEEE 5th Control Syst.
computing that would try to minimize the congestion over the Graduate Res. Colloq., Aug. 2014, pp. 199–203.
entire network. Moreover, how to tune the request on different [8] B. Zhou, A. V. Dastjerdi, R. N. Calheiros, S. N. Srirama, and R. Buyya,
interfaces without degrading the user experience is an issue ‘‘A context sensitive offloading scheme for mobile cloud computing
service,’’ in Proc. IEEE 8th Int. Conf. Cloud Comput., New York, NY,
in ICN based Edge computing. USA, Jun. 2015, pp. 869–876.
[9] Y. Li, L. Sun, and W. Wang, ‘‘Exploring device-to-device communication
J. INFRASTRUCTURE AND ARCHITECTURE for mobile cloud computing,’’ in Proc. IEEE Int. Conf. Commun. (ICC),
We believe that the combination of ICN and Edge comput- Sydney, NSW, Australia, Jun. 2014, pp. 2239–2244.
[10] K. Ha et al., ‘‘The impact of mobile multimedia applications on data
ing will speed up content retrieval. However, ICN in Edge center consolidation,’’ in Proc. IEEE Int. Conf. Cloud Eng. (IC2E),
networks poses many challenges to network’s infrastructure Redwood City, CA, USA, Mar. 2013, pp. 166–176.
and architecture. The issue arises because of two different [11] M. T. Beck et al., ‘‘ME-VoLTE: Network functions for energy-efficient
video transcoding at the mobile edge,’’ in Proc. 18th IEEE Int. Conf.
architectures. How will ICN and Edge computing co-exist Intell. Next Generat. Netw., Paris, France, Apr. 2015, pp. 38–44.
with each other? Inter-networking schemes with existing [12] T. J. Barnett, A. Sumits, S. Jain, and U. Andra, ‘‘Cisco visual networking
architecture of Edge computing are necessary to make both index: Global mobile data traffic forecast update, 2016–2021,’’ Cisco
Syst., Inc., San Jose, CA, USA, White Paper 1454457600, Mar. 2017.
paradigms interoperable. The interoperability of ICN with [Online]. Available: http://www.cisco.com/c/en/us/solutions/collateral/
Edge networks is an open challenge to researchers that should service-provider/visual-networking-index-vni/mobile-white-paper-c11-
be addressed. 520862.html
[13] M. T. Beck et al., ‘‘Mobile edge computing: A taxonomy,’’ in Proc. 6th
XII. CONCLUSION Int. Conf. Adv. Future Internet, Lisbon, Portugal, 2014, pp. 48–54.
[14] M. Satyanarayanan, ‘‘The emergence of edge computing,’’ Computer,
A migration of IP addresses and the use of naming mecha- vol. 50, no. 1, pp. 30–39, Jan. 2017.
nisms for content, context and services/functions shall con- [15] F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, ‘‘Fog computing:
tribute to the optimal performance for future networks. ICN A platform for Internet of Things and analytics,’’ in Big Data and
Internet of Things: A Roadmap for Smart Environments. Springer,
over Edge computing is an efficient technique to ensure a Mar. 2014, pp. 169–186. [Online]. Available: https://link.springer.com/
shorter response time. It will help to solve the problems of chapter/10.1007/978-3-319-05029-4_7
[16] D. Thomas, ‘‘Cloud computing—Benefits and challenges!’’ J. Object [40] C. Byers. OpenFog Consortium—Out of the Fog: Use Case
Technol., vol. 8, no. 3, pp. 37–41, Jun. 2009. Scenarios. Accessed: May 5, 2017. [Online]. Available:
[17] L. Gao, T. H. Luan, B. Liu, W. Zhou, and S. Yu, ‘‘Fog com- https://www.openfogconsortium.org/wp-content/uploads/OpenFog-
puting and its applications in 5G,’’ in 5G Mobile Communications. Transportation-Drone-Delivery-Use-Case.pdf
Cham, Switzerland: Springer, 2017, pp. 571–593. [Online]. Available: [41] M. Aazam and E.-N. Huh, ‘‘Fog computing and smart gateway based
https://doi.org/10.1007/978-3-319-34208-5_21 communication for cloud of things,’’ in Proc. IEEE Int. Conf. Future
[18] Y. Yu, ‘‘Mobile edge computing towards 5G: Vision, recent progress, Internet Things Cloud, Barcelona, Spain, Aug. 2014, pp. 464–470.
and open challenges,’’ China Commun., vol. 13, no. 2, pp. 89–99, [42] M. Firdhous, O. Ghazali, and S. Hassan, ‘‘Fog computing: Will it be
2016. the future of cloud computing?’’ in Proc. 3rd Int. Conf. Inform. Appl.,
[19] M. Paoloni, ‘‘Power at the edge: Processing and storage move from Kuala Terengganu, Malaysia, 2014, pp. 8–15.
Central core to the network edge,’’ Greater Seattle Area, Senza Fili [43] T. H. Luan, L. Gao, Z. Li, Y. Xiang, G. Wei, and L. Sun. (2015). ‘‘Fog
Consulting, Tech. Rep., Feb. 2017. [Online]. Available: http://www. computing: Focusing on mobile users at the edge.’’ [Online]. Available:
senzafiliconsulting.com https://arxiv.org/abs/1502.01815
[20] (Jun. 2017). Ericsson Mobility Report, SE-164 80 Stockholm, Sweden. [44] P. Hu, H. Ning, T. Qiu, Y. Zhang, and X. Luo, ‘‘Fog computing based face
[Online]. Available: https://www.ericsson.com/en/mobility-report identification and resolution scheme in Internet of Things,’’ IEEE Trans.
[21] K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong, ‘‘Dynamic energy-aware Ind. Informat., vol. 13, no. 4, pp. 1910–1920, Aug. 2017.
cloudlet-based mobile cloud computing model for green computing,’’ [45] E. Cau et al., ‘‘Efficient exploitation of mobile edge computing for
J. Netw. Comput. Appl., vol. 59, pp. 46–54, Jan. 2016. virtualized 5G in EPC architectures,’’ in Proc. 4th IEEE Int. Conf.
[22] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, ‘‘Cloud Mobile Cloud Comput., Services, Eng. (Mobile Cloud), Oxford, U.K.,
computing—The business perspective,’’ Decision Support Syst., vol. 51, Mar./Apr. 2016, pp. 100–109.
no. 1, pp. 176–189, 2011. [46] M. Agiwal, A. Roy, and N. Saxena, ‘‘Next generation 5G wireless net-
[23] M. Rahman, J. Gao, and W.-T. Tsai, ‘‘Energy saving in mobile cloud works: A comprehensive survey,’’ IEEE Commun. Surveys Tut., vol. 18,
computing,’’ in Proc. IEEE Int. Conf. Cloud Eng. (IC2E), San Francisco, no. 3, pp. 1617–1655, 3rd Quart., 2016.
CA, USA, Mar. 2013, pp. 285–291. [47] S. Nunna et al., ‘‘Enabling real-time context-aware collaboration through
[24] Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, ‘‘Heterogeneity 5G and mobile edge computing,’’ in Proc. 12th Int. Conf. Inf. Technol.-
in mobile cloud computing: Taxonomy and open challenges,’’ New Generat., Las Vegas, NV, USA, Apr. 2015, pp. 601–605.
IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 369–392,
[48] D. Satria, D. Park, and M. Jo, ‘‘Recovery for overloaded mobile edge
Feb. 2014.
computing,’’ Future Generat. Comput. Syst., vol. 70, pp. 138–147,
[25] M. Satyanarayanan et al., ‘‘Edge analytics in the Internet of Things,’’ May 2017.
IEEE Pervasive Comput., vol. 14, no. 2, pp. 24–31, Feb. 2015.
[49] European Telecommunications Standards Institute Industry Specifica-
[26] R. Roman, J. Lopez, and M. Mambo, ‘‘Mobile edge computing, Fog et al.: tions Group, Mobile-Edge Computing—Service Scenarios. [Online].
A survey and analysis of security threats and challenges,’’ Future Generat. Available: http://www.etsi.org/deliver/etsi_gs/MEC-IEG/001_099/004/
Comput. Syst., vol. 78, pp. 680–698, Nov. 2016. [Online]. Available: 01.01.01_60/gs_MEC-IEG004v010101p.pdf
https://doi.org/10.1016/j.future.2016.11.009
[50] M. Satyanarayanan et al., ‘‘An open ecosystem for mobile-cloud conver-
[27] M. Satyanarayanan, Z. Chen, K. Ha, W. Hu, W. Richter, and
gence,’’ IEEE Commun. Mag., vol. 53, no. 3, pp. 63–70, Mar. 2015.
P. Pillai, ‘‘Cloudlets: At the leading edge of mobile-cloud convergence,’’
in Proc. 6th Int. Conf. Mobile Comput., Appl. Services, Austin, TX, USA, [51] A. Ahmed and E. Ahmed, ‘‘A survey on mobile edge computing,’’ in
Nov. 2014, pp. 1–9. Proc. 10th IEEE Int. Conf. Intell. Syst. Control ISCO, Coimbatore, India,
Jan. 2016, pp. 1–8.
[28] U. Shaukat, E. Ahmed, Z. Anwar, and F. Xia, ‘‘Cloudlet deployment in
local wireless networks: Motivation, architectures, applications, and open [52] M. Quwaider and Y. Jararweh, ‘‘Cloudlet-based efficient data collection
challenges,’’ J. Netw. Comput. Appl., vol. 62, pp. 18–40, Feb. 2016. in wireless body area networks,’’ Simul. Model. Pract. Theory, vol. 50,
[29] B. Li, Y. Pei, H. Wu, and B. Shen, ‘‘Heuristics to allocate high- pp. 57–71, Jan. 2015.
performance cloudlets for computation offloading in mobile ad hoc [53] S. Yi, Z. Hao, Z. Qin, and Q. Li, ‘‘Fog computing: Platform and appli-
clouds,’’ J. Supercomput., vol. 71, no. 8, pp. 3009–3036, 2015. cations,’’ in Proc. 3rd IEEE Workshop Hot Topics Web Syst. Technol.
[30] X. Guo, L. Liu, Z. Chang, and T. Ristaniemi, ‘‘Data offloading and task (HotWeb), Washington, DC, USA, Nov. 2015, pp. 73–78.
allocation for cloudlet-assisted ad hoc mobile clouds,’’ Wireless Netw., [54] P. Du and A. Nakao, ‘‘Application specific mobile edge computing
vol. 24, no. 1, pp. 79–88, Jan. 2018, doi: 10.1007/s11276-016-1322-z. through network softwarization,’’ in Proc. 5th IEEE Int. Conf. Cloud
[31] Open Edge Computing. Accessed: May 11, 2017. [Online]. Available: Netw. (Cloudnet), Pisa, Italy, Oct. 2016, pp. 130–135.
http://openedgecomputing.org/index.html [55] European Telecommunications Standards Institute Industry Specifica-
[32] A. Ceselli, M. Premoli, and S. Secci, ‘‘Cloudlet network design opti- tions Group, MEC Proofs of Concept. Accessed: May 15, 2017. [Online].
mization,’’ in Proc. IFIP Netw. Conf. (IFIP Netw.), Toulouse, France, Available: http://www.etsi.org/technologies-clusters/technologies/
May 2015, pp. 1–9. mobile-edge-computing/mec-poc
[33] European Telecommunications Standards Institute. Accessed: [56] European Telecommunications Standards Institute, PoC Edge Video
Sep. 10, 2018. [Online]. Available: http://www.etsi.org/ Orchestration and Video Clip Replay. Accessed: May 15, 2017. [Online].
[34] M. R. Rahimi, J. Ren, C. H. Liu, A. V. Vasilakos, and Available: http://mecwiki.etsi.org/index.php?title=PoC_2_Edge_Video_
N. Venkatasubramanian, ‘‘Mobile cloud computing: A survey, state Orchestration_ and _Video_Clip_Replay_via_MEC
of art and future directions,’’ Mobile Netw. Appl., vol. 19, no. 2, [57] K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, and M. Satyanarayanan,
pp. 133–143, 2014. ‘‘Towards wearable cognitive assistance,’’ in Proc. 12th Annu. Int. Conf.
[35] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, ‘‘Edge computing: Vision Mobile Syst., Appl., Services, New York, NY, USA, 2014, pp. 68–81.
and challenges,’’ IEEE Internet Things J., vol. 3, no. 5, pp. 637–646, [58] O. Arias, J. Wurm, K. Hoang, and Y. Jin, ‘‘Privacy and security in Internet
Oct. 2016. of Things and wearable devices,’’ IEEE Trans. Multi-Scale Comput. Syst.,
[36] B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, vol. 1, no. 2, pp. 99–109, Apr./Jun. 2015.
‘‘A survey of information-centric networking,’’ IEEE Commun. Mag., [59] M. Quwaider and Y. Jararweh, ‘‘Cloudlet-based for big data collection
vol. 50, no. 7, pp. 26–36, Jul. 2012. in body area networks,’’ in Proc. 8th Int. Conf. Internet Technol. Secured
[37] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, ‘‘Fog computing and its Trans., London, U.K., Dec. 2013, pp. 137–141.
role in the Internet of Things,’’ in Proc. 1st Ed. MCC Workshop Mobile [60] Y. Shi, G. Ding, H. Wang, H. E. Roman, and S. Lu, ‘‘The fog comput-
Cloud Comput., Helsinki, Finland, 2012, pp. 13–16. ing service for healthcare,’’ in Proc. 2nd Int. Symp. Future Inf. Com-
[38] I. Stojmenovic and S. Wen, ‘‘The Fog computing paradigm: Scenarios and mun. Technol. Ubiquitous HealthCare (Ubi-HealthTech), Beijing, China,
security issues,’’ in Proc. Federated Conf. Comput. Sci. Inf. Syst., Warsaw, May 2015, pp. 1–5.
Poland, Sep. 2014, pp. 1–8. [61] Q. Yaseen, F. AlBalas, Y. Jararweh, and M. Al-Ayyoub, ‘‘A fog comput-
[39] OpenFog Consortium, Fremont, CA, USA. An Open, Interoperable Fog ing based system for selective forwarding detection in mobile wireless
Computing Architecture. Accessed: May 5, 2017. [Online]. Available: sensor networks,’’ in Proc. IEEE 1st Int. Workshops Found. Appl. Self∗
https://www.openfogconsortium.org/about-us/ Syst. (FAS∗ W), Augsburg, Germany, Sep. 2016, pp. 256–262.
[62] M. Satyanarayanan, G. Lewis, E. Morris, S. Simanta, J. Boleng, and [86] R. El Hattachi and J. Erfanian, ‘‘A Deliverable by NGMN (Next Genera-
K. Ha, ‘‘The role of cloudlets in hostile environments,’’ IEEE Pervas. tion Mobile Networks),’’ NGMN 5G, Frankfurt, Germany, White Paper,
Comput., vol. 12, no. 4, pp. 40–49, Oct. 2013. Feb. 2015, pp. 1–125.
[63] V. S. Achanta, N. T. Sureshbabu, V. Thomas, M. L. Sahitya, and [87] E. Bastug, M. Bennis, and M. Debbah, ‘‘Living on the edge: The role
S. Rao, ‘‘Cloudlet-based multi-lingual dictionaries,’’ in Proc. 3rd Int. of proactive caching in 5G wireless networks,’’ IEEE Commun. Mag.,
Conf. Services Emerg. Markets, Mysore, India, Dec. 2012, pp. 30–36. vol. 52, no. 8, pp. 82–89, Aug. 2014.
[64] R. Ullah, Y. Faheem, and B. S. Kim, ‘‘Energy and congestion-aware [88] M. Simsek, A. Aijaz, M. Dohler, J. Sachs, and G. Fettweis, ‘‘5G-enabled
routing metric for smart grid ami networks in smart city,’’ IEEE Access, tactile Internet,’’ IEEE J. Sel. Areas Commun., vol. 34, no. 3, pp. 460–473,
vol. 5, pp. 13799–13810, 2017, doi: 10.1109/ACCESS.2017.2728623. Mar. 2016.
[65] I. Stojmenovic, ‘‘Fog computing: A cloud to the ground support for smart [89] O. Galinina, A. Pyattaev, S. Andreev, M. Dohler, and Y. Koucheryavy,
things and machine-to-machine networks,’’ in Proc. Austral. Telecom- ‘‘5G multi-RAT LTE-WiFi ultra-dense small cells: Performance dynam-
mun. Netw. Appl. Conf. (ATNAC), Southbank, VIC, Australia, Nov. 2014, ics, architecture, and trends,’’ IEEE J. Sel. Areas Commun., vol. 33, no. 6,
pp. 117–122. pp. 1224–1240, Jun. 2015.
[66] Y. Jararweh, A. Doulat, O. AlQudah, E. Ahmed, M. Al-Ayyoub, and [90] M. Amadeo et al., ‘‘Information-centric networking for the Internet
E. Benkhelifa, ‘‘The future of mobile cloud computing: Integrating of Things: Challenges and opportunities,’’ IEEE Netw., vol. 30, no. 2,
cloudlets and mobile edge computing,’’ in Proc. 23rd Int. Conf. Telecom- pp. 92–100, Mar./Apr. 2016.
mun. (ICT), Thessaloniki, Greece, May 2016, pp. 1–5. [91] D. Trossen, M. J. Reed, M. Georgiades, N. Fotiou, and
[67] M. Aazam and E.-N. Huh, ‘‘Fog computing: The cloud-IoT/IoE mid- G. Xylomenos. (2015). ‘‘IP over ICN–The better IP? An unusual take on
dleware paradigm,’’ IEEE Potentials, vol. 35, no. 3, pp. 40–44, information-centric networking.’’ [Online]. Available: https://arxiv.org/
May/Jun. 2016. abs/1507.04221
[68] Y. Liu, X. Mao, Y. He, K. Liu, W. Gong, and J. Wang, ‘‘CitySee: Not [92] M. Amadeo et al., ‘‘Information-centric networking for the Internet
only a wireless sensor network,’’ IEEE Netw., vol. 27, no. 5, pp. 42–47, of Things: Challenges and opportunities,’’ IEEE Netw., vol. 30, no. 2,
Oct. 2013. pp. 92–100, Mar./Apr. 2016.
[69] L. Soh, J. Burke, and L. Zhang, ‘‘Supporting augmented reality: Look- [93] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, ‘‘Edge computing: Vision
ing beyond performance,’’ in Proc. Morning Workshop Virtual Reality and challenges,’’ IEEE Internet Things J., vol. 3, no. 5, pp. 637–646,
Augmented Reality Netw. (VR/AR Netw.), New York, NY, USA, 2018, Oct. 2016.
pp. 7–12, doi: 10.1145/3229625.3229627. [94] X. Wang, M. Chen, T. Taleb, A. Ksentini, and V. C. M. Leung,
[70] J. Grubert, T. Langlotz, S. Zollmann, and H. Regenbrecht, ‘‘Towards ‘‘Cache in the air: Exploiting content caching and delivery techniques
pervasive augmented reality: Context-awareness in augmented reality,’’ for 5G systems,’’ IEEE Commun. Mag., vol. 52, no. 2, pp. 131–139,
IEEE Trans. Vis. Comput. Graphics, vol. 23, no. 6, pp. 1706–1724, Feb. 2014.
Jun. 2017. [95] G. A. Lewis, S. Echevería, S. Simanta, B. Bradshaw, and
[71] G. Karagiannis et al., ‘‘Vehicular networking: A survey and tutorial on J. Root, ‘‘Cloudlet-based cyber-foraging for mobile systems in resource-
requirements, architectures, challenges, standards and solutions,’’ IEEE constrained edge environments,’’ in Proc. 36th Int. Conf. Softw. Eng.,
Commun. Surveys Tuts., vol. 13, no. 4, pp. 584–616, Nov. 2011. Hyderabad, India, May/Jun. 2014, pp. 412–415.
[72] M. Amadeo, C. Campolo, and A. Molinaro, ‘‘Information-centric net- [96] Extreme outdoor Server. ADLINK Technologies.
working for connected vehicles: A survey and future perspectives,’’ IEEE Accessed: Jul. 15, 2018. [Online]. Available: http://www.adlinktech.com/
Commun. Mag., vol. 54, no. 2, pp. 98–104, 4th Quart., 2016. PD/web/PD_detail.php?cKind=&pid=1573&utm_source
[73] M. Kaur, J. Martin, and H. Hu, ‘‘Comprehensive view of security prac- [97] M. Paolini and S. Fili, ‘‘How to control latency and benefit
tices in vehicular networks,’’ in Proc. Int. Conf. Connected Vehicles from it: An expanded role for latency,’’ Greater Seattle Area,
Expo (ICCVE), Seattle, WA, USA, Sep. 2016, pp. 19–26. Senza Fili Consulting, White Paper, 2018, [Online]. Available:
[74] A. Osseiran et al., ‘‘Scenarios for 5G mobile and wireless communica- http://www.senzafiliconsulting.com
tions: The vision of the METIS project,’’ IEEE Commun. Mag., vol. 52, [98] D. Grewe, M. Wagner, M. Arumaithurai, I. Psaras, and D. Kutscher,
no. 5, pp. 26–35, May 2014. ‘‘Information-centric mobile edge computing for connected vehicle envi-
[75] M. F. Bari, S. R. Chowdhury, R. Ahmed, R. Boutaba, and B. Mathieu, ronments: Challenges and research directions,’’ in Proc. Workshop Mobile
‘‘A survey of naming and routing in information-centric networks,’’ IEEE Edge Commun. (MECOMM), New York, NY, USA, 2017, pp. 7–12, doi:
Commun. Mag., vol. 50, no. 12, pp. 44–53, Dec. 2012. 10.1145/3098208.3098210.
[76] G. Xylomenos et al., ‘‘A survey of information-centric networking [99] N. Fotiou, V. A. Siris, G. Xylomenos, G. C. Polyzos, K. V. Katsaros, and
research,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 2, pp. 1024–1049, G. Petropoulos, ‘‘Edge-ICN and its application to the Internet of Things,’’
2nd Quart., 2014. in Proc. IFIP Netw. Conf. (IFIP Netw.) Workshops, Stockholm, Sweden,
[77] C. Fang, F. R. Yu, T. Huang, J. Liu, and Y. Liu, ‘‘A survey of green Jun. 2017, pp. 1–6, doi: 10.23919/IFIPNetworking.2017.8264880.
information-centric networking: Research issues and challenges,’’ IEEE [100] M. Sifalakis, B. Kohler, C. Scherb, and C. Tschudin, ‘‘An information
Commun. Surveys Tuts., vol. 17, no. 3, pp. 1455–1472, 3rd Quart., 2015. centric network for computing the distribution of computations,’’ in Proc.
[78] M. Amadeo, C. Campolo, and A. Molinaro, ‘‘Information-centric net- 1st ACM Conf. Inf.-Centric Netw. (ACM-ICN), New York, NY, USA,
working for connected vehicles: A survey and future perspectives,’’ IEEE 2014, pp. 137–146, doi: 10.1145/2660129.2660150.
Commun. Mag., vol. 54, no. 2, pp. 98–104, Feb. 2016. [101] Docker Inc. (2017). The Docker Project Page. [Online]. Available:
[79] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, ‘‘The case for https://www.docker.com/
VM-based cloudlets in mobile computing,’’ IEEE Pervasive Comput., [102] Amazon Web Services, Inc. (2017). Amazon Lambda Project Page—
vol. 8, no. 4, pp. 14–23, Oct./Dec. 2009. Run Code, Not Servers—Serverless Computing. [Online]. Available:
[80] Cloudlet-based Edge Computing. Accessed: May 17, 2017. [Online]. https://aws.amazon.com/lambda/
Available: http://elijah.cs.cmu.edu/ [103] A. Madhavapeddy, ‘‘Unikernels: Library operating systems for the
[81] 3rd Generation Partnership Project (3GPP). [Online]. Available: cloud,’’ SIGARCH Comput. Archit. News, vol. 41, no. 1, pp. 461–472,
http://www.3gpp.org/ 2013.
[82] Information-Centric Networking Research Group ICNRG. [Online]. [104] W. Shang et al., ‘‘Named data networking of things (invited paper),’’ in
Available: https://irtf.org/icnrg Proc. IEEE 1st Int. Conf. Internet-Things Design Implement. (IoTDI),
[83] SG13: Future Networks, With focus on IMT-2020, Cloud Computing Berlin, Germany, Apr. 2016, pp. 117–128, doi: 10.1109/IoTDI.2015.44.
and Trusted Network Infrastructures. [Online]. Available: http://www. [105] M. Mukherjee, D. Wang, and L. Shu, ‘‘Survey of fog computing: Funda-
itu.int/en/ITU-T/studygroups/2017-2020/13/Pages/default.asp mental, network applications, and research challenges,’’ IEEE Commun.
[84] Alliance for Telecommunications Industry Solutions. Surveys Tuts, vol. 20, no. 3, pp. 1826–1857, 3rd Quart., 2018.
Accessed: May 15, 2017. [Online]. Available: https://www.atis.org/ [106] ADLINK Technology. Accessed: Jul. 15, 2018. [Online]. Available:
[85] M. Recchione, ‘‘Understanding information centric networking and https://www.adlinktech.com
mobile edge computing,’’ 5G Americas, Vicki Livingston, White [107] Advantech. [Online]. Available: www.advantech.com/nc
Paper 3330, Dec. 2016. [Online]. Available: http://www.5gamericas.org/ [108] Artesyn. [Online]. Available: https://www.artesyn.com/
files/3414/8173/2353/Understanding_Information_Centric_Networking_ [109] Interdigital. [Online]. Available: http://www.interdigital.com/
and_Mobile_Edge_Computing.pdf [110] Qwilt. [Online]. Available: https://www.qwilt.com/
[111] Vasona Networks. Accessed: Jul. 15, 2018. [Online]. Available: SYED HASSAN AHMED (S’13–M’17–SM’18)
https://www.vasonanetworks.com/ received the B.S. degree in computer science from
[112] K. Zhang, Y. Mao, S. Leng, Y. He, and Y. Zhang, ‘‘Mobile-edge com- the Kohat University of Science and Technology,
puting for vehicular networks: A promising network paradigm with pre- Pakistan, and the master’s combined Ph.D. degree
dictive off-loading,’’ IEEE Veh. Technol. Mag., vol. 12, no. 2, pp. 36–44, from the School of Computer Science and Engi-
Jun. 2017. neering (SCSE), Kyungpook National University
[113] S. Arshad, B. Shahzaad, M. A. Azam, J. Loo, S. H. Ahmed, and (KNU), South Korea. In 2015, he was a Visiting
S. Aslam, ‘‘Hierarchical and flat-based hybrid naming scheme in content-
Ph.D. Student at Georgia Tech, Atlanta, GA, USA.
centric networks of things,’’ IEEE Internet Things J., vol. 5, no. 2,
He is currently an Assistant Professor with the
pp. 1070–1080, Apr. 2018.
[114] T. Refaei, J. Ma, S. Ha, and S. Liu, ‘‘Integrating IP and NDN through Computer Science Department, Georgia Southern
an extensible IP-NDN gateway,’’ in Proc. ACM ICN, vol. 3, 2017, University (GSU), Statesboro, GA, USA. Before starting at GSU, he was
pp. 224–225, a Post-Doctoral Fellow with the Department of Electrical and Computer
[115] J. Augé, G. Carofiglio, G. Grassi, L. Muscariello, G. Pau, and X. Zeng, Engineering, University of Central Florida, Orlando, FL, USA. He has
‘‘MAP-Me: Managing anchor-less producer mobility in content-centric authored/co-authored over 100 international publications, including jour-
networks,’’ IEEE Trans. Netw. Serv. Manage., vol. 15, no. 2, pp. 596–610, nal articles, conference proceedings, book chapters, and three books. His
Jun. 2018, doi: 10.1109/TNSM.2018.2796720. research interests include sensor and ad hoc networks, cyber-physical sys-
[116] Y. Zhang, A. Afanasyev, J. Burke, and L. Zhang, ‘‘A survey of mobil- tems, vehicular communications, and future Internet. He is an ACM Profes-
ity support in named data networking,’’ in Proc. 3rd Workshop Name- sional Member. From 2014 to 2016, he consequently received the Research
Oriented Mobility, Architect., Algorithms Appl. (NOM), Apr. 2016, Contribution Awards by SCSE and KNU. In 2016, his work on robust content
pp. 83–88. retrieval in future vehicular networks leads him to receive the Qualcomm
[117] Z. Zhu, R. Wakikawa, and L. Zhang, A Survey of Mobility Support in the Innovation Award at KNU.
Internet. document RFC 6301.IRTF, 2011.
[118] C.-A. Sarros et al., ‘‘Connecting the edges: A universal, mobile-centric,
and opportunistic communications architecture,’’ IEEE Commun. Mag.,
vol. 56, no. 2, pp. 136–143, Feb. 2018.
[119] X. Chen, L. Jiao, W. Li, and X. Fu, ‘‘Efficient multi-user computation
offloading for mobile-edge cloud computing,’’ IEEE/ACM Trans. Netw.,
vol. 24, no. 5, pp. 2795–2808, Oct. 2016.
[120] Z. Yantao and M. Jianfeng, ‘‘A highly secure identity-based authenticated
key-exchange protocol for satellite communication,’’ J. Commun. Netw.,
vol. 12, no. 6, pp. 592–599, Dec. 2011.
[121] S. S. Al-Riyami and K. G. Paterson, ‘‘Certificateless public key cryp-
tography,’’ in Advances in Cryptology—ASIACRYPT, vol. 2894. Berlin,
Germany: Springer-Verlag, 2003, pp. 452–473.
[122] J. Wu, M. Dong, K. Ota, J. Li, and Z. Guan, ‘‘FCSS: Fog computing based
content-aware filtering for security services in information centric social
networks,’’ IEEE Trans. Emerg. Topics Comput., to be published, doi:
10.1109/TETC.2017.2747158. BYUNG-SEO KIM (M’02–SM’17) received the
[123] Y. Liu, A. Zhang, J. Li, and J. Wu, ‘‘An anonymous distributed key B.S. degree in electrical engineering from Inha
management system based on CL-PKC for space information network,’’ University, Incheon, South Korea, in 1998, and
in Proc. IEEE Int. Conf. Commun. (ICC), Kuala Lumpur, Malaysia, the M.S. and Ph.D. degrees in electrical and com-
May 2016, pp. 1–7, doi: 10.1109/ICC.2016.7510841. puter engineering from the University of Florida
[124] M. Król and I. Psaras, ‘‘NFaaS: Named function as a service,’’ in Proc. in 2001 and 2004, respectively. His Ph.D. study
ACM Conf. Inf.-Centric Netw., Berlin, Germany, 2017, pp. 134–144.
was supervised by Dr. Y. Fang. From 1997 to
[125] M. Amadeo, C. Campolo, and A. Molinaro, ‘‘NDNe: Enhancing named
1999, he was at Motorola Korea Ltd., Paju, South
data networking to support cloudification at the edge,’’ IEEE Commun.
Lett., vol. 20, no. 11, pp. 2264–2267, Nov. 2016. Korea, as a Computer Integrated Manufacturing
Engineer in Advanced Technology Research and
Development. From 2005 to 2007, he was at Motorola Inc., Schaumburg
Illinois, as a Senior Software Engineer in Networks and Enterprises. His
REHMAT ULLAH received the B.S and M.S research focuses in Motorola Inc. were designing protocol and network
degrees (major in wireless communications and architecture of wireless broadband mission critical communications. From
networks) in computer science from COM- 2012 to 2014, he was the Chairman with the Department of Software and
SATS University Islamabad, Islamabad, Pakistan, Communications Engineering, Hongik University, South Korea, where he
in 2013 and 2016, respectively. He is currently is currently a Professor. His work has appeared in around 167 publications
pursuing the Ph.D. degree in computer engineering and 22 patents. His research interests include the design and development
with the Broadband Convergence Networks Lab- of efficient wireless/wired networks, including link-adaptable/cross-layer-
oratory, Department of Electronics and Computer based protocols, multi-protocol structures, wireless CCNs/NDNs, mobile
Engineering, Hongik University, South Korea. His edge computing, physical layer design for broadband PLC, and resource
major interests are in the field of information- allocation algorithms for wireless networks. He was also served as the
centric networking (specifically wireless content-centric/named data net- member of Sejong-city Construction Review Committee and the Ansan-city
working), edge computing, low power and lossy networks (LLN), IoT, 5th Design Advisory Board. He served as the General Chair for 3rd IWWCN
Generation (5G), and future internet architectures. Moreover, he is an ACM 2017, and a TPC member for the IEEE VTC 2014-Spring and the EAI
member and serves as a Reviewer for the IEEE Wireless Communications FUTURE2016, and ICGHIC in 2016 and 2019 conferences. He served as
Magazine, the IEEE Communications Magazine, Transactions on Emerging the Guest Editor of special issues for the International Journal of Distributed
Telecommunications Technologies, Future Generation Computer Systems Sensor Networks (SAGE), the IEEE ACCESS, and the Journal of the Institute of
(Elsevier), the IEEE ACCESS Journal, and various International Conferences Electrics and Information Engineers. He is an Associate Editor of the IEEE
and Workshops, including ACM MobiHoc (Los Angeles, CA, USA), IEEE ACCESS.
CCNC (Las Vegas, NV, USA), and VTC2018-Spring (Porto, Portugal).