Edge computing driven IoT
Edge computing driven IoT
The Internet of Things (IoT) is impacting the world’s connectivity landscape. More and more IoT devices are
connected, bringing many benefits to our daily lives. However, the influx of IoT devices poses non-trivial
challenges for the existing cloud-based computing paradigm. In the cloud-based architecture, a large amount
of IoT data is transferred to the cloud for data management, analysis, and decision making. It could not only
cause a heavy workload on the cloud but also result in unacceptable network latency, ultimately undermining
the benefits of cloud-based computing. To address these challenges, researchers are looking for new comput-
ing models for the IoT. Edge computing, a new decentralized computing model, is valued by more and more
researchers in academia and industry. The main idea of edge computing is placing data processing in near-
edge devices instead of remote cloud servers. It is promising to build more scalable, low-latency IoT systems.
Many studies have been proposed on edge computing and IoT, but a comprehensive survey of this crossover
area is still lacking.
In this survey, we first introduce the impact of edge computing on the development of IoT and point
out why edge computing is more suitable for IoT than other computing paradigms. Then, we analyze the
necessity of systematical investigation on the edge-computing-driven IoT (ECDriven-IoT) and summarize
new challenges occurring in ECDriven-IoT. We categorize recent advances from bottom to top, covering six
aspects of ECDriven-IoT. Finally, we conclude lessons learned and propose some challenging
CCS Concepts: • Computer systems organization → Distributed architectures; Real-time operating sys-
tems; • Networks → Network protocols; • Security and privacy; • Computing methodologies → Dis-
tributed computing methodologies;
Additional Key Words and Phrases: Edge computing, Internet of Things
This work was supported in part by NSFC Grants No. 62141220, No. 61972253, No. U1908212, No. 72061127001, No. 62172276,
and No. 61972254, the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher
Learning, and Open Research Projects of Zhejiang Lab No. 2022NL0AB01.
174
Authors’ addresses: L. Kong (corresponding author), J. Tan, J. Huang, G. Chen, and S. Wang, Shanghai Jiao Tong
University, No. 800, Dongchuan Road, Shanghai, 200240; emails: {linghe.kong, jinlintan, junqin.huang}@sjtu.edu.cn,
[email protected], [email protected]; X. Jin and P. Zeng, Shenyang Institute of Automation, Chinese Academy of
Sciences, No. 135, Chuangxin Road, Hunnan District, Shenyang City, Liaoning Province, 110169; emails: {jinxi, zp}@sia.cn;
M. Khan, King Saud University, Kingdom of Saudi Arabia, Po Box 92144, Riyadh 11653; email: [email protected]; S.
K. Das, Missouri University of Science and Technology, Rolla, MO 65409, USA; email: [email protected].
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and
the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored.
Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
prior specific permission and/or a fee. Request permissions from [email protected].
© 2022 Association for Computing Machinery.
0360-0300/2022/12-ART174 $15.00
https://doi.org/10.1145/3555308
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:2 L. Kong et al.
1 INTRODUCTION
The Internet of Things (IoT) is a revolutionary approach that interlinks uniquely addressable
physical and virtual devices through different communication protocols. According to the statis-
tics, the number of wireless-connected IoT devices will reach 50 billion by 2025 [51]. Potential
devices include smartphones, bio-nano things, body sensors, smart tags, wearable devices, embed-
ded objects, and traditional electronic gadgets [6]. These devices usually have a variety of sensors
inside for collecting environmental data, which are fundamental elements of data-driven intelli-
gence. Thus, massive deployed devices lead to an explosive data increase in the meantime. The
collected data need to be processed and analyzed before providing useful results for users. But
the computation ability of lightweight IoT devices is quite limited. One solution to this problem
is cloud computing. In the cloud-based paradigm, IoT data is first transferred to the cloud server
for processing, and then computing results will be sent back to devices. However, data transmis-
sion rate and network bandwidth could become bottlenecks to the further development of massive
IoT [162]. Moreover, as most IoT devices will generate personal and sensitive data, it is inappropri-
ate to send all IoT data to remote cloud servers, which will cause security and privacy concerns.
Edge computing is a new computing paradigm that directs computational data, applications,
and services away from cloud servers to the network edge. Content providers and application
developers can use edge computing to offer users services closer to them in geography, which
can accelerate the response speed of services. Edge computing is characterized as high bandwidth,
ultra-low latency, and real-time access to network information [86, 150]. And IoT applications usu-
ally require real-time response, privacy preservation, and massive data transmission. Compared
with cloud computing, edge computing has the potential to match large-scale IoT applications’
requirements.
The common goal of IoT and edge computing is to perform seamless computing anytime and
anywhere, but they act in different roles in the system. IoT focuses on endpoint sensing, while edge
computing focuses on near-field computation. Thus, it is promising for edge-computing-driven
IoT (ECDriven-IoT) systems to make these two technologies complement each other. Nowadays,
IoT has been widely used in many complex scenarios, such as smart homes, smart cities, smart
grids, virtual reality (VR), augmented reality (AR), and autonomous driving. ECDriven-IoT can
benefit these IoT applications from three aspects: (1) Real-time response and high quality of
services (QoS). Edge computing can provide shorter network latency than cloud computing, as
edge servers lie closer to IoT devices in geography. This superiority can support high-demand real-
time IoT applications better. Owing to a majority of data processed in edge servers, the amount
of data offloaded to the cloud can be largely reduced. Thus, ECDriven-IoT can bring higher QoS
for those real-time IoT applications. (2) Low energy consumption. Most IoT nodes are power-
limited devices, but synchronizing large amounts of sensing data to the remote cloud wastes much
power. With edge computing, IoT nodes only need to send data to local edge servers, so the energy
consumption of IoT nodes can be decreased to a lower level. Thus, ECDriven-IoT can extend the
lifetime of IoT nodes and reduce the maintenance overhead. (3) High scalability. One unavoid-
able challenge in cloud-based IoT systems is the large-scale access requirements. The cloud server
could be the system bottleneck due to large amounts of concurrent connections from IoT nodes.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:3
In ECDriven-IoT, edge servers (e.g., base stations) provide moderate computing resources in a dis-
tributed manner, so ECDriven-IoT can provide good scalability that satisfies the requirements of
large-scale IoT applications like smart cities or autonomous driving. Therefore, we believe edge
computing is indispensable for future IoT, and the study combining IoT and edge computing has
academic prospects.
Many surveys [57, 157] pointed out that recent advances related to IoT and edge computing have
made many efforts to satisfy these requirements. However, when combining edge computing and
IoT, there are still several new challenges regarding how to efficiently integrate these two technolo-
gies and bridge the difference between them. We summarize three new challenges in ECDriven-IoT
systems:
• Heterogeneity of edge computing and IoT. IoT devices are working everywhere and vary
across different scenarios. Thus, there are various hardware devices and communication pro-
tocols in IoT systems. For edge computing, the deployment architecture of edge nodes also
requires different solutions for different scenarios. Thus, combining edge computing with
IoT is faced with the challenge on how to unify the diversity of IoT and edge computing and
make them complement each other. To efficiently apply edge computing in heterogeneous
IoT systems, the cooperation architecture of ECDriven-IoT, hardware devices, and commu-
nication protocols need to be explored and form industry standards.
• Coordination between communication and computing. When combining edge com-
puting with IoT, the system is more complex than only IoT or edge computing-based ones.
The communication between edge servers and IoT devices will bring extra consumption to
the whole system. Besides, edge servers and IoT devices are limited in power and computing
capacity. For example, if IoT devices offload all workload to edge servers, then it must pose
a greater demand on communication cost and computing capacity of edge nodes. So, we
should explore how to allocate workload between edge servers and IoT devices to balance
the cost of communication and computation.
• Complicated security and privacy issues. How to guarantee systems’ security and pri-
vacy is always a significant challenge in IoT and edge computing. However, these issues
become more tricky due to the heterogeneity and limited computing capability of ECDriven-
IoT. IoT devices and edge servers are vulnerable to various attacks. Once any of these points
are compromised, the system will be in great danger. So, a qualified ECDriven-IoT system
should fully consider possible security threats and countermeasures in different application
scenarios.
There have been numerous studies from IoT to edge computing, covering every aspect of the
system. It is necessary to reveal what research has been done in this area and explore what the
future research direction is. Many excellent surveys have focused on either IoT or edge computing.
In the IoT aspect, a plethora of surveys have referred to architecture [57, 157], communication [106,
124], IoT application [61, 159] as well as security and privacy [10, 110]. As for edge computing
combined with IoT, there have also been several surveys from different perspectives as shown in
Table 1. However, these surveys:
• covered a limited number of research areas, and the system architecture of ECDriven-IoT
has not been discussed.
• revealed many challenges in edge computing or IoT, but those new challenges arising from
combining edge computing and IoT have not been explored.
ECDriven-IoT is a promising solution taking advantage of edge computing to build scalable
and efficient IoT systems. Both academia and industry need a survey to explain what happens
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:4 L. Kong et al.
when edge computing encounters IoT, what benefits it brings in, and what new challenges it faces.
Taking the requirements of a comprehensive survey into account, we illustrate the architecture
of ECDriven-IoT from the different levels in detail and summarize recent research advances. The
main contributions of this survey are summarized as follows:
• We reveal three new challenges in ECDriven-IoT, including the heterogeneity of IoT and
edge computing, coordination between communication and computation, and more tricky
security and privacy issues.
• We categorize existing related studies from six aspects, i.e., system architecture, operating
system, communication protocol, computing paradigm, application, and security and pri-
vacy. It gives a whole view of the current advance of ECDriven-IoT and describes possible
solutions for addressing these challenges in each aspect.
• Finally, we conclude key lessons learned after reviewing existing related work and give sev-
eral insights into future research challenges and directions in ECDriven-IoT.
The rest of this survey is organized as follows. Section 2 introduces the background of IoT and
edge computing and compares cloud computing with edge computing. The taxonomy of ECDriven-
IoT is also proposed in this section. According to the taxonomy, various hardware architectures
of ECDriven-IoT are explored in Section 3. In Section 4, we present operating systems adopted in
IoT and edge computing, which play a significant role in ECDriven-IoT. Communication protocols
and computing technologies are discussed in Sections 5 and 6, respectively. Section 7 discusses
security and privacy concerns when deploying ECDriven-IoT systems in practice. ECDriven-IoT
applications are introduced in Section 8. Section 9 provides lessons learned, open challenges along
with future research directions. Finally, we make a conclusion in Section 10.
2 BACKGROUND
In this section, we introduce the background of ECDriven-IoT, which has two main components:
IoT and edge computing. We also compare the difference between edge computing and cloud com-
puting to explain why edge computing is more suitable for IoT than cloud computing. And then,
we give a taxonomy of ECDriven-IoT.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:5
electronic health, smart home, and life support. On the other hand, for industry, IoT also plays an
active role in automation, logistics, and intelligent transportation.
IoT has attracted immense attention from the industry and academia [6, 185]. More and more
IoT applications are focusing on achieving real-time responses, such as Virtual Reality (VR) [52],
Augmented Reality (AR) [52], and automatic driving. The very short latency is non-negotiable
for these applications. In cloud computing, due to geographical distance and network fluctuation,
the latency is too high to satisfy real-time requirements. Besides, massive data deteriorate transmis-
sion performance. So, how to effectively allocate network bandwidth and computing resources is a
challenge [189]. In the IoT community, there are different data formats and communication proto-
cols, making IoT a vertically fragmented network system [190], which poses another challenge to
accomplish the desired low-latency performance. Furthermore, most IoT devices are power-limited,
and it is necessary to balance the power consumption to extend the lifetime of IoT devices.
Before IoT further deepens its impact on the world, many challenges are still worthy of attention
and research. One of the critical issues is how to achieve good interconnection and interoperabil-
ity among IoT devices, guarantee security demands, and provide a high level of intelligence. In
addition, IoT devices usually lack of computing power and energy capacity. Therefore, a new com-
putational paradigm should target the resource efficiency in addition to scalability issues. Edge
computing as a new computing paradigm could provide such help for IoT.
2.2.1 Cloud Computing. Cloud computing is another significant change after large computer
to client-server transformation. Users can share software and hardware resources in cloud com-
puting [70]. The complex hardware structure in cloud systems is transparent to users. So, users
do not need the expertise or direct control of cloud servers. There have been many studies on the
cloud and IoT, namely, the CloudIoT paradigm [26]. They have thoroughly investigated the main
attributes, characteristics, basic concepts, and open issues of the CloudIoT paradigm. Table 2 shows
the connection and difference between cloud computing and edge computing. Edge computing is
essentially an edge optimization of cloud computing. Both of them are designed for handling big
data. However, the main difference is that data can be distributed and processed on the closer edge
servers in edge computing. Figure 1 also shows the difference in geographic distribution between
cloud computing and edge computing. Thus, edge computing is more suitable for real-time data
processing and secure intelligent analysis.
Many studies attempt to optimize cloud computing to suit IoT scenarios [27, 44]. For example,
Zhou et al. proposed an architecture named CloudThings, which is an approach to combine cloud
computing and IoT. This architecture is a cloud-oriented IoT approach, helping IaaS, PaaS, and SaaS
in developing and managing IoT applications [199]. Pacheco et al. proposed a privacy-protected
architecture for integrating cloud computing and IoT. This architecture presents a scheme for pro-
tecting data generated by IoT devices without a secure transport layer protocol [34]. However,
the requirement of real-time response, massive data throughput, and low power still constrain the
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:6 L. Kong et al.
application of cloud computing in IoT [144]. Thus, another solution is to propose a new computing
paradigm to solve these problems thoroughly.
2.2.2 Edge Computing. Edge computing conforms to the computing characteristics of mobile
devices in IoT. The core of this architecture is mobile edge computing (MEC). MEC is a new
concept that integrates IT and telecommunications, which adds functions such as computation,
storage, and processing to the wireless network side. It enables more and more mobile devices
to quickly and easily access IoT, such as wearable smart devices. Yaser et al. proposed a layered
model consisting of a MEC server and a Cloudlets infrastructure [79]. This architecture aims to
increase the coverage of mobile user signals. And it allows users to complete the services they
request with minimal cost in terms of power and response latency. The main goal of the MEC
solution is to export some cloud functions to the mobile network edge, increasing available band-
width and reducing latency. Unlike the general architectural model, mobile hardware architecture
is used more in communications, using multiple software-defined network (SDN) controllers
and virtualization to solve data processing in communications [153].
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:7
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:8 L. Kong et al.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:9
together [43]. Different data sources are combined at each level of the IoT hierarchy to produce
timely and accurate results by utilizing the computational capabilities of intermediate nodes.
EdgeX Foundry is another typical ECDriven-IoT architecture model [47], which creates an open-
source framework for IoT edge computing. The framework is completely independent of hardware
and operating systems, supports a plug-and-play component ecosystem, unifies the market, and
accelerates the deployment of IoT solutions. Also, it addresses critical interoperability challenges
for edge nodes and data normalization in a distributed IoT edge architecture [56].
Edge computing nodes deployed in various environments are heterogeneous, while general ar-
chitecture can implement cross-platform management of heterogeneous resources. In the architec-
ture, how to efficiently manage fog/edge computing infrastructure, allocate available resources to
IoT devices, and schedule fog/edge computing resources is of significant importance [100]. Li et al.
proposed an architecture called ECIoT and studied the management of radio resources and com-
puting resources in ECIoT [98]. ECIoT focuses on resource allocation and performance control.
To improve the performance of ECIoT, they use the Lyapunov stochastic optimization method to
maximize system efficiency. Kitagami et al. proposed a multi-agent-based flexible IoT edge com-
puting architecture to balance global optimization by a cloud and local optimization by edges
for optimizing the role of cloud servers and edge servers dynamically [88]. In Reference [99], a
multi-layer resource allocation scheme was proposed, and it can adapt to the characteristics of
resource-constrained nodes at edges.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:10 L. Kong et al.
Salman et al. introduced a hardware architecture that integrates new technologies such as an
SDN and virtual network functions (VNF) [153]. This architecture is used to implement and
flexibly manage distributed edge networks, improve network scalability, and reduce costs. For
example, for a typical factory, services and workloads are more IT-centric (e.g., factory data cen-
ters), and as they move down, they become OT-centric (e.g., factory machines). Software-defined
resource allocation and management is gaining momentum in the edge computing paradigm as
it can enable plant operators to better adapt to future needs. From a network perspective, this
translates into an SDN implementing VNF throughout the plant.
Yaser et al. proposed a comprehensive framework model based on a software definition to sim-
plify IoT management process [77]. It abstracts all control and management operations from un-
derlying devices and places them in the middleware layer to hide the complexity of traditional
system architectures. It is a model for forwarding, storing, and protecting generated data from IoT
objects through integrated software, and is ideal for use in edge computing and edge network en-
vironments. Qin et al. designed a software-defined architecture by extending the Multi-Network
Information Architecture (MINA) [140]. MINA is middleware with a multi-layer IoT SDN con-
troller. The IoT SDN controller they developed supports a variety of scheduling commands. At
the same time, this architecture can optimize the IoT network environment by using genetic al-
gorithms. The architecture provides differentiated service quality for different IoT tasks across
heterogeneous wireless networks.
4 OPERATING SYSTEM
The IoT nodes usually connect to the Internet through communication protocols. Due to the het-
erogeneous nature of IoT, many different communication protocols are adopted in the system.
Moreover, there are many IoT devices, including mobile phones, sensors, and other hardware
platforms, such as Aurdriono [67], Raspberry [114], Intel, and Zolertia Z1 [53]. The operating
system can bridge all the differences between these devices and provide a unified application
programming interface. Considering the limited memory and power, traditional operating sys-
tems, such as the Linux and Berkeley software distribution (BSD), are not suitable for IoT
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:11
or layered ones. The monolithic architecture embeds necessary OS components and applications
within its kernel, which could increase the kernel size and the difficulty of adding new features or
deleting old ones. The micro-kernel architecture provides minimum functions in the kernel. Thus,
applications and OSs are considered decoupled modules to make them easy to be added or be re-
moved. So, the extension of such architecture will be more flexible. Also, a small kernel size makes
the micro-kernel architecture more suitable for the ECDriven-IoT. Another type of OS architecture
is the virtual architecture, in which a virtual machine mimicking hardware is exported to user pro-
grams. As an improvement to early monolithic systems, this system architecture has modules as a
layer-based architecture. Each layer has different functionalities. However, a few IoT devices adopt
the virtual and layered architecture, so we mainly focus on the first two architectures.
4.1.1 Architecture of Contiki. With a modular architecture, Contiki can efficiently reduce the
size of the system, and multiple embedded OSs choose modular architecture due to its small size.
Contiki is an event-driven OS with multi-threading supports, thus providing optional threading
facilities for every process. Due to its customization, ease of extension, and better reliability, this OS
can serve as a memory, file, and time server [80]. In the ECDriven-IoT, it can meet the requirements
of heterogeneity.
4.1.2 Architecture of LiteOS. As a UNIX-like OS, LiteOS provides an abstraction of IoT devices.
LiteOS is also a modular architecture OS. To minimize the programming learning complexities,
it provides an efficient way and operating features, thus allowing user-friendly operations. The
main feature of LiteOS is that it provides a shell and a hierarchical file system. Moreover, LiteOS
has a much smaller code footprint, thus making it suitable for other platforms. The kernel of
LiteOS is a subsystem of the whole system architecture. Dynamical loading and multi-threading
are implemented in the kernel, thus providing concurrency supports [28]. However, LiteOS slows
down the program execution under the limitation of hardware and consumption power. Multiple
approaches have been proposed to solve this problem.
4.1.3 Architecture of RETOS. RETOS can solve various problems in IoT applications. RETOS
was developed with the aims of reconfiguration, vigorous activity, and efficiency of resources, so
it can efficiently deal with difficulties faced by IoT sensor nodes. As a modular system, RETOS
ensures efficiency and reliability through a dual model, operation, and code checking. Moreover,
RETOS can prevent hardware manipulation, memory access, kernel reading, and other dangerous
operations [29]. The RETOS performs well in the field of wireless sensor networks. However, when
applied in ECDriven-IoT, RETOS cannot satisfy other requirements, such as real-time response and
a unified programming interface.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:13
4.1.4 Architecture of RIOT. The ECDriven-IoT consists of billions of IoT devices and edge nodes.
These devices usually have small memory, low power consumption, and limited communication
bandwidth. Considering the requirements of real-time systems, the ECDriven-IoT needs a broader
vision to embed intelligence to smartphones and portables, to achieve the connection of every-
thing [179]. To save memory, RIOT adopts a micro-kernel architecture, so the size of its kernel is
minimized. Adopting multi-threading aims to be effective with energy, memory, modulator, and
APIs. Also, RIOT is a highly reliable OS, which is important in the ECDriven-IoT system.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:14 L. Kong et al.
4.2.4 Scheduling Algorithm of RIOT. Using a scheduler through fixed priority and preemption,
RIOT allows for soft real-time capabilities [71]. RIOT can handle low-priority tasks to deal with
high-priority applications. RIOT applies a simple principle to achieve real-time scheduling: When
a high-priority thread arrives, threads with low priority will be preempted, and the high-priority
task runs right now until finished. What is more, RIOT can minimize response latency and power
consumption by mimicking the parallel execution of events with the same priority. At the same
time, it brings no context switches fee.
4.3.1 Networking Stack for Contiki. Contiki supports not only a full TCP/IP stack but also a
lightweight stack for low-power radio communication. Contiki implements μIP, the first stan-
dalone stack [11]. μIP supports IPv4 and IPv6 with a limited memory, which is suitable for the
ECDriven-IoT. It can communicate with both the lightweight stack and full-stack, and its peers do
not need to have a complete protocol stack. Also, Contiki applies Rime [46], so Contiki supports
low radio communication and various communication modes. The module of Rime employs simple
functions, making the stack lightweight and suitable for IoT. However, Contiki does not support
as many communication protocols as the system requires when it refers to edge computing.
4.3.2 Networking Stack for TinyOS. In the ECDriven-IoT, both IoT devices and edge nodes are of
limited energy and memory, and these nodes are connected to the Internet and communicate with
each other. Therefore, we need an operating system that can provide stable communication links
between devices. TinyOS adopts a protocol that can be used for the transport layer, networking
layer, and medium access control layer. Thus it can consume as fewer layers as possible and make
TinyOS reliable and robust [91]. Moreover, TinyOS can be suitable for various applications, so it
is a good choice in the ECDriven-IoT.
4.3.3 Networking Stack for LiteOS. In LiteOS, MAC and communication protocols are taken as
threads or files. Hence, it provides flexibility for different communication protocols. These proto-
cols can be loaded dynamically as applications. During the communication, data packets will be
sent to the port where the protocol is listening [28]. This feature makes it very suitable for IoT
applications that vary in the communication protocol, but it has difficulty satisfying the latency
requirements for treating the protocol as an application.
4.3.4 Networking Stack for RETOS. RETOS divides the kernel into static and dynamic parts for
adapting to resource-constrained hardware environments. This design enables an easy program-
ming interface for application developers. The static kernel part is optimized at the device driver
level and guarantees the kernel performance in transmitting data packets and maintaining network
connectivity. The dynamic kernel part is similar to LiteOS and implemented as loaded modules. So,
different routing and communication protocols can be managed as the dynamic part and applied
to different applications [31].
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:15
5 COMMUNICATION PROTOCOL
The IoT sensing layer collects sensing data (e.g., sound, light, electricity) through sensors. Based
on the terminal module of the network layer, base stations are connected to the network layer to
realize data transmission after data acquisition. The network layer is responsible for transmitting
data collected by the sensing layer. It should use different communication technologies based on
specific scenario characteristics. The application layer can be viewed as the data and business
platform of the IoT. As the collection point of all IoT terminal data, the data platform is responsible
for unified data storage and analysis.
The communication protocol at the network layer is a group of competitors. It is also the focus
of this section. In the ECDriven-IoT system, each terminal device and edge network device can
be regarded as an independent individual. The communication between such independent com-
ponents has the characteristics of hardware heterogeneity, low power, and short communication
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:16 L. Kong et al.
time. These features pose a great challenge in selecting and designing communication protocols.
IoT network layer communication protocols can be divided into short-range and long-distance
communication protocols. Short-range communication protocols include Wi-Fi [72], Bluetooth
technology [66], ZigBee [50], and UWB [8]. Long-distance communication protocols include NB-
IoT [5], LoRaWAN [165], and 5G [14]. Figure 6 shows the rate and coverage of various wireless
network communication protocols.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:17
some functions such as user authentication. Meanwhile, Acer et al. utilized Wi-Fi aware network
search to analyze IoT data [4].
Wi-Fi technology’s data rate is fast enough for ECDriven-IoT applications. However, as trans-
mission speed increases, the power consumption of devices also increases dramatically. In edge
devices, energy saving is a critical factor. So, Wi-Fi may not adapt to some scenarios well in
ECDriven-IoT systems.
5.1.2 Bluetooth. In recent years, much of the work on wireless sensor networks targets to be
efficient, low cost, scalable, and easy to deploy. Optimizing battery usage and power consump-
tion reduces costs and extends sensor life. Bluetooth is an ideal communication protocol for the
ECDriven-IoT. Its low power consumption makes edge devices run for a long time and reduces
maintenance. Generally speaking, edge computing does not require high data transmission speed.
Nair et al. introduced an architecture that uses the Bluetooth low energy (BLE) communi-
cation standard and hybrid topologies to reduce the power consumption of communication sys-
tems [122]. The BLE is considered a low-power version of traditional Bluetooth. However, the
extensive use of BLE in deployments can lead to high collision rates, especially in device-intensive
IoT environments. To alleviate this contradiction, Harris et al. proposed opportunistic listening,
an extension of the BLE active mode with tags and scanning devices [69].
For smart cars that use Bluetooth technology, users can connect their smartphones with their
cars. In this case, they can replace the phone’s speaker and microphone with the car’s ones, and
use the car’s devices to make a call or message. At the same time, you can also use your mobile
phone to read diagnostic data about your body everywhere [125].
5.1.3 ZigBee. The smart home is an IoT application closely related to human life. ZigBee is a
widely-used communication protocol in the smart home. At the same time, ZigBee is also the ideal
communication protocol for the ECDriven-IoT. Because of its low power consumption, ZigBee can
be suitable for IoT environments that include massive wireless sensors.
Moravcevic et al. proposed a way to integrate the ZigBee protocol into smart homes [116]. This
approach firstly defines a home device as a service that can add ZigBee devices from different
manufacturers to the system. Various home devices on the market today can communicate using
the ZigBee protocol. So, energy-efficient devices that support ZigBee can be added to the smart
home system.
In addition to smart home applications, ZigBee can combine with other new technologies to
control and communicate between IoT devices. Ferreira et al. proposed a model combining event
capture and device control [55]. This model is implemented using basic general techniques such as
RESTful API or UPnP. With ZigBee communication technology, this easy-to-capture body interac-
tion allows developers to make fun and useful applications. Another important aspect of this tech-
nology is the data exchange between various types of endpoints by using standardized communica-
tion protocols. It allows a wide variety of programs to utilize data exchange to achieve specific user
needs, even though these programs are independently developed by developers around the world.
Meanwhile, the privacy and security of IoT in the communication protocol layer have also re-
ceived the attention of researchers. Ronen et al. discovered a new type of worm threat [147]. When
there are too many IoT devices, and the density exceeds a certain amount, the worm will spread
rapidly in a large area of the communication layer, and adjacent IoT devices will infect each other.
They verified the infection with the help of the Philips Hue Smart Light platform. They use Zig-
Bee only as their wireless communication technology and found that this worm threat can be
transmitted directly between various types of adjacent light bulbs, which are light bulbs that can
communicate with each other on the same platform. The contagious nature of this attack can cause
city lights compromised on a large scale in a matter of minutes.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:18 L. Kong et al.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:19
will inevitably interfere with each other. But every coin has two sides. This drawback also makes
cross-protocol communication possible.
For example, Zhou et al. introduced a cross-technology communication protocol, ZiFi [200]. The
system uses ZigBee radios to identify the presence of Wi-Fi networks through the unique interfer-
ence characteristics generated by Wi-Fi beacons, which can significantly improve the standby en-
ergy efficiency of Wi-Fi devices. Kim et al. introduced FreeBee [87], which supports three popular
wireless technologies (Wi-Fi, ZigBee, and Bluetooth) across technology broadcasts. FreeBee’s core
idea is to modulate symbolic messages by changing the timing of three standard beacon frames
without additional frames and traffic.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:20 L. Kong et al.
LPWAN are ultra-low power consumption, long-distance, low throughput, and broad coverage.
Some typical applications include urban coverage, remote meter reading, manhole cover testing,
and offshore fishing vessel testing. Long-distance communication protocols are also often used for
IoT communication for specific remote edge devices.
5.2.1 NB-IoT. NB-IoT is called narrowband IoT and can be deployed directly on LTE networks.
Good compatibility reduces the cost of deployment. It has lower power consumption. Theoretically,
the terminal module carrying NB-IoT uses a battery and has a standby time of up to 10 years. The
reduction in module costs has also led more companies in the market to use this technology. In
3GPP, an LTE-based narrowband system has been introduced to support the IoT [22].
Mangalvedhe et al. [107] introduced the NB-IoT system design, some potential problems, and
solutions for the actual deployment system. Adhikary et al. focus on the coverage of NB-IoT in
IoT environments [5]. They believe that NB-IoT provides broader coverage than traditional LTE
systems. Petrov et al. proved the possibility of applying NB-IoT to IoT cars [136]. They conducted a
comprehensive system-level assessment revealing the impact of in-vehicle NB-IoT communication
on critical metrics, such as reliability, transmission delay, and energy efficiency. The results show
that the development potential of NB-IoT may meet the future performance requirements of IoT
vehicles.
The NB-IoT has four features: (1) Wide coverage area. NB-IoT provides better indoor coverage.
(2) Strong connectivity ability. NB-IoT supports more than 100,000 connections in a single
workspace. (3) Low power consumption. Usually, the standby time of the NB-IoT terminal device
can last for several years. (4) Low cost. The NB-IoT license band can be deployed in-band, guard
band or independent carrier mode to coexist with existing networks. Therefore, NB-IoT can be
widely used in various related industries, such as intelligent remote meter reading, asset tracking,
intelligent parking, and intelligent mechanized agriculture.
5.2.2 LoRaWAN. LoRaWAN is a long-distance communication protocol different from NB-IoT.
It is an ultra-long-range wireless transmission technology based on chirp spread spectrum technol-
ogy promoted and adopted by Semtech. At the most basic level, wireless protocols like LoRaWAN
are relatively simple. LoRaWAN is a star topology [132]. This type of structure is generally bet-
ter than a mesh network, because it has advantages in maintaining battery power and increasing
communication range.
Many researchers have studied the performance and metrics of systems using this protocol. Pet-
ric et al. used the LoRa FABIAN protocol stack to generate and then observe the traffic between
IoT nodes and LoRa stations to perform the test [135]. In addition to long working life and low
production costs, coverage is a key performance indicator for long-distance communication proto-
cols. Petajajarvi et al. studied the coverage of LoRaWAN technology through actual measurement
work [137]. Bor et al. developed a platform for LoRa performance evaluation and described a pro-
tocol that leverages LoRa’s unique features on top of LoRa’s physical layer [25]. This protocol
enables energy-efficient wide-area multi-hop data collection.
Because of the similar name, many people confuse LoRaWAN with LoRa. However, LoRaWAN
refers to the networking protocol of the MAC layer, and LoRa is just a protocol for the physical
layer. From the perspective of network layering, LoRaWAN can use any physical layer protocol,
and LoRa can also be used as the physical layer of other networking technologies. Several technolo-
gies that compete with LoRaWAN also use LoRa at the physical layer. LoRa is one of the LPWAN
communication technologies and a long-distance communication solution based on chirp spread
spectrum technology. This solution changes the previous trade-offs between transmission distance
and power consumption to provide users with a simple system that can achieve long-distance, long
battery life, and large capacity, thereby expanding the network.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:21
5.2.3 5G. With many emerging scenes, such as autonomous driving, and smart cities, requir-
ing higher data rates, the fifth-generation (5G) cellular network has arisen with a high data
rate and broad communication areas. In ECDriven-IoT, the low latency and high energy efficiency
requirements lead to smaller transmission time intervals. Moreover, small cells can achieve high
area capacity in densification. All of these have led to new radio access technologies and a new
core network [158]. With the help of higher frequencies, large-scale antennae can be deployed at
base stations. Thus array gains can overcome the shortage of higher path loss and can gain spatial
multiplexing [94].
With a resilient cloud-native core network and end-to-end support for network slicing, 5G
is distinguished by high flexibility and scalable network technology. Based on three major user
case domains, 5G can support deterministic and isochronous communication with high reliability
and availability. 5G can be applied in the ECDriven-IoT with hard guarantees for latency bounds,
packet loss, and reliability, as well as synchronization down to the nanosecond level [59]. More-
over, the seamless change of the application server can be supported by 5G with low latency. 5G
application enablers will be studied for interactions between users, application servers, and the
network in a complementary manner [82].
6 COMPUTING
We are not only concerned with the underlying hardware and communication protocols but also
computational processes in IoT and edge networks. These research areas include algorithmic ac-
celeration for different scenarios, distributed computing in IoT [48], green computing [92], and
caching [183], as well as SDN and NFV. These new computational studies lack sufficient focus, but
they all have huge development prospects and can optimize edge computing in IoT.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:22 L. Kong et al.
6.3 Caching
In computation offloading and distributed computing, massive data are generated and transmitted
among edge nodes, which influences communication latency and IoT devices’ power. Caching is an
effective method to increase computing speed and save computing bandwidth. In the ECDriven-
IoT scenes, some applications require few computing resources and storage in IoT devices and
edge nodes. Thus, these remaining caches can be utilized more efficiently, reducing latency and
improving system efficiency. The idea of caching is transplanted to edge computing to reduce the
data transmission cost and system delay. At the same time, it will make design and development
more difficult.
Combining caching and edge computing with IoT is a promising means of alleviating traffic in a
backhaul. With network stability taken into account, Du et al. formulated a stochastic optimization
problem to jointly optimize the offloading decision and cache decision making [45]. Xia et al. [186]
investigated a cache-aided mobile edge computing network, where the source offloads the compu-
tation task to multiple destinations having computation capacity with the help of a cache-aided
relay. However, their work does not explore the cache-aid with IoT. So when applied to IoT, how
to efficiently solve the complexity of IoT and edge computing is still a challenge.
Distributed caching is widely used in the caching deployment of base stations. However, the
caching capacity of a single BS is generally particularly limited, which will degrade the perfor-
mance of the wireless mobile network [154]. Li et al. designed a collaborative cache scheme in the
heterogeneous mobile edge computing network, in which the edge caching of macro base stations
and small base stations are utilized to bring storage resources closer to users [96]. For most IoT de-
vices, the smaller the cache size, the more complex the topology. Therefore, more research should
explore the combination of edge computing and IoT in caching to make it a more efficient way to
reduce latency and energy consumption.
Another important research direction for cache computing is cached content placement [128].
In general, cached content placement system information is updated continuously to improve the
cache hit ratio. In an edge computing environment, caching typically occurs on user devices. The
cache at the user device may allow the user to download the requested content in a more effi-
cient manner using device-to-device (D2D) communication [184]. As the density of edge devices
increases, the cache advantages of user devices will be reflected in their low deployment costs.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:23
7.1.1 DDoS Attacks. DDoS attacks toward edge-computing nodes consist of outage attacks,
sleep deprivation, and battery draining. In outage attacks, edge nodes will be exposed to unautho-
rized users and unable to perform in the designed way [117]. As a much harder-to-detect attack,
sleep deprivation adversaries overwhelm edge-computing nodes with an undesired set of legiti-
mate requests. Battery-draining attackers will deplete the battery of the edge-computing nodes or
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:24 L. Kong et al.
IoT sensors/devices. DDoS attacks can also occur at the communication layer with continuous or
intermittent jamming [12].
7.1.2 Eavesdropping or Sniffing. In eavesdropping, adversaries can listen over communication
links to acquire private information, thus leading to privacy concerns. Through this attack, at-
tackers can take much important information about the system, such as user names, personal
information, or some commercial secrets [146].
7.1.3 Jamming Attacks. Jamming attacks are a kind of energy-consumption denial-of-service
attack. They can be launched in the link or physical layer. These attacks often utilize the weakness
of IoT systems and edge computing architectures. In jamming attacks, adversaries intentionally
flood the network with forged messages to exhaust the systems’ communication bandwidth, com-
puting sources, and storage volumes, making the whole system unable to carry out tasks [169].
7.1.4 Malicious Hardware/Software Injection. Attackers can inject malicious inputs into the
edge-computing node servers and perform hacking by adding unauthorized software or hardware
components to the communication between IoT devices and edge-computing nodes. This attack
can also make adversaries acquire many unauthorized data, thus raising privacy concerns [12].
7.1.5 Unauthorized Control Access. In the ECDriven-IoT paradigm, edge computing and IoT
nodes communicate with each other to access or share their data. However, these devices and
nodes can not use complicated methods to authorize permission access. Attackers can access one
of the unsecured edge nodes and possibly control the whole system, which is of great danger.
7.1.6 Privacy Leakage. As for privacy, the ECDriven-IoT can be applied to many personal
scenes, such as healthcare and smart homes. Thus, such personal information will be collected
by IoT devices and then transmitted to edge nodes to be processed and stored. However, consid-
ering the limited self-protecting ability of edge computing nodes and IoT devices, privacy leakage
potential exists in the ECDriven-IoT system. Furthermore, the ECDriven-IoT system will acquire
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:25
position information to serve the users, so attackers can obtain users’ physical position or other
sensitive information if they compromise the devices. Thus, how to guarantee data privacy in the
process from collection to storage is a crucial problem [12].
7.1.7 Other Attacks. The ECDriven-IoT is an emerging paradigm that combines heterogeneous
resources and devices. Thus the system is vulnerable to many attacks from different levels. Be-
yond the attacks mentioned above, there still are non-network side-channel attacks [117], routing
information attacks [182], forgery attacks [163], replay/freshness attacks [54], and inessential log
attacks [105]. Considering the importance of system security, the community has proposed many
attack countermeasures to protect this paradigm.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:26 L. Kong et al.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:27
[117], secure firmware update [117], and reliable routing protocols [102] also play a very
important role in making the system secure. As for the security of data, many solutions have been
proposed in academia, such as de-patterning data transmissions [197], decentralization [197], and
authorization [101]. In many applications, these solutions can be combined with other solutions to
work together. Although there have been many solutions, security and privacy in ECDriven-IoT
remain a big challenge in the present.
8 APPLICATIONS
The ECDriven-IoT is suitable for many applications. This section will explain how it works and
how to satisfy the requirements in these application scenes. The ECDriven-IoT plays a major role
in responsive and latency-sensitive IoT applications.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:28 L. Kong et al.
the deployment of a large number of inexpensive sensors and controllers is needed as part of a
collaborative effort in-house. The large amount of data generated by these sensors will be trans-
mitted and used by other IoT devices. Considering data transmission bandwidth pressure and
privacy data protection requirements, edge computing can be an ideal choice for building smart
homes [174]. Furthermore, edge computing will bring other features such as easy installation, re-
location, privacy preservation, and flexibility [148].
Smart homes can be extended to smart communities and even smart cities, and are expected
to become an indispensable part of human life. ECDriven-IoT systems can also serve as the ideal
architecture for smart cities. According to the data growth trend of a city today, the data will
grow exponentially in the future. These data are generated by public safety, health, utilities, and
transportation. Processing the data at the network edge is more efficient than building a cloud
data center. Next, considering the sudden events and public safety in the city, edge computing
can save data transmission time and reduce response latency. This benefit is critical for appli-
cations that require predictability and low latency. In addition, edge computing can make deci-
sions and diagnoses from the network edge, where events occur faster than in the cloud center.
Finally, the natural advantage of edge computing is location awareness. Some geo-based applica-
tions like transportation can collect and analyze data to avoid the dilemma of transmission to the
cloud [171].
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:29
humans can interact more naturally with the virtual world through the data that are collected
by IoT devices [156]. With IoT sensors, AR technologies can extend the real world to the virtual
world [18]. In the initial step, cloud computing provides the demands of computational power,
which can satisfy these requirements in latency and quality. However, VR and AR can be applied to
more scenes, such as tourism, smart transportation networks, and robotic-assisted surgeries. Cloud
computing is no longer used to satisfy the requirements in latency and throughout the network, as
these scenes are strict in latency, which may decrease user satisfaction. For low-latency offloading
services in VR and AR, edge computing can effectively reduce the latency in combining these
processed data with physical reality.
Edge computing can also migrate computing tasks from mobile devices to edge nodes to in-
crease the computational capacity of VR devices, save battery life, and reduce latency at the same
time [35]. Additionally, edge computing can be connected with the cloud for stronger computing
capabilities when needed [19].
Zao et al. proposed an architecture that combines edge nodes and cloud data centers to leverage
the augmented brain-computer interface [196]. The main benefit of this architecture is the low
latency and real-time interaction, which can provide a more comfortable playing experience in VR
and AR application scenes.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:30 L. Kong et al.
discussed some of its characteristics and future directions. Morabito et al. showed how to enhance
edge computing with lightweight virtualization in the IoT [115].
Dastjerdi et al. presented an introduction to the concepts and characteristics of fog computing.
They also analyzed what a complete edge computing software system looks like, including the
system design patterns, API, and service management [42]. In their research, Gupta et al. started
from a software perspective and first proposed several challenges to be solved in implementing
the edge and IoT paradigms [65]. The most critical challenge is resource management technology.
In other words, how to determine which application modules are deployed in the edge device to
minimize latency and ensure adequate throughput. At the same time, network congestion and
energy costs also need to be considered in the future.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:31
multiple layers of ECDriven-IoT, i.e., architecture layer, communication layer, and data layer. But
these solutions are far from satisfactory because of high computation complexity or specific hard-
ware demands. For example, blockchain-based solutions for architecture security bring extra com-
munication overheads and storage costs; TEE-based solutions for computation security rely on
trusted hardware. ECDriven-IoT should focus on exploring lightweight and the common security
and privacy solutions, which are practical and efficient even in resource-constrained devices.
9.1.4 Different Designs for Different Application Scenes. The design of ECDriven-IoT cannot be
illustrated simply by a single model, and the system requirements vary for different application
scenarios. The ECDriven-IoT system design should be flexibly adapted to make it more efficient
and suitable for various ECDriven-IoT applications. For example, we may be more concerned with
the computational and communication complexity of real-time applications (e.g., smart health,
autonomous driving, VR) but more concerned with the power consumption of long-life protection
applications (e.g., field environmental monitoring). It is a trade-off in the design of ECDriven-
IoT systems. Therefore, when designing an ECDriven-IoT system, we should fully consider what
metrics the application really cares about and give a suitable application-specific solution.
9.2.1 Heterogeneous Platforms in Edge Computing and IoT. In a traditional cloud computing
data center, users do not need to know how the program works or care about the underlying
hardware architecture. However, in the ECDriven-IoT, edge devices and networks need to take on
computing tasks while considering heterogeneous hardware platforms. The heterogeneous nature
of ECDriven-IoT leads to a significant increase in programming workload for developers. The
future development of IoT relies on edge computing, and the application scenarios are rich and
colorful. Effectively solving the difficulties brought by heterogeneous platforms will make more
developers invest in such work.
How to discover resources and services in a distributed computing environment is an area to
be explored. To make full use of the edge devices of the network, it is necessary to establish a
discovery mechanism to find the appropriate nodes that can be deployed in a distributed manner.
Because of the sheer number of devices available, these mechanisms cannot rely on manuals. In
addition, various heterogeneous devices are needed to meet the latest computing needs, such as
large-scale machine learning tasks. These mechanisms must seamlessly integrate computational
workflows at different levels without increasing latency or compromising the user experience. The
original cloud-based methods are no longer applicable in edge computing.
9.2.2 Task Allocation in the ECDriven-IoT. The biggest challenge for the ECDriven-IoT is how
to deploy large-scale computing and storage capabilities dynamically [20]. The appropriate de-
ployment will make device sides work together efficiently and seamlessly. Evolving distributed
computing has spawned many technologies that are used to facilitate the task of partitioning in
multiple geographies. However, on the edge side, partitioned computing not only poses the chal-
lenge of efficient partitioning but also encounters bottlenecks in automatic allocation without the
capacity or location of edge nodes. Therefore, a new scheduling strategy is needed to assign tasks
to edge nodes. It is a prominent issue that must be addressed for large-scale deployments of IoT
edge devices and networks and will affect the scale of the development of the ECDriven-IoT.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:32 L. Kong et al.
9.2.3 Data Abstraction in Edge Computing and IoT. Although data-generation devices in the IoT
do not need to send generated data to the data center frequently, the edge node needs some required
data to perform analysis work. Data abstraction refers to these data pre-processing algorithms and
solutions, including noise cancellation, data classification, and computing. For example, gateways
need to process some events such as noise cancellation. However, IoT devices are rich and varied,
and different devices use different data formats. It brings the first challenge to data abstraction.
The second challenge is how to effectively determine the level of data abstraction. Considering
data security issues, the application does not get all the raw data, but only abstracts the parts it is
interested in. If too little of the raw data is filtered, then the application will not get the information
it needs. However, keeping too much raw data can cause storage problems. In addition, the data
generated by edge devices are often unreliable due to external interference from sensors. Therefore,
extracting accurate information from unreliable raw data is another challenge.
The application needs to control objects to provide a specific service, such as reading and writing
data. The data abstraction layer combines the presentation of data and corresponding operations
and provides a unified interface. In addition, finding a universal way of data abstraction is not easy
because of the diversity of devices, different ways of presenting data, and different corresponding
operations.
9.2.4 Edge Nodes Security. The security of the ECDriven-IoT requires end-to-end protection.
As the device is closer to IoT, the difficulties in network edge-side access control and threat pro-
tection will increase dramatically. Edge-side security mainly includes device security, network
security, data security, and application security. In addition, the confidentiality of critical data and
the protection of personal privacy data are vital areas of IoT security [149].
Several issues must be addressed before end devices (e.g., switches, base stations) are used as
edge nodes for shared access. First, risks associated with users and owners of edge devices need to
be defined. Second, when the device is used as an edge computing node, the original functionality
of the device cannot be compromised. Third, multiple users on edge nodes need security as their
primary concern. Fourth, the minimum service level needs to be guaranteed to the users of edge
nodes. Finally, workloads, computing power, data locations and migration, maintenance costs, and
energy consumption need to establish an appropriate pricing model.
9.2.5 Development Tools for Edge-computing-driven IoT. As the number of edge nodes support-
ing general-purpose computing continues to increase, the demand for development frameworks
and toolkits will continue to grow. Edge analysis is different from existing work. Since edge anal-
ysis is implemented in user-driven applications, existing tools may not be suitable for expressing
edge analysis workflows. The programming model needs to use edge nodes to support the paral-
lelism of tasks and perform calculations on multiple levels of hardware. At the same time, program-
ming languages need to consider the hardware heterogeneity in the workflow and the computing
power of various resources. So, ECDriven-IoT is more complicated than existing cloud computing
models.
10 CONCLUSION
In this article, we present a comprehensive survey of the ECDriven-IoT, including supporting
technologies and research challenges in this field. We first categorize existing studies to help re-
searchers find innovative research topics. We then propose some open issues worthy of study and
contribute to the development of the industry. Currently, the research on the ECDriven-IoT topic
is still highly fragmented, which is not conducive to the research and development of the field.
Therefore, this survey helps review and summarize existing research work and promote cross-
cooperation in related areas.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:33
REFERENCES
[1] Mohammad Aazam and Eui-Nam Huh. 2014. Fog computing and smart gateway-based communication for cloud of
things. In Proceedings of the International Conference on Future Internet of Things and Cloud. IEEE, 464–470.
[2] Nasir Abbas, Yan Zhang, Amir Taherkordi, and Tor Skeie. 2018. Mobile edge computing: A survey. IEEE Internet
Things J. 5, 1 (2018), 450–465.
[3] Stefano Abbate, Marco Avvenuti, Daniel Cesarini, and Alessio Vecchio. 2012. Estimation of energy consumption for
TinyOS 2.x-based applications. Procedia Comput. Sci. 10 (2012), 1166–1171.
[4] Utku Günay Acer, Aidan Boran, Claudio Forlivesi, Werner Liekens, Fernando Pérez-cruz, and Fahim Kawsar. 2015.
Sensing WiFi network for personal IoT analytics. In Proceedings of the International Conference on the Internet of
Things (IOT’15). IEEE, 104–111.
[5] Ansuman Adhikary, Xingqin Lin, and Y.-P. Eric Wang. 2016. Performance evaluation of NB-IoT coverage. In Proceed-
ings of the IEEE Vehicular Technology Society (VTC’16). IEEE, 1–5.
[6] Bilal Afzal, Muhammad Umair, Ghalib Asadullah Shah, and Ejaz Ahmed. 2019. Enabling IoT platforms for social IoT
applications: Vision, feature mapping, and challenges. Future Gen. Comput. Syst. 92 (2019), 718–731.
[7] Yuan Ai, Mugen Peng, and Kecheng Zhang. 2018. Edge computing technologies for internet of things: A primer. Dig.
Commun. Netw. 4, 2 (2018), 77–86.
[8] G. R. Aiello and G. D. Rogerson. 2003. Ultra-wideband wireless systems. IEEE Microwave Mag. 4, 2 (2003), 36–47.
[9] K. Akkaya and M. Younis. 2003. An energy-aware QoS routing protocol for wireless sensor networks. In Proceedings
of the International Conference on Distributed Computing Systems Workshops. IEEE, 710–715.
[10] Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim Abaker Targio Hashem, and Faiz Alotaibi. 2017. Internet of things
security: A survey. J. Netw. Comput. Appl. 88 (2017), 10–28.
[11] Thamer A. Alghamdi, Aboubaker Lasebae, and Mahdi Aiash. 2013. Security analysis of the constrained application
protocol in the Internet of Things. In Proceedings of the International Conference on Future Generation Communication
Technologies. IEEE, 163–168.
[12] Abdulmalik Alwarafy, Khaled A. Al-Thelaya, Mohamed Abdallah, Jens Schneider, and Mounir Hamdi. 2021. A survey
on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet Things J. 8, 6 (2021),
4004–4022.
[13] Mahdi Amiri-Kordestani and Hadj Bourdoucen. 2017. A survey on embedded open source system software for the
internet of things. In Proceedings of the Free and Open Source Software Conference. 6.
[14] Jeffrey G. Andrews, Stefano Buzzi, Wan Choi, Stephen V. Hanly, Angel Lozano, Anthony C. K. Soong, and
Jianzhong Charlie Zhang. 2014. What will 5G be? IEEE J. Select. Areas Commun. 32, 6 (2014), 1065–1082.
[15] Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The internet of things: A survey. Comput. Netw. 54, 15
(2010), 2787–2805.
[16] Israr Iqbal Awan, Nadir Shah, Muhammad Imran, Muhammad Shoaib, and Nasir Saeed. 2019. An improved mecha-
nism for flow rule installation in-band SDN. J. Syst. Architect. 96 (2019), 1–19.
[17] Ahmet Cihat Baktir, Atay Ozgovde, and Cem Ersoy. 2017. How can edge computing benefit from software-defined
networking: A survey, use cases, and future directions. IEEE Commun. Surveys Tutor. 19, 4 (2017), 2359–2391.
[18] Luciano Baresi, Danilo Filgueira Mendonça, and Martin Garriga. 2017. Empowering low-latency applications through
a serverless edge computing architecture. In Service-Oriented and Cloud Computing. Springer International Publish-
ing, Cham, 196–210.
[19] Ejder Bastug, Mehdi Bennis, Muriel Medard, and Merouane Debbah. 2017. Toward interconnected virtual reality:
Opportunities, challenges, and enablers. IEEE Commun. Mag. 55, 6 (2017), 110–117.
[20] Michael Till Beck, Martin Werner, Sebastian Feld, and S. Schimper. 2014. Mobile edge computing: A taxonomy. In
Proceedings of the International Conference on Advances in Future Internet. Citeseer, 48–55.
[21] A. Bekasiewicz and S. Koziel. 2016. Compact UWB monopole antenna for internet of things applications. Electron.
Lett. 52, 7 (2016), 492–494.
[22] Yihenew Dagne Beyene, Riku Jantti, Olav Tirkkonen, Kalle Ruttik, Sassan Iraji, Anna Larmo, Tuomas Tirronen, and
Johan Torsner. 2017. NB-IoT technology overview and experience from cloud-RAN implementation. IEEE Wireless
Commun. 24, 3 (2017), 26–32.
[23] Flavio Bonomi, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. 2014. Fog computing: A platform for internet of
things and analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments. Springer International
Publishing, Cham, 169–186.
[24] Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the internet of
things. In Proceedings of the 1st MCC Workshop on Mobile Cloud Computing. ACM, New York, NY, 13–16.
[25] Martin C. Bor, Utz Roedig, Thiemo Voigt, and Juan M. Alonso. 2016. Do LoRa low-power wide-area networks scale? In
Proceedings of the ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems.
ACM, New York, NY, 59–67.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:34 L. Kong et al.
[26] Alessio Botta, Walter de Donato, Valerio Persico, and Antonio Pescapé. 2016. Integration of cloud computing and
internet of things: A survey. Future Gen. Comput. Syst. 56 (2016), 684–700.
[27] Fangbo Cai, Nafei Zhu, Jingsha He, Pengyu Mu, Wenxin Li, and Yi Yu. 2019. Survey of access control models and
technologies for cloud computing. Cluster Comput. 22, 3 (2019), 6111–6122.
[28] Qing Cao, Tarek Abdelzaher, John Stankovic, and Tian He. 2008. The LiteOS operating system: Towards unix-like
abstractions for wireless sensor networks. In Proceedings of the International Conference on Information Processing in
Sensor Networks (IPSN’08). IEEE, 233–244.
[29] Juan José Martínez Castillo and Karina Aviles Rodriguez. 2012. Security architecture for Ad hoc NOMOHi networks:
Development of a project based on emergency rural telecommunications. In Proceedings of the World Congress on
Internet Security (WorldCIS’12). IEEE, 183–187.
[30] Korhan Cengiz and Tamer Dag. 2015. A review on the recent energy-efficient approaches for the internet protocol
stack. EURASIP J. Wireless Commun. Netw. 2015, 1 (2015), 1–22.
[31] Hojung Cha, Sukwon Choi, Inuk Jung, Hyoseung Kim, Hyojeong Shin, Jaehyun Yoo, and Chanmin Yoon. 2007. RE-
TOS: Resilient, expandable, and threaded operating system for wireless sensor networks. In Proceedings of the Inter-
national Symposium on Information Processing in Sensor Networks. IEEE, 148–157.
[32] Tej Bahadur Chandra, Pushpak Verma, and A. K. Dwivedi. 2016. Operating systems for internet of things: A compar-
ative study. In Proceedings of the International Conference on Information and Communication Technology for Compet-
itive Strategies (ICTCS’16). ACM, New York, NY, Article 47, 6 pages.
[33] Hyunseok Chang, Adiseshu Hari, Sarit Mukherjee, and T. V. Lakshman. 2014. Bringing the cloud to the edge. In
Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM’14). IEEE, 346–351.
[34] Kai Chih Chang, Razieh Nokhbeh Zaeem, and K. Suzanne Barber. 2018. Enhancing and evaluating identity privacy
and authentication strength by utilizing the identity ecosystem. In Proceedings of the Workshop on Privacy in the
Electronic Society. ACM, New York, NY, 114–120.
[35] Mingzhe Chen, Walid Saad, and Changchuan Yin. 2018. Virtual reality over wireless networks: Quality-of-service
model and learning-based resource management. IEEE Trans. Commun. 66, 11 (2018), 5621–5635.
[36] Songlin Chen, Yixin Jiang, Hong Wen, Wenjie Liu, Jie Chen, Wenxin Lei, and Aidong Xu. 2018. A novel terminal
security access method based on edge computing for IoT. In Proceedings of the International Conference on Networking
and Network Applications (NaNA’18). IEEE, 394–398.
[37] Xu Chen. 2014. Decentralized computation offloading game for mobile cloud computing. IEEE Trans. Parallel Distrib.
Syst. 26, 4 (2014), 974–983.
[38] Xu Chen, Lei Jiao, Wenzhong Li, and Xiaoming Fu. 2015. Efficient multi-user computation offloading for mobile-edge
cloud computing. IEEE/ACM Trans. Netw. 24, 5 (2015), 2795–2808.
[39] Zhipeng Cheng, Minghui Min, Zhibin Gao, and Lianfen Huang. 2020. Joint task offloading and resource allocation
for mobile edge computing in ultra-dense network. In Proceedings of the IEEE Global Communications Conference.
IEEE, 1–6.
[40] Shao-Yi Chien, Wei-Kai Chan, Yu-Hsiang Tseng, Chia-Han Lee, V. Srinivasa Somayazulu, and Yen-Kuang Chen. 2015.
Distributed computing in IoT: System-on-a-chip for smart cameras as an example. In Proceedings of the 20th Asia and
South Pacific Design Automation Conference. IEEE, 130–135.
[41] Supratim Das, Amarjeet Singh, Surinder Pal Singh, and Amit Kumar. 2015. A low overhead dynamic memory manage-
ment system for constrained memory embedded systems. In Proceedings of the International Conference on Computing
for Sustainable Global Development (INDIACom’15). IEEE, 809–815.
[42] A. Dastjerdi and R. Buyya. 2016. Fog computing: Helping the internet of things realize its potential. Computer 49, 8
(2016), 112–116.
[43] Rustem Dautov and Salvatore Distefano. 2017. Three-level hierarchical data fusion through the IoT, edge, and cloud
computing. In Proceedings of the International Conference on Internet of Things and Machine Learning. ACM, New
York, NY, Article 1, 5 pages.
[44] Josep Domingo-Ferrer, Oriol Farrás, Jordi Ribes-González, and David Sánchez. 2019. Privacy-preserving cloud com-
puting on sensitive data: A survey of methods, products and challenges. Comput. Commun. 140–141 (2019), 38–60.
[45] Jianbo Du, Liqiang Zhao, Jie Feng, Xiaoli Chu, and F. Richard Yu. 2018. Economical revenue maximization in cache
enhanced mobile edge computing. In Proceedings of the IEEE International Conference on Communications (ICC’18).
IEEE, 1–6.
[46] Adam Dunkels. 2007. Rime-a lightweight layered communication stack for sensor networks. In Proceedings of the
European Conference on Wireless Sensor Networks, Vol. 44. Citeseer, 2.
[47] EdgeX. 2018. EdgeX Foundry. Retrieved from https://www.edgexfoundry.org/get-started/.
[48] Hesham El-Sayed, Sharmi Sankar, Mukesh Prasad, Deepak Puthal, Akshansh Gupta, Manoranjan Mohanty, and Chin-
Teng Lin. 2018. Edge of things: The big picture on the integration of edge, IoT and the cloud in a distributed computing
environment. IEEE Access 6 (2018), 1706–1717.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:35
[49] Hanan Elazhary. 2019. Internet of things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and
edge emerging computing paradigms: Disambiguation and research directions. J. Netw. Comput. Applications 128
(2019), 105–140.
[50] Sinem Coleri Ergen. 2004. ZigBee/IEEE 802.15. 4 summary. UC Berkeley (Sept. 10, 2004).
[51] Ericsson. 2010. CEO to shareholders: 50 billion connections 2020. Retrieved from https://www.ericsson.com/en/press-
releases/2010/4/ceo-to-shareholders-50-billion-connections-2020.
[52] Mohamed Fahim, Brahim Ouchao, Abdeslam Jakimi, and Lahcen El Bermi. 2019. Application of a non-immersive
VR, IoT based approach to help moroccan students carry out practical activities in a personal learning style. Future
Internet 11, 1 (2019), 15.
[53] S. Farah, A. Benachenhou, G. Neveux, D. Barataud, G. Andrieu, and T. Fredon. 2015. Real-time microwave remote
laboratory architecture. In Proceedings of the European Microwave Conference (EuMC). IEEE, 1315–1318.
[54] Yuxiang Feng, Wenhao Wang, Yukai Weng, and Huanming Zhang. 2017. A replay-attack resistant authentication
scheme for the internet of things. In Proceedings of the IEEE International Conference on Computational Science and
Engineering (CSE’17) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC’17), Vol. 1. IEEE,
541–547.
[55] Hiro Gabriel Cerqueira Ferreira, Edna Dias Canedo, and Rafael Timóteo de Sousa. 2013. IoT architecture to enable
intercommunication through REST API and UPnP using IP, ZigBee and arduino. In Proceedings of the IEEE 9th Inter-
national Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’13). IEEE, 53–60.
[56] EdgeX Foundry. 2021. Why EdgeX. Retrieved from https://www.edgexfoundry.org/why_edgex/why-edgex/.
[57] Khusanbek Gafurov and Tai-Myoung Chung. 2019. Comprehensive survey on internet of things, architecture, se-
curity aspects, applications, related technologies, economic perspective, and future directions. J. Info. Process. Syst.
15 (2019), 797–819.
[58] Padmini Gaur and Mohit P. Tahiliani. 2015. Operating systems for IoT devices: A critical survey. In Proceedings of
the IEEE Region 10 Symposium. IEEE, 33–36.
[59] Amitabha Ghosh, Andreas Maeder, Matthew Baker, and Devaki Chandramouli. 2019. 5G evolution: A view on 5G
cellular technology beyond 3GPP release 15. IEEE Access 7 (2019), 127639–127651.
[60] Tuan Nguyen Gia, Mingzhe Jiang, Amir-Mohammad Rahmani, Tomi Westerlund, Pasi Liljeberg, and Hannu Ten-
hunen. 2015. Fog computing in healthcare internet of things: A case study on ECG feature extraction. In IEEE Interna-
tional Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable,
Autonomic and Secure Computing; Pervasive Intelligence and Computing. IEEE, 356–363.
[61] Dimitrios Glaroudis, Athanasios Iossifides, and Periklis Chatzimisios. 2020. Survey, comparison and research chal-
lenges of IoT application protocols for smart farming. Comput. Netw. 168, C (2020), 14.
[62] Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, and Trent Jaeger. 2017. Trustshadow: Secure
execution of unmodified applications with arm trustzone. In Proceedings of the 15th Annual International Conference
on Mobile Systems, Applications, and Services. ACM, New York, NY, 488–501.
[63] Shaoyong Guo, Xing Hu, Song Guo, Xuesong Qiu, and Feng Qi. 2020. Blockchain meets edge computing: A distributed
and trusted authentication system. IEEE Trans. Industr. Inform. 16, 3 (2020), 1972–1983.
[64] Xiuzhen Guo, Yuan He, Jia Zhang, and Haotian Jiang. 2019. WIDE: Physical-level CTC via digital emulation. In
Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN’19). IEEE, 49–60.
[65] Harshit Gupta, Amir Vahid Dastjerdi, Soumya K. Ghosh, and Rajkumar Buyya. 2017. iFogSim: A toolkit for modeling
and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments.
Software: Pract. Exper. 47, 9 (2017), 1275–1296.
[66] J. C. Haartsen. 2000. The bluetooth radio system. IEEE Person. Commun. 7, 1 (2000), 28–36.
[67] Oliver Hahm, Emmanuel Baccelli, Hauke Petersen, and Nicolas Tsiftes. 2016. Operating systems for low-end devices
in the internet of things: A survey. IEEE Internet Things J. 3, 5 (2016), 720–734.
[68] K. Eric Harper, Thijmen de Gooijer, Johannes O. Schmitt, and David Cox. 2016. Microdatabases for the industrial
Internet. Retrieved from https://arxiv.org/abs/1601.04036.
[69] Albert F. Harris III, Vansh Khanna, Guliz Tuncay, Roy Want, and Robin Kravets. 2016. Bluetooth low energy in dense
IoT environments. IEEE Commun. Mag. 54, 12 (2016), 30–36.
[70] Brian Hayes. 2008. Cloud computing. Commun. ACM 51, 7 (2008), 9–11.
[71] John L. Hennessy and David A. Patterson. 2011. Computer Architecture: A Quantitative Approach. Elsevier.
[72] P. S. Henry and Hui Luo. 2002. WiFi: What’s next? IEEE Commun. Mag. 40, 12 (2002), 66–72.
[73] M. Shamim Hossain and Ghulam Muhammad. 2016. Cloud-assisted industrial internet of things (IIoT)—Enabled
framework for health monitoring. Comput. Netw. 101 (2016), 192–202.
[74] Farhoud Hosseinpour, Payam Amoli, Juha Plosila, Timo Hämäläinen, and Hannu Tenhunen. 2016. An intrusion
detection system for Fog computing and IoT based logistic systems using a smart data approach. Int. J. Dig. Content
Technol. Appl. 10 (12 2016), 34–46.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:36 L. Kong et al.
[75] Junqin Huang, Linghe Kong, Guihai Chen, Min-You Wu, Xue Liu, and Peng Zeng. 2019. Towards secure indus-
trial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans. Industr. Inform. 15, 6 (2019),
3680–3689.
[76] Jonathan Hui and Pascal Thubert. 2011. Compression format for IPv6 datagrams over IEEE 802.15. 4-based networks.
Technical Report 6282. Internet Engineering Task Force (IETF), 1–23. Retrieved from https://www.rfc-editor.org/rfc/
rfc6282.txt.
[77] Yaser Jararweh, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Mladen Vouk, Andy Rindos, et al. 2015. SDIoT: A software
defined based internet of things framework. J. Ambient Intell. Human. Comput. 6, 4 (2015), 453–461.
[78] Yaser Jararweh, Mohammad Alsmirat, Mahmoud Al-Ayyoub, Elhadj Benkhelifa, Ala’ Darabseh, Brij Gupta, and
Ahmad Doulat. 2017. Software-defined system support for enabling ubiquitous mobile edge computing. Comput.
J. 60, 10 (2017), 1443–1457.
[79] Yaser Jararweh, Ahmad Doulat, Omar AlQudah, Ejaz Ahmed, Mahmoud Al-Ayyoub, and Elhadj Benkhelifa. 2016.
The future of mobile cloud computing: Integrating cloudlets and mobile edge computing. In Proceedings of the 23rd
International Conference on Telecommunications (ICT’16). IEEE, 1–5.
[80] Farhana Javed, Muhamamd Khalil Afzal, Muhammad Sharif, and Byung-Seo Kim. 2018. Internet of things (IoT) oper-
ating systems support, networking technologies, applications, and challenges: A comparative review. IEEE Commun.
Surveys Tutor. 20, 3 (2018), 2062–2100.
[81] Fatma Ben Jemaa, Guy Pujolle, and Michel Pariente. 2016. Cloudlet-and NFV-based carrier Wi-Fi architecture for a
wider range of services. Ann. Telecommun. 71, 11 (2016), 617–624.
[82] Sunmi Jun, Yoohwa Kang, Jaeho Kim, and Changki Kim. 2020. Ultra-low-latency services in 5G systems: A perspec-
tive from 3GPP standards. ETRI J. 42, 5 (2020), 721–733.
[83] Ajay Kakkar. 2020. A survey on secure communication techniques for 5G wireless heterogeneous networks. Info.
Fusion 62 (2020), 89–109.
[84] Jiawen Kang, Rong Yu, Xumin Huang, Maoqiang Wu, Sabita Maharjan, Shengli Xie, and Yan Zhang. 2019. Blockchain
for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6, 3 (2019),
4660–4670.
[85] Hajime Kanzaki, Kevin Schubert, and Nicholas Bambos. 2017. Video streaming schemes for industrial IoT. In Pro-
ceedings of the International Conference on Computer Communication and Networks (ICCCN’17). IEEE, 1–7.
[86] Wazir Zada Khan, Ejaz Ahmed, Saqib Hakak, Ibrar Yaqoob, and Arif Ahmed. 2019. Edge computing: A survey. Future
Gen. Comput. Syst. 97 (2019), 219–235.
[87] Song Min Kim and Tian He. 2015. FreeBee: Cross-technology communication via free side-channel. In Proceedings
of the Annual International Conference on Mobile Computing and Networking (MobiCom’15). ACM, New York, NY,
317–330.
[88] Shinji Kitagami, Tadashi Ogino, Takuo Suganuma, and Norio Shiratori. 2017. Proposal of a multi-agent based flexible
IoT edge computing architecture harmonizing its control with cloud computing. In Proceedings of the International
Symposium on Computing and Networking (CANDAR’17). IEEE, 223–229.
[89] Diego Kreutz, Fernando M. V. Ramos, Paulo Esteves Veríssimo, Christian Esteve Rothenberg, Siamak Azodolmolky,
and Steve Uhlig. 2015. Software-defined networking: A comprehensive survey. Proc. IEEE 103, 1 (2015), 14–76.
[90] Karthik Kumar, Jibang Liu, Yung-Hsiang Lu, and Bharat Bhargava. 2013. A survey of computation offloading for
mobile systems. Mobile Netw. Appl. 18, 1 (2013), 129–140.
[91] Vijay Kumar, George Oikonomou, Theo Tryfonas, Dan Page, and Iain Phillips. 2014. Digital investigations for IPv6-
based wireless sensor networks. Dig. Invest. 11, S2 (2014), S66–S75.
[92] Patrick Kurp. 2008. Green computing. Commun. ACM 51, 10 (2008), 11–13.
[93] O. Landsiedel, K. Wehrle, and S. Gotz. 2005. Accurate prediction of power consumption in sensor networks. In Pro-
ceedings of the IEEE Workshop on Embedded Networked Sensors. IEEE, 37–44.
[94] Erik G. Larsson, Ove Edfors, Fredrik Tufvesson, and Thomas L. Marzetta. 2014. Massive MIMO for next generation
wireless systems. IEEE Commun. Mag. 52, 2 (2014), 186–195.
[95] Heiner Lasi, Peter Fettke, Hans-Georg Kemper, Thomas Feld, and Michael Hoffmann. 2014. Industry 4.0. Bus. Info.
Syst. Eng. 6, 4 (2014), 239–242.
[96] Bo Li, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, and Yun Yang. 2020. Auditing cache data integrity in the edge
computing environment. IEEE Trans. Parallel Distrib. Syst. 32, 5 (2020), 1210–1223.
[97] Jiliang Li, Zhou Su, Deke Guo, Kim-Kwang Raymond Choo, Yusheng Ji, and Huayan Pu. 2021. Secure data
deduplication protocol for edge-assisted mobile CrowdSensing services. IEEE Trans. Vehic. Technol. 70, 1 (2021),
742–753.
[98] Shichao Li, Ning Zhang, Siyu Lin, Linghe Kong, Ajay Katangur, Muhammad Khurram Khan, Minming Ni, and Gang
Zhu. 2018. Joint admission control and resource allocation in edge computing for internet of things. IEEE Netw. 32,
1 (2018), 72–79.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:37
[99] Fuhong Lin, Yutong Zhou, Xingsuo An, Ilsun You, and Kim-Kwang Raymond Choo. 2018. Fair resource allocation in
an intrusion-detection system for edge computing: Ensuring the security of internet of things devices. IEEE Consum.
Electron. Mag. 7, 6 (2018), 45–50.
[100] Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, and Wei Zhao. 2017. A survey on internet of things:
Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4, 5 (2017),
1125–1142.
[101] Dan Liu, Zheng Yan, Wenxiu Ding, and Mohammed Atiquzzaman. 2019. A survey on secure data analytics in edge
computing. IEEE Internet Things J. 6, 3 (2019), 4946–4967.
[102] Yang Lu and Li Da Xu. 2018. Internet of things (IoT) cybersecurity research: A review of current research topics. IEEE
Internet Things J. 6, 2 (2018), 2103–2115.
[103] Xin Ma and Wei Luo. 2008. The analysis of 6LowPAN technology. In Proceedings of the IEEE Pacific-Asia Workshop
on Computational Intelligence and Industrial Application, Vol. 1. IEEE, 963–966.
[104] Pavel Mach and Zdenek Becvar. 2017. Mobile edge computing: A survey on architecture and computation offloading.
IEEE Commun. Surveys Tutor. 19, 3 (2017), 1628–1656.
[105] Shahid Mahmood, Amin Ullah, and Anas Khalid Kayani. 2019. Fog computing trust based architecture for internet
of things devices. Int. J. Comput. Commun. Netw. 1, 1 (2019), 18–25.
[106] Luca Mainetti, Luigi Patrono, and Antonio Vilei. 2011. Evolution of wireless sensor networks towards the internet
of things: A survey. In Proceedings of the International Conference on Software, Telecommunications and Computer
Networks. IEEE, 1–6.
[107] Nitin Mangalvedhe, Rapeepat Ratasuk, and Amitava Ghosh. 2016. NB-IoT deployment study for low power wide area
cellular IoT. In Proceedings of the IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio
Communications (PIMRC’16). IEEE, 1–6.
[108] Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. A survey on mobile edge com-
puting: The communication perspective. IEEE Commun. Surveys Tutor. 19, 4 (2017), 2322–2358.
[109] Yuyi Mao, Jun Zhang, and Khaled B. Letaief. 2016. Dynamic computation offloading for mobile-edge computing with
energy harvesting devices. IEEE J. Select. Areas Commun. 34, 12 (2016), 3590–3605.
[110] Diego Mendez Mena, Ioannis Papapanagiotou, and Baijian Yang. 2018. Internet of things: Survey on security. Info.
Secur. J.: Global Perspect. 27, 3 (2018), 162–182.
[111] Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, Niels Bouten, Filip De Turck, and Raouf Boutaba. 2016. Net-
work function virtualization: State-of-the-art and research challenges. IEEE Commun. Surveys Tutor. 18, 1 (2016),
236–262.
[112] Takuho Mitsunaga, Yoshifumi Manabe, and Tatsuaki Okamoto. 2010. Efficient secure auction protocols based on the
Boneh-Goh-Nissim encryption. In Advances in Information and Computer Security. Springer, Berlin, 149–163.
[113] Muhammad Baqer Mollah, Md. Abul Kalam Azad, and Athanasios Vasilakos. 2017. Secure data sharing and searching
at the edge of cloud-assisted internet of things. IEEE Cloud Comput. 4, 1 (2017), 34–42.
[114] N. Montavont and T. Noel. 2002. Handover management for mobile nodes in IPv6 networks. IEEE Commun. Mag. 40,
8 (2002), 38–43.
[115] Roberto Morabito, Vittorio Cozzolino, Aaron Yi Ding, Nicklas Beijar, and Jorg Ott. 2018. Consolidate IoT edge com-
puting with lightweight virtualization. IEEE Netw. 32, 1 (2018), 102–111.
[116] Vladimir Moravcevic, Milan Tucic, Roman Pavlovic, and Aleksandar Majdak. 2015. An approach for uniform repre-
sentation and control of ZigBee devices in home automation software. In Proceedings of the IEEE 5th International
Conference on Consumer Electronics (ICCE’15). IEEE, 237–239.
[117] Arsalan Mosenia and Niraj K. Jha. 2017. A comprehensive study of security of internet-of-things. IEEE Trans. Emerg.
Top. Comput. 5, 4 (2017), 586–602.
[118] Carla Mouradian, Diala Naboulsi, Sami Yangui, Roch H. Glitho, Monique J. Morrow, and Paul A. Polakos. 2018. A
comprehensive survey on Fog computing: State-of-the-art and research challenges. IEEE Commun. Surveys Tutor. 20,
1 (2018), 416–464.
[119] Geoff Mulligan. 2007. The 6LoWPAN architecture. In Proceedings of the 4th Workshop on Embedded Networked Sensors.
ACM, New York, NY, 78–82.
[120] Arslan Munir, Prasanna Kansakar, and Samee U. Khan. 2017. IFCIoT: Integrated Fog cloud IoT: A novel architectural
paradigm for the future Internet of Things. IEEE Consum. Electron. Mag. 6, 3 (2017), 74–82.
[121] Arslan Musaddiq, Yousaf Bin Zikria, Oliver Hahm, Heejung Yu, Ali Kashif Bashir, and Sung Won Kim. 2018. A survey
on resource management in IoT operating systems. IEEE Access 6 (2018), 8459–8482.
[122] Karan Nair, Janhavi Kulkarni, Mansi Warde, Zalak Dave, Vedashree Rawalgaonkar, Ganesh Gore, and Jonathan Joshi.
2015. Optimizing power consumption in IoT based wireless sensor networks using bluetooth low energy. In Proceed-
ings of the International Conference on Green Computing and Internet of Things (ICGCIoT’15). IEEE, 589–593.
[123] Rick Nelson. 2017. Smart factories leverage cloud, edge computing. Eval. Eng. 56, 6 (2017), 14.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:38 L. Kong et al.
[124] Kim Thuat Nguyen, Maryline Laurent, and Nouha Oualha. 2015. Survey on secure communication protocols for the
internet of things. Ad Hoc Netw. 32 (2015), 17–31.
[125] Dennis Kengo Oka, Takahiro Furue, Lennart Langenhop, and Tomohiro Nishimura. 2014. Survey of vehicle IoT blue-
tooth devices. In Proceedings of the IEEE 7th International Conference on Service-Oriented Computing and Applications.
IEEE, 260–264.
[126] Babatunji Omoniwa, Riaz Hussain, Muhammad Awais Javed, Safdar Hussain Bouk, and Shahzad A. Malik. 2019.
Fog/Edge computing-based IoT (FECIoT): Architecture, applications, and research issues. IEEE Internet Things J. 6, 3
(2019), 4118–4149.
[127] Jose A. Onieva, Ruben Rios, Rodrigo Roman, and Javier Lopez. 2019. Edge-assisted vehicular networks security. IEEE
Internet Things J. 6, 5 (2019), 8038–8045.
[128] Pouya Ostovari, Abdallah Khreishah, and Jie Wu. 2013. Cache content placement using triangular network coding.
In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’13). IEEE, 1375–1380.
[129] Michael O’Keeffe. 2008. The paillier cryptosystem. Math. Dept. 18 (Apr. 2008), 1–16.
[130] Jianli Pan and James McElhannon. 2018. Future edge cloud and edge computing for internet of things applications.
IEEE Internet Things J. 5, 1 (2018), 439–449.
[131] Heejin Park, Shuang Zhai, Long Lu, and Felix Xiaozhu Lin. 2019. StreamBox-TZ: Secure stream analytics at the edge
with TrustZone. In Proceedings of the USENIX Annual Technical Conference (ATC’19). 537–554.
[132] Yao Peng, Longfei Shangguan, Yue Hu, Yujie Qian, Xianshang Lin, Xiaojiang Chen, Dingyi Fang, and Kyle Jamieson.
2018. PLoRa: A passive long-range data network from ambient LoRa transmissions. In Proceedings of the ACM Special
Interest Group on Data Communications (SIGCOMM’18). ACM, New York, NY, 147–160.
[133] Charith Perera, Chi Harold Liu, Srimal Jayawardena, and Min Chen. 2014. A survey on internet of things from
industrial market perspective. IEEE Access 2 (2014), 1660–1679.
[134] Charith Perera, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2014. Context aware computing
for the internet of things: A survey. IEEE Commun. Surveys Tutor. 16, 1 (2014), 414–454.
[135] Tara Petrić, Mathieu Goessens, Loutfi Nuaymi, Laurent Toutain, and Alexander Pelov. 2016. Measurements, perfor-
mance and analysis of LoRa FABIAN, a real-world implementation of LPWAN. In Proceedings of the IEEE 27th Annual
International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC’16). IEEE, 1–7.
[136] Vitaly Petrov, Andrey Samuylov, Vyacheslav Begishev, Dmitri Moltchanov, Sergey Andreev, Konstantin Samouylov,
and Yevgeni Koucheryavy. 2018. Vehicle-based relay assistance for opportunistic crowdsensing over narrowband IoT
(NB-IoT). IEEE Internet Things J. 5, 5 (2018), 3710–3723.
[137] Juha Petäjäjärvi, Konstantin Mikhaylov, Marko Pettissalo, Janne Janhunen, and Jari Iinatti. 2017. Performance of
a low-power wide-area network based on LoRa technology: Doppler robustness, scalability, and coverage. Int. J.
Distrib. Sensor Netw. 13, 3 (2017), 1550147717699412.
[138] Pawani Porambage, Jude Okwuibe, Madhusanka Liyanage, Mika Ylianttila, and Tarik Taleb. 2018. Survey on multi-
access edge computing for internet of things realization. IEEE Commun. Surveys Tutor. 20, 4 (2018), 2961–2991.
[139] Zane D. Purvis and Alexander G. Dean. 2008. TOSSTI: Saving time and energy in TinyOS with software thread
integration. In Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium. IEEE,
354–363.
[140] Zhijing Qin, Grit Denker, Carlo Giannelli, Paolo Bellavista, and Nalini Venkatasubramanian. 2014. A software defined
networking architecture for the internet-of-things. In Proceedings of the IEEE Network Operations and Management
Symposium (NOMS’14). IEEE, 1–9.
[141] Meikang Qiu, Sun-Yuan Kung, and Keke Gai. 2020. Intelligent security and optimization in Edge/Fog Computing.
Future Generation Computer Systems 107 (2020), 1140–1142. DOI:https://doi.org/10.1016/j.future.2019.06.002
[142] Wajid Rafique, Lianyong Qi, Ibrar Yaqoob, Muhammad Imran, Raihan Ur Rasool, and Wanchun Dou. 2020. Com-
plementing IoT services through software defined networking and edge computing: A comprehensive survey. IEEE
Commun. Surveys Tutor. 22, 3 (2020), 1761–1804.
[143] Amir M. Rahmani, Tuan Nguyen Gia, Behailu Negash, Arman Anzanpour, Iman Azimi, Mingzhe Jiang, and Pasi
Liljeberg. 2018. Exploiting smart e-health gateways at the edge of healthcare internet-of-things: A Fog computing
approach. Future Gen. Comput. Syst. 78 (2018), 641–658.
[144] Muhammad Raheel Raza, Asaf Varol, and Nurhayat Varol. 2020. Cloud and Fog computing: A survey to the con-
cept and challenges. In Proceedings of the International Symposium on Digital Forensics and Security (ISDFS’20).
IEEE, 1–6.
[145] Biljana L. Risteska Stojkoska and Kire V. Trivodaliev. 2017. A review of internet of things for smart home: Challenges
and solutions. J. Cleaner Prod. 140 (2017), 1454–1464.
[146] Rodrigo Roman, Javier Lopez, and Masahiro Mambo. 2018. Mobile edge computing, Fog et al.: A survey and analysis
of security threats and challenges. Future Gen. Comput. Syst. 78 (2018), 680–698.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:39
[147] Eyal Ronen, Adi Shamir, Achi-Or Weingarten, and Colin O’Flynn. 2017. IoT goes nuclear: Creating a ZigBee chain
reaction. In Proceedings of the IEEE Symposium on Security and Privacy (S&P’17). IEEE, 195–212.
[148] Dario Sabella, Alessandro Vaillant, Pekka Kuure, Uwe Rauschenbach, and Fabio Giust. 2016. Mobile-edge computing
architecture: The role of MEC in the internet of things. IEEE Consum. Electron. Mag. 5, 4 (2016), 84–91.
[149] Ahmad-Reza Sadeghi, Christian Wachsmann, and Michael Waidner. 2015. Security and privacy challenges in indus-
trial internet of things. In Proceedings of the ACM/EDAC/IEEE Design Automation Conference (DAC’15). IEEE, 1–6.
[150] Yuvraj Sahni, Jiannong Cao, and Lei Yang. 2019. Data-aware task allocation for achieving low latency in collaborative
edge computing. IEEE Internet Things J. 6, 2 (2019), 3512–3524.
[151] Ahsan Saleem, Abid Khan, Saif Ur Rehman Malik, Haris Pervaiz, Hassan Malik, Masoom Alam, and Anish Jindal.
2020. FESDA: Fog-enabled secure data aggregation in smart grid IoT network. IEEE Internet Things J. 7, 7 (2020),
6132–6142.
[152] Ola Salman, Imad Elhajj, Ali Chehab, and Ayman Kayssi. 2018. IoT survey: An SDN and Fog computing perspective.
Comput. Netw. 143 (2018), 221–246.
[153] Ola Salman, Imad Elhajj, Ayman Kayssi, and Ali Chehab. 2015. Edge computing enabling the internet of things. In
Proceedings of the IEEE 2nd World Forum on Internet of Things (WF-IoT’15). IEEE, 603–608.
[154] Zihao Sang, Songtao Guo, Quyuan Wang, and Ying Wang. 2021. GCS: Collaborative video cache management strat-
egy in multi-access edge computing. Ad Hoc Netw. 117 (2021), 102516.
[155] Subhadeep Sarkar, Subarna Chatterjee, and Sudip Misra. 2018. Assessment of the suitability of Fog computing in the
context of internet of things. IEEE Trans. Cloud Comput. 6, 1 (2018), 46–59.
[156] Mahadev Satyanarayanan, Pieter Simoens, Yu Xiao, Padmanabhan Pillai, Zhuo Chen, Kiryong Ha, Wenlu Hu, and
Brandon Amos. 2015. Edge analytics in the internet of things. IEEE Pervas. Comput. 14, 2 (2015), 24–31.
[157] Pallavi Sethi and Smruti R. Sarangi. 2017. Internet of things: Architectures, protocols, and applications. J. Electric.
Comput. Eng. 2017 (2017), 9324035.
[158] Mansoor Shafi, Andreas F. Molisch, Peter J. Smith, Thomas Haustein, Peiying Zhu, Prasan De Silva, Fredrik Tufvesson,
Anass Benjebbour, and Gerhard Wunder. 2017. 5G: A tutorial overview of standards, trials, challenges, deployment,
and practice. IEEE J. Select. Areas Commun. 35, 6 (2017), 1201–1221.
[159] Sajjad Hussain Shah and Ilyas Yaqoob. 2016. A survey: Internet of things (IOT) technologies, applications and chal-
lenges. In Proceedings of the IEEE Smart Energy Grid Engineering (SEGE’16). IEEE, 381–385.
[160] Majlesi Shahrbanoo, Mehrpour Ali, and Mehran Mohsenzadeh. 2012. An approach for agile SOA development using
agile principals. Retrieved from https://arxiv.org/abs/1204.0368.
[161] Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart user authentication through actuation of daily
activities leveraging WiFi-enabled IoT. In Proceedings of the ACM International Symposium on Theory, Algorithmic
Foundations, and Protocol Design for Mobile Networks and Mobile Computing (Mobihoc’17). ACM, New York, NY,
Article 5, 10 pages.
[162] Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. 2016. Edge computing: Vision and challenges. IEEE
Internet Things J. 3, 5 (2016), 637–646.
[163] Kyung-Ah Shim. 2019. Universal forgery attacks on remote authentication schemes for wireless body area networks
based on internet of things. IEEE Internet Things J. 6, 5 (2019), 9211–9212.
[164] Jose Costa Sapalo Sicato, Sushil Kumar Singh, Shailendra Rathore, and Jong Hyuk Park. 2020. A comprehensive
analyses of intrusion detection system for IoT environment. J. Info. Process. Syst. 16, 4 (2020), 975–990.
[165] Rashmi Sharan Sinha, Yiqiao Wei, and Seung-Hoon Hwang. 2017. A survey on LPWA technology: LoRa and NB-IoT.
ICT Express 3, 1 (2017), 14–21.
[166] S. Smys, B. Abul, and W. Haoxiang. 2020. Hybrid intrusion detection system for internet of things (IoT). J. ISMAC 2,
4 (2020), 190–199.
[167] Alexandru Stanciu. 2017. Blockchain based distributed control system for edge computing. In Proceedings of the
International Conference on Control Systems and Computer Science (CSCS’17). IEEE, 667–671.
[168] Mark W. Storer, Kevin Greenan, Darrell D. E. Long, and Ethan L. Miller. 2008. Secure data deduplication. In Proceedings
of the ACM International Workshop on Storage Security and Survivability. ACM, New York, NY, 1–10.
[169] Hung-Min Sun, Shih-Pu Hsu, and Chien-Ming Chen. 2007. Mobile jamming attack and its countermeasure in wireless
sensor networks. In Proceedings of the International Conference on Advanced Information Networking and Applications
Workshops (AINAW’07), Vol. 1. IEEE, 457–462.
[170] Xiang Sun and Nirwan Ansari. 2016. EdgeIoT: Mobile edge computing for the internet of things. IEEE Commun. Mag.
54, 12 (2016), 22–29.
[171] Tarik Taleb, Sunny Dutta, Adlen Ksentini, Muddesar Iqbal, and Hannu Flinck. 2017. Mobile edge computing potential
in making cities smarter. IEEE Commun. Mag. 55, 3 (2017), 38–43.
[172] Tuyen X. Tran, Abolfazl Hajisami, Parul Pandey, and Dario Pompili. 2017. Collaborative mobile edge computing in
5G networks: New paradigms, scenarios, and challenges. IEEE Commun. Mag. 55, 4 (2017), 54–61.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
174:40 L. Kong et al.
[173] Fan-Hsun Tseng, Li-Der Chou, and Han-Chieh Chao. 2011. A survey of black hole attacks in wireless mobile ad hoc
networks. Hum.-centric Comput. Info. Sci. 1, 1 (2011), 4.
[174] Carlo Vallati, Antonio Virdis, Enzo Mingozzi, and Giovanni Stea. 2016. Mobile-edge computing come home connect-
ing things in future smart homes using LTE device-to-device communications. IEEE Consum. Electr. Mag. 5, 4 (2016),
77–83.
[175] M. Vellanki, S. P. R. Kandukuri, and A. Razaque. 2016. Node level energy efficiency protocol for internet of things. J.
Theoret. Comput. Sci. 3 (2016), 5.
[176] Prabal Verma and Sandeep K. Sood. 2018. Fog assisted-IoT enabled patient health monitoring in smart homes. IEEE
Internet Things J. 5, 3 (2018), 1789–1796.
[177] Massimo Villari, Maria Fazio, Schahram Dustdar, Omer Rana, and Rajiv Ranjan. 2016. Osmotic computing: A new
paradigm for edge/cloud integration. IEEE Cloud Comput. 3, 6 (2016), 76–83.
[178] G. V. Vivek and M. P. Sunil. 2015. Enabling IOT services using WIFI-ZigBee gateway for a home automation system.
In Proceedings of the IEEE International Conference on Research in Computational Intelligence and Communication
Networks (ICRCICN’15). IEEE, 77–80.
[179] Haoqin Wang, Zhen Chen, Guanping Xiao, and Zheng Zheng. 2016. Network of networks in Linux operating system.
Physica A: Stat. Mech. Appl. 447 (2016), 520–526.
[180] Tian Wang, Guangxue Zhang, Anfeng Liu, Md Zakirul Alam Bhuiyan, and Qun Jin. 2019. A secure IoT service
architecture with an efficient balance dynamics based on cloud and edge computing. IEEE Internet Things J. 6, 3
(2019), 4831–4843.
[181] Xiaoding Wang, Sahil Garg, Hui Lin, Georges Kaddoum, Jia Hu, and M. Shamim Hossain. 2020. A secure data ag-
gregation strategy in edge computing and blockchain empowered internet of things. IEEE Internet Things J. (2020),
1–1.
[182] Mohammad Wazid, Poonam Reshma Dsouza, Ashok Kumar Das, Vivekananda Bhat K. Neeraj Kumar, and Joel J. P. C.
Rodrigues. 2019. RAD-EI: A routing attack detection scheme for edge-based internet of things environment. Int. J.
Commun. Syst. 32, 15 (2019), e4024.
[183] Hua Wei, Hong Luo, Yan Sun, and Mohammad S. Obaidat. 2020. Cache-aware computation offloading in IoT systems.
IEEE Syst. J. 14, 1 (2020), 61–72.
[184] Juan Wen, Kaibin Huang, Sheng Yang, and Victor O. K. Li. 2017. Cache-enabled heterogeneous cellular networks:
Optimal tier-level content placement. IEEE Trans. Wireless Commun. 16, 9 (2017), 5939–5952.
[185] Bernd W. Wirtz, Jan C. Weyerer, and Franziska T. Schichtel. 2019. An integrative public IoT framework for smart
government. Govern. Info. Quart. 36, 2 (2019), 333–345.
[186] Junjuan Xia, Chao Li, Xiazhi Lai, Shiwei Lai, Fusheng Zhu, Dan Deng, and Liseng Fan. 2020. Cache-aided mobile edge
computing for B5G wireless communication networks. EURASIP J. Wireless Commun. Netw. 2020, 1 (2020), 1–10.
[187] Chenhan Xu, Kun Wang, Peng Li, Song Guo, Jiangtao Luo, Baoliu Ye, and Minyi Guo. 2018. Making big data open in
edges: A resource-efficient blockchain-based approach. IEEE Trans. Parallel Distrib. Syst. 30, 4 (2018), 870–882.
[188] Li Da Xu, Wu He, and Shancang Li. 2014. Internet of things in industries: A survey. IEEE Trans. Industr. Inform. 10, 4
(2014), 2233–2243.
[189] Xiaolong Xu, Qingxiang Liu, Yun Luo, Kai Peng, Xuyun Zhang, Shunmei Meng, and Lianyong Qi. 2019. A compu-
tation offloading method over big data for IoT-enabled cloud-edge computing. Future Gen. Comput. Syst. 95 (2019),
522–533.
[190] Zhiwei Xu, Lu Chao, and Xiaohui Peng. 2019. T-REST: An open-enabled architectural style for the internet of things.
IEEE Internet Things J. 6, 3 (2019), 4019–4034.
[191] Dylan Yaga, Peter Mell, Nik Roby, and Karen Scarfone. 2018. Blockchain Technology Overview. NIST Intera-
gency/Internal Report (NISTIR), National Institute of Standards and Technology, Gaithersburg, MD. DOI:https:
//doi.org/10.6028/NIST.IR.8202
[192] Shanhe Yi, Cheng Li, and Qun Li. 2015. A survey of Fog computing: Concepts, applications and issues. In Proceedings
of the Workshop on Mobile Big Data. ACM, New York, NY, 37–42.
[193] Changsheng You, Kaibin Huang, Hyukjin Chae, and Byoung-Hoon Kim. 2016. Energy-efficient resource allocation
for mobile-edge computation offloading. IEEE Trans. Wireless Commun. 16, 3 (2016), 1397–1411.
[194] Wei Yu, Fan Liang, Xiaofei He, William Grant Hatcher, Chao Lu, Jie Lin, and Xinyu Yang. 2018. A survey on the edge
computing for the internet of things. IEEE Access 6 (2018), 6900–6919.
[195] Faisal A. Zaman, Abdallah Jarray, and Ahmed Karmouch. 2019. Software defined network-based edge cloud resource
allocation framework. IEEE Access 7 (2019), 10672–10690.
[196] John K. Zao, Tchin Tze Gan, Chun Kai You, Sergio José Rodríguez Méndez, Cheng En Chung, Yu Te Wang, Tim
Mullen, and Tzyy Ping Jung. 2014. Augmented brain computer interaction based on Fog computing and linked data.
In Proceedings of the International Conference on Intelligent Environments. IEEE, 374–377.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.
Edge-computing-driven Internet of Things: A Survey 174:41
[197] Jiale Zhang, Bing Chen, Yanchao Zhao, Xiang Cheng, and Feng Hu. 2018. Data security and privacy-preserving in
edge computing paradigm: Survey and open issues. IEEE Access 6 (2018), 18209–18237.
[198] Ma Zhaofeng, Wang Xiaochang, Deepak Kumar Jain, Haneef Khan, Gao Hongmin, and Wang Zhen. 2019. A
blockchain-based trusted data management scheme in edge computing. IEEE Trans. Industr. Inform. 16, 3 (2019),
2013–2021.
[199] Jiehan Zhou, Teemu Leppanen, Erkki Harjula, Mika Ylianttila, Timo Ojala, Chen Yu, Hai Jin, and Laurence Tianruo
Yang. 2013. CloudThings: A common architecture for integrating the internet of things with cloud computing. In
Proceedings of the IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD’13).
IEEE, 651–657.
[200] Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin Sun, and Jian Ma. 2010. ZiFi: Wireless LAN discovery via
ZigBee interference signatures. In Proceedings of the ACM Annual International Conference on Mobile Computing and
Networking (MobiCom’10). ACM, New York, NY, 49–60.
ACM Computing Surveys, Vol. 55, No. 8, Article 174. Publication date: December 2022.