scholarly journals The Future of Mobile Edge Computing

2021 ◽  
pp. 81-105
Author(s):  
Yan Zhang

AbstractThis chapter first introduces the fundamental principles of blockchain and the integration of blockchain and mobile edge computing (MEC). Blockchain is a distributed ledger technology with a few desirable security characteristics. The integration of blockchain and MEC can improve the security of current MEC systems and provide greater performance benefits in terms of better decentralization, security, privacy, and service efficiency. Then, the convergence of artificial intelligence (AI) and MEC is presented. A federated learning–empowered MEC architecture is introduced. To improve the performance of the proposed scheme, asynchronous federated learning is proposed. The integration of blockchain and federated learning is also presented to enhance the security and privacy of the federated learning–empowered MEC scheme. Finally, more MEC enabled applications are discussed.

2020 ◽  
Vol 2 (1) ◽  
pp. 92
Author(s):  
Rahim Rahmani ◽  
Ramin Firouzi ◽  
Sachiko Lim ◽  
Mahbub Alam

The major challenges of operating data-intensive of Distributed Ledger Technology (DLT) are (1) to reach consensus on the main chain as a set of validators cast public votes to decide on which blocks to finalize and (2) scalability on how to increase the number of chains which will be running in parallel. In this paper, we introduce a new proximal algorithm that scales DLT in a large-scale Internet of Things (IoT) devices network. We discuss how the algorithm benefits the integrating DLT in IoT by using edge computing technology, taking the scalability and heterogeneous capability of IoT devices into consideration. IoT devices are clustered dynamically into groups based on proximity context information. A cluster head is used to bridge the IoT devices with the DLT network where a smart contract is deployed. In this way, the security of the IoT is improved and the scalability and latency are solved. We elaborate on our mechanism and discuss issues that should be considered and implemented when using the proposed algorithm, we even show how it behaves with varying parameters like latency or when clustering.


2020 ◽  
Vol 224 ◽  
pp. 03018
Author(s):  
L Novoselova ◽  
E Grin

The article addresses the prospects of using distributed ledger technologies – blockchain and artificial intelligence – for the purpose of systematizing the rights to the results of intellectual activity for their subsequent commercialization. The authors describe the key characteristics of the distributed ledger technology and review various legal problems pertaining to the use of blockchain technologies. The authors draw conclusions regarding the prospects of using blockchain and artificial intelligence technologies as measures for rapid prevention and elimination of intellectual rights violations. They also express their views on the process of commercializing intellectual property and reducing the number of conflicts related to the inclusion of intellectual property objects into distributed ledger systems. The article was prepared with the financial support of the Ministry of Higher Education and Science of the Russian Federation within the framework of the research “Scientific and methodological support for the development of theoretical and applied legal structures (models) of accounting and disposal of rights to the results of intellectual activity (technology transfer)


Author(s):  
Atiqur Rahman ◽  
Guangfu Wu ◽  
Ali Md Liton

Nowadays, the masonry for environment-friendly and protected network structure designs, for example, the Internet of Things and gigantic data analytics are increasing at a faster pace compared to an earlier state. Mobile edge computing for an Internet of Things widget is information processing that is achieved at or close to the collectors of information in an Internet of Things system. Herein, we are proposing to temporarily evaluation the concepts, features, protection, and privacy applications of Internet of Things authorized mobile edge computing with its data protection view in our data-driven globe. We focus on illuminating one of kind components that need to be taken into consideration whilst creating a scalable, consistent, impenetrable and disseminated mobile edge computing structure. We also sum up the fundamental ideas regarding security threat alleviation strategies. After that, we walk around the existing challenges and opportunities in the area of mobile edge computing. In conclusion, we analyze a case study, in which a security protection mechanism can be hardened to lift out everyday jobs.


Logistics ◽  
2020 ◽  
Vol 4 (4) ◽  
pp. 32
Author(s):  
Saša Malešević ◽  
Michael Lustenberger ◽  
Florian Spychiger

Improving current supply chains by using distributed ledger technology (DLT) has been a highly researched topic during the last years. Currently, there are numerous articles elaborating on how such technologies can theoretically improve supply chains. However, case studies of such concepts and their economic value are scarce. In order to bridge this gap, we collaborated with a regional label company to clarify how a distributed ledger technology would benefit their ecosystem. This work answers the question of how such a prototype would look and whether it adds value. By following design science research practices, we design two artifacts based on requirements gathered in 14 interviews and discuss the artifacts’ elements within an evaluation panel. Our findings show that a distributed ledger application for the regional label ecosystem should have an open and decentralized architecture giving all participants full access to the shared data while still providing security and privacy for sensitive data. Additionally, data capturing should be simple. However, such an application does not add sufficient economic value and is currently of no practical interest in the regional label ecosystem as the expenditure likely exceeds the benefit.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1834
Author(s):  
Ikram Ullah ◽  
Gerard de Roode ◽  
Nirvana Meratnia ◽  
Paul Havinga

Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.


Sign in / Sign up

Export Citation Format

Share Document