Fog and IoT: An Overview of Research Opportunities

@article{Chiang2016FogAI,
  title={Fog and IoT: An Overview of Research Opportunities},
  author={Mung Chiang and Tao Zhang},
  journal={IEEE Internet of Things Journal},
  year={2016},
  volume={3},
  pages={854-864}
}
Fog is an emergent architecture for computing, storage, control, and networking that distributes these services closer to end users along the cloud-to-things continuum. It covers both mobile and wireline scenarios, traverses across hardware and software, resides on network edge but also over access networks and among end users, and includes both data plane and control plane. As an architecture, it supports a growing variety of applications, including those in the Internet of Things (IoT), fifth… 

Figures and Tables from this paper

Fog as a Service Technology

FA2ST and its architecture are proposed to underpin a multi-level system of fog computing services for end-to-end support of IoT applications and a use case in a vertical industry, and a performance study.

Fog Networks: A Prospective Technology for IoT

Fog is proposed as the expected ground for enabling Internet of Things, which envisions creating an environment wherein various heterogeneous devices can communicate with each other via internet.

Fog Computing in IOT: An Overview of New Opportunities

This paper will discuss how Fog computing is providing different services to the users which were lacking in cloud paradigm and how it is solving challenges faced by the IoT paradigm.

Opportunistic Fog for IoT: Challenges and Opportunities

This paper discusses key issues in opportunistic fog computing, investigates potential solutions from existing work, and proposes an opportunistic architecture for future work.

Fog Computing for the Internet of Things

The principles and literature characterizing FC are described, highlighting six IoT application domains that may benefit from the use of this paradigm, and an overview of existing FC software and hardware platforms for the IoT is provided.

IoT Applications in Fog and Edge Computing: Where Are We and Where Are We Going?

This paper summarizes the current discussion about fog and edge computing systems, and identifies application areas of these systems in the Internet of Things.

A Fog-based service enablement architecture for cross-domain IoT applications

A fog-based multi-level service enablement architecture for cross-domain IoT applications is proposed that enables services sharing at network edges by a fog service overlay and introduces a hierarchical fog network for seamless service provisioning.

Fog computing and Internet of Things in one building block: a survey and an overview of interacting technologies

The various challenges that are facing the Fog/IoT paradigm are discussed and the main contributions that have been proposed to overcome these challenges are specified.

Towards the Distributed Edge – An IoT Review

This paper reviews this original topology of an IoT solution, and different techniques and layers available to alleviate the issues inherent of the original paradigm, and how a new method of defining at these topologies is gaining speed.

The Internet of Things, Fog and Cloud Continuum: Integration and Challenges

...

References

SHOWING 1-10 OF 31 REFERENCES

Fog Computing: A Platform for Internet of Things and Analytics

This chapter proposes a hierarchical distributed architecture that extends from the edge of the network to the core nicknamed Fog Computing, and pays attention to a new dimension that IoT adds to Big Data and Analytics: a massively distributed number of sources at the edge.

Big Data and Internet of Things: A Roadmap for Smart Environments

This book presents current progress on challenges related to Big Data management by focusing on the particular challenges associated with context-aware data-intensive applications and services and advances on managing and exploiting the vast size of data generated from within the smart environment towards an integrated, collective intelligence approach.

Internet of Things Security Analysis

The paper focuses on the application of Internet of Things in the nation and even in the global in the future, analysing the existed security risks of the Internet of Thing 's network points, transmission and proposes some suggestive solutions due to these problems.

The Case for VM-Based Cloudlets in Mobile Computing

The results from a proof-of-concept prototype suggest that VM technology can indeed help meet the need for rapid customization of infrastructure for diverse applications, and this article discusses the technical obstacles to these transformations and proposes a new architecture for overcoming them.

CYRUS: towards client-defined cloud storage

This work designs, implements, and deploys CYRUS (Client-defined privacY-protected Reliable cloUd Service), a practical system that integrates multiple autonomous CSPs into one unified cloud and allows individual clients to specify their desired performance levels and share files.

iBeam: Intelligent client-side multi-user beamforming in wireless networks

This paper exploits multi-user multi-input multi- input multi-output (MU-MIMO) technology to improve throughput and reliability in both directions of a wireless connection and experimentally evaluates iBeam, which shows significant throughput improvements over both single-AP connections and multi- AP connections in a time division mode.

TUBE: time-dependent pricing for mobile data

The architecture, implementation, and a user trial of an end-to-end TDP system called TUBE are presented, which creates a price-based feedback control loop between an ISP and its end users and allows users to save money by choosing the time and volume of their usage.

Design of a low-latency, high-reliability wireless communication system for control applications

A preliminary wireless system architecture is proposed that focuses on low-latency operation through the use of reliable broadcasting, semi-fixed resource allocation, and low-rate coding that can achieve latencies under 2ms for SNRs above 7dB.

Defending Connected Vehicles Against Malware: Challenges and a Solution Framework

This paper identifies vehicle-specific challenges, discusses existing solutions and their limitations, and presents a cloud-assisted vehicle malware defense framework that can address these challenges.

Coordinating cellular background transfers using loadsense

It is shown experimentally that to obtain good throughput, considering link quality alone is insufficient, and that cellular load must also be factored in, and a novel technique called LoadSense is presented for a cellular client to obtain a measure of the cellular load, locally and passively, that allows the client to determine the ideal times for communication.