Page 88 - ITU Journal Future and evolving technologies – Volume 2 (2021), Issue 2
P. 88

ITU Journal on Future and Evolving Technologies, Volume 2 (2021), Issue 2




          resolve these problems by approximating them into con‑   6.1 Real‑time resource allocation and deploy‑
          vex problems iteratively [112]. This method will produce   ment
          a local optimal solution in a parallel and distributed man‑
                                                               MEC application environments evolve and change rapidly,

          ner. Some work employs the SCA method to resolve UAV
                                                               it is therefore essential to evaluate and predict diverse as‑


          trajectory [105, 83, 89, 78] and UAV position [88, 77]







                                                               pects of the application and network to respond appro‑




          problems. However the resulting  optimizer can have a



                                                               priately. For  the  resource  allocation  scheme,  the  chan-
          high computational complexity and does not respond to
                                                               ging  traf ic  load  and  channel  conditions  can  hinder  the
          the real‑time requirement of the system [78].

                                                               network, creating  bottlenecks  and signi icantly  impede

                                                               the  delay.  For  deployment  of  mobile  resources,  user
          5.2.3   Greedy algorithms                            mobility is important to take into account to position the
                                                               resource at  the  proper  place  and  taking  account  of  the
                                                               travel  time  to be sure they are available when needed.
          Greedy  algorithms  are  known  heuristics  solutions  for
                                                               Many other aspects can impact the resource management
          coverage  problems  [113],  such  as  in  UAV  deployment.
                                                               scheme. Classic machine learning mechanisms may help
          They  propose  a  good  estimation  of  the  global  optimal
                                                               predict  these  aspects, but they have to be meticulously
          solution  to  complex  problems.  Chen  et  al.  [110]  use  a
                                                               modelled as historic data may not match the application
          greedy  algorithm  to  deploy  UAVs  to  locations  and
                                                               due  to  the  challenging  and  very  fast  changing
          associate their devices’ tasks to maximize of loaded tasks.   environment.
          Wang et al. [111] use a greedy algorithm to dispatch






          UAVs, considering  users’  hotspots,  for  maximizing  the   6.2 Security and privacy

          number of processed tasks.
                                                               The security and privacy questions in MEC are sensi‑








                                                               tive because of the distributed and wireless nature of the
          5.2.4   Population‑based meta‑heuristics             paradigm. Also, in mission‑critical applications, it is even









                                                               more the case as the information can be sensitive and




          Population‑based meta‑heuristics search for the best so‑   malicious attackers  can take  advantage  of the situation







          lutions in a set of candidate solutions. It starts with a ran‑   or make  it worse. The   ixed and wearable  sensors are
          dom population of solutions, then merges, keeps or elimi‑   prone to network attacks on their wireless communica‑

                                                               tion. The attackers can jam the communication,  rende-
          nates each one in each iteration to obtain the most suited.
                                                               ring  them  unreliable  or  listen  to  the  con idential  data.


          They have the advantage  to avoid local  optima [114] at





                                                               The  cloud is generally  more secure than the other






          the cost of a higher complexity than a classic optimization
                                                               layers of  MEC,  but  privacy  is  to  be  considered  as  we

          method. Thus, it can be hard to employ them for online


                                                               transmit  sensitive  data  to  the  Internet. MEC  needs

          solutions. Besides, each algorithm possesses its own ad‑
          vantage and inconvenience.                           proper security and privacy mechanisms to be reliable in
                                                               sensitive situations.
          Evolutionary computation Wang et al. [92] use a Diffe-
          rential Evolution  (DE) algorithm to decide UAV      6.3 Green MEC






          location.  Their  problem  possesses  a  mixed  decision
                                                               Several pieces of work focus on reducing the energy con‑
          variables and is a variable‑length, posing problem to use




                                                               sumption of the devices, as it is important  to preserve




          ef iciently  a  DE  algorithm, so  they  propose  a  new   their battery.    However, they may not consider the








          encoding where  each  UAV  in  an  individual  and  the
                                                               energy  consumption  on  the  overall  application,  i.e.,  the
          population  is  a  deployment  solution.  Yang  et  al.  [108]   energy  consumption  of  the  edge  and  cloud. It  is

          also use a DE to deploy UAVs at a location to balance the   indispensable  to  consider  it  globally  to  achieve  green
          workload  among  them  to  avoid  bottleneck  in  the   MEC,  therefore minimizing pollution  and reduce costs.




          network.                                             Further, it is  even  more  the  case  with  mission‑critical



          Ions motion  optimization  Islambouli  and Sharafed‑   applications  where  resources  may  be  on  mobile  units
                                                               and so battery‑constrained.
          dine [82] use ions motion optimization [114] to choose

          the number of UAVs and their positions, along  with de‑







                                                               6.4 MEC experimentation and test beds

          vice associations and computation allocations.  The algo‑







          rithm models the population of possible solutions that are   The majority of the reviewed work validate  their work
          anions and cations and choose an ef icient solution itera‑   by simulation.  Although there are good simulation tools,
          tively. The work [114] shows that ions motions optimiza‑   experiments are valuable to assess a scheme in real si-
          tion tend to avoid local optimum and few tuning parame‑   tuations.   The    prevalence    of    simulations    is
          ters, instead of other population‑based algorithms.  undoubtedly due to the lack of tools, especially test beds
                                                                                             1

                                                               for edge com‑ puting.  The SILECS platform proposes a
                                                               large‑scale  distributed  infrastructure  from  sensors  to
          6.    OPEN ISSUES AND CHALLENGES                     large data centers, thus making it a possible tool for MEC
                                                               experimentation.
          In this section, we discuss some still open issues and re‑
          lated challenges.                                    1 https://www.silecs.net/
          74                                 © International Telecommunication Union, 2021
   83   84   85   86   87   88   89   90   91   92   93