5G Applications: Requirements, Challenges, and Outlook

5G Applications: Requirements, Challenges, and Outlook

Aaron Yi Ding Delft University of Technology, Netherlands aaron.ding@tudelft.nl  and  Marijn Janssen Delft University of Technology, Netherlands m.f.w.h.a.janssen@tudelft.nl
Abstract.

The increasing demand for mobile network capacity driven by Internet of Things (IoT) applications results in the need for understanding better the potential and limitations of 5G networks. Vertical application areas like smart mobility, energy networks, industrial IoT applications, and AR/VR enhanced services all pose different requirements on the use of 5G networks. Some applications need low latency, whereas others need high bandwidth or security support. The goal of this paper is to identify the requirements and to understand the limitations for 5G driven applications. We review application areas and list the typical challenges and requirements posed on 5G networks. A main challenge will be to develop a network architecture being able to dynamically adapt to fluctuating traffic patterns and accommodating various technologies such as edge computing, blockchain based distributed ledger, software defined networking, and virtualization. To inspire future research, we reveal open problems and highlight the need for piloting with 5G applications, with tangible steps, to understand the configuration of 5G networks and the use of applications across multiple vertical industries.

5G Systems; Pilot; IoT; Smart City; Edge Computing
copyright: nonedoi: 10.1145/3278161.3278166\newrefformat

secSection \enquoteLABEL:#1 \newrefformatfigFig. LABEL:#1 \newrefformattabTable LABEL:#1

1. Introduction

The success of mobile communication stems from its pervasive coverage and substantial ecosystem that boost rapid pace of innovation in terms of new applications and venture creations. To withstand its long-term prosperity, the upcoming fifth generation (5G) of mobile networks are expected to generate new opportunities in the era of Internet of Things (IoT), autonomous driving, augmented and virtual reality (AR/VR) services. This vision is supported by the on-going development of 5G cellular architecture and its air interface enhancement (Wang.2014, ; Akpakwu.2018, ) to cater for massive deployment of connected devices, which are projected to reach more than 75 billion by 2025 (Statista.2017, ).

Comparing with existing 4G, 5G networks encompass new wireless interfaces to support higher frequencies and spectrum efficiency. There is significant improvement in terms of signaling, management and accounting procedures at the 5G core networks in order to accommodate the needs from diverse range of new applications that are outside traditional mobile broadband category (ngmn.2015, ). By its design, 5G deployment will provide extensive connectivity through its heterogeneous wireless access, ranging from macrocell (long range) to femtocell (short range). As shown in Figure 1, the coverage will span across metropolitan area, municipal area and down to campuses and buildings. This pervasive connectivity is the key to seamless mobility and service availability that has been centered in the cellular system since its debut.

Figure 1. Envision of 5G Network Connectivity

Given the new demands from IoT, autonomous driving, AR/VR and smart city services, one important pursuit for 5G is to match its capacity to the scale and growth of various 5G driven applications in an economical and sustainable manner. This mission covers network architecture, communication techniques, ecosystem design and actual deployment. Recent efforts have sought the utilization of network function virtualization (NFV), software-defined networking (SDN), edge computing and offloading, as well as distributed data analytics (e.g., Apache Spark (Spark.2018, )). Those technical innovations have shown promising results (Han.2015, ; Ding.2014, ; Costa.2014, ; Ding.2015a, ; Ding.2015, ; Ding.2015b, ; Flores.2017, ; Morabito.2018, ; Cozzolino.2017, ; Cozzolino.2018, ; Pu.2015, ). Meanwhile, as new application domains are inspired by 5G on almost daily basis, we still lack a comprehensive understanding on requirements originating from various domains which include both technical and governance perspectives, especially what opportunities and challenges 5G will endure in the current transitional phase.

Motivated by the latest advance in 5G and trend of urbanization (UnitedNations.2014, ), this paper tackles the challenges of 5G from the application perspective. In particular, we focus on vertical application domains, which are built for target enterprise and entities with specific requirements. As a solid step to demystify the requirements in the context of IoT and smart cities, we aim to answer the major question: ”How do we consolidate 5G driven applications across multiple vertical industries to unveil the full potential of 5G?” Besides identifying challenges, our work also highlights the opportunities for 5G applications in various vertical domains, which can shed light on future development for researchers, engineers and policy makers from academia, industry and government.

Our key contributions are hence twofold:

  • First, we classify the application domains inspired by 5G, and quantify their key requirements. Our requirement analysis covers major aspects including communication range, bandwidth capacity, latency, reliability, energy, security and privacy.

  • Second, we pinpoint open challenges and opportunities based on reviewing the state-of-the-art research and project initiatives. Our discussions cover both technical aspect and also regulation and governance. We further stress the need to pilot 5G experimental testbed through tight cooperation across universities, network operators, equipment vendors and governmental institutes.

We note that although this work provides an extensive sampling of existing and emerging 5G applications, our study does not attempt to cover every nuance. The rest of this paper is organized as follows. Section 2 provides an overview of application domains in 5G. Section 3 illustrates the application requirements. Section 4 highlights open challenges and potential opportunities in 5G. We discuss related work and project initiatives and conclude with our outlook in Section 5.

2. 5G Enabled Applications

The advances in mobile networking have created a myriad of diverse applications to improve the life quality of end users, including smart mobility, digital commerce, social networking and health care. From a broader perspective, mobile applications are part of the Internet services, which have witness a rapid evolution over the past decades.

Figure 2. Advancement of Internet Services

As illustrated in Figure 2, the Internet services have evolved from conventional point-to-point data exchange, world wide web (WWW), mobile and social applications, to the recent IoT services and forthcoming tactile Internet (Zanella.2014, ; Fettweis.2014, ; Simsek.2016, ). In specific, the tactile Internet applications will facilitate the integration between digital sphere and our physical environments, covering advanced use cases of machine-to-machine (M2M) communication. Those new applications are characterized by the need for a network having ultra low latency, high availability, reliability and security. Many of these applications are also context-aware where the context is sensed for triggering actions, e.g., smartphones are nowadays aware if the owner is driving and can avoid interrupting the driver (Shishkov.2018, ).

Among several application domains, the IoT-empowered smart city has become a focal concern of 5G. In this context, smart city integrates traditional and modern Information and Communication Technology (ICT) for a unified and simple access to services for the city administration and the residents. The aim is an enhanced use of resources, improving quality of services for citizens while reducing operational costs of public administration (Anthopoulos.2015, ) and reducing the administrative burden for citizens and businesses. For example, smart transportation should reduce congestion and pollution and at the same time result in higher utilization of transport.

On the one hand, IoT has quickly advanced from an experimental technology to the driving force of 5G systems. To fully exploit the opportunities behind IoT, 5G has placed IoT at a vital position in its ecosystem. On the other hand, realizing the IoT vision of smart city depends on a careful integration with 5G telecommunication technologies to provide scalable and robust connectivity. Comprehensive and scalable supports from 5G are hence required to overcome the economic and technical constraints of state-of-the-art conceptualizations and implementations, while maintaining both practical and commercial appeals.

For 5G driven applications, we highlight five domains that can benefit from a tight integration with 5G and next generation cyber-physical infrastructure.

Figure 3. Application groups empowered by 5G
  • Smart Mobility: Mobility applications in 5G ranges from traditional road/route planning to the emerging autonomous driving services (connected vehicles) and extended sharing economics of smart transportation. The benefits of smart mobility include traffic balancing, efficient routing, accident prevention, energy saving, cost and emission reduction (Benevolo.2016, ). From this group of applications, there is a strong demand for 5G to support pervasive connectivity, low latency, high speed and link reliability, security and low power consumption.

  • Smart Energy: This category of applications includes power plant monitoring and management, smart grid networking, power failure detection and response, new consumption saving services for homes and office buildings, energy marketplace and smart charging stations for electronic vehicles. Smart energy is expected to enhance efficiency and reliability of power systems with renewable energy and achieve intelligent distribution. The major demands for 5G are on link reliability, security and privacy (Fang.2012, ; Wang.2013, ).

  • Smart Health: Health applications are becoming popular among mobile users owing to the growing awareness of fitness and well-being. Together with the advance of smart wearables, applications of this category have covered mobile based condition monitoring and diagnosis, environmental quality inspection. With more data collected from sensors deployed on wearable devices, smart health will positively influence the medical and healthcare systems (Akpakwu.2018, ). Another emerging application in this domain is the AR/VR enabled surgery, which will demand low latency and high bandwidth, on top of the general requirements of low power, security and data privacy from 5G.

  • Industrial Applications: Applications such as Industry IoT 4.0 (Wang:2016, ) represent the next generation of cyber-physical services in terms of manufacturing, machine-to-machine (M2M) communication, 3D printing and AI supported construction. The impact of those industrial applications will extend beyond factories and plants, directly benefiting the entire society. The major demands for 5G include critically high reliability, ultra low latency, support of massive deployment, security and privacy.

  • Consumer Applications: The vast amount of consumer applications (Apps) reflect the potential of 5G mobile business and technology innovations. As we are familiar with typical mobile applications running on smartphones and tablets, the emerging applications include ultra HD (4K/8K) mobile streaming, blockchain based financial technology (FinTech), pervasive gaming (like Pokemon GO 111https://www.pokemongo.com/en-us/), mobile AR/VR mixed reality services supported by unmanned aerial vehicles, and holographic technology such as HoloLens 222https://www.microsoft.com/en-us/hololens. All those advanced services are demanding 5G to support extensive connectivity, high bandwidth, low latency, low energy footprint, link reliability and security.

3. Requirement Analysis

To carry out a fine-grained analysis that reflects technical interdependency, we break down the aforementioned application domains (detailed Section 2) into four distinct types. As shown in Figure 3, 5G driven applications are divided into four categories: 1) domestic type with short communication range, 2) remote type with long range, 3) latency critical, and 4) massive scale. Our goal is to quantitatively manifest their requirements for facilitating future development and deployment of 5G systems. We also note that although this grouping includes a wide range of existing and emerging applications, our discussions do not attempt to cover every nuance.

Applications Communication Range Bandwidth Capacity Latency Link Reliability Energy Security Privacy
Smart buildings short range 10 - 1000 Mbps Median Median Low High
Smart devices short range 10 - 1000 Mbps Median Median Low High
Smart farming long range 1 - 100 Mbps Tolerant Median Low Median
Urban monitoring long range 1 - 100 Mbps Tolerant Median Low Median
Autonomous driving long range 10 - 5000 Mbps Critical High High Critical
AR/VR services short range 100 - 5000 Mbps Critical Median High Median
Smart energy median range 10 - 1000 Mbps Median High Median High
Smart mobility long range 10 - 1000 Mbps Median High Median Median
Table 1. Vertical Application Requirements in 5G

3.1. General Requirements

For each type of applications, we highlight the general requirements in Table 1, covering communication range, bandwidth capacity, latency, link reliability, energy consumption, security and privacy.

3.1.1. Domestic - short range

As shown in Figure 3, this group of applications include consumer applications in the context of smart homes and office buildings (Anthopoulos.2015, ). Owing to their communication pattern, 5G needs to support low power networking, which is crucial for wearable devices. Given the exposed security issues at smart homes (Hafeez.2016, ), there is a strong demand to regulate unwanted traffic on the wireless interfaces.

3.1.2. Remote - long range

Applications in smart farming and urban monitoring demand 5G support especially in terms of communication coverage. Since devices deployed for farming and urban monitoring need to operate over long time period, energy saving is another key requirement.

3.1.3. Latency critical

Industrial applications are typically tied to safety in manufacturing and hence demanding high level of security. For consumer domain such as autonomous driving and AR/VR services, low latency (critical level) and high bandwidth must be supported in 5G communication. Due to the safety concern, autonomous driving also demands high link reliability.

3.1.4. Massive scale

For scenarios of massive deployment such as in smart grid and transportation systems, 5G needs to elastically scale, to cater for increased traffic demand, number of end devices, and applications, and with acceptable cost. In particular to smart energy, high link reliability and security are also required.

3.2. Requirements from Emerging Services

For emerging applications in both smart city and vertical industries, 5G architecture needs to consider the requirements from several new angles. The first one rises from the swift of traffic pattern from downlink driven to uplink driven. This is mainly due to the introduction of high volume of data generated from smart vehicles, drones, and industrial IoT deployment. The traffic patterns might change and demand from different vertical industries and can shift over time. Being able to adapt to the fluctuation will be a key requirement for the 5G networks.

Secondly, due to the enforcement of General Data Protection Regulation (GDPR) 333https://www.eugdpr.org/, data privacy is becoming an avid issue. Data referring to an identifiable or identified person falls under this regulation. Especially with more embedded devices and autonomously flying drones/robots to collect data for surveillance purposes, 5G needs to guarantee security in communication and ensure privacy-by-design. The latter refers to ensuring data protection by having a proper architecture.

Besides technical requirements, 5G must take into account the requirements from governmental and economical angles. In this context, connectivity of 5G in the future will be regarded as one of the mandatory common-pool resources (CPR) similar to water and electricity. This has strong implication on the regulation and management of 5G networks in terms of interoperability across operators, cost of maintenance, public-private sector ownership, wireless spectrum bidding and allocation (especially above 3 Ghz). Being a public resource, safety of large-scale operations will also become a key requirement.

4. Opportunities and Open Challenges

4.1. Technology Opportunities

Figure 4. Edge-enabled Platform for 5G

We identify four technology advancement that can benefit 5G, including blockchain inspired distributed ledger, lightweight virtualization, software-defined Networking, and edge computing.

Blockchain based Distributed Ledger

Besides upholding user privacy on the Internet, GDPR is also accelerating the development of distributed ledger technologies (i.e., blockchain based protocol design). Specifically, we are witnessing a strong demand nowadays to unify the data management across end users, companies and government. This includes providing the appropriate means to receive, track, and fulfill user requests, and to update the data as requested.

Given the high risk for enterprise in the face of steep fines, Blockchain Technology (BCT) which can store a secure historical record of transactions in a tamper-proof format will play a more visible role for many data driven applications in 5G. In this context, BCT stores information at different nodes. The past information cannot be removed and information can only be added when the nodes possess it (Olnes:2017, ). BCT was introduced for Bitcoin and is based on Distributed Ledger Technology (DLT), in which each participant has access to a shared ledger which is stored in many nodes (Nakamoto:2008, ). All transactions are stored in a ledger and all nodes have a copy of this. In turn, blocks are time stamped batches of valid transactions in which each block includes the hash of the prior block. Creating new blocks is known as mining (Narayanan:2016, ). By linking the blocks a chain is formed which has resulted in the use of the name ‘blockchain’. Blockchain uses can be found in many sectors (Tapscott:2016, ). Especially for 5G empowered IoT and mobile financial services, we will see a merge between IoT security solutions (Hafeez.2015, ; Hafeez.2016, ; Hafeez.2017, ; Hafeez.2017a, ; Hafeez.2018, ) and novel blockchain and cryptocurrency designs to achieve better accountability and privacy in 5G.

Virtualization and Software-Defined Networking

Network Function Virtualization (NFV) is a solid technology to organize network related computation in 5G. By its design, NFV utilizes virtualization technologies to decouple physical network equipment from the functions running on them (Han.2015, ). This way, various virtual network functions can be implemented and deployed on one or more physical servers. In particular, the new lightweight virtualization technologies such as Docker and Unikernels (Morabito.2018, ) will facilitate 5G to support new services of IoT domain which demands multi-tenancy, low cost, efficient resource utilization, and low power consumption.

Meanwhile, for managing 5G network traffic, Software-Defined Networking (SDN) is another powerful tool which has been successfully applied to data centers and commercial networks. In its essence, SDN decouples the data and control plane so that all the control functions can be implemented in a centralized network controller. Its design transfers the control functionality to software based entities, which eliminates the use of vendor specific back-box hardware and promotes the use commodity switches in data plane over proprietary appliances (kreutz:2015, ). On top of its security benefits (Ding.2014, ), SDN can better support multi-tenancy for large scale deployment of 5G services, such as in smart city and industrial operations, e.g., by using frameworks such as SoftOffload (Ding.2015a, ; Ding.2015, ; SoftOffload, ).

Mobile Edge Computing

The convergence of mobile Internet and wireless systems in 5G can trigger an explosive growth in resource-hungry and computation-intensive applications, which cover a broad paradigms of IoT. These IoT systems include real-time video / audio surveillance, smart e-health, smart transportation, and Internet of Vehicles (IoV). Mobile edge computing, by complementing various cloud resources and bringing computation closer to smart devices/objects, has been envisioned as an enabling and highly promising technology to reap the potential of IoT in 5G.

Recently, multi-access mobile edge computing (MA-MEC), which actively exploits a systematic and adaptive integration of wireless access technologies in 5G, will further enhance the access capacity between smart devices and mobile edge platforms. The design of MA-MEC is in line with the evolution towards ultra-dense deployment of small-cells (micro / pico / femto cells) in future 5G. In specific, the densely deployed 5G small cells can enhance the capacity and quality of the connections. As an example, the emerging dual-connectivity in 5G networks can enable smart objects to communicate with conventional macro-cells and offload data traffic to small cells simultaneously (Ding.2011, ; Korhonen.2012, ; Ding.2012, ; Korhonen:2013, ; Ding.2013, ). This enhances the access capacity of mobile edge cloud at small cells. In addition, the existing computational offloading techniques (Cuervo.2010, ; Chun.2011, ; Kosta.2012, ), including edge offloading (Cozzolino.2017, ), will further complement the needs for speeding up computation and low communication latency.

Edge-enabled 5G Service Framework

To exemplify how to combine new technologies into 5G, we propose an edge-enabled platform for 5G to consolidate data management in large scale cyber-physical system deployment. As shown in Figure 4, through this platform, the 5G edge layer is expected to bring a variety of benefits, such as i) ultra-low latency between smart devices and edge cloud for real-time, interactive, and mission-critical applications, e.g., industrial operations; ii) privacy and security in local communications; and iii) fast data processing at the point of capture for IoT applications. For instance, the proposed platform will provide robust and ultra-low latency connections for smart vehicles to efficiently access the edge layer deployed on road-side units for real-time information processing. To build the edge layer, we can utilize the SDN framework (SoftOffload, ), IoT management tool (Haus.2017a, ; Haus.2017b, ), and Kafka framework. 444https://kafka.apache.org/

Pilots Experiment Scale Technology Operation Model Focus
Envisioned 5G Pilot City Scale 5G driven Public-Industry hybrid Consumer and public services
Singtel 5G Regional (Buona Vista area, Singapore) 5G driven Company driven - Ericsson (vendor) Network services
Toronto Waterfront Regional (Port area in Toronto) Fixed network Company - Google (cloud service provider), and partially public sector Infrastructure oriented
Table 2. Comparison of 5G Pilot Initiatives

4.2. Open Challenges

A combination of promising technologies like NFV and edge computing is needed to meet the demands of new applications. Nevertheless, the success of 5G still requires tackling many other challenges.

Technical Challenges

For 5G network operation, security is a major concern. The role of encryption, especially the operator driven pervasive encryption (RFC.8404, ), has raised lots of discussions across service providers (e.g., Google, Amazon), ISPs e.g., KPN, T-Mobile, equipment vendors (e.g., Nokia, Ericsson) and standardization units such as IETF 555https://www.ietf.org/ and ETSI 666https://www.etsi.org/.

In the context of cellular systems, the conventional network management, security operations, and performance optimization have been conducted over a large majority of data traffic flows without encryption. While unencrypted traffic could facilitate troubleshooting and management operations at all network layers, it has also made pervasive monitoring by unseen parties possible. With support from service providers (e.g., Google) and increased awareness of privacy on the Internet (haus:comst:2017, ), more and more traffic are encrypted in an end-to-end manner. This trend has created a challenge for 5G since existing management, operational, and security practices have depended on the availability of clear text to function. For 5G operators, it is important to investigate if critical operational practices can be met by less invasive means.

Besides conventional traffic balancing between real-time and typical web traffic (Jarvinen.2013, ), 5G needs also to prioritize traffic types with fine granularity. In some vertical applications the quick response is needed to avoid failure, whereas other applications response-time is less an issue. However, this traffic differentiation is correlated with the net neutrality debate whether the freedom and fairness of Internet will be affected.

To efficiently exploit computation and storage resources at mobile edge nodes, a joint optimization of placement of computation/storage resource and cell-association with radio resource allocation are required. Such joint optimization must be self-adaptive and with minimum manual efforts. The adaptation needs to take into account time-varying environments, such as the varying wireless channel states when users move across the cells and computation/storage resource utilizations.

Challenges from Regulation and Governance

As connectivity becomes a common-pool resource (CPR), there is a need for governance to manage fair usage, ensure sufficient bandwidth and scalability, enforce interoperability and give priority to certain vertical applications. For this change, regulations might interfere with the role of 5G providers in the future. Latency critical application like connected vehicle might be given priority to avoid car collisions over other applications. Also the distributed nature might demand redundant coverage of areas to avoid problems in case of mall-function. Back-up and recovery plans might be required by regulations.

Without regulation, it is challenging to ensure proper functioning when some of the components are restricted or fail (e.g., due to market failure). For instance, the spectrum allocation is open to discussion as some spectra are already occupied by Department of Defense applications in certain countries. Failures can be disastrous for critical vertical applications areas. Edge computing architectures might be needed to be able to operate independently of the network to avoid failure of the larger system. Also security should be enforced in such a way that the whole system cannot be breached by a hack. Another aspect will be interoperability between different providers and platforms. roaming between providers should be possible to ensure proper functioning of the vertical applications which are likely to be operated by multiple 5G providers.

The General Data Protection Regulation (GDPR) represents the largest change to European Union (EU) data protection laws in decades. For 5G applications, one major criteria is on the private data collected from both end users and physical infrastructure. Privacy-by-design should be guaranteed when using the 5G applications. In addition for better integration of 5G, we also need to draw lessons from studies on standardization (Ding:CCR:2014, ), ambidexterity (Matheus.2017, ), and applying open data to smart cities (Janssen.2015, ).

5. Initiative and Outlook

A main challenge for 5G will be to create a network architecture that adapts to fluctuating traffic patterns, consists of promising technologies like edge computing, software defined networking, virtualization, and combines wired and wireless elements to deal with the requirements of various vertical industries. The vertical industries yield various requirements on 5G and the actual usage might fluctuate. This requires that the architecture is dynamic, able to prioritize traffic, and can ensure that edge computing power (as envisioned in Figure 4) is available for fast and efficient processing and response.

Reflecting on our main pursuit of this paper, ”How do we consolidate 5G driven applications across multiple vertical industries to unveil the full potential of 5G?” we believe that this answer is non-trival and the answer shall be sought from developing a comprehensive piloting testbed integrating the various technologies and in which vertical industries are involved.

This envisioned network testbed pilot needs to integrate various technologies and be compliant to regulation and governance. To shed light on the 5G pilot, which will combine the efforts with Delft Green Village 777https://www.thegreenvillage.org/, we compare it against the Singtel 5G initiative 888https://www.singtel.com/about-Us/news-releases/journey-to-5g-singtel-and-ericson-to-launch-singapores-first-5g-pilot-network and Toronto Waterfront 999https://sidewalktoronto.ca/. We summarize our observations in Table 2 in terms of experiment scale, driven technology, operation model, and project focus.

Given the challenges we outlined, this pilot project must bridge the gap between research community, industrial stakeholders, and governmental institutes. In particular from technical perspectives, the envisioned 5G pilot should allow us to: 1) experiment novel radio access technologies and their feasibility for different 5G applications; 2) incubate novel applications by creating a trail infrastructure before entering mass market; 3) expose unforeseen limitations of network configurations; and 4) illustrate how to minimize unnecessary replacement costs through a feasible migration path, which can lead to significant deployment scale.

We must note that although our work provides an extensive sampling of existing and emerging vertical applications, this study does not attempt to cover every nuance. Further piloting can reveal new challenges and be used to understand the nature of the challenges. Besides that, the requirement analysis and technologies discussed can be applied to a broad spectrum of scenarios on top of 5G context. In addition to open challenges, our work highlights the opportunities for 5G-enabled applications from both technical and governance perspectives, which can shed light on future development for researchers, engineers and policy makers from academia, industry and government.

Acknowledgments

We thank Martin Kienzle (IBM), Inge van de Water (Gemeente Delft), and Dennis Meerburg (TU Delft) for their contributory feedback.

References

  • (1) Wang et al. 2014. Cellular Architecture and Key Technologies for 5G Wireless Communication Networks. IEEE Communications Magazine 52, 2 (2014), 122-130.
  • (2) Akpakwu et al. 2018. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges. IEEE Access 6 (2018), 3619-3647.
  • (3) https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/ (visited on 07/31/2018)
  • (4) NGMN Alliance. NGMN 5G White Paper. 2015.
  • (5) https://spark.apache.org/ (visited on 07/31/2018)
  • (6) Han et al. 2015. Network function virtualization: Challenges and opportunities for innovations. IEEE Communications Magazine 53, 2 (2015), 90-97.
  • (7) Aaron Yi Ding, Jon Crowcroft, Sasu Tarkoma, and Hannu Flinck. 2014. Software Defined Networking for Security Enhancement in Wireless Mobile Networks. Computer Networks 66 (2014), 94-101.
  • (8) Costa-Requena et al. 2014. Software defined 5G mobile backhaul. In Proceedings of 1st International Conference on 5G for Ubiquitous Connectivity (5GU ’14). IEEE, 258-263.
  • (9) Aaron Yi Ding, Yanhe Liu, Sasu Tarkoma, Hannu Flinck, Jon Crowcroft. 2015. Demo: An Open-source Software Defined Platform for Collaborative and Energy-aware WiFi Offloading. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom ’15). ACM Press, New York, NY, 182-184.
  • (10) Aaron Yi Ding, Yanhe Liu, Sasu Tarkoma, Hannu Flinck, Henning Schulzrinne, and Jon Crowcroft. 2015. Vision: Augmenting WiFi Offloading with An Open-source Collaborative Platform. In Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services (MCS ’15). ACM Press, New York, NY, 44-48.
  • (11) Yi Ding. 2015. Collaborative Traffic Offloading for Mobile Systems. Ph.D. Dissertation. University of Helsinki, Helsinki, Finland.
  • (12) Flores et al. 2017. Large-scale Offloading in the Internet of Things. In Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 479-484.
  • (13) Morabito et al. 2018. Consolidate IoT Edge Computing with Lightweight Virtualization. IEEE Network 32, 1 (2018), 102-111.
  • (14) Cozzolino et al. 2017. FADES: Fine-Grained Edge Offloading with Unikernels. In Proceedings of the Workshop on Hot Topics in Container Networking and Networked Systems (HotConNet ’17). ACM Press, New York, NY, 36-41.
  • (15) Cozzolino et al. 2018. Empowering Cyber-Physical Systems with FADEX. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’18). ACM Press, New York, NY, 537-537.
  • (16) Pu et al. 2015. Low Latency Geo-distributed Data Analytics. In ACM SIGCOMM ’15.
  • (17) https://esa.un.org/unpd/wup/publications/files/wup2014-highlights.Pdf (visited on 07/31/2018)
  • (18) Zanella et al. 2014. Internet of Things for Smart Cities. IEEE Internet of Things Journal 1, 1 (2014), 22-32.
  • (19) Fettweis et al. 2014. The Tactile Internet: Applications and Challenges. IEEE Vehicular Technology Magazine 9, 1 (2014), 64-70.
  • (20) Simsek et al. 2016. 5G-Enabled Tactile Internet. IEEE Journal on Selected Areas in Communications 34, 3 (2016), 460-473.
  • (21) Shishkov et al. 2018. Three Categories of Context-Aware Systems. In Proceedings of International Symposium on Business Modeling and Software Design.
  • (22) L. G. Anthopoulos. 2015. Understanding the smart city domain: A literature review. In Transforming City Governments for Successful Smart Cities. Springer, 9-21.
  • (23) Benevolo et al. 2016. Smart Mobility in Smart City. In Empowering Organizations. 13-28.
  • (24) Fang et al. 2016. Smart Grid - The New and Improved Power Grid: A Survey. IEEE Communications Surveys and Tutorials 14, 4 (2012), 944-980.
  • (25) Wang et al. 2013. Cyber security in the Smart Grid: Survey and challenges. Computer Networks 57, 5 (2013), 1344-1371.
  • (26) Wang et al. 2016. Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination. Computer Networks 101, 4 (2016), 158-168.
  • (27) Ølnes et al. 2017. Blockchain in government: Benefits and implications of distributed ledger technology for information sharing. Government Information Quarterly 34, 3 (2017), 355-364.
  • (28) S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf (visited on 09/03/2018)
  • (29) Narayanan et al. 2016. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.
  • (30) Tapscott et al. 2016. The Impact of Blockchain Goes Beyond Financial Services. Harvard Business Review. https://hbr.org/2016/05/the-impact-of-the-blockchain-goes-beyond-financial-services (visited on 09/03/2018)
  • (31) Hafeez et al. 2015. Demo: Cloud-based Security As a Service for Smart IoT Environments. In Proceedings of the 2015 Workshop on Wireless of the Students, by the Students, and for the Students (S3 ’15). ACM Press, New York, NY, 20-20.
  • (32) Hafeez et al. 2016. Securebox: Toward Safer and Smarter IoT Networks. In Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking (CAN ’16). ACM Press, New York, NY, 55-60.
  • (33) Hafeez et al. 2017. IOTURVA: Securing Device-to-Device (D2D) Communication in IoT Networks. In Proceedings of the 12th Workshop on Challenged Networks (CHANTS ’17). ACM Press, New York, NY, 1-6.
  • (34) Hafeez et al. 2017. Toward Secure Edge Networks: Taming Device-to-Device (D2D) Communication in IoT. arXiv: 1712.05958.
  • (35) Hafeez et al. 2018. Real-time IoT Device Activity Detection in Edge Networks. In Proceedings of 12th International Conference on Network and System Security. Springer.
  • (36) Kreutz et al. 2015. Software-Defined Networking: A Comprehensive Survey. IEEE Communications Surveys & Tutorials 103, 1 (2015), 14-76.
  • (37) https://www.cs.helsinki.fi/group/eit-sdn/softoffload.html (visited on 07/31/2018)
  • (38) Ding et al. 2011. NAO: a framework to enable efficient mobile offloading. In Proceedings of the ACM Middleware Workshop on Posters and Demos (PDT ’11). ACM Press, New York, NY, Article No. 8.
  • (39) Korhonen et al. 2012. Controlling Traffic Offloading Using Neighbor Discovery Protocol. IETF Internet Draft.
  • (40) Ding et al. 2012. Enabling energy-aware mobile data offloading for smartphones through vertical collaboration. In Proceedings of the 2012 ACM conference on CoNEXT student workshop. ACM Press, New York, NY, 27-28.
  • (41) Korhonen et al. 2013. Toward Network Controlled IP Traffic Offloading. IEEE Communications Magazine 51, 3 (2013), 96-102.
  • (42) Ding et al. 2013. Enabling Energy-Aware Collaborative Mobile Data Offloading for Smartphones. In Proceedings of IEEE International Conference on Sensing, Communications and Networking (SECON ’13). IEEE, 487-495.
  • (43) Cuervo et al. 2010. MAUI: making smartphones last longer with code offload. In Proceedings of ACM MobiSys ’10.
  • (44) Chun et al. 2011. CloneCloud: elastic execution between mobile device and cloud. In Proceedings of ACM EuroSys ’11.
  • (45) Kosta et al. 2012. ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In Proceedings of IEEE INFOCOM ’12.
  • (46) Haus et al. 2017. Managing IoT at the Edge: The Case for BLE Beacons. In Proceedings of the 3rd Workshop on Experiences with the Design and Implementation of Smart Objects (SMARTOBJECTS ’17). ACM Press, New York, NY, 41-46.
  • (47) Haus et al. 2017. Demo: iConfig: What I See Is What I Configure. In Proceedings of the 12th Workshop on Challenged Networks (CHANTS ’17). ACM Press, New York, NY, 29-31.
  • (48) Moriarty et al. Effects of Pervasive Encryption on Operators. RFC 8404 2018.
  • (49) Haus et al. 2017. Security and Privacy in Device-to-Device (D2D) Communication: A Review. IEEE Communications Surveys & Tutorials 19, 2 (2017), 1054-1079.
  • (50) Järvinen et al. 2013. Effect of Competing TCP Traffic on Interactive Real-time Communication. In Proceedings of 14th International Conference on Passive and Active Measurement (PAM ’13). Springer.
  • (51) Ding et al. 2014. Bridging the Gap Between Internet Standardization and Networking Research. ACM SIGCOMM Computer Communication Review 44, 1 (2014), 56-62.
  • (52) Matheus et al. 2017. How to Become a Smart City?: Balancing Ambidexterity in Smart Cities. In Proceedings of 10th International Conference on Theory and Practice of Electronic Governance.
  • (53) Janssen et al. 2015. Big and Open Linked Data BOLD to Create Smart Cities and Citizens: Insights from Smart Energy and Mobility Cases. In Proceedings of 14th IFIP International Conference on Electronic Government.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
""
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
   
Add comment
Cancel
Loading ...
307480
This is a comment super asjknd jkasnjk adsnkj
Upvote
Downvote
""
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters
Submit
Cancel

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test
Test description