Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

Edge Computing for Cyber-physical Systems: A Systematic Mapping Study Emphasizing Trustworthiness

Published: 07 September 2022 Publication History

Abstract

Edge computing is projected to have profound implications in the coming decades, proposed to provide solutions for applications such as augmented reality, predictive functionalities, and collaborative Cyber-Physical Systems (CPS). For such applications, edge computing addresses the new computational needs, as well as privacy, availability, and real-time constraints, by providing local high-performance computing capabilities to deal with the limitations and constraints of cloud and embedded systems. Edge computing is today driven by strong market forces stemming from IT/cloud, telecom, and networking—with corresponding multiple interpretations of “edge computing” (e.g., device edge, network edge, distributed cloud). Considering the strong drivers for edge computing and the relative novelty of the field, it becomes important to understand the specific requirements and characteristics of edge-based CPS, and to ensure that research is guided adequately, e.g., avoiding specific gaps.
Our interests lie in the applications of edge computing as part of CPS, where several properties (or attributes) of trustworthiness, including safety, security, and predictability/availability, are of particular concern, each facing challenges for the introduction of edge-based CPS. We present the results of a systematic mapping study, a kind of systematic literature survey, investigating the use of edge computing for CPS with a special emphasis on trustworthiness. The main contributions of this study are a detailed description of the current research efforts in edge-based CPS and the identification and discussion of trends and research gaps. The results show that the main body of research in edge-based CPS only to a very limited extent consider key attributes of system trustworthiness, despite many efforts referring to critical CPS and applications like intelligent transportation. More research and industrial efforts will be needed on aspects of trustworthiness of future edge-based CPS including their experimental evaluation. Such research needs to consider the multiple interrelated attributes of trustworthiness including safety, security, and predictability, and new methodologies and architectures to address them. It is further important to provide bridges and collaboration between edge computing and CPS disciplines.

1 Introduction

Adding to the landscape of embedded systems, cloud computing, networking, and telecommunications—edge computing is proposed to provide solutions for various cyber-physical systems (CPS) and applications, such as augmented reality, predictive functions, e.g., for anomaly detection, and collaborative CPS, to name a few. These applications often share requirements on high availability, real-time behavior, domain-specific sensitive data, while more and more involving huge amounts of data and corresponding processing demands.
A key advantage of edge computing is localized and enhanced computational performance, which reduces costs on the device/embedded systems side because of less computing and storage resources and overcomes the shortcoming on latency, bandwidth, and privacy issues of the centralized cloud-based solutions. By adding a new third tier of computing to address these requirements and limitations, edge computing is projected to have profound implications in the coming decades, [8, 42, 47, 56, 66].
As a consequence, edge computing is today driven by strong market forces stemming from IT/cloud, telecom, and networking—with corresponding multiple interpretations of “edge computing,” including in terms of where the edge lies, e.g., device edge, network edge, distributed cloud, and so on. Such interpretations include.
multi-access edge computing (MEC) – a term coined by the European Telecommunications Standards Institute,1 previously referred to as mobile edge computing. This edge-computing concept is closely associated with telecom and 5G networks, for example, exploiting base stations as compute facilities [5],
fog computing – as an extension of cloud computing that beyond the cloud leverages additional localized resources such as routers and gateways [13],
cloudlets – as clusters of trusted computers with a strong connection to the Internet that is utilized by nearby mobile devices [57].
The focus of this study lies in the intersection of the various edge-computing paradigms and cyber-physical systems and applications. CPS represent the “Integration of computation, networking, and physical processes,” ranging from minuscule (e.g., pacemakers) to large-scale (e.g., national power-grid) and typically involving feedback [24, 54, 63, 66]. While CPS have been around at least since the late 1970s (depending on how you interpret the term), they are today provided with entirely new capabilities due to improvements in various technologies, ranging from sensors, communication, computation, and artificial intelligence (AI) and machine learning (ML), algorithms, to new materials, batteries, and additive manufacturing. Corresponding trends for CPS include operation in more complex environments, higher levels of automation, electrification, and CPS-cloud and development/operation integration. This paves the way for unprecedented market opportunities, leading to CPS deployment in more open environments in all kinds of application domains such as transportation, manufacturing, healthcare, and smart cities. This can be seen as letting the “robots out of their cages,” as exemplified with automated driving and co-bots (robots collaborating with humans [14, 24, 66]).
CPS are often associated with critical applications where failures may jeopardize lives or where the lack of availability—for example, of infrastructure and manufacturing—may have severe cost and/or safety implications. As an example of an integration between CPS and edge computing, Figure 1 depicts a scenario with an intelligent transportation system (ITS) following the OpenFog reference architecture [1]. This ITS scenario brings the opportunity to examine the interactions among fog domains and cloud domains such as element management systems (EMS), service provider (SP), metro traffic services, and system manufacturer clouds. By leveraging fog architecture, the strict requirements of this ITS application can be accommodated. For instance, fog computing can be utilized to compute tasks obtained from a traffic control system or an autonomous vehicle. Therefore, the task can be performed in real-time to ensure the optimal and safe operations of the ITS.
Fig. 1.
Fig. 1. OpenFog architecture in ITS scenario (adapted from OpenFog Report [1]).
Motivation. The strong potential of future CPS comes along with new needs for computation, aligning with the strong drivers for edge computing. Future CPS are therefore likely to integrate edge computing in various forms, from device edge to the network edge (likely adapted to the needs and constraints of the respective domains), in essence adding a new tier to existing embedded systems and cloud computing on the cyber-side. This cyber-enhancement will enable to deploy new, enhanced, and integrated cyber-physical capabilities.
Our interests lie in the applications of edge computing as part of Cyber-Physical Systems (CPS), where the introduction of edge-based CPS for critical systems requires an emphasis on trustworthiness and dependability. We note that both trustworthiness and dependability represent multifaceted properties, strongly related to CPS, security and human perception of trust [10, 17, 34, 48]. While the concept of dependability in its current form has been around for some 40 years, the concept of trustworthiness is now emerging as an umbrella term associated with how we, as humans, perceive the operation of increasingly advanced and complex CPS [48, 63]). This use of the term is further underpinned by the relatively recent adoption of the term in the context of trustworthy AI, visible, for example, through the EU efforts towards trustworthy AI (see, e.g., Reference [37] for an overview of work by the “High-level expert group on artificial intelligence” initiated by the European Commission). The technological shift is also implying that current methodologies and standards are partly inadequate to address challenges of future CPS [67]. This is clearly seen in the multitude of ongoing standardization efforts related to automated driving, cyber-security, and introduction of advanced perception and AI in the context of safety critical systems[2, 3, 4, 41, 68]—reflecting different aspects of designing and assuring safety and security for highly automated CPS2 as well as in updated editions of traditional safety standards [40].
In this article, we have chosen to emphasize the following attributes (or sub-properties) of trustworthiness: Safety, Security, and Predictability. The rationale for this choice of attributes stems from industrial needs as derived in the TECoSA research center [50]; industry sees these three attributes as vital for introducing new edge-based CPS. Each of the attributes (safety, security and predictability) is facing new challenges as CPS expand to become edge-based, collaborative autonomous, and “filled with” AI. Moreover, the mutual dependencies and tradeoffs between these attributes also need to be explicitly considered. The selection of these attributes, and at this granularity, also provides a delimitation of the scope of our survey. We detail and elaborate on how we use Trustworthiness and its attributes as part of the survey in Section 4.
Contribution. This article, therefore, investigates the directions and concerns for the use of edge computing in CPS that need to be trustworthy. Considering the strong drivers and the relative novelty of the field, it becomes important to understand the specific requirements and characteristics of edge-based CPS, and to ensure that research is guided adequately to address specific gaps.
We present the results of a systematic mapping study [43], a kind of systematic literature survey, investigating the use of edge computing for CPS with a special emphasis on trustworthiness.
The main contributions of this study are:
A detailed description of the current research efforts in edge-based CPS - relating to CPS domains, types of applications and system aspects, and the type of edge computing considered (MEC, fog computing, and cloudlets).
An analysis on how those research efforts address trustworthiness in terms of safety, security, and predictability - including combinations of these properties and their relations to various edge-computing concepts and applications.
An analysis on the research gaps found during this study - including recommendations for future work directions.
We first review related surveys of edge computing, CPS, and overlapping studies in Section 2. We use a mapping study (this type of systematic literature survey is described in Section 3) and a classification to structure and characterize research literature in the intersection between edge computing and CPS, as described in Section 4. We present the results in Section 5, where a link to the data can also be found. Next, we discuss the findings, identify research gaps, and treat validity in Section 6. We elaborate on future work and recommendations for research in Section 7 and provide concluding remarks in Section 8.

2 Related Work

To the best of our knowledge, no previous paper has provided a broader systematic literature survey on the connection between edge computing and CPS research. However, several studies have addressed fog-computing for specific CPS domains such as smart cities and Industry 4.0, and many literature studies were carried out in related areas of edge computing and CPS. In the following, we briefly describe surveys with some relation to our survey and the specific perspectives they provide. As elaborated in the following, the surveys indicate needs to further address trustworthiness-related properties of relevance for the use of edge computing in CPS [8, 30, 42, 56, 64].
Surveys on Edge Computing in CPS. In Reference [51] a survey of fog computing for sustainable smart cities is provided, revealing that (i) cloud/fog collaboration (“cloud companion support”), (ii) data analytics, (iii) multi-protocol support at communication level, (iv) mobility, and (v) security and privacy represent commonly addressed research topics in fog computing applications. The article draws a conclusion that both IoT and fog computing are comparatively immature fields, motivating a need for a focus on platforms for testing, experimentation, and evaluation. The importance to support multiple communication and application-level protocols, privacy and security (including authenticity, confidentiality, and integrity), and distributed intelligence is highlighted.
The topic of fog computing in the context of Industrial Internet of Things (IIoT) and Industry 4.0 has received a lot of attention in the research literature. For instance, Reference [12] reviews fog infrastructure and protocols in IIoT applications. Several communication and networking challenges are treated, including (i) energy efficiency (e.g., balancing quality-of-service with energy consumption), (ii) network throughput and storage capacity (dependent on decisions of where to use and store data), (iii) resource allocation and spectrum use (as a challenge for network performance with impact on many quality-of-service parameters), (iv) latency, dealing with real-time connectivity requirements and the end-to-end chain of networking and processing (with several issues affecting latency such as resource allocation, network architecture, and node storage and energy capabilities), and (v) cache-enabled edge devices (to reduce the load on backhaul links, and with schemes for efficiently accessing data).
In Reference [15], research papers on fog computing in the context of Industry 4.0 are surveyed. Industrial IoT protocols and applications are examined in terms of their architecture, latency, security, and energy consumption, and the authors highlight several challenges with industrial fog computing. In a more recent survey, Reference [16] considers edge-computing-assisted CPS from a similar perspective of quality-of-service optimization. They define a series of critical challenges including latency, energy consumption, security and privacy, and system reliability. In addition to classifying studies into these categories, they summarize mechanisms for addressing them.
In Reference [58], the authors conduct a survey on four edge-computing reference architectures proposed by Intel-SAP [39], FAR-Edge Project [32], Edge Computing Consortium [21], and the Industrial Consortium for Industry 4.0 [22]. The aforementioned reference architectures are all based on a three-layer model for edge computing, which integrates all layers to process the service. We note that these reference architectures focus on edge computing for industrial environments, increasing the importance of ensuring, e.g., system reliability and security. Although these four reference architectures have contributed partially to trustworthiness attributes with an emphasis on security, very few focused on other trustworthiness attributes such as safety and availability for edge-based CPS.
CPS Surveys. There are several directions of CPS literature surveys, focusing, e.g., on applications of CPS [18], specific CPS domains (such as manufacturing/Industry 4.0 or electrical grid) [19, 44], or on specific properties, such as security [62].
Literature surveys of CPS highlight connectivity, IoT, big data, and cloud interactions. Specific mentioning of fog or edge computing appears to be relatively rare, and the surveyed literature generally focuses on technical or methodological aspects applicable to CPS in distributed computer system settings such as interoperability and performance. Challenges highlighted by References [18, 44] include complexity of CPS, interoperability, cybersecurity, safety, dependability, and energy consumption.
CPS are often associated with critical applications; this is well recognized in CPS roadmaps and research challenge formulations [14, 7, 63]. Similarly, the increasing complexity of CPS with connectivity, collaboration, and more advanced algorithms including artificial intelligence and deep learning, poses both new opportunities and challenges [7, 63]. In the context of critical applications, this is especially true for properties such as security and safety, which face new challenges with new attack surfaces and faults/failure modes with complex behaviors and interactions in more open environments, requiring new approaches for system development, operation, and maintenance [7, 24, 54, 63, 67].
Another aspect is the increasing level of automation of CPS. NASA in Reference [27] provides a comprehensive survey on safety assurance of increasingly autonomous systems. They identify open challenges regarding, (i) methodologies for safety assurance (e.g., how do we go about designing and reasoning about the safety of autonomous CPS and in providing automated reasoning to assist developers?), (ii) architecting autonomous systems to support assurance with an emphasis on pervasive monitoring, (iii) dealing with human-autonomous CPS interactions, and (iv) considering ethics for autonomous systems.
These findings are also supported by comparisons of related agendas and roadmaps [63] and by the NIST CPS architecture framework [23]. The NIST framework was developed based on consultations with experts. It resulted in the identification of key life-cycle phases and aspects of CPS, with the aspects as representing groupings of cross-cutting concerns of relevance for one or more system stakeholders. Examples of key aspects identified include human-CPS interaction, trustworthiness, timing, data, and composability. The Platforms4CPS survey of agendas and roadmaps provided recommendations that address research, innovation, societal, legal, and business challenges related to CPS. Particular emphasis was placed on trust-related concerns, and CPS edge computing was highlighted as a specific research challenge.
Edge-computing Surveys. Surveys of the various flavors of edge computing include those focusing on characteristics and requirements [30, 42, 56], resource management, [46, 64], reference architectures [58], or specific technological instances such as multi-access or mobile edge computing [46, 60] and fog computing [30, 35, 47].
In Reference [42], a comprehensive survey of literature on edge-computing paradigms is presented, providing characteristics of edge-computing systems including fog computing, cloudlets, and mobile edge computing. Based on the survey, requirements for enabling edge-computing systems are summarized, including availability, reliability, and security. Low-cost fault-tolerance and security are put forward as open challenges. Additional application and challenge perspectives are provided by Reference [56], considering requirements for IoT applications including wearable cognitive assistance and favorable properties of edge-based realizations including availability, privacy, and latency. Challenges ahead, including complexity, security, and viable business models, are discussed. A previous survey on mobile edge computing of the same authors [8] discusses requirements and challenges. Requirements mentioned for edge computing include reliability, scalability, resource management, security, interoperability, and business models. Open challenges put forward include seamless edge execution handover, eco-systems and business models enabling collaboration, lightweight security and privacy, and real-time data processing at scale. Reference [30] investigates fog computing and specifically highlights challenges related to performance, security, and governance.
In Reference [47], a survey on fog computing focusing on algorithms and architectures is presented. The paper describes expectations and the suitability of fog computing for future Tactile Internet applications involving physical tactile experiences and remote real-time control, with example applications in telesurgery and vehicle platooning. Requirements of connectivity and latency are elaborated for such applications, including expected end-to-end latencies of 1 ms or less and a maximum of 1 s outage per year. Challenges discussed include the design of higher-layer APIs and protocols on top of lower-layer protocols (e.g., provided by 5G), algorithms for tactile applications, as well as novel resource management algorithms.
A complementary perspective is taken by Reference [64] by focusing on resource management independent of the type of edge-computing system. The findings indicate a relatively low coverage of non-functional3 properties in the literature; those covered in the paper include response time, energy, availability, and resource efficiency (in terms of resource utilization). Another study [46] also focuses on resource management but in the specific context of mobile edge computing, emphasizing joint radio-and-computational resource management. Privacy and energy-related issues are included.
In Reference [11], a systematic literature review was conducted on dependability and fog computing. This study provides an overview of the current state of the research, analyzing dependability attributes, sources of threats, and threat management techniques. The authors identified reliability and availability as the most studied dependability attributes. Node failure and link or path failure were the main sources of failure reported in the literature. The study also focused on the means applied to ensure dependability, identifying redundancy techniques as the most common methods. The relation between safety and security in the solutions proposed for fog computing was also considered, finding very few studies that address both topics. Finally, it identified certain research gaps, e.g., reintegration after fault recovery in distributed systems.
The survey cited in Reference [55] presents an overview of the emerging edge-computing paradigms (fog, MEC, cloudlet), from the perspective of orchestrating the storage and computing resources of end-devices, edge servers and the cloud, which the authors call end-edge-cloud orchestration, and the paradigms are compared and evaluated in terms of offloading, caching, security, and privacy. In the study, the authors also argue that transparent computing4 shares this commonality, and thus include it in the survey. However, this study appears to be unique in this regard, and we chose to not include transparent computing in our final categorization.
Furthermore, the ambitiously titled survey [72] “all one needs to know” about edge-computing paradigms includes taxonomies over fog, MEC, and cloudlet architectures, and evaluations of their quality-of-service, security, RAS (reliability, availability, survivability) and management, to name a few objectives. The paper concludes by identifying challenges and research directions, several of which relate to trustworthiness aspects including resilient fog system design (considering reliability and availability and tradeoffs w.r.t. latency, throughput, and security), fog system service-level agreements, and various further security aspects such as trust and authentication in Heterogeneous Fog Systems.

3 Method

A systematic mapping study is a well-established methodology from the Software Engineering research community that provides a structured classification of papers (a map of the field), where the classification relates to the corresponding research questions [52]. Systematic mapping studies are used by researchers based on established existing guidelines and well-defined steps.
Our systematic mapping study follows the guidelines presented in References [43, 53]. The process is adapted from Reference [6] and consists of the following main steps, as presented in Figure 2. The details of each step are presented in the next subsections. Definition of Research Questions (Step 1). The main goal of this study is to investigate the use of edge computing for Cyber-Physical Systems (CPS) and to find research gaps. This goal is refined into the following research questions (RQs):
Fig. 2.
Fig. 2. Workflow of the research method process.
RQ1:
How are edge-computing solutions used for, or considered together with CPS in research? Objective: to identify the areas where edge computing is being investigated, which technologies are used, and how trustworthiness is treated in the context.
RQ1.1:
Which CPS domains are within the focus of edge computing?
RQ1.2:
Which edge-computing solutions are used for CPS?
RQ1.3:
Which attributes (or aspects) of trustworthiness are addressed within edge computing for CPS?
RQ2:
What types of applications within CPS are being treated with edge computing? Objective: to identify which application types are using edge techniques in the field of CPS and to identify research gaps in it.
RQ3:
What type of research is being conducted within edge computing for CPS? Objective: to characterize what the individual studies emphasize in terms of research contribution.
RQ4:
What other factors are influencing the development of edge computing for CPS? Objective: to analyze other trends in the development of edge-computing technology within CPS.
RQ4.1:
What classes of Artificial Intelligence (AI) are being used in edge-based CPS context?
RQ4.2:
What type of edge-computing solutions for CPS consider energy efficiency?
Identification of Search String and Source Selection (Step 2). The main focus of this section is to identify a search string and the selection of database sources to apply the search to achieve both a good coverage of existing research on the topic and a manageable number of studies [43].
Search String. A relevant search string should be able to return research works from the databases that address the study’s RQs. For our research, we are interested in the intersection of two domains, namely, those of edge-computing solutions and cyber-physical systems. To characterize each domain, synonyms of the main keywords and terms related to the respective domains are combined using the logical OR operator. The following list includes the terms used to define each of the domains:
Domain ADomain B
Cyber-physical systems
CPS
Industry 4.0
Edge computing
Fog computing
Cloudlet
The wildcard character “ \(*\) ” is used to provide results with and without hyphenation. To compose a search string for such an intersection, the logical operator AND is used to return studies that belong to both sets. The final search string is shown in Table 1.
Table 1.
(“edge computing” OR “fog computing” OR cloudlet) AND
(“cyber*physical” OR CPS OR “industry 4.0”)
Table 1. The Final Search String
Source Selection. To find the existing relevant occurrences for this topic, two scientific online digital libraries were chosen: IEEE Xplore Digital Library5 and ACM Digital Library.6
The presented search string is used to query the studies from the sources with the necessary adaptations made in the syntax. The query resulted in a total amount of 667 candidate studies. The total number of retrieved studies from each database is shown in Table 2.
Table 2.
Digital LibrarySearch Results
ACM Digital Library338
IEEE Xplore Digital Library329
Total667
Table 2. Number of Studies Retrieved from Each Library Catalog
Study Selection Criteria (Step 3). This step performs the shortlisting/selecting the relevant studies that are identified in the previous step based on some inclusion/exclusion criteria. For a study to be classified as relevant, it should meet all the inclusion criteria at once and none of the exclusion ones. The inclusion criteria include all the studies referring to edge computing within the domain of CPS or Industry 4.0. The exclusion criteria determines which studies to be excluded: We excluded studies that are duplicates of other studies; studies that are not peer-reviewed, tutorial papers, and poster papers; survey studies are removed, since they lie outside the scope of the mapping. Instead, the relevant survey studies are covered in Section 2.
The selection process includes several steps and is detailed in Figure 3.
Fig. 3.
Fig. 3. Overview of the study selection process.
After obtaining the total amount of studies from the automatic search, the first step to select the relevant studies begins with the removal of the duplicates. We used Zotero7 to identify these duplicates and remove them. This is an open-source tool and is widely used. In the next step, all survey studies were removed, leaving the process with 649 studies after this step. For the next step, “Title & abstract exclusion,” the studies were divided among the participating researchers/authors for a review of the paper titles and abstracts, resulting in a flagging of papers as “Relevant” (R), or “Not clear” (NC), or “Not relevant.” A study was marked as relevant if it met all the inclusion criteria and none of the exclusion criteria, or as not-relevant if it lacked one of the inclusion criteria or met at least one of the exclusion criteria, or as not-clear if there were uncertainties arising from the title and abstracts review. All studies flagged as NC were examined closely by means of full-text skimming. Any subsequent studies that remain NC were brought to discussion.
Snowballing. After identifying the primary studies, the snowballing aimed at identifying additional papers by using the references of the already identified relevant papers. This was accomplished automatically using the free and open-source reference management software Zotero with the AI-backed search engine Semantic Scholar (S2) by integrating their web APIs.8
The snowballing resulted in the retrieval of 4,705 references. After removing duplicates, 3,792 studies remained. These were then compared with the list from the original search string, the 667 papers shown in Figure 3, reducing the number to 3,709. The resulting list is finally filtered using the same search string described above; the studies had to include a term related to CPS and a term related to edge computing. This process reduced the final results to 24 references. Finally, the content of the studies was analyzed, adding a total of 17 new sources from the snowballing (see left bottom part in Figure 3).
At the end of the Study selection process, there were a total of 224 studies flagged as Relevant, and the data mapping step could begin.
Data Mapping (Step 4). The next step in the systematic mapping study is to establish how the relevant studies are to be classified to attempt to answer the underlying research questions of the study. This section provides the definitions used in the classification scheme.
Beyond the general publication data such as title, name of the author(s), and publication year, seven additional facets are considered. The first, being the research types presented in Reference [70], which are adopted unaltered in our study, like in Reference [6]. The others are CPS domain, edge implementation, application class, trustworthiness, artificial intelligence, and energy efficiency. The initial categorization is based on the acquired knowledge from discussions with experts from their respective fields. Next, weekly meetings were held to refine the categories further.
We defined a well-structured form based on the classification scheme and the research questions to extract the data from the selected relevant studies. Microsoft Excel spreadsheet was used to organize and store the extracted information from each relevant study for subsequent analysis.
Analysis of Results and Discussion of Insight (Step 5). The last step of the systematic mapping study process is results analysis, where the map of the field is produced from the relevant studies and then a comprehensive analysis of the studies is performed to address the research questions. We used multiple methods to produce the maps, such as bubble charts, pie charts, and line graphs. Produced maps and the derived analysis are presented in Section 5, and a discussion of the insights is presented in Section 6.

4 Classification Schemes Definition

This section explains all the classifications in detail.

Research Type, Adopted from Reference [70]

Validation research concentrates on investigating a proposed solution, which is novel and has not yet been implemented in practice. Investigations are carried out systematically, i.e., prototyping, simulation, experiments, mathematical systematic analysis, and mathematical proof of properties.
Evaluation research focuses on evaluating a problem or an implemented solution in practice, i.e., case studies, field studies, and field experiments.
Solution proposal provides a novel solution for a problem or a new significant extension to an existing technique.
Philosophical paper describes a new way of looking at things by structuring in form of a conceptual framework or taxonomy.
Opinion paper expresses the author’s opinion whether a certain technique is good or bad.
Experience paper sketches on the personal experience of the author, i.e., what and how something has been done in practice.
Survey paper represents research where data and results are taken from other, already existing publications, where conclusions are drawn regarding trends, challenges, areas of interests, future work, and so on.

CPS Domain

Telecommunication (Telecom) includes communication infrastructures, wireless communication, applications of 5G mobile networks, and so on.
Healthcare includes the technologies to monitor and give medical care to the patients in hospitals as well as customers outside the hospital.
Manufacturing includes sensing, actuation, big data analysis, communication, control, and optimization of manufacturing systems. Typical CPS-related concepts include cloud manufacturing, Industry 4.0, and digital twins.
Infrastructure includes smart buildings/homes and smart cities. The CPS technologies enable remote monitoring and control and hence have the potential to improve the safety, security, and energy efficiency in, for example, smart buildings.
Energy encompasses energy-related considerations in, for example, smart grids, power plants, household electricity generation with renewable energy. Energy is one of the aspects related to sustainability.
Transportation refers to different modes for transporting people and goods (cars, trucks, buses, trains, etc.). Major applications include, for example, autonomous vehicles, vehicle-to-X communications, and intelligent transportation systems.
Other referring to any other CPS domain mentioned.
Not specified – relevant if the work is independent of any explicit CPS domain mentioning.
Edge Implementation/Concepts. Among the many interpretations of edge computing, we find that “the edge” is given a different meaning, as already mentioned in the introduction. We focus on the following implementations, or concepts, referring to edge computing that we understand as mainstream [25, 26].
Fog computing can be seen as an extension of cloud computing introduced by Cisco Systems in [13]. It enables computing, storage, networking, and data management from the core of the network to its edges. Therefore, network performance can be enhanced given that the processes are not only executed in centralized cloud servers but also along the path to them.
Multi-Access Edge Computing (MEC) is a platform that provides IT and cloud-computing capabilities within radio access network (RAN) in 4G and 5G, in close proximity to mobile subscribers [5, 60]. Particularly, it is located on the network edge and provides computation capabilities and storage resources to nearby low-energy, low-resource mobile devices.
Cloudlet is another direction in distributed mobile computing that shares many traits with MEC. Specifically, a cloudlet refers to a cluster of trusted computers with a strong connection to the Internet that is utilized by nearby mobile devices. Moreover, cloudlets are located in the middle tier of a 3-tier continuum, i.e., mobile device-cloudlet-cloud, and typically one hop away from mobile devices. The idea is to offload computation from mobile devices to a virtual machine (VM)-based cloudlet located on the network edge. Therefore, cloudlets need infrastructure with VM capability [57].
Other definitions of edge computing are used in the surveyed literature. Some research articles that we reviewed proposed their solution in terms of other related edge-computing concepts such as mist computing, vehicular edge computing, etc.). Thus, we classify those articles as “other.”
Not specified has been assigned to studies without any explicit reference to any type of edge computing implementation.
Application Class. With application class, we refer to the application or system aspect in focus for the research.
Resource management considers edge-based methods for handling system resources, such as scheduling, orchestration, migration, distribution of computation, storage, and so on.
Collaborative CPS deal with systems where information is exchanged between several CPS, typically with edge-computing infrastructure foreseen to support computation, for the purposes of collaboration.
Real-time application analytics concerns applications where edge computing can be leveraged to bring demanding real-time computation closer to the edge devices.
Human-machine interaction are applications where edge computing can be used to provide low-latency feedback to human operators, such as augmented reality and cognitive assistance.
Networked control systems include CPS with a closed-loop feedback control over the edge and/or dynamical systems analyzed using control theory.
Autonomous systems describes edge-device systems with a high degree of autonomy, even in the absence of other devices.
System-internal monitoring denotes methods for measuring or otherwise detecting system characteristics, such as energy consumption, latency, or faults/failures.
Software architecture is used to refer to structural/behavior arrangements and configurations of software and hardware components, e.g., related to concepts such as software-defined networking and blockchains.
Trustworthiness. As mentioned in the introduction, we use the term trustworthiness as an umbrella property, focusing on the attributes of safety, security, and predictability. This choice of attributes implies that the way we use the term comes relatively close to the concept of dependability, as “the ability to deliver service that can justifiably be trusted.” Dependability encompasses the attributes of availability, reliability, safety, integrity, maintainability, and, more recently, security, and in addition considers means to deal with these attributes (such as fault removal and tolerance) and “threats” to dependability (faults, errors, and failures) [10].
Trustworthiness is increasingly adopted in the context of CPS [37, 48, 63]. Trustworthiness, as a concept, reflects an emphasis on the end properties of a system, where the resulting trust will stem from the integration of cyber- and physical parts and their interactions with humans and other systems. This concept thus extends well beyond pure computing systems and is suitable for CPS. Considering this adoption and usages of the term, trustworthiness has been our choice.
Given our emphasis on three trustworthiness attributes, the corresponding classification is as follows:
Safety commonly concerns either an absolute or a risk-related property; we exemplify here with the latter interpretation, viewing safety as the “absence of unacceptable risk” from conditions that can lead to harm to people, property, or the environment [20]. Safety considerations typically result in requirements on how a system is used and interacts with its environment, and on availability- and reliability-related properties of subsystems/components and their interactions. According to Firesmith, safety can be seen as the degree to which accidental harm is prevented, detected, and reacted to [29]. However, newer safety standards are beginning to highlight that harm may arise also from malicious intent and usage of a system, thus safety will increasingly rely on protection from attacks (security). For example, the ISO26262 edition from 2018 has the following statement: “5.4.2.3 The organization shall institute and maintain effective communication channels between functional safety, cybersecurity, and other disciplines that are related to the achievement of functional safety. EXAMPLE 1 Communication channels between functional safety and cybersecurity in order to exchange relevant information (e.g., in the case it is identified that a cybersecurity issue might violate a safety goal or a safety requirement, or in the case a cybersecurity requirement might compete with a safety requirement)” [40]. While it is important that such a point and reference to cyber-security is made, it is also evident that methodological guidance on how to accomplish this is urgently required, indeed representing a research topic that is drawing (and requiring much more) attention as, for example, seen from the publications in recent Safecomp conferences.
Security, as opposed to safety, can be seen as the degree to which malicious harm is prevented, detected, and reacted to [29]. Security is in itself multi-attribute, taken, for example, to encompass authentication, authorization, integrity, confidentiality, and availability (see Chapter 4 in Reference [31]). The increasing connectivity, and the introduction of edge-based CPS, provides both promises to deal with security attacks (by, e.g., local monitoring and responses), but also exposes more attack surfaces, where attackers may leverage all three of cyber, physical, and human dimensions (and their combinations) for attacks.
Predictability is a term traditionally associated with real-time computing systems, referring to the ability to satisfy the timing requirements of critical tasks with some level of guarantee (depending on the static or dynamic nature of the systems) [59]. Edge-based CPS will be dynamic in nature, with varying loads, partial failures or losses (e.g., loss of message packets), potential migration of computations, and so on. To deal with real-time critical applications, a number of timing requirements may be relevant, such as precise timing, age of data, and the corresponding detection of timing overruns [65]. This relates closely to the availability and resource management of end-to-end computation chains in an edge-based CPS. With predictability, we refer to both hard and soft real-time capabilities, including approaches that in some way address availability and resource management.
Combinations of several trustworthiness properties and their tradeoffs will normally have to be considered in edge-based CPS. We therefore also specifically searched for papers that considered combinations of these properties.
None has been assigned to studies without any specific reference to a trustworthiness property.
Artificial Intelligence. In this article, the primary interest is to understand which classes of artificial intelligence methods have been used in the context of trustworthy edge computing. Note that AI methods can either be applied to enhance the capabilities of edge-computing infrastructure or used within applications on top of edge computing. For the sake of the present study, we have divided the AI technologies into the following classes:
Machine reasoning refers to symbolic ontology-based methods working with declarative knowledge including logical reasoning.
Machine learning includes numeric and symbolic learning methods including supervised, unsupervised, reinforcement learning, and combinations of those.
Model-based methods include methods used for procedural knowledge processing, including state space exploration and AI-planning.
Other refers to methods that are not included in the categories above, such as evolutionary methods and game theory.
None has been assigned to the studies without any specific reference to artificial intelligence.
Energy Efficiency. This is a binary category where we have identified if a paper considers energy efficiency at the application level and/or the computing infrastructure.

5 Results

In this section, we present the findings from the survey with a subsection for each of the four research questions as introduced in Section 3. The outcomes of the research questions are illustrated in the form of charts and/or graphs. The complete list of the relevant studies and their classifications in the study can be found online.9

RQ1: How Are Edge Computing Solutions Used for, or Considered Together with CPS in Research?

Figure 4 shows the distribution of the CPS domains among the literature studied. The results show that the biggest group of studies address CPS in general, without specifying the domain. Among the ones that are related to a specific domain, manufacturing has the largest representation.
Fig. 4.
Fig. 4. Distribution of the CPS domains considered in all relevant studies.
The distribution of the different edge implementations is shown in Figure 5. Fog computing is overwhelmingly the largest category, covering nearly half of the total number of publications.
Fig. 5.
Fig. 5. Distribution of edge implementations considered in all relevant studies.
Finally, the distribution of the trustworthiness attributes is shown in Figure 6. The pie chart on the left shows that 48% of the studied papers do not consider any of the trustworthiness attributes, and only 3% of the studies consider all the trustworthiness attributes. The remaining 49% consider one or two attributes, and the chart on the right shows the breakdown of publications in this category. Safety, security, and predictability are represented by a primary color, and their intersections represent publications that mention two of them.
Fig. 6.
Fig. 6. Trustworthiness concepts. The left chart shows how many distinct aspects of trustworthiness are considered, and the right chart shows a detailed breakdown of the “One or more” (brown) category.
An interesting aspect to consider is the evolution of the trustworthiness attributes in edge-based CPS over time, as seen in Figure 7. It is possible to observe how, despite the increase in the number of publications, the ratio of those that consider trustworthiness attributes remains relatively constant. The low number of publications in 2020 comes from the fact that the study began at the beginning of that year.
Fig. 7.
Fig. 7. Trustworthiness categories over time. Note that data from the year 2020 is incomplete, owing to the timing of the study.
Finally, the relations between CPS domain, edge implementation, and trustworthiness are presented in Figure 8. The x-axis shows the CPS domains, the y-axis shows the edge-computing implementations. In each intersection, the total number of publications is shown, as well as the relative coverage of the three trustworthiness attributes. To reduce the complexity of the pie charts, the intersections between the trustworthiness attributes are not shown. Instead, studies that address more than one attribute are counted once for each contribution.
Fig. 8.
Fig. 8. Relation between CPS domain, edge implementation, and trustworthiness.
Figure 8 shows that manufacturing using fog computing as the edge implementation has received the largest attention. Some gaps are also noticeable, such as healthcare or energy applications using cloudlet-based edge computing.

RQ2: What Types of Applications within CPS Are Being Treated with Edge Computing?

Figure 9 represents the distribution of the application types, revealing that resource management and real-time application analytics are the most studied application types for edge-based CPS.
Fig. 9.
Fig. 9. Distribution of application types considered in all relevant studies.
Figure 10 shows how the application types are distributed among the CPS domains. The x-axis represents the number of publications, and the y-axis shows the different domains.
Fig. 10.
Fig. 10. Applications distributed among the domains in all relevant studies.
Finally, the relation between application type, edge implementation, and trustworthiness is presented in Figure 11. It should be mentioned that it closely resembles Figure 8, but with the application class on the x-axis, rather than the CPS domain. Real-time application analytics and Resource management using fog computing represent the largest groups. There are some research gaps, where none or very few publications have been found, e.g., human-machine interaction using MEC and system-internal monitoring using cloudlets. It can also be noticed that human-machine interaction received the least attention in the surveyed research.
Fig. 11.
Fig. 11. Relation between application type, edge implementation, and trustworthiness.

RQ3: What Type of Research Is Being Conducted within Edge Computing for CPS?

The distribution of the research types is shown in Figure 12. More than half of the studies have been classified as solution proposals, while evaluation and validation only represent 21% and 9%, respectively. The remaining studies are shared among opinion, philosophical, and experience papers.
Fig. 12.
Fig. 12. Distribution of research types in all relevant studies.
Figure 13 shows the relation between application type, edge implementation, and research type. Regarding the research type, it is visible that solution proposal is the predominant category in almost every group. Evaluation and validation tend to occupy the second and third positions, but there are quite a few groups where these categories are not present.
Fig. 13.
Fig. 13. Relation between application type, edge implementation, and research type.

RQ4: What Other Factors Are Influencing the Development of Edge Computing for CPS?

The distribution of the AI methods used in the studies is shown in Figure 14, illustrating that two-thirds of the publications do not mention any kind of AI. Among the studies that use AI, learning methods are the most common ones.
Fig. 14.
Fig. 14. Distribution of AI methods considered in all relevant studies.
However, the evolution of those categories over time gives a slightly different picture, as shown in Figure 15. It can be seen that the interest in learning methods within edge computing for CPS increased substantially for the year 2019.
Fig. 15.
Fig. 15. Distribution of AI over time. Note that data from the year 2020 is incomplete, owing to the timing of the study.
Finally, with energy efficiency chosen to represent sustainability, only 9% of the studies consider some aspect of energy efficiency. Figure 16 shows the distribution of studies considering energy efficiency per CPS domain.
Fig. 16.
Fig. 16. Energy efficiency as considered within the different domains in the relevant studies.

6 Discussion

Our systematic mapping study, as well as the related surveys, clearly paints a picture of edge-based CPS as an emerging field that addresses multiple types of applications. It is clear that the initial drive towards edge computing has been focusing on non-critical applications, but that the momentum and opportunities are likely to lead to increased adoption of edge computing in CPS, and therefore a need to increasingly deal with multiple attributes of trustworthiness. In the following, we first discuss the findings from our systematic mapping study and then contrast them with the findings of the related surveys. Finally, we discuss the validity of our mapping study.
Discussing the Findings. Among the edge-computing solutions, fog computing is the most present implementation in the analyzed studies, as seen in Figure 5. When looking at the distribution within the CPS domains, as in Figure 8, it can be seen that only in telecom is MEC more frequent than fog computing. This finding is natural, given the connection between the telecom industry and MEC. A possible explanation for the limited number of papers covering MEC among the CPS domains could be that the telecommunication companies have a strong tradition of patenting (rather than writing papers); note that patents are not covered in this mapping study.
By contrast, manufacturing, which is much more focused on fog computing according to the surveyed publications, is also the CPS domain with the highest number of studies about edge-based CPS. This is likely because manufacturing technology already has a high degree of automation, sensors, and network capabilities, and so taking the next step to Edge is a relatively small one. Additionally, the search string included “Industry 4.0,” which also may favor results within the manufacturing industry. Last, the cloudlet architecture is the category with the lowest amount of publications for all of the CPS domains, which could have its explanation in that cloudlets have (so far) mainly intended non-CPS applications.
The consideration of trustworthiness when using edge computing in the context of critical CPS was one of the main motivations for embarking on this study. After analyzing the results in Figure 6, it is clear that many of the research efforts in edge-based CPS are only considering trustworthiness of the systems to a very limited extent. In recent years, as shown in Figure 7, the number of publications related to edge-based CPS has experienced huge growth. Nevertheless, the proportion of those that consider trustworthiness has been constant, around 50%. Among the ones that consider it, most of them only cover one or two of the attributes of trustworthiness that we have analyzed. Regarding those aspects, Predictability and Security received the most attention. For predictability, we note a strong interest in various aspects of resource management, which have rendered a classification of “predictability.” In hindsight, we can say that there are nuances of predictability, essentially referring to “best-effort” (average-case performance) vs. efforts providing some level of guarantees. Thus, not all efforts on predictability are relevant for critical CPS. Further, safety is the least-considered trustworthiness aspect. This is especially noteworthy, since many papers indeed refer to various types of critical applications as relevant for edge computing, including, for example, in manufacturing and transportation (e.g., vehicle platooning). The development of safety-critical systems requires adherence to safety standards. The current set of standards and thus best practices are not fit for the next generation AI-equipped edge-based CPS [7, 27, 63]. The corresponding challenges are perhaps most prominently seen for automated driving (AD), with the increasing number of efforts that are trying to promote AD safety [28].
Regarding the application type, resource management and real-time application analytics have been the most extensively studied areas, especially using fog computing as the edge implementation, as shown in Figure 9. Power consumption in energy-aware systems, together with task completion latency, are the two most concerned elements during the application. Extensive studies of edge-based CPS, especially regarding computation task offloading [69], energy-efficient scheduling [73], and resource allocation management [38], have investigated the natural tradeoff between these two factors. The minimization of execution delay and energy consumption in a cooperative edge-based system requires the joint optimization of communication and computation resources between local devices and edge servers. This consideration is usually measured as a weighted-sum function of the delay and energy and adjusted with different weightings to satisfy the requirements in various use cases. Nevertheless, other factors, such as the operational cost [71], network utility [61], quality-of-experience [49], and robustness of transmission network [9], are also considered as the objectives to be optimized in the application of edge-computing system for CPS.
When analyzing the type of research in Figure 12, more than half of the studies have been classified as a solution proposal. When grouping the studies by application type and edge implementation, solution proposal is still the predominant category in almost every group. Evaluation and validation tend to occupy the second and third positions, but there are some research gaps where these two categories are not present, e.g., resource management using cloudlets. As we are embarking on a phase of novel, edge-based CPS in many applications, more effort will be needed on evaluation and validation studies, not the least concerning trustworthiness properties.
Regarding other factors that are influencing the development of edge computing for CPS, this study has analyzed the AI methods used and the inclusion of energy efficiency. Regarding the AI methods, only one-third of the studies explicitly state that they use artificial intelligence (Figure 14). However, when considering the temporal evolution (Figure 15), one can see an increase in the use of machine learning methods from 2019. Regarding energy efficiency, it is only considered by a rather low fraction of the total number of studies. This value is particularly low in the domains of manufacturing and zero in the healthcare domain.
As CPS are used to integrate new technologies and deployed in settings that span embedded, edge, and cloud computing, there are corresponding needs to bridge gaps between the involved research communities. As treated in this article, this becomes particularly important concerning the edge vs. CPS disciplines. A high-level summary of these findings is illustrated in Table 3. While providing scalable computing in various forms, the edge-computing communities have not had the same exposure to critical applications. Since several trustworthiness attributes have been identified as “research challenges,” this would provide a useful starting point for discussions with CPS and dependability fields where these topics have a long tradition. For example, our survey indicates that edge-computing research has primarily focused on soft real-time (SRT) systems (where meeting timing requirements is generally not seen as critical), whereas CPS communities have for long studied both hard real-time (HRT) (where missing timing requirements may be critical) and SRT systems, as well as their combination. In any case, as we embark on more open and increasingly complex systems, all trustworthiness attributes face challenges on their own (e.g., for security, more attack surfaces; for safety, learning systems deployed in more open world settings), but also need consideration in conjunction.
Table 3.
Field vs. PropertiesSafetySecurityPredictabilityEnergy
CPSYesYesYes (HRT/SRT)Partly
Edge computingNoResearch challengeYes (SRT)Research challenge
Table 3. High-level Overview of Findings w.r.t. Key CPS Properties
Further, as cyber-physical systems become connected and start to collaborate, this will lead to cyber-physical systems of systems (CPSoS). We believe that many such CPSoS will tend to include edge computing and AI to support many of the coordination and collaboration challenges. Systems of systems are characterized by the operational and managerial independence of their constituent systems and by emergent behavior [45]. Take, for instance, city traffic as a “system,” exemplifying a situation with a multitude of stakeholders, independent evolution (of streets, vehicles, other infrastructure), not always clear responsibilities, and where a change or the introduction of entirely new systems (such as automated vehicles) may cause hard-to-predict behaviors (emergence).
Finally, although not an aspect we emphasized in our survey, we note that business models are identified as research challenges by the edge-computing communities. To our understanding, CPS have not to the same extent considered this topic and will need to do so, as CPS are likely to be increasingly provided as services as part of CPSoS.
Findings vs. Related Edge-computing Surveys. It is interesting to reflect on our mapping study findings versus the other state-of-the-art surveys that we summarized in Section 2, in particular for those covering some flavor of edge computing. We note that these survey papers identify a rather broad range of topics as relevant research challenges. Commonly identified challenges include various aspects of resource management, latency, security, privacy, and energy efficiency. Topics identified by a few papers include interoperability-related challenges, governance, business models, architecture, mobility, and application algorithms including data analytics.
The resource-constrained nature of edge-based systems is highlighted by several papers, where a few call for cost-efficient approaches to security and fault-tolerance. The complexity of edge-based systems is touched upon by a few papers directly or indirectly. We note that security in itself is a multifaceted topic that would deserve a more in-depth survey. While research has addressed or is highlighting selected reliability and availability challenges, security is still mainly identified as a research challenge with an emphasis on privacy and confidentiality—thus with less coverage of security implications on availability and safety [11].
In addition, the need to deal with conflicting objectives and multi-objective design is highlighted by a few surveys (e.g., considering quality-of-service, energy, cost and bandwidth). Specifically, several of the surveys, including References [11, 16, 64, 72], highlight gaps regarding non-functional properties in terms of trustworthiness/dependability-related attributes. As an overall remark, we conclude that the related surveys found similar gaps when it comes to addressing trustworthiness attributes, while there is a lack in considering safety and its relation to other trustworthiness attributes explicitly. A combined view, drawing upon our findings and the related surveys, is illustrated in Table 3.
Validity of the Results. Several issues need to be taken into account when conducting a systematic mapping study, which, if unaddressed, can potentially limit the validity of obtained results [43].
One such limitation is that this study only considered published papers written in English. For this reason, some relevant contributions in other languages may have been omitted. However, it should be mentioned that this is a limitation with most systematic mapping studies, and the impact is assumed to be small [14, 6]. Additionally, since the snowballing process was automated, it is possible that the occasional publication is parsed incorrectly, and thus be considered “unknown” by the automation tool. Such publications would thus not have been properly processed by the management software, and thus omitted from the results.
Another potential threat to the validity is the subjectivity of the individual researcher during the classification stage. Since only one option is chosen for each category, it can sometimes be hard to assess the core subject matter or the study under review. To mitigate this, a validation process was performed where researchers reviewed a randomly sampled subset from the rest of the team. No significant discrepancies were identified during this step. Moreover, weekly meetings were performed where all the reviewers participated to harmonize the concepts and classifications. This process led to several clarifications and in some cases to re-reviews of papers to make sure the same approach was applied to all papers.
Finally, the relevance of the findings may not be representative or relevant if the search string/terms were not appropriate to the corresponding research questions. As discussed in this article, this topic is non-trivial, since many concepts and synonyms are used to refer to edge computing as well as to CPS. We believe that the validity of our mapping study is strengthened with the comparison with the related surveys, since they encompass a broader (sometimes slightly different) scope compared to our mapping study. For example, the state-of-the-art surveys also include “CPS-” and “edge-” only surveys. The performed snowballing also helped to reduce the risk of missing relevant publications.

7 Recommendations AND Future Work

As covered by our mapping and the related surveys (Section 2), a multitude of topics is already being researched concerning edge-computing systems. It is clear that much more research and industrial efforts (including standardization) will be needed in the direction of future edge-based CPS. We summarize here our analysis of the findings (from the Discussion, Section 6) in terms of recommendations for further research and other efforts that would complement current efforts:
Further addressing security, safety, and predictability challenges. Each trustworthiness property needs further research on its own, but also to take the others into account, and moreover, the considerations of multiple simultaneous functional and non-functional requirements to be considered during design and dealt with during runtime. Research directions include how to deal with security (new vulnerabilities and attack surfaces) and predictability given the dynamics of edge-based CPS (e.g., mobility, and partial failures) and the desire to reason about and tailor latency (e.g., with respect to different quality-of-service levels) over end-to-end complex computational chains. Edge computing and communication provide new or enhanced capabilities that “augment CPS,” for example, by enhancing performance and safety. At the same time, these new capabilities, based on hardware, software, and data (with environment dependencies), increase the system complexity and invariably lead to new faults and failure modes, as well as potential unintended effects (emergence) and unintended usage. These effects are likely to introduce new hazards and risks that will require new research to better understand how to systematically deal with risk mitigation and the challenging task of safety assurance/certification in the context of future edge-based CPS [27].
Addressing the relationships between trustworthiness properties. This requires an understanding of how these properties relate to each other, can be traded against each other—ensuring a proper balancing between trustworthiness properties in partly open upgradable systems, and how edge-based CPS can be realized in cost-efficient ways. Important directions here include methodologies for complexity management, runtime reconfiguration, architecture frameworks, and reference architectures. As a common pattern, shared between the trustworthiness attributes considered in this article, there is a need to investigate how to manage and orchestrate such compute/communication chains to obtain (optimize and trade) the desired properties (e.g., w.r.t. to latency, robustness, availability, and so on). Key ingredients here include monitoring, error/anomaly detection, error handling, and ways to deal with system reconfiguration and degrades modes.
Architecting, platforms, and programmability. Edge-based CPS will involve the (often) dynamic integration of heterogeneous subsystems, with tight internal and external (environment) interactions. These systems often have long life-spans—over which they are also likely to evolve—and so must thus be maintainable, upgradable, debuggable, and scalable. Research is needed into platforms and programming models that can enable such properties, along with interoperability, reconfigurability, and energy management, while explicitly supporting trustworthiness properties at various levels. We believe that the trustworthiness properties need to be treated as first-class citizens, all the way from reference architectures, over APIs to the programming models. Resilience needs to be provided bottom-up with sufficient tailorability to suit different application needs. Research needs to address new abstractions and architectures to find a balance between the increasing complexity (of new mechanisms) and the overall system properties.
Business models and operational models (contracts) for edge-based CPS. Edge computing will not only introduce new technology into CPS but in many cases also new stakeholders such as edge computing and communication platform providers and operators. Our findings support a need to further investigate suitable business models and “contracts,” which would promote collaborative edge-based CPS and clarify responsibilities and liability.
Considering the characteristics and domain-specific requirements of edge-based CPS. Research and other efforts need to consider the specific characteristics of edge-computing systems in terms of their distributed nature, heterogeneity, dynamics (e.g., potential mobility), resource constraints, and trustworthiness-related requirements. The latter requirements will vary among application domains and in regard to the risks of the domains concerned.
Incorporating energy and environmental sustainability considerations into research. Edge-based CPS form part of an increasingly digitalized society with computing “everywhere.” To make this cost-efficient and to minimize environmental impact, circular economy concepts (reuse, repair, re-purpose, and so on) and energy considerations need further research and to be integrated into the overall architecting of future edge-based CPS. As stated in Reference [33], the sustainable developments generally only receive little attention within the framework of edge computing. Hence, the sustainability should be incorporated in the development of edge computing.
Emphasis on testbeds and experimental evaluation/validation. This recommendation follows from the relative novelty of edge-based CPS as a field and the apparently limited emphasis on experimental work. While the limited amount of work could be an indication of early stages, it is important with testbeds for experimentation and learning. This might be even more important for edge-based CPS, as they integrate technologies from telecom, IT/cloud, embedded systems, and communications.
Forums for networking and collaboration regarding edge-based CPS. The integration mentioned in the previous bullet(s) requires establishing new forums for interactions between the CPS and edge-computing communities. We also believe that reference architectures and architectural frameworks (first bullet) can help to address the needed cross-domain understanding.
As a follow-up to our systematic mapping study, it could be of interest to increase the scope of the study by incorporating more attributes related to trustworthiness, such as transparency and accountability [36], and also potentially to increase the level of detail by including more related attributes (or sub-attributes), such as resilience, availability, integrity, and confidentiality. A further potential direction would be to increase the reach of the study through the inclusion of other search terms, potentially providing further insights. Such directions include incorporating related concepts or characteristic properties with respect to CPS and Industry 4.0 like IIoT or dependability. It would also be of interest to provide a more in-depth analysis regarding sustainability and related concepts such as the “circular economy.” A more fine-grained analysis of the AI methods used for edge-based CPS would also be beneficial. A broader reach covering more of some of the industrial developments could also beneficially be extended to incorporate patents. Since the whole field of research is growing rapidly, an update to include the newest papers would also be beneficial in the next few years. We also believe that nuances of predictability and security could be explored in more detail.

8 Conclusions

The introduction of edge computing for CPS comes as a natural solution to the opportunities at hand and the current limitations of embedded systems and cloud computing. However, the heterogeneity of “things at the edge” as well as the integration with other fields of computing has brought proposals for multiple possible solutions.
This study provides an overview of the current research efforts in the usage of edge-computing solutions for critical CPS. Through the analysis and classification of 224 papers, this study provides an overview and insight into the current connections between the two fields and the corresponding research gaps. The analysis motivates a bigger emphasis on research to address trustworthiness-related properties, an aspect that is particularly relevant and necessary for the introduction of critical edge-based CPS.

Footnotes

2
For example, the so-called SOTIF standard (ISO 21448) addresses safety aspects of machine learning and advanced perception systems for automated driving. As such, it is representative for similar efforts also in other CPS domains (where also AI/ML and advanced perception systems are introduced, e.g., with similar ongoing work to extend Reference [20]. ISO 5083 addresses safety for high levels of driving automation, including cybersecurity considerations.
3
Sometimes such properties are also referred to as “extra-functional,” meaning that they specify, e.g., how well or how to scale one or more functions.
4
An extension to the classical Von Neumann architecture, where the lowest layers of a computer system are extended over a network. By leveraging block-streaming and just-in-time compilation, data and instructions can be fetched and executed over a network instead of the local bus.
5
IEEE Xplore Digital Library [Online]. Available: https://ieeexplore.ieee.org/Xplore/home.jsp.
6
ACM Digital Library [Online]. Available: https://dl.acm.org/.
8
Git repository [Online]. Available: https://gits-15.sys.kth.se/nilsjor/zotero-s2-api.
9
Available in CSV-format: https://zenodo.org/record/5112378.

References

[1]
2018. IEEE standard for adoption of OpenFog reference architecture for fog computing. (2018), 1–176. DOI:
[2]
2021. ISO/AWI TS 5083: Road vehicles – Safety for automated driving systems – Design, verification and validation - Under development. Retrieved from https://www.iso.org/standard/81920.html.
[3]
2021. ISO/SAE 21434 - Road vehicles – Cybersecurity engineering (under development).
[4]
2021. P2846 - Assumptions for Models in Safety-Related Automated Vehicle Behavior - Under development. Retrieved from https://standards.ieee.org/project/2846.html.
[5]
N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie. 2018. Mobile edge computing: A survey. IEEE Internet Things J. 5, 1 (2018), 450–465.
[6]
Sara Abbaspour Asadollah, Daniel Sundmark, Sigrid Eldh, Hans Hansson, and Wasif Afzal. 2017. 10 years of research on debugging concurrent and multicore software: A systematic mapping study. Softw. Qual. J. 25, 1 (Mar. 2017), 49–82. DOI:
[7]
AENEAS, ARTEMIS, and EPoSS associations. 2019. Strategic Research Agenda for Electronic Components and Systems. Retrieved from https://www.ecsel.eu/sites/default/files/2019-02/ECS-SRA%2019%FINAL.pdf.
[8]
E. Ahmed, A. Ahmed, I. Yaqoob, J. Shuja, M. Imran A. Gani, and M. Shoaib. 2017. Bringing computation closer toward the user network: Is edge computing the solution? IEEE Commun. Mag. 55, 11 (2017), 138–144.
[9]
Hamza Anwar and Quanyan Zhu. 2017. Minimax robust optimal control of multiscale linear-quadratic systems. In 51st Annual Conference on Information Sciences and Systems (CISS). IEEE, 1–6.
[10]
A. Avizienis, J. Laprie, B. Randell, and C. Landwehr. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Depend. Secure Comput. 1, 1 (2004), 11–33.
[11]
Z. Bakhshi, G. Rodriguez-Navas, and H. Hansson. 2019. Dependable fog computing: A systematic literature review. In 45th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). 395–403. DOI:
[12]
Rabeea Basir, Saad B. Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, and Mikael Gidlund. 2019. Fog computing enabling industrial internet of things: State-of-the-art and research challenges. Sensors 19 (2019).
[13]
Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the internet of things. In 1st Edition of the MCC Workshop on Mobile Cloud Computing (MCC’12). Association for Computing Machinery, New York, NY, 13–16. DOI:
[14]
Darko Bozhinoski, Davide Di Ruscio, Ivano Malavolta, Patrizio Pelliccione, and Ivica Crnkovic. 2019. Safety for mobile robotic systems: A systematic mapping study from a software engineering perspective. J. Syst. Softw. 151 (2019), 150–179. DOI:
[15]
Gustavo Caiza, Morelva Saeteros, William Oñate, and Marcelo V. Garcia. 2020. Fog computing at industrial level, architecture, latency, energy, and security: A review. Heliyon 6, 4 (2020), e03706. DOI:
[16]
Kun Cao, Shiyan Hu, Yang Shi, Armando Walter Colombo, Stamatis Karnouskos, and Xin Li. 2021. A survey on edge and edge-cloud computing assisted cyber-physical systems. IEEE Trans. Industr. Inform. 17, 11 (Nov. 2021), 7806–7819. DOI:
[17]
NIST Computer Security Resource Center. [n.d.]. Glossary. Retrieved 2021 from https://csrc.nist.gov/glossary/term/trustworthiness.
[18]
Hong Chen. 2017. Applications of cyber-physical system: A literature review. J. Industr. Integ. Manag. - Spec. Iss.: Cyber Phys. Syst. Industr. Integ. 2, 3 (2017). DOI:
[19]
M. H. Cintuglu, O. A. Mohammed, K. Akkaya, and A. S. Uluagac. 2017. A survey on smart grid cyber-physical system testbeds. IEEE Commun. Surv. Tutor. 19, 1 (2017), 446–464.
[20]
International Electrotechnical Commission. 2010. Functional Safety of E/E/PE Safety-Related Systems, ISO Standard 61508:2010.
[21]
Edge Computing Consortium. 2017. Edge Computing Reference Architecture 2.0. Retrieved from http://en.ecconsortium.net/Uploads/file/20180328/1522232376480704.pdf.
[22]
Industrial Internet Consortium. 2018. Edge Computing Reference Architecture 2.0. Retrieved from https://www.iiconsortium.org/IIRA.htm.
[23]
Smart Grid Cyber-Physical Systems Public Working Group and Engineering Laboratory Cyber-Physical Systems Program Office. 2017. Framework for Cyber-Physical Systems: Volume 1, Overview, Version 1.0, NIST Spec. Publ. 1500-201. DOI:
[24]
Werner Damm, Janos Sztipanovits, John S. Baras, Klaus Beetz, Saddek Bensalem, Manfred Broy, Radu Grosu, Bruce H. Krogh, Insup Lee, Harald Ruess, Alberto L. Sangiovanni-Vincentelli, and Joseph Sifakis. 2016. Towards a Cross-Cutting Science of Cyber-Physical Systems for Mastering all-Important Engineering Challenges. Retrieved from https://cps-vo.org/node/27006.
[25]
K. Dolui and S. K. Datta. 2017. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In Global Internet of Things Summit (GIoTS). 1–6.
[26]
Hanan Elazhary. 2019. Internet of things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. J. Netw. Comput. Applic. 128 (2019), 105–140. DOI:
[27]
E. Alves et al.2018. Considerations in Assuring Safety of Increasingly Autonomous Systems. Retrieved from https://ntrs.nasa.gov/search.jsp?R=20180006312.
[28]
Matthew Wood et al.2019. Safety First for Automated Driving. Retrieved from https://www.daimler.com/documents/innovation/other/safety-first-for-automated-driving.pdf.
[29]
D. G. Firesmith. 2003. Common Concepts Underlying Safety, Security, and Survivability Engineering. Technical Report Technical Note: CMU/SEI-2003-TN-033. CMU/SEI.
[30]
N. M. Gonzalez, W. A. Goya, R. de Fatima Pereira, K. Langona, E. A. Silva, T. C. Melo de Brito Carvalho, C. C. Miers, J. Møangs, and A. Sefidcon. 2016. Fog computing: Data analytics and cloud distributed processing on the network edges. In 35th International Conference of the Chilean Computer Science Society (SCCC). 1–9.
[31]
Edward Griffor (Ed.). 2017. Handbook of System Safety and Security. Syngress. DOI:
[32]
FAR-EDGE Project H2020. 2017. FAR-EDGE Architecture and Components Specification. Retrieved from https://ec.europa.eu/research/participants/documents/downloadPublic?documentIds=080166e5b3996c23&appId=PPGMS.
[33]
Andrea Hamm, Alexander Willner, and Ina Schieferdecker. 2020. Edge computing: A comprehensive survey of current initiatives and a roadmap for a sustainable edge computing development. In 15th International Conference on Wirtschaftsinformatik. GITO Verlag, 694–709.
[34]
Peter A. Hancock, Deborah R. Billings, Kristin E. Schaefer, Jessie Y. C. Chen, Ewart J. de Visser, and Raja Parasuraman. 2011. A meta-analysis of factors affecting trust in human-robot interaction. Hum. Fact. 53, 5 (2011), 517–527. DOI:
[35]
Z. Hao, E. Novak, S. Yi, and Q. Li. 2017. Challenges and software architecture for fog computing. IEEE Internet Comput. 21, 2 (2017), 44–53.
[36]
High-Level Expert Group on AI of European Commission. 2019. Ethics guidelines for trustworthy AI. Brussels. Retrieved from https://ec.europa.eu/digital-single-market/en/news/ethics-guidelines-trustworthy-ai.
[37]
High-Level Expert Group on AI of European Commission (AI HLEG. 2021). Overview of deliverables from the AI HLEG. Retrieved from https://digital-strategy.ec.europa.eu/en/policies/expert-group-ai.
[38]
Rose Qingyang Hu et al. 2018. Mobility-aware edge caching and computing in vehicle networks: A deep reinforcement learning. IEEE Trans. Vehic. Technol. 67, 11 (2018), 10190–10203.
[39]
[40]
International Organization for Standardization. 2018. ISO 26262: Road vehicles–Functional safety. Retrieved from https://www.iso.org/obp/ui/#iso:std:iso:26262:-1:en.
[41]
International Organization for Standardization. 2019. Road Vehicles - Safety of the Intended Functionality (ISO 21448). Technical Report, IEC standard. Retrieved from https://www.iso.org/standard/70939.html.
[42]
Wazir Zada Khan, Ejaz Ahmed, Saqib Hakak, Ibrar Yaqoob, and Arif Ahmed. 2019. Edge computing: A survey. Fut. Gen. Comput. Syst. 97 (8 2019), 219–235. DOI:
[43]
B. Kitchenham and S. Charters. 2007. Guidelines for performing Systematic Literature Reviews in Software Engineering, Keele University and Durham University Joint Report, Keele University. https://www.elsevier.com__data/promis_misc/525444systematicreviewsguide.pdf.
[44]
Yang Lu. 2017. Cyber physical system (CPS)-based Industry 4.0: A survey. J. Industr. Integ. Manag. - Spec. Iss.: Cyber Phys. Syst. Industr. Integ. 2, 3 (2017). DOI:
[45]
Mark W. Maier. 1998. Architecting principles for systems-of-systems. Syst. Eng. 1, 4 (1998), 267–284. DOI:
[46]
Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief. 2017. A survey on mobile edge computing: The communication perspective. IEEE Commun. Surv. Tutor. 19, 4 (2017), 2322–2358.
[47]
C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow, and P. A. Polakos. 2018. A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 20, 1 (2018), 416–464.
[48]
National Institute of Standards and Technology Cyber Physical Systems Public Working Group. 2016. Framework for Cyber-Physical Systems - Release 1.0. Retrieved from https://pages.nist.gov/cpspwg/.
[49]
Zhaolong Ning, Peiran Dong, Xiaojie Wang, Joel J. P. C. Rodrigues, and Feng Xia. 2019. Deep reinforcement learning for vehicular edge computing: An intelligent offloading system. ACM Trans. Intell. Syst. Technol. 10, 6 (2019), 1–24.
[50]
KTH Royal Institute of Technology. [n.d.]. TECoSA research center on Trustworthy Edge Computing Systems and Applications. Retrieved 2021 from https://www.tecosa.center.kth.se/.
[51]
Charith Perera, Yongrui Qin, Julio C. Estrella, Stephan Reiff-Marganiec, and Athanasios V. Vasilakos. 2017. Fog computing for sustainable smart cities: A survey. ACM Comput. Surv. 50, 3 (June 2017). DOI:
[52]
Kai Petersen, Robert Feldt, Shahid Mujtaba, and Michael Mattsson. 2008. Systematic mapping studies in software engineering. In Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering (EASE’08). BCS Learning Development Ltd., Swindon, GBR, 68–77.
[53]
Kai Petersen, Sairam Vakkalanka, and Ludwik Kuzniarz. 2015. Guidelines for conducting systematic mapping studies in software engineering: An update. Inf. Softw. Technol. 64 (2015), 1–18.
[54]
Ragunathan Rajkumar, Insup Lee, Lui Sha, and John Stankovic. 2010. Cyber-physical systems: The next computing revolution. In 47th Design Automation Conference. IEEE. DOI:
[55]
Ju Ren, Deyu Zhang, Shiwen He, Yaoxue Zhang, and Tao Li. 2019. A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, Mobile Edge Computing, Fog Computing, and Cloudlet. Comput. Surv. 52, 6 (Oct. 2019), 125:1–125:36. DOI:
[56]
M. Satyanarayanan. 2017. The emergence of edge computing. IEEE Comput. 50, 1 (2017).
[57]
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. 2009. The case for VM-based cloudlets in mobile computing. IEEE Pervas. Comput. 8, 4 (2009), 14–23.
[58]
Inés Sittón-Candanedo, Ricardo S. Alonso, Juan M. Corchado, Sara Rodríguez-González, and Roberto Casado-Vara. 2019. A review of edge computing reference architectures and a new global edge proposal. Fut. Gen. Comput. Syst. 99 (2019), 278–294. DOI:
[59]
John Stankovic and Krithi Ramamritham. 1990. What is predictability for real-time systems? Real-time Syst. (1990). DOI:
[60]
T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta, and D. Sabella. 2017. On multi-access edge computing: A survey of the emerging 5G network edge cloud architecture and orchestration. IEEE Commun. Surv. Tutor. 19, 3 (2017), 1657–1681. DOI:
[61]
Liansheng Tan, Zhongxun Zhu, Fei Ge, and Naixue Xiong. 2015. Utility maximization resource allocation in wireless networks: Methods and algorithms. IEEE Trans. Syst., Man Cyber.: Syst. 45, 7 (2015), 1018–1034.
[62]
Koen Tange, Michele De Donno, Xenofon Fafoutis, and Nicola Dragoni. 2019. Towards a systematic survey of industrial IoT security requirements: Research method and quantitative analysis. In Workshop on Fog Computing and the IoT (IoT-Fog’19). Association for Computing Machinery, New York, NY, 56–63. DOI:
[63]
Haydn Thompson and Meike Reimann. 2018. Platforms4CPS Key Outcomes and Recommendations. Retrieved from https://www.platforms4cps.eu.
[64]
Klervie Toczé and Simin Nadjm-Tehrani. 2018. A taxonomy for management and optimization of multiple resources in edge computing. Wirel. Commun. Mob. Comput. (June 2018), 7476201. DOI:
[65]
Martin Törngren. 1998. Fundamentals of implementing real-time control applications in distributed computer systems. Real-time Syst. 14 (1998), 219–250. DOI:
[66]
Martin Törngren, Fredrik Asplund, Saddek Bensalem, John McDermid, Roberto Passerone, Holger Pfeifer, Alberto Sangiovanni-Vincentelli, and Bernhard Schätz. 2016. Characterization, Analysis and Recommendations for Exploiting the Opportunities of Cyber-Physical Systems. Academic Press, 3–14. DOI:
[67]
Martin Törngren and Paul Grogan. 2018. How to deal with the complexity of future cyber-physical systems? Designs 2, 4 (10 2018), 40. DOI:
[68]
Underwriters Laboratories (UL). 2020. ANSI/UL4600 - Evaluation of Autonomous Products. Retrieved from https://ul.org/UL4600.
[69]
Yanting Wang, Min Sheng, Xijun Wang, Liang Wang, and Jiandong Li. 2016. Mobile-edge computing: Partial computation offloading using dynamic voltage scaling. IEEE Trans. Commun. 64, 10 (2016), 4268–4282.
[70]
Roel Wieringa, Neil Maiden, Nancy Mead, and Colette Rolland. 2005. Requirements engineering paper classification and evaluation criteria: A proposal and a discussion. Requir. Eng. 11, 1 (Dec. 2005), 102–107.
[71]
Jie Xu, Lixing Chen, and Shaolei Ren. 2017. Online learning for offloading and autoscaling in energy harvesting mobile edge computing. IEEE Trans. Cog. Commun. Netw. 3, 3 (2017), 361–373.
[72]
Ashkan Yousefpour, Caleb Fung, Tam Nguyen, Krishna Kadiyala, Fatemeh Jalali, Amirreza Niakanlahiji, Jian Kong, and Jason P. Jue. 2019. All one needs to know about fog computing and related edge computing paradigms: A complete survey. J. Syst. Archit. 98 (Sept. 2019), 289–330. DOI:
[73]
Hongyan Yu, Quyuan Wang, and Songtao Guo. 2018. Energy-efficient task offloading and resource scheduling for mobile edge computing. In IEEE International Conference on Networking, Architecture and Storage (NAS). IEEE, 1–4.

Cited By

View all
  • (2024)Immutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud ContinuumProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3669918(1-8)Online publication date: 30-Jul-2024
  • (2024)Edge-Cloud Architectures for Hybrid Energy Management Systems: A Comprehensive ReviewIEEE Sensors Journal10.1109/JSEN.2024.338239024:10(15748-15772)Online publication date: 15-May-2024
  • (2024)Face Recognition for Automatic Border Control: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2024.337326412(37288-37309)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Cyber-Physical Systems
ACM Transactions on Cyber-Physical Systems  Volume 6, Issue 3
July 2022
251 pages
ISSN:2378-962X
EISSN:2378-9638
DOI:10.1145/3551653
  • Editor:
  • Chenyang Lu
Issue’s Table of Contents
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 07 September 2022
Online AM: 21 June 2022
Accepted: 01 May 2022
Revised: 01 December 2021
Received: 01 January 2021
Published in TCPS Volume 6, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Edge computing
  2. fog computing
  3. mobile edge computing
  4. cloudlet
  5. cyber-physical systems
  6. trustworthiness
  7. safety
  8. security
  9. predictability
  10. dependability
  11. critical systems

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • KTH Royal Institute of Technology
  • ECSEL Joint Undertaking (JU)
  • European Union’s Horizon 2020

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,267
  • Downloads (Last 6 weeks)145
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Immutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud ContinuumProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3669918(1-8)Online publication date: 30-Jul-2024
  • (2024)Edge-Cloud Architectures for Hybrid Energy Management Systems: A Comprehensive ReviewIEEE Sensors Journal10.1109/JSEN.2024.338239024:10(15748-15772)Online publication date: 15-May-2024
  • (2024)Face Recognition for Automatic Border Control: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2024.337326412(37288-37309)Online publication date: 2024
  • (2024)HxPINN: A hypernetwork-based physics-informed neural network for real-time monitoring of an industrial heat exchangerNumerical Heat Transfer, Part B: Fundamentals10.1080/10407790.2024.2325648(1-22)Online publication date: 13-Mar-2024
  • (2024)Cyber-physical power systems: A comprehensive review about technologies drivers, standards, and future perspectivesComputers and Electrical Engineering10.1016/j.compeleceng.2024.109149116(109149)Online publication date: May-2024
  • (2023)Risk Management and Cybersecurity in Transportation and WarehousingCybersecurity Measures for Logistics Industry Framework10.4018/978-1-6684-7625-3.ch001(1-35)Online publication date: 29-Dec-2023
  • (2023)5G Deployment Models and Configuration Choices for Industrial Cyber-Physical Systems – A State of Art OverviewIEEE Transactions on Industrial Cyber-Physical Systems10.1109/TICPS.2023.33113941(236-256)Online publication date: 2023
  • (2023)Towards Safe Online Machine Learning Model Training and Inference on Edge Networks2023 International Conference on Machine Learning and Applications (ICMLA)10.1109/ICMLA58977.2023.00161(1082-1089)Online publication date: 15-Dec-2023
  • (2023)Edge Computing and AI for IoT: Opportunities and Challenges2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)10.1109/ICCE-Taiwan58799.2023.10226787(357-358)Online publication date: 17-Jul-2023
  • (2023)Collaborative Collision Avoidance of Connected Vehicles Using ADMM with PI-Regulated Lagrangian Multipliers2023 IEEE 19th International Conference on Automation Science and Engineering (CASE)10.1109/CASE56687.2023.10260658(1-8)Online publication date: 26-Aug-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media