1. Introduction
The unstoppable proliferation of novel computing and sensing device technologies, and the ever-growing demand for data-intensive applications in the edge and cloud, are driving the next wave of transformation in computing systems architecture [
1,
2]. In the same context, there is a vast number of devices that can collect, process, and transmit data to other devices and systems over the Internet or other communications networks. This new concept, known as Internet of Things (IoT), enables the collection of data from various and diverse sources in the physical world [
3]. Leveraging this concept, many different advanced human-centric services and applications can be widely deployed, such as energy management in smart home environments, remote health monitoring, intelligent transportation, etc. [
4].
Since most data are created at the edge and computationally intensive data processing usually takes place in centralized cloud infrastructures, a flexible interconnection of all involved entities is required to bring the edge as closer to the cloud as possible and vice versa. Together with the cloud, edge-based computing is pushing the limits of the traditional centralized cloud computing solutions enabling, among other features, efficient data processing and storage as well as low latency for service execution. In this context, multi-access edge computing (MEC), formerly mobile edge computing, is a new architectural concept that enables cloud computing capabilities and an IT service environment at the edge of any network [
5,
6]. Located in close proximity to the end users and connected IoT devices, MEC provides extremely low latency and high bandwidth while always enabling applications to leverage cloud capabilities if necessary. The resulting paradigm shift in computing is centered around dynamic, intelligent, and yet seamless interconnection of IoT devices, edge and cloud resources in one computing system, to form what is known as a continuum [
7,
8]. The goal of this synergy is the provision of advanced services and applications to the end users, which is also leveraged by similar advances in the networking field, such as network function virtualization (NFV) [
9,
10], which decouples network operations from specific hardware equipment, as well as software defined networking (SDN) [
11], which enables a holistic and intelligent network management approach.
A continuum, today also referred to as cloud, IoT, edge-to-cloud or fog-to-cloud continuum, is expected to provide high computational capabilities for data processing at both edge and cloud, while inferring and persisting important information for post-mortem and offline analysis. Throughout the rest of this paper, the term continuum will be used to indicate the IoT-edge-cloud (IEC) continuum, unless otherwise stated. The full deployment of such a continuum is expected to leverage the support of latency critical applications, via dynamic task offloading among the IoT nodes and edge or cloud servers. Moreover, data collected directly from all entities of the continuum can be used for optimum resource allocation and scheduling policies [
12]. However, there are many technical challenges associated with this new architectural approach:
Unlike centrally managed clouds, massively heterogeneous systems in the continuum (including IoT devices, edge devices and cloud infrastructures) are significantly more complex to manage. Furthermore, distributed data management raises an additional level of complexity by classifying data infrastructures, collecting vast and diverse data volumes, providing transparent data access methods, optimizing the internal dataflow, and effectively preserving data collections [
13].
Heterogeneity of the involved devices and associated technologies. Hence, hardware and technology agnostic protocols are important not only to manipulate a large number of interconnected entities, but also to enable scalability which is a key concept in the IEC continuum.
The continuum needs to be effectively managed to optimally meet the application demands during service execution, taking into account multiple constraints, such as the location of the involved nodes (edge or IoT), their transmission and processing capabilities, as well as their energy footprint. Optimum resource allocation in multi-node heterogeneous environments might lead to highly non-convex problems. In this context, machine learning (ML) algorithms have emerged as a promising approach that can solve various optimization problems providing near-optimal solutions [
14,
15]. In traditional centralized ML approaches, all collected data are sent to a high-performance computing node for proper model training and inference. However, on one hand the collection of heterogeneous data from all involved nodes of the continuum might increase pre-processing load, and on the other hand centralized ML training might jeopardize latency requirements in critical applications. Therefore, as it will also be described in Section II, the support of distributed and decentralized ML approaches is a key concept in IEC systems [
16,
17,
18].
Due to the distributed and dynamic nature of the continuum, with plenty of devices from different owners and provenance, the application of reliability and trustiness becomes fundamentally challenging. Secure mechanisms to access the distributed nodes, data privacy preservation, and providing open and transparent operation is fundamental to enhance trustworthiness [
19].
As it was previously mentioned, the continuum puts together a broad and diverse space with multiple heterogeneous devices and protocols. Although there are several standards, open-source projects and foundations that focus on global communication and management protocols, the envisioned continuum must also consider that some constrained devices will not support any specific tool. Therefore, contributing to an open ecosystem favors interoperability with existing and emerging frameworks, which is a key challenge towards next generation broadband wireless networks [
20].
Hence, as it becomes apparent from the above, the optimum design of an IEC infrastructure should address various technical challenges, such as: i) distributed data management; ii) continuum infrastructure virtualization and diverse network connectivity; iii) optimized and scalable service execution and performance; iv) guaranteed trust, security, and privacy; v) reliability and trustworthiness, as well as; vi) support of scalability, extensibility, and adoption of open-source frameworks [
21]. These challenges are also depicted in
Figure 1. The envisioned effects of edge computing in a wide range of potential use cases, from smart environmental monitoring to future fifth generation (5G) advanced applications (such as e-health, autonomous driving, smart manufacturing, etc.), have fueled several initiatives aimed at addressing the different challenges posed by the full deployment of an IEC continuum. These challenges become even more important as the discussions on sixth generation (6G) networks have already started taking place [
22,
23].
Therefore, the goal of this survey paper is to analyze all recent technological developments on the field of IEC continuum systems. Emphasis will be given on the addressed challenges per case, according to the previous description. In the same context, open issues and limitations will be identified as well. Moreover, potential deployment scenarios based on IEC continuum systems will be also presented. The rest of this survey paper is organized as follows: In subsection 1.1 of
Section 1 indicative recent survey papers are presented, while the main contributions of our work are highlighted in subsection 1.2. In
Section 2, the most important supporting technologies in IEC systems are presented. In particular, the key concepts of distributed and decentralized ML with emphasis on federated learning (FL), serverless computing, blockchain technology, subnetworks and device-to-device communications are discussed. In
Section 3, indicative use cases are presented in the context of IEC systems, such as IoT in agriculture, smart manufacturing, efficient energy management in households, smart cities, as well as maritime applications. In 4, state-of-the-art approaches in IEC continuum systems are presented. In
Section 5, a discussion based on the addressed challenges covered by the presented works takes place. In the same context, limitations and open issues are identified as well. Concluding remarks are outlined in
Section 6. For the sake of illustration, an overview of the survey paper is also depicted in
Figure 2.
1.1. Related Works
In this subsection, indicative recent survey papers are presented in the context of IEC systems and related fields. Ιn [
24] for example, the authors present all recent advances on edge-computing-driven IoT (ECDriven-IoT), that have been summarized in six main aspects: Architecture of edge-computing driven IoT, operating systems, communication protocols, computing, security and privacy as well as use cases and applications. In [
25], the most important security and privacy approaches in the context of edge computing (EC)-based IoT systems are discussed. In particular, these include user-centric, device-centric and end-to-end (E2E) security. Apart from the architectural approach per case, additional issues such as firewalls, intrusion detection systems, authentication and authorization mechanisms, as well as privacy-preserving designs are discussed as well. Moving a step forward, the work in [
26] discusses the major classifications of attacks in IEC continuum systems and also provides possible solutions and countermeasures along with the related research efforts.
In [
27], a survey of edge artificial intelligence (AI) is provided, where AI algorithms and models are deployed on edge devices. In this context, various technical challenges are presented and analyzed, due to the resource constraint nature of the edge devices. In [
28], a comprehensive survey on mobile edge computing nodes (ECNs) is presented along with related challenges and limitations. In particular, mobile ECNs are classified into four major categories, namely aerial, ground vehicular, spatial, and maritime nodes. For each category, the different types of nodes are introduced, along with transmission and mobility limitations. A key outcome of this work is the need for an integrated architecture taking into consideration all the aforementioned different types of nodes and diverse technical characteristics. The work in [
29] is mainly focused on distributed ML approaches in the IEC continuum. In this context, the main libraries and frameworks for ML and deep learning (DL) inference, centralized training, and distributed training with a focus on the edge and cloud are presented and analyzed, along with limitations and open issues. In [
30], the authors present an up-to-date survey of the edge computing research, in the context of integrating edge computing with emerging technologies in other domains (e.g., AI, blockchain, 6G, and digital twin) to support internet of energy (IoE) applications. The research in [
31] is focused on service orchestration and resource management for edge computing, including task offloading, content caching and virtual network embedding (VNE). Finally, in [
32], all recent technological advances on edge computing, especially from the perspective of architectures and models, key technologies, and directions are presented and discussed.
The aforementioned indicative surveys are also summarized in
Table 1, where the main contributions per case are highlighted. In the same context, the key contributions of our work are mentioned as well, that will be analyzed in the following subsection.
1.2. Contributions
Unlike other related surveys, the goal of this paper is to analyze all recent developments in the IEC continuum in the context of the addressed challenges, as described in the introductory part and also depicted in
Figure 1. For this reason, the most important key enabling technologies towards an integrated IEC continuum are presented as well. This analysis is extremely important since the new era of computing systems and 6G networks will build upon a holistic integration of various cutting-edge technologies, taking into consideration among others the aforementioned technological challenges, towards a unified access and management framework to support diverse and demanding applications. Therefore, the main contributions of our work can be summarized as follows:
Recent works in the IEC continuum are presented, with emphasis on the challenges they deal with, as well as on the supporting technologies.
Basic limitations are identified, and open research directions are analyzed as well. This discussion on open issues takes into consideration the coexistence of IEC systems with next generation broadband wireless networks.
Indicative use cases are presented, where the synergy among IoT, edge and cloud nodes is highlighted towards optimum service deployment and user experience.
2. Supporting Technologies in the IoT Edge Cloud Continuum
The overall architectural approach of an IEC system is shown in
Figure 3 (communication with a 5G network has been included as well). As it can be observed, various IoT nodes from different operational scenarios may communicate with 5G access points (APs) via either public or private networks. The latter case can be more appealing in latency demanding applications, such as smart manufacturing, since all network operations can be established within the premises of interest [
33,
34]. It should be also noted at this point that inter-node communications can be supported as well, based on well-known communication protocols, such as Sigfox, LoRa, or narrow band (NB)-IoT [
35]. It is also assumed that MEC servers can be either collocated with APs, or alternately deployed in close proximity.
IoT nodes, which are assumed to have sensing and transmitting capabilities, can offload a particular task to the MEC server either in cases of latency demanding applications or in cases of extreme computational load. This offloading may also take place in the cloud domain if necessary. Therefore, as also depicted in
Figure 3, efficient ML algorithms can be used for resource optimization and for efficient task offloading. In all cases, it is essential to identify trusted IoT nodes and secure task offloading/data transfer procedures. Therefore, task offloading may also include the execution of advanced security protocols that might not be always feasible in resource-constraint IoT nodes. Finally, in highly demanding latency scenarios (e.g., autonomous driving in the cases of advanced 5G infrastructure [
36]) the involved IoT devices should be in position to support network functionalities via NFV and ensure uninterrupted connectivity.
In light of the above, the most important key enabling technologies for an efficient IEC deployment include distributed/decentralized ML approaches for efficient resource optimization, serverless computing to leverage software and hardware decoupling, blockchain technology to ensure security during data transfer among the various nodes of the continuum, subnetworks for the provision of uninterrupted connectivity as well as device to device (D2D) communications for inter-node data transfer and content caching if necessary.
2.1. Distributed and Decentralized Machine Learning
As also mentioned in the introductory part, over the last decade ML algorithms have emerged as a potential solution to relax the computational burden of traditional optimization approaches and provide near-optimum solutions in highly non-convex problems [
37]. In centralized ML approaches, data collected directly from different network devices (i.e., mobile terminals, access points, IoT devices, edge servers, etc.), are sent to a high-performance computing server for proper model training. Afterwards, model inference to all involved devices takes place, if necessary.
However, there are several disadvantages with this approach, especially in the modern era of IEC systems: i) centralized data collection might lead to high computational load, especially for large number of involved devices and associated datasets, as well as to a single point of failure; ii) since the vision of the IEC continuum involves multiple connected heterogeneous devices over diverse infrastructures, data preprocessing prior to the actual training of the ML model is necessary, which might increase overall training time and result in system latency deterioration; iii) frequent transmission of data from IoT devices to centralized servers might drive security and privacy concerns, since not all IoT devices have the processing power to execute advanced security protocols; and iv) computationally demanding ML training might have an impact on the energy footprint of the involved devices.
Distributed ML approaches can reduce centralized computational burden, either by parallelizing the training procedures, or by efficiently distributing training data [
38,
39]. The first case, which is also known as model-parallelism, enables different parts of the model to be trained on different devices (e.g., certain layers of a neural network - NN or certain neurons per layer are trained per device). In the second case, each ML node takes into account a subset of the training data. Afterwards, model aggregation takes place. Although both aforementioned approaches can improve training times and relax the computational burden, unavoidably, training data offloading still takes place. Consequently, their deployment on privacy critical applications might be questionable.
To overcome the aforementioned issue, the concept of FL has emerged over the last years [
40,
41], as a promising approach that ensures distributed ML training on one hand and privacy protection on the other hand. To this end, training is performed locally on the involved devices, with no need for forwarding training data to external servers. At predefined time intervals, the parameters of the trained model are sent to the central processing node, where the master model is periodically updated. Moreover, since training data remain localized, privacy is enhanced, as it was previously mentioned. In addition, with FL, data can be distributed across many devices, which can enable the use of much larger datasets. Moreover, the amount of data transfers and communication burden is reduced, especially in cases where the data are distributed across devices with limited connectivity or bandwidth. Finally, FL allows the model to be trained on a diverse range of data sources, which can improve its robustness and generalizability, as well as overall training times. For example, focusing on the previously mentioned autonomous driving 5G scenario, using this approach a predefined set of identical cars can be parallelly trained on different landscapes. Results can then be aggregated and sent back to the autonomous cars in order to cover a wide range of driving reactions.
A schematic diagram of FL is shown in
Figure 4, in the case of NN training. In this case, each node trains locally the corresponding ML model with the available local data set. The derived parameters (i.e., weights of the NN in the specific case), are sent periodically to the master processing node for proper model aggregation. At the next stage, the new weights of the master model are sent back to the local nodes for model update. Apart from autonomous driving which was previously mentioned, FL can be quite beneficial in a wide range of scenarios, such as smart manufacturing and e-health applications, where data privacy protection is of utmost importance [
42].
2.2. Serverless Computing
Serverless computing expands on state-of-the-art cloud computing by further abstracting away software operations and parts of the hardware–software stack. To this end, and with respect to the already standardized 5G architecture, the execution of vertical applications in the management and orchestration layer initiates the E2E service creation and orchestration. In the context of serverless computing [
43,
44], related functions need to be executed in the background for specific time triggers or in general short events. In this case, a container cluster manager (CCM) is required where the appropriate set of function containers is enabled per requested application. Therefore, supported applications are fully decoupled from hardware infrastructure. This will not only make feasible on one hand the support of latency-critical scenarios, such as autonomous driving, smart manufacturing, e-health applications, etc., but on the other hand a more efficient infrastructure management can be supported.
The serverless computing concept benefits from containerization by removing decision making regarding scaling thresholds, reducing costs by charging only when applications are triggered, and reducing application starting times. Therefore, appropriate business models can be applied in IEC continuum systems, based on the actual usage of applications. Serverless and edge computing are indispensable parts in the heterogeneous cloud environments of 6G networks, since major network functionalities should be able to migrate and be executed at the edge, either in cases of outage of the main core network or in order to leverage flexible network deployment for ultra-low latency applications.
2.3. Blockchain Technology
The ever-increasing number of interconnected devices on the Internet has raised many concerns regarding security and privacy preservation, as it was previously mentioned. To this end, blockchain technology is a credible way to ensure security and privacy in heterogeneous infrastructures. A blockchain is a distributed ledger technology with growing lists of records (blocks) that are securely linked together via cryptographic hashes. Each block contains a cryptographic hash of the previous block, a timestamp and transaction data. Those blocks are interconnected to form a chain. Therefore, for a particular block (i.e., nth block), its hash value is calculated by hashing the whole part of the n-1 block, which in turn includes the hash of the n-2 block, etc. [
45,
46].
A key novelty of the blockchain technology is that it does not require a central authority for node identification and verification, but transactions are made on a peer-to-peer (P2P) basis. In general, blockchain is a decentralized security mechanism, where multiple copies of blocks are held in different nodes. Therefore, a tampering attempt would have to alter all blocks in all participating nodes. Moreover, since timestamps are inserted in all related blocks, it is not possible to alter the encrypted content after it has been published to the ledger, making it more trustworthy and secure as a result. In addition, timestamps are also helpful for the tracking of the generated blocks and for statistical analysis.
The integration of blockchain technology in IoT networks faces many technical challenges, since the encryption and decryption process of the blocks requires computational resources that cannot be always supported by lightweight IoT devices. Recent advances in the development of ‘‘light clients’’ for blockchain platforms have enabled nodes to issue transactions in the blockchain network without downloading the entire blockchain [
47]. Therefore, combining blockchain with FL, IoT sensing devices can offload a portion of their data to an edge server for local model training. However, there are still open issues to be addressed, such as a common blockchain framework that can be adopted from all involved entities, which is a key concept towards scalability in large scale networks. Blockchain is usually combined with smart contracts, stored on a blockchain, and run only when predetermined conditions are met [
48,
49]. Therefore, human intervention is minimized. Smart contracts do not contain legal language, terms, or agreements—only code that executes actions. Hence, the need for trusted intermediators is reduced, while at the same time malicious and accidental exceptions are minimized.
2.4. Subnetworks
The increased number of wireless applications deployed at the network edge involving a limited number of network components, such as a sensor network in a manufacturing environment or vehicle-to-vehicle (V2V) communications, requires minimum latency with short range transmission. To this end, the concept of subnetworks has been introduced, where a network component in the edge acts as a serving AP [
50,
51]. However, the concept of subnetworks extends the provision of zero latency to the connected devices, as in cases where the connection with the core network is lost. In this case, as also mentioned in the autonomous driving application, the subnetwork should be in position to operate autonomously for the provision of uninterrupted E2E connectivity. Sub-networks will be a key driving factor towards the 6G architectural concept due their local topology in conjunction with the specialized performance attributes required, such as extreme latency or reliability. Moreover, the concept of subnetworks is crucial for the design of energy efficient networks, where topology reconfiguration might take place in time varying IoT sensor networks [
52].
In 6G terminology, subnetworks are also referred to as ‘in-X’ subnetworks, with the ‘X’ standing for the entity where the subnetwork is deployed, such as a production module in a smart manufacturing environment, a robot, a vehicle, a house, or even the human body in cases of wearable devices that can monitor various parameters [
53]. A schematic diagram of such a network is shown in
Figure 5, where data flows are categorized according to their latency requirements: low, such as in the cases of non-latency critical key performance indicators (KPI) monitoring; medium, such as task offloading in edge servers, and; high. The latter case includes for example control signals from the involved IoT devices in a smart manufacturing environment that necessitate immediate production termination in cases of malfunction. Therefore, the highly critical data flows are kept within the in-X subnetwork, as the tight latency requirement does not allow for external processing. For this reason, a local edge server can be in close proximity to the AP under consideration (in this case, an unmanned aerial vehicle – UAV).
2.5. Device to Device Communications
In an IoT environment, a specific type of content might be requested from several user terminals or other IoT devices in close geographical proximity. In this case, user experienced latency can be improved if content is requested from adjacent IoT devices that share the same content, instead of centralized APs. In this case, a particular node requests content by broadcasting a short-range signal in order to setup a link connection with the node having the content. Therefore, D2D connectivity should be supported in this case [
54,
55]. However, apart from content caching, D2D connectivity can also support subnetwork organization, as it was mentioned in the previous subsection, as well as dynamic IoT nodes deployment and reconfiguration if necessary.
In general, D2D communication offers autonomous intelligent services or mechanisms without centralized supervision. Hence, the provision of ultra-low latency services in the IEC continuum can be achieved, as D2D communication offers more reliable connectivity between devices. In addition, the concept of green network deployment can be supported as well, due to the shorter propagation paths and consequently reduced transmission power.
In the same context, device interconnection can be established via mesh networking [
56,
57]. A mesh network comprises a type of local area network (LAN) topology, where multiple devices or nodes are connected in a non-hierarchical manner, so that they can cooperate, and provide significant network coverage to a wider area compared to the area coverage achieved by a single router. As mesh networks consist of multiple nodes, responsible for signal sending and information relaying, every node of the network needs to be connected to another via a dedicated link. Since mesh networks leverage on a multi-hop wireless backbone formed by stationary routers, they can serve both mobile and stationary users. Mesh networks have significant advantages such as fast and easy network extension, self-configuration and self-healing and reliability, as a single node failure does not result in total network failure.
4. Recent Works in IoT-Edge-Cloud Continuum Architectures
In this section all recent advances in the area of IEC continuum systems are presented. In this context, in [
71] hybrid cloud deployments for supporting data-intensive, 5G-enabled IoT applications were investigated. Moreover, a decentralized hybrid cloud MEC architecture, resulting in a Platform-as-a-Service (PaaS) is proposed and its main building blocks and layers are thoroughly described. In this context, a security and privacy module makes feasible anomaly detection, anonymization, encryption and identity management. In addition, serverless computing is supported along with AI optimization. Moreover, two indicative use cases are provided, and in particular a smart city scenario as well as e-health applications. Due to the PaaS deployment of the proposed architecture, potential stakeholders and business models are identified as well. In [
72], an IEC framework is proposed and evaluated for the visual control of IoT devices in a user's smartphone. This approach couples various technologies for DNS naming and indoor localization to support the visual control of IoT devices. To this end, the DNS Name Autoconfiguration (DNSNA) for IoT devices is used, where an IoT device is registered to a router that sends a broadcast message. Afterwards, a unique DNS name and IPv6 address are generated for the specific IoT device. Localization is based on periodic WiFi beacon messages from the smartphone and the received signal strength indicator (RSSI) value for such a beacon message that is received by each IoT device. In the same context, open research challenges were identified as well, such as secure communications among the user terminal and the involved IoT devices, as well as extension of the proposed approach in multiuser scenarios.
In [
73], the UNITE architecture was described, where all available resources across the entire IEC architecture are classified into three major classes: computing, networking, and storage. To this end, a holistic resource monitoring and management takes place, where the UNITE framework evaluates certain KPIs, such as latency or throughput. If one of these KPIs falls below a predefined value, then the appropriate actions take place (e.g., application migration, network rerouting, etc.) transparently to the end user. Moreover, the UNITE framework allows agnostic application development, not bound to any specific running environment.
In [
74], an optimized IoT-enabled big data analytics architecture for edge–cloud computing using ML is proposed and evaluated. The considered scheme is composed of two layers, i.e., IoT–edge and cloud processing. In this context, an edge intelligence node is introduced, which handles and stores big amount of data at the edges of the network with the integration of cloud technology. The proposed data design is experimentally simulated with an authentic data set using Apache Spark. In [
75], the goal is to combine edge and cloud computing for IoT data analytics by taking advantage of edge nodes to reduce data transfer. In order to process data close to the source, sensors are grouped according to their locations, and feature learning is performed on the closer to the edge node. The results showed that transmission data and the corresponding network traffic could be reduced even up to about 80% without significant loss of accuracy. In [
76], a sharing resource allocation problem among multiple service providers in the edge cloud is investigated. In this context, the authors study distributed algorithms to find a near-optimal solution with fast convergence. In particular, the dual decomposition and alternating direction method of multipliers were used.
In [
77], the concept of volunteer edge cloud was introduced, where blockchain technology is used to deal with the problem of service payment and data credibility in a decentralized system. In this context, performance evaluation in a mobile robots environment has taken place, where a proof-of-concept system based on Ethereum and KubeEdge was designed. Results demonstrated that more flexible IoT devices can be supported, while at the same time software development is improved as well. In [
78], an architectural approach is proposed and evaluated, which combines IoT, cloud, and edge computing for failure analysis and prediction. According to the presented results, the proposed model can reduce the number of failed tasks for cloud-IoT applications. In [
79], a low complexity and secure task offloading algorithm was implemented and evaluated in IEC environments. Results indicate that the proposed approach can provide a significant reduction on the overall execution times compared to other baseline approaches. In [
80], the IoT microservice deployment problem is investigated in heterogeneous edge-cloud environments. In this context, microservices leverage programming flexibility, as each application can be deployed as a collection of loosely coupled services [
81]. Optimum microservice deployment should take into consideration multiple applications whose execution is based on highly heterogeneous infrastructures. To this end, a deep reinforcement learning (DRL) methodology was presented in [
80] that was compared with a random and a genetic algorithm. According to the presented results, the proposed approach has improved performance compared to the other benchmark approaches even when scaling up the requests.
In [
82], a deep Q-learning (DQL) framework is proposed and evaluated for efficient task offloading from IoT devices to either edge or cloud servers. To this end, blockchain is used during task offloading to ensure security and privacy protection. A key novelty of this work is that it considers the energy status of each device during offloading calculations while at the same time an energy harvesting process is adopted per device. In [
83], an IEC computing continuum solution is investigated in the context of SAR operations. These scenarios can be highly demanding both in terms of throughput and latency since they involve multiple and diverse operations, such as dynamic multi-robot mapping and fleet management, computer vision for feature extraction, data processing, device management, orchestration of software components as well as low latency communications. The proposed approach, based on the NEPHELE project [
84], leverages virtualization of IoT devices at the edge part of the infrastructure and supports openness and interoperability aspects in a device-independent way. In the same context, an orchestration framework is supported for coordination between cloud and edge computing orchestration platforms, also considering ML and security protection.
In [
85], reference architectures are discussed for industrial IoT, Internet of Vehicles (IoV) as well as IoT-based smart homes. In [
86], a novel approach is introduced that adopts fuzzy logic algorithms, considering application characteristics (e.g., CPU demand, network demand and delay sensitivity) as well as resource utilization and resource heterogeneity. The presented results indicate that this approach improves overall service time, when compared to other benchmark approaches. In [
87], an industrial edge-cloud collaborative computing platform is presented, namely the Sophon Edge, that also makes use of AI enabled operations. Sophon Edge adopts a pipeline-based computing model for streaming data from IoT devices. Moreover, this platform supports an iterative way for model evolution and updating to enable agile and data driven IoT applications. In [
88], edge-cloud collaboration in the context of AI assisted approaches is investigated. To this end, various aspects are discussed, such as privacy enhancement via federated learning, ML model training in hardware constraint devices, model compression, inference polices, etc. In [
89], an architectural approach is presented for the IEC continuum able to be federated so as to support cross-domain services that use different cloud-IoT resources. In this context, various aspects are taken into consideration, such as content virtualization and cognitive management of services. In [
90], optimum application deployment takes into consideration both required latency as well as overall power consumption. To this end, simulations were conducted with the help of iFogSim [
91] simulator which demonstrate that application service quality is significantly improved, and system power consumption is greatly reduced when compared with other baseline approaches.
In [
92], the authors propose a new Internet of Things Edge-Cloud Federation (IoTEF) architecture for multi-cluster IoT applications. This new architecture has four layers: (i) Application Isolation; (ii) Data Transport; (iii) Distributed Operating System (OS), and; (iv) Unified Federated Management layer. This approach provides a common framework for data management to both edge and cloud, reduced latency since data processing is closer to the edge, as well as a unified federated management approach for managing several clusters from a single management interface. In the same context, experimental results were provided as well, taking into consideration a smart building scenario. In [
93], quality of service (QoS) is considered as the main performance metric to solve the problem of optimum cluster usage in edge cloud environments. In [
94], the paper describes a model-based approach to automatically assign multiple software deployment plans to hundreds of edge gateways and connected IoT devices implemented in collaboration with a smart healthcare application provider.
In [
95], the paper deals with a precision agriculture (PA) case that covers extreme PA requirements by using automation, IoT technologies, and edge and cloud computing through virtualization. In this context, a three-layered architectural approach has been considered, where IoT devices are located in greenhouse facilities, tasks can be offloaded to virtualized edge servers, while the cloud infrastructure deals with non-latency critical high complexity calculations. In [
96], an edge-fog-cloud architectural approach for IoT-based smart agricultural applications is introduced. In this context, an optimization problem is formulated using mixed-integer linear programming aiming to improve various KPIs, such as energy consumption, CO2 emission, and network traffic.
In [
97], an architectural approach of edge-computing in IoT-based manufacturing applications is described. In this context, the role of edge-computing is analyzed from four perspectives, and in particular: edge equipment, network communication, information fusion and cooperation with cloud. In the same context, the architectural approach of [
98] leverages edge-fog-cloud cooperation in a smart manufacturing environment. In [
99], the architecture of an IoT big data ecosystem is presented and analyzed, based on a three-layer approach: edge layer, cloud layer and application layer. In this context, an efficient task execution is carried out between the cloud and the edge layer, in the context of predictive maintenance.
In [
100] edge computing is combined with blockchain technology in a smart manufacturing environment. In [
101], a hybrid task offloading model is introduced, including the collaboration of cloud computing and MEC, in the context of smart cities. To this end, a distributed deep learning-driven task offloading algorithm is proposed to generate near-optimal offloading decisions over the mobile devices, edge cloud server, and central cloud server. According to the presented results, the proposed approach can significantly reduce overall computational burden, when compared with other offloading schemes. In [
102], a lightweight mechanism for security provision in IoT based e-health applications is proposed and evaluated. To this end, potential nodes that can be used in the orientation are acceptable only in the case that can verify their trustiness. In this case, they render some services to the network, without fully being part of it. Their full admittance is based on the bootstrapping factor value. Therefore, attack attempts can be minimized. In [
103], FL is used in order to reduce the amount of data sent to MEC servers for processing and training of ML models. In this case, considering wearable devices on end users, local models can be derived based on the corresponding data sets. After the local FL training is completed, the e-health wearable device sends the corresponding local FL system model results to the MEC node, which aggregates the local FL system model (i.e., the global FL model) and broadcasts the updates to all e-health wearable users. In this context, D2D communications are also exploited. In [
104] blockchain technology with smart contracts has been deployed to leverage data integrity and transaction fairness in e-health applications. According to the presented results, the proposed approach can resist to adaptive chosen keyword attacks.
In [
105], the problem of energy efficiency has been investigated in IEC orientations. In this context, the mathematical formulation leads to a convex optimization problem that has been solved with the help of a proposed iterative technique. To this end, the proposed approach outperforms other baseline technologies according to the resource allocation policies that have been considered, such as equal computational load to all involved servers, popularity-based and workload-aware assignment, as well as communication-based assignment. In [
106], the authors deal with anomaly detection in the IEC continuum. In particular, the inverse distance weighted algorithm and marching squares algorithm are adopted to generate the boundary of anomaly in terms of isopleths. Afterwards, an appropriate filtering mechanism is employed at the edge networks, and related data are transmitted to the cloud for further analysis only if necessary. The performance of the proposed approach was evaluated with the help of a sensor telemetry data set and results showed that it can outperform other benchmark approaches. In [
107], an IoT energy management system has been designed for smart city environments, leveraging DRL for energy efficient calculations. In this context, two distinct approaches are evaluated: In the first case, IoT devices offload energy scheduling tasks to an edge server. In the second case, the edge server offloads NN calculations in the cloud domain to reduce overall computational times. Results were presented for specific communities with smart homes and edge servers.
According to the presented results, the proposed schemes can achieve low energy cost while causing lower delay compared to traditional schemes. Finally, in [
108] an IEC architecture is proposed and evaluated that integrates ML algorithms for optimum energy management in microgrids that employ distributed energy sources. In this context, edge devices are located in the boundaries of microgrids and collect various types of energy management data. Edge devices send telemetry data to a cloud-based IoT platform that is responsible for data monitoring, visualization, storage and sharing for future planning purposes. The implementation is based on open-source software and performance evaluation results address scalability for hundreds of prosumers. In particular, two forecasting algorithms were considered. As part of their future work, the authors have identified among others the employment of FL approaches, as well as the insertion of historical data in the considered algorithms via deep learning.
6. Conclusions
In this survey paper, all recent advances with respect to IoT edge-cloud based operating systems were presented and analyzed. From the derived analysis it became apparent that the full deployment of edge-cloud-IoT systems towards the new era of broadband wireless networks will face many technical challenges, such as a unified data management system that can support multiple diverse services and applications (such as e-health, smart manufacturing, smart cities, agriculture, etc.), appropriate security mechanisms as well as optimum resource allocation that can be adapted to various conditions. Currently missing from the IEC ecosystem, is an open, non-proprietary, interoperable, robust, secure, sustainable multi-cloud and multi-edge continuum hosting solution, aimed at optimizing the execution of services, especially in data intensive applications, and able to adapt to different and adaptable strategies (e.g., execution time reduction, concurrent execution, edge processing, fog security, locality, high resource utilization, low latency and high energy efficiency), while being scalable, extensible and open to experimentation. This solution should be able to support various use cases and scenarios that can be leveraged by the use of IoT technology.
Since 6G standardization is still a work in progress, with an incipient but strongly growing research effort, it is the right moment to identify the overall set of services, requirements, and functions in the IoT-cloud-edge continuum, for end-to-end systems management with a strong focus on practical scenarios and applications. This joint design of the IEC continuum and 6G networks will unavoidably leverage the support of advanced services and applications in the new 6G era, such as connected intelligent machines, internet of senses, as well as holoportation.