Have a personal or library account? Click to login
Mission Critical Messaging Using Multi-Access Edge Computing Cover

Mission Critical Messaging Using Multi-Access Edge Computing

Open Access
|Dec 2019

References

  1. 1. Mukherjee, S., C. Beard. A Frameworkfor Ultra-Reliable Low Latency Mission-Critical Communication. – In: Proc. of Wireless Telecommunications Symposium (WTS’17), Chicago, IL, 2017, pp. 1-5.10.1109/WTS.2017.7943546
  2. 2. Petrov, V., etal. Achieving End-to-End Reliabilityof Mission-Critical Trafficin Softwarized 5G Networks. – IEEE Journalon Selected Areasin Communications, Vol. 36, March 2018, No 3, pp. 485-501.10.1109/JSAC.2018.2815419
  3. 3. Khoshnevisan, M., V. Joseph, P. Gupta, F. Meshkati, R. Prakash, P. Tinnakornsrisuphap. 5G Industrial Networkswith CoMPfor URLLCand Time Sensitive Network Architecture. – IEEE Journalon Selected Areasin Communications, Vol. 37, April 2019, No 4, pp. 947-959.10.1109/JSAC.2019.2898744
  4. 4. Porambage, P., J. Okwuibe, M. Liyanage, M. Ylianttila, T. Taleb. Surveyon Multi-Access Edge Computingfor Internetof Things Realization. – IEEE Communications Surveys & Tutorials, Vol. 20, Fourthquarter 2018, No 4, pp. 2961-2991.10.1109/COMST.2018.2849509
  5. 5. Bekkouche, O., T. Taleb, M. Bagaa. – UAVs Traffic Control Basedon Multi-Access Edge Computing. – In: Proc. of IEEE Global Communications Conference (GLOBECOM’18), Abu Dhabi, United Arab Emirates, 2018, pp. 1-6.10.1109/GLOCOM.2018.8647421
  6. 6. Markakis, E. K., etal. Efficient Next Generation Emergency Communicationsover Multi-Access Edge Computing. – IEEE Communications Magazine, Vol. 55, November 2017, No 11, pp. 92-97.10.1109/MCOM.2017.1700345
  7. 7. Yang, J., X. Ji. An Improved Inter-Domain Handover Scheme Basedon Bidirectional Cooperative Relay. – Cyberneticsand Information Technologies, Vol. 13, 2013, No 4, pp.127-138.10.2478/cait-2013-0059
  8. 8. Kumar, S. A., P. Ilango, G. H. Dinesh. A Modified LEACH Protocolfor Increasing Lifetimeofthe Wireless Sensor Network. – Cyberneticsand Information Technologies, Vol. 16, 2016, No 3, pp. 154-164.10.1515/cait-2016-0040
  9. 9. Sharma, S., etal. Secure Authentication Protocolfor 5G Enabled IoT Network. – In: Proc. of 5th International Conferenceon Parallel, Distributedand Grid Computing (PDGC’18), Solan Himachal Pradesh, India, 2018, pp. 621-626.10.1109/PDGC.2018.8745799
  10. 10. Jover, R. P. The Current Stateof Affairsin 5G Securityandthe Remaining Security Challenges. – arXiv:1904.08394c2 [cs. CR\ 18 April 2019, pp. 1-8. https://arxiv.org/pdf/1904.08394.pdf
  11. 11. 3GPP TS 29.199-4 3rd Generation Partnership Project. Technical Specification Group Core Networkand Terminals. Open Service Access (OSA). Parlay X Web Services. Part 4: Short Messaging Release 9, V9.0.0, 2009.
  12. 12. Guist, F., etal. MEC Deploymentsin 4Gand Evolutiontowards 5G. – ETSI White Paper, No 24, 2018.
  13. 13. Kekki, S., etal. MECin 5G Networks. ETSI White Paper, No 28, 2018.
  14. 14. ETSI GS MEC 003 Mobile Edge Computing (MEC). Frameworkand Reference Architecture, V1.1.1, 2016.
  15. 15. 3GPP TR 22.824 Technical Specification Group Servicesand System Aspects. Feasibility Studyon 5G Message Servicefor MIoT. Stage 1, Release 16, V16.0.0, 2018.
  16. 16. 3GPP TS 38.413 Technical Specification Group Radio Access Networks. NG-RAN. NG Application Protocol (NGAP), Release 18, V15.2.0, 2018.
  17. 17. Zhang, K., T. Liu, D. Cheng. Observabilityof Finite Labeled Transition Systems. – IEEE Transactionson Automatic Control, Vol. 63, June 2018, No 6, pp. 1501-1512.10.1109/TAC.2017.2749380
  18. 18. Beek, M. H., F. Damiani, S. Gnesi, F. Mazzanti, L. Paolini. Onthe Expressivenessof Modal Transition Systemswith Variability Constraints. – Scienceof Computer Programming, Vol. 169, 2019, pp. 1-17. 10.1016/j.scico.2018.09.006.10.1016/j.scico.2018.09.006
  19. 19. Escrig, D. de F., J. J. A. Keiren, T. A. C. Willemse. Gamesfor Bisimulationsand Abstraction. – Local Methodsin Computer Science, Vol. 13, 2017, Issue 4:15, pp.1-40.
  20. 20. Yang, X., J. Katoen, H. Lin, G. Liu, H. Wu. Branching Bisimulationand Concurrent Object Verification. – In: Proc. of 48th Annual IEEE/IFIP International Conferenceon Dependable Systemsand Networks (DSN), Luxembourg City, 2018, pp. 267-278.10.1109/DSN.2018.00037
  21. 21. Gibson-Robinson, T., P. Armstrong, A. Boulgakov, A. W. Roscoe. FDR3: A Parallel Refinement Checkerfor CSP. – International Journalon Software Toolsfor Technology Transfer. Vol. 2, 2016, Issue 18, pp. 149-167.10.1007/s10009-015-0377-y
  22. 22. ETSI GS MEC-IEG 006 Mobile Edge Computing. Market Acceleration. MEC Metrics Best Practiceand Guidelines, V1.1.1, 2017.
  23. 23. ITU-R M.2410-0 Minimum Requirements Relatedto Technical Performancefor IMT-2020 Radio Interface(S), 2017.
  24. 24. Bertenyi, B., etal. 5G NR Radio Interface. – Journalof ICT Standardization, Vol. 6, May 2018, Issue 1&2, pp. 31-58.
  25. 25. Cattaneo, G., F. Giust, C. Meani, D. Munaretto, P. Paglierani. Deploying CPU-Intensive Applicationson MECin NFV Systems: The Immersive Video Use Case. – Computers, Vol. 55, 2018, Issue 7, pp.1-20. DOI:10.3390/computers7040055.10.3390/computers7040055
  26. 26. Filippou, M. C., D. Sabella, V. Riccobene. Flexible MEC Service Consumptionthrough Edge Host Zoningin 5G Networks. – Cornell University, Computer Science, Distributed, Paralleland Cluster Computing, 2019, arXiv:1903.01794 [cs. DC].10.1109/WCNCW.2019.8902852
  27. 27. Liu, J., G. Shou, Y. Liu, Y. Hu, Z. Guo. Performance Evaluationof Integrated Multi-Access Edge Computingand Fiber-Wireless Access Networks. – IEEE Access, Vol. 6, 2018, pp. 30269-30279.10.1109/ACCESS.2018.2833619
DOI: https://doi.org/10.2478/cait-2019-0037 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 73 - 89
Submitted on: Sep 17, 2019
Accepted on: Nov 10, 2019
Published on: Dec 11, 2019
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2019 Evelina N. Pencheva, Ivaylo I. Atanasov, Vladislav G. Vladislavov, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.