May 2025
What is this page?
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
Publications (89)
January 2025
December 2024
·
28 Reads
Edge computing is emerging as a key enabler of low-latency, high-efficiency processing for the Internet of Things (IoT) and other real-time applications. To support these demands, containerization has gained traction in edge computing due to its lightweight virtualization and efficient resource management. However, there is currently no established framework to leverage both containers and unikernels on edge devices for optimized IoT deployments. This paper proposes a hybrid edge system design that leverages container and unikernel technologies to optimize resource utilization based on application complexity. Containers are employed for resource-intensive applications, e.g., computer vision, providing faster processing, flexibility, and ease of deployment. In contrast, unikernels are used for lightweight applications, offering enhanced resource performance with minimal overhead. Our system design also incorporates container orchestration to efficiently manage multiple instances across the edge efficiently, ensuring scalability and reliability. We demonstrate our hybrid approach's performance and efficiency advantages through real-world computer vision and data science applications on ARM-powered edge device. Our results demonstrate that this hybrid approach improves resource utilization and reduces latency compared to traditional virtualized solutions. This work provides insights into optimizing edge infrastructures, enabling more efficient and specialized deployment strategies for diverse application workloads.
December 2024
·
25 Reads
The rapid expansion of IoT devices and their real-time applications have driven a growing need for edge computing. To meet this need, efficient and secure solutions are required for running such applications on resource-constrained devices with limited power, CPU, and memory. Unikernel, with its minimalistic design and application-specific approach, offers a promising alternative to traditional virtualization and container technologies in these environments. The existing research does not thoroughly examine the feasibility of using unikernel for edge computing. This paper investigates the potential of unikernel for ARM-powered edge computing by evaluating the performance and efficiency of three prominent unikernel systems such as OSv, Nanos, and Unikraft against Docker container. We experiment with real-world edge computing applications and utilize key metrics such as boot time, execution time, memory usage, CPU overhead, and network performance to determine how unikernel performs under the constraints of edge devices. Our findings reveal the potential advantages of unikernel in terms of reduced resource consumption and faster startup times while highlighting areas where they may need further optimization for edge deployment. This study provides valuable insights for researchers and practitioners considering unikernel as a lightweight, efficient solution for edge computing on ARM architectures.
July 2024
·
43 Reads
May 2024
·
108 Reads
·
4 Citations
January 2024
·
106 Reads
·
3 Citations
IEEE Access
In the evolving tech landscape, various container technologies coexist and offer compelling advantages in quickly deploying applications and efficiently utilizing resources on edge devices. Despite the potential benefits of containerization in general, limited research has explored how various container technologies perform in specific domains. In response, this paper provides an extensive evaluation of container technologies (e.g., RunC, LXC, Containerd, Docker, Podman, and Singularity) in the context of OpenCV-based computer vision applications on ARM-based edge devices. Experiments verify that the performance of containerized computer vision applications is comparable to that of non-containerized ones. While the performance is roughly equivalent across all container runtimes/engines, Docker consistently demonstrates superior efficiency for computer vision applications on ARM-based edge devices. These insights contribute to bridge the existing gap to the integration of containers in IoT and ARM-based edge computing scenarios.
January 2024
·
33 Reads
IEEE Access
IoT edge computing is a network design model that captures and processes data at the network edge. The results are forwarded to a cloud service or, if additional processing is needed, a middle tier. By processing data at the edge and middle tier, edge networks achieve better load-balancing and improve performance; however, traditional edge network deployments represent a rigid participation model. Edge networks require physical access to an IoT device and often lock the device to a single edge network. These constraints make it difficult to construct the ideal network, as they reject IoT devices deployed at the network edge but not owned by the network administrator. Our goal is to remove these limitations by creating a network protocol that supports broader participation of IoT devices, cryptographically secures network data, and improves network performance by increasing captured data at the network edge. The protocol is named Snap to symbolize the ease of self assembly. Our experimental research focuses on temperature stability and the cycle efficiency of an HVAC system by utilizing a Snap network to combine two existing edge networks and increase the number of temperature measurement points. The additional measurement points improved the efficiency of the HVAC cycle strategy by increasing the square footage of measured building space. The additional temperature capture points supported an adjustment to the HVAC cycle strategy which resulted in reducing the disparity between the requested temperature and the resulting temperatures. Snap networks support a broader range of IoT sensors leading to increased measurement density, sample rate frequency, and coverage of the network edge.
November 2023
·
5 Reads
August 2023
·
12 Reads
·
15 Citations
Citations (63)
... However, despite these advantages, container virtualization systems have been subject to security issues, such as malware infections, malicious images, and privilege escalation, due to their relatively weaker isolation strategy compared to virtual machines [1]. To address these security concerns related to container virtualization, various projects have been proposed in each area of containerization technology, such as runtime security, image signature, and authorization [2] [3]. In particular, the image scanning approach, which can detect vulnerabilities within containers and their installed packages, has been regarded as a fundamental solution for securing container virtualization systems [4][5][6]. ...
- Citing Conference Paper
May 2024
... 2) Container Technology: When it comes to container technology, Docker, which is a famous container runtime/engine, is widely preferred for deploying computer vision applications due to its versatility and extensive adoption. In addition, it is compatible with container orchestration platforms such as Kubernetes and Docker Swarm [59]. The choice of container image and its size significantly influence application performance, emphasizing the need for careful selection and configuration. ...
- Citing Article
- Full-text available
January 2024
IEEE Access
... On one hand, unlike the homogeneous local models trained in the federated learning, which all deal with the same task [15]- [19], partial-DTs in the federated DT construction are heterogeneous, each with distinct model parameters and functions, trained by potentially various sources of feature data. For instance, in the transportation DT system, partial-DTs for vehicles, pedestrians and road scenes can be diverse due to different monitoring areas or sensing equipments, but should be simultaneously created and later integrated as a whole [20], [21]. On the other hand, unlike the federated learning that commonly focuses on training a global model until convergence in a single time frame, the federated DT construction has to be dynamically conducted frame-byframe in accordance with the DT evolution. ...
- Citing Conference Paper
August 2023
... Microservice architecture is characterized by decomposing large applications into loosely coupled and function-specific microservices; this approach has become predominant in modern software design due to its ability to enable rapid delivery and scale [2]. Advances in containerization technology resolve the integration issues between microservices and operating systems [3], facilitating their deployment on edge servers that can communicate with each other, which in turn enables collaborative processing of application requests. However, in contrast to cloud computing, MEC faces resource constraints [4], causing resource competition among applications with diverse latency requirements, which is intrinsically the contention among microservices. ...
- Citing Conference Paper
- Full-text available
July 2023
... Code vulnerabilities have profound implications across diverse domains in the digital realm, ranging from the utilization of digital devices within IoT ecosystems and online accounts (Atashpanjeh et al. 2022) to pivotal systems like containers (Haq, Tosun, and Korkmaz 2022) and operating systems. Although anticipating specific sophisticated techniques proves challenging, most of these vulnerabilities can be attributed to developers' setbacks in ensuring robust code security. ...
- Citing Conference Paper
- Full-text available
December 2022
... However, this process often occurs manually [37]. Kaiser et al. [69] highlight several container vulnerability scanning tools, including Snyk [70], Trivy [36], Clair [71], and Anchore [72]. Among these, Trivy is particularly recognized for its effectiveness [37], demonstrating high coverage for image issues [73] and consistently detecting vulnerabilities [74]. ...
- Citing Article
- Full-text available
January 2022
IEEE Access
... The advancements in machine learning have revolutionized numerous fields, enabling machines to perform complex tasks such as image segmentation, speech recognition, and natural language processing with remarkable efficiency. [1] These breakthroughs have been largely driven by the IoT has already made significant inroads into critical sectors, including healthcare, military operations, education, and artificial intelligence [3]. Its ability to seamlessly connect devices and streamline operations has led to advancements in medical diagnostics, real-time monitoring, smart classrooms, and intelligent defense systems. ...
- Citing Chapter
January 2021
... The model used a machine-learning algorithm (random forest classification algorithm) to predict and protect against unknown attacks. The authors in [27] ran multiple scanning tools on different containerized computer vision applications from DockerHub and provided a detailed guideline regarding how to better deploy secured containers on the edge. A recent survey on container technologies for ARM architecture [28] investigates a wide range of issues, including vulnerabilities, portability and lack of support. ...
- Citing Conference Paper
- Full-text available
January 2022
... In this section, it is explained the results of the research are explained and at the same time, is given the comprehensive discussion. Results can be presented in figures, graphs, tables, and others that make the reader understand easily [14], [15]. The discussion can be made in several sub-sections. ...
- Citing Conference Paper
December 2021
... With disruptive growth in IoT (Internet of Thing) in the current technology is gaining demand among the many sectors [1,2]. An IoT describes the system which consists of physical objects which is called "thing" [3]. These are connected to embedded system with sensors and with other technology which are used for connecting and exchanging the information with other systems over the internet. ...
- Citing Article
- Full-text available
January 2022
IEEE Access