Add this event to your calendar
Cybersecurity Conference Description [Submitted by Organizer/ Or Written By Us]
The evolution towards 5G is widely influenced by the exponential growth in the number of computing devices embedded in everyday objects and interconnected services over the Internet. This massive interconnection of heterogeneous devices is technically termed the Internet of Things (IoT). The IoT paradigm enables resource constrained devices to be connected over the Internet. IoT is poised to induce a significant surge in demand for computing resources, as well as networking infrastructures in order to accommodate these myriads of interconnected devices. As of now, data being collected is predominantly transported to to and from centralized clouds or enterprise data centers for processing. Despite having the theoretically unlimited resources to process data at the cloud, data transmission to and from the cloud is becoming one of the biggest bottlenecks in IoT because of (i) low latency requirements of mission-critical and demanding applications such as real-time video analytics, and (ii) sheer volume of data to be moved around. Meeting these extreme demands will necessitate modifications to the networking and computation infrastructures and technologies. Multi-Access Edge Computing (MEC), formerly known as Mobile Edge Computing, is one such noteworthy modification which brings intelligence to the edge of the network along with higher processing and storage capabilities. According to the recent trends of MEC and other edge computing concepts, 5G networks will play a major role of connecting IoT devices.
With such potential benefits, the role of MEC in IoT realization becomes apparent, more so the role of both MEC and IoT (MEC-IoT) technologies towards the evolution to 5G. The success of MEC-IoT still requires tackling many key challenges at the edge nodes, e.g., resource management, network connectivity and scalability, energy efficiency, middleware, security, privacy, trust, service management, societal impact, etc. This workshop will elaborate and emphasize the key aspects of MEC-IoT evolution in many applications, and will provide the opportunity for the researchers across the globe to share their latest research works on emerging MEC-IoT.
In this workshop we invite contributions which tackle theoretical, technical and application aspects of MEC-IoT Integration for 5G.
Do You Have A Question Regarding This Event?
About Our Service
We've been listing Cybersecurity Conferences and InfoSec Events for the last seven years which is a VERY long time in cyberspace!
What started as a simple blog post in 2012 spawned into this mega directory which lists, literally, every single IT Security event that takes place around the world at any given time.
We hope you enjoy our resource, and as ever, we'd really appreciate it if you could link back to our site.