Special Issues
Table of Content

AI-Driven Optimization for Secure and Sustainable Edge IoT Services

Submission Deadline: 30 June 2026 View: 1588 Submit to Special Issue

Guest Editor(s)

Prof Tianyi Li

Email: tianyi@cs.aau.dk

Affiliation: Department of Computer Science, Aalborg University, Aalborg, 9220, Denmark

Homepage:

Research Interests: Edge Computing, Data Mining, Distributed Systems


Prof Yushuai Li

Email: yusli@cs.aau.dk

Affiliation: Department of Computer Science, Aalborg University, Aalborg, 9220, Denmark

Homepage:

Research Interests: Distributed Systems, Block Chain, Digital Twins


Prof Peiyuan Guan

Email: peiyuang@ieee.org

Affiliation: Department of Informatics, University of Oslo, Oslo, Norway

Homepage:

Research Interests: Edge Computing, Federated Learning, Reinforcement Learning


Prof Jiawen Kang

Email: kavinkang@gdut.edu.cn

Affiliation: Department of Automation, Guangdong University of Technology, Guangzhou, 510006, China

Homepage:

Research Interests: Edge Computing, Block Chain, IoT


Dr Min Zhang

Email: min.zhang@waikato.ac.nz

Affiliation: School of Engineering Teaching and Research, University of Waikato, Hamilton, 3216, New Zealand

Homepage:

Research Interests: Microgrid, P2P energy trading, digital twin


Summary

Scope and Motivation
The integration of edge computing and the Internet of Things (IoT) is shifting intelligence and data processing from the cloud to the network edge. This shift supports real-time applications in areas like smart cities, industrial automation, and healthcare, where low latency and high quality of service (QoS) are essential.


However, the large scale and limited resources of edge IoT devices create challenges in security, sustainability, and reliability. Traditional cloud security approaches are not suitable for the distributed edge, and energy constraints threaten long-term operation. Optimizing service performance, security, and energy use together is a key research goal.Emerging technologies such as AI, machine learning, digital twins, federated learning, and blockchain offer new ways to build secure and sustainable services across the edge-to-cloud continuum.


This Special Issue focuses on applying Artificial Intelligence to balance security, sustainability, and performance in Edge IoT services. We welcome research on intelligent systems and algorithms that enable autonomous, efficient, and resilient service delivery


Topics of Interest
We invite original research and review articles on secure and sustainable Edge IoT services. Topics include, but are not limited to:
· AI and machine learning for dynamic resource management in edge systems
· Intelligent service placement and workload offloading for low-latency applications
· Reinforcement learning for self-healing and adaptive service networks
· Energy-aware scheduling and task allocation across edge and cloud
· Lightweight cryptography and authentication for resource-limited devices
· Blockchain for service integrity and data provenance
· Federated learning and privacy-preserving collaborative intelligence
· AI-driven intrusion and anomaly detection for service security
· Energy-harvesting system design for long-lasting edge services
· Cross-layer security for service data protection
· Secure service collaboration in federated edge environments


Keywords

edge computing, AI, security, energy efficiency

Published Papers


  • Open Access

    ARTICLE

    Graph-Based Constrained PPO for Low-Latency and Energy-Aware AI Agent Migration in Internet of Vehicular Agents

    Kanyang Jiang, Yingkai Kang, Ming Li
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2026.083294
    (This article belongs to the Special Issue: AI-Driven Optimization for Secure and Sustainable Edge IoT Services)
    Abstract The Internet of Vehicular Agents (IoVA) interconnects distributed AI agents across vehicular networks to deliver real-time intelligent services for vehicular users. Due to the limited computing capacity of vehicles, AI agents are deployed on nearby RoadSide Units (RSUs) to perform computation-intensive inference. As vehicles traverse RSU coverage boundaries, AI agents must migrate to target RSUs to maintain service continuity. However, the communication and computing resources at each RSU are shared among multiple co-served vehicles, creating coupled allocation decisions that jointly determine system latency and energy consumption. To address this challenge, we propose a low-latency and… More >

  • Open Access

    ARTICLE

    An Improved Blockchain-Empowered Storage Service Based on Data Association

    Bin Fang, Qi Yu, Han Wu, Xingxing Hou, Jingyu Zhang
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2026.080210
    (This article belongs to the Special Issue: AI-Driven Optimization for Secure and Sustainable Edge IoT Services)
    Abstract The integration of Internet of Things (IoT) with blockchain technology introduces significant challenges in handling massive and frequent transaction data generated by distributed IoT devices. The Unspent Transaction Output (UTXO) model, widely adopted in blockchain systems like Bitcoin, faces critical scalability issues when applied to IoT environments. This is because the datasets it processes expand rapidly, which consumes a large amount of memory and increases the disk access latency of resource-constrained IoT nodes. Existing optimization approaches exhibit limitations in dynamic adaptability and protocol compatibility. To address these challenges, we propose an improved blockchain-empowered storage service More >

  • Open Access

    REVIEW

    Three-Level Taxonomy of RL Self-Healing for Energy, Latency, and Security Constrained Edge IoT Networks: A Review

    Hitesh Mohapatra
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2026.080961
    (This article belongs to the Special Issue: AI-Driven Optimization for Secure and Sustainable Edge IoT Services)
    Abstract This review systematically analyzes Reinforcement Learning approaches for self-healing in energy-constrained secure edge IoT networks across 82 studies from 2020 to 2026. Unlike existing surveys that focus on general RL applications, the proposed review focuses on a three-level taxonomy that uniquely addresses edge IoT deployment realities through formulation-scope-hardware mapping. The work develops a novel three-level taxonomy classifying recovery scope (node, link, service, network), RL formulations (tabular, deep, multi-agent, model-based), and constraint integration (energy, latency, security, hybrid), revealing service migration dominance at 30% coverage and node recovery achieving 38% maximum energy savings. Normalized performance baselines establish More >

Share Link