Submitted:
22 April 2025
Posted:
23 April 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Related Work
- Predictive AI at the edge,
- Federated learning for decentralized intelligence sharing,
- SDN-based flow control for network-wide coordination, and
- A containerized, scalable deployment model.
3. Methodology
3.1. Device Layer
- Packet ID
- QoS Class: {High, Medium, Low}
- Time-To-Live (TTL)
- Criticality Level
- Battery Level
3.2. Edge Layer
3.3. Dynamic Load Indexing
- : Current CPU utilization (%)
- : Memory usage (%)
- : Normalized length of task queue (%)
3.4. Traffic Forecasting
3.5. Task Classification
- Latency requirement
- Task size
- Source energy level
- Historical failure rate
- Class A: Process locally
- Class B: Offload to peer
- Class C: Forward to cloud
3.6. Orchestration Layer
- Policy Routing: via OpenFlow tables
- QoS Enforcement: using weighted fair queuing
- Security: via TLS/DTLS tunnels and mutual authentication
- : Network-wide average delay
- : Energy cost
- : Jitter
- α,β,γ: Weighting coefficients set by SLA policy
3.7. Protocol Flow Summary
- Data Generation: IoT devices tag packets with metadata.
- Edge Ingress: Packets arrive at nearest EN, classified into routing classes.
- Forecasting: EN predicts load, scales pods if required.
- Routing Decision: Task handled locally or redirected.
- Policy Update: OL updates OpenFlow rules dynamically.
4. Proposed Protocol Architecture
4.1. Data Plane
4.2. Control Plane
- α,β,γ are context-defined weights (e.g., latency-critical vs. bandwidth-intensive applications).
4.1. Intelligence Plane
- Scale up/down containers
- Request task migration
- Allocate priority queues
- Notify the control plane
4.2. Architectural Features and Innovations
4.3. Protocol Execution Workflow
- Packet Arrival → Device emits metadata-tagged packet
- Classification → Edge node uses ML model to determine task type
- Forecasting → LSTM predicts traffic load
- Resource Check → Node decides to process, offload, or forward
- Policy Enforcement → SDN controller updates rules if needed
- Federated Learning → Local model synced to global without raw data
- Audit Logging → Action is stored in tamper-proof ledger
4.4. Advantages over Traditional Architectures
- Adaptive scaling and routing based on real-time forecasts
- Intelligent prioritization of latency-sensitive tasks
- Seamless integration with 5G slicing and orchestration
- Privacy-preserving model updates without cloud dependency
- High resilience due to predictive overload management

5. Simulation and Statistical Validation

5.1. Simulation Setup
- 100 edge nodes connected via 5G New Radio (NR) links to local base stations,
- 5 SDN controllers acting as orchestration points across regional edge clusters.

5.2. Performance Metrics
- Average End-to-End Latency (ms)
- Packet Delivery Ratio (PDR %)
- Energy Consumption per Packet (mJ)
- Node Utilization (%)
- LSTM Prediction Accuracy (RMSE in KB/s)
- Load Balancing Index (LBI)
- σL : Standard deviation of load across edge nodes
- μL : Mean load
5.3. Simulation Results
- 1.
- Latency
- 2.
- Energy Efficiency
- 3.
- Packet Delivery Ratio
- 4.
- Scalability
- 5.
- LSTM Prediction Accuracy
- 6.
- Load Balancing
5.4. Statistical Validation
5.5. Discussion of Results
6. Conclusions
References
- Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. [CrossRef]
- Hakiri, A., Gokhale, A., Berthou, P., Schmidt, D. C., & Gayraud, T. (2015). Software-defined networking: Challenges and research opportunities for future internet. [CrossRef]
- Salman, O., Elhajj, I. H., Chehab, A., & Kayssi, A. (2015). Software defined networking: State of the art and research challenges.
- Zhang, W., Wang, Y., Li, X., & Li, X. (2018). A decision-tree-based dynamic edge network optimization method.
- Wang, P., Luo, M., & Liu, Y. (2020). LSTM-based forecasting for IoT traffic in 5G networks.
- Afolabi, I., Taleb, T., Samdanis, K., Ksentini, A., & Flinck, H. (2018). Network slicing and softwarization: A survey on principles, enabling technologies, and solutions. [CrossRef]

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).