{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:47:59Z","timestamp":1762876079128,"version":"build-2065373602"},"reference-count":21,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Driven by the vision of the Internet of Things (IoT), there has been a dramatic shift in mobile computing in recent years from centralized mobile cloud computing (MCC) to mobile edge computing (MEC). The main features of MECs are to promote mobile computing, network control, and storage to the edge of the network in order to achieve computationally intensive and latency-critical applications on resource-constrained mobile devices. Therefore, MEC is proposed to enable computing directly at the edge of the network, which can deliver new applications and services, especially for the IoT. In order to provide a highly flexible and reliable platform for the IoT, a MEC-based IoT platform (MIoT) is proposed in this study. Through the MIoT, the information asymmetrical symmetry between the consumer and producer can be reduced to a certain extent. Because of the IoT platform, fault tolerance is an important research topic. In order to deal with the impact of a faulty component, it is important to reach an agreement in the event of a failure before performing certain special tasks. For example, the initial time of all devices and the time stamp of all applications should be the same in a smart city before further processing. However, previous protocols for distributed computing were not sufficient for MIoT. Therefore, in this study, a new polynomial time and optimal algorithm is proposed to revisit the agreement problem. The algorithm makes all fault-free nodes decide on the same initial value with minimal rounds of message exchanges and tolerate the maximal number of allowable faulty components in the MIoT.<\/jats:p>","DOI":"10.3390\/sym11020167","type":"journal-article","created":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T11:19:58Z","timestamp":1549019998000},"page":"167","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Reliability Enhancement of Edge Computing Paradigm Using Agreement"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5981-221X","authenticated-orcid":false,"given":"Shu-Ching","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Information Management, Chaoyang University of Technology, 168, Jifeng E. Rd., Wufeng, Taichung 41349, Taiwan"}]},{"given":"Wei-Shu","family":"Hsiung","sequence":"additional","affiliation":[{"name":"Department of Information Management, Chaoyang University of Technology, 168, Jifeng E. Rd., Wufeng, Taichung 41349, Taiwan"}]},{"given":"Chia-Fen","family":"Hsieh","sequence":"additional","affiliation":[{"name":"Department of Information Management, Chaoyang University of Technology, 168, Jifeng E. Rd., Wufeng, Taichung 41349, Taiwan"}]},{"given":"Yao-Te","family":"Tsai","sequence":"additional","affiliation":[{"name":"Department of International Business, Feng Chia University, 100, Wenhwa Rd., Seatwen, Taichung 40724, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2019,2,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Botta, A., De Donato, W., Persico, V., and Pescap\u00e9, A. (2014, January 27\u201329). On the Integration of Cloud Computing and Internet of Things. Proceedings of the 2014 International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain.","DOI":"10.1109\/FiCloud.2014.14"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MC.2016.245","article-title":"Fog Computing: Helping the Internet of Things Realize Its Potential","volume":"49","author":"Dastjerdi","year":"2016","journal-title":"Computer"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","article-title":"Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges","volume":"78","author":"Roman","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Puthal, D., Sahoo, B.P.S., Mishra, S., and Swain, S. (2015, January 12\u201313). Cloud Computing Features, Issues, and Challenges: A Big Picture. Proceedings of the 2015 International Conference on Computational Intelligence and Networks (CINE), Bhubaneshwar, India.","DOI":"10.1109\/CINE.2015.31"},{"key":"ref_5","first-page":"3283","article-title":"Abstract Model of Fault Tolerance Algorithm in Cloud Computing Communication Networks","volume":"3","author":"Kumar","year":"2011","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_6","first-page":"349","article-title":"New Anatomy of Trustworthy Mobile Cloud Computing","volume":"45","author":"Wang","year":"2016","journal-title":"Inf. Technol. Control"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TSC.2013.53","article-title":"Omnisuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for Mobile Social Networks","volume":"7","author":"Khalid","year":"2014","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","article-title":"Mobile Edge Computing: A Survey on Architecture and Computation Offloading","volume":"19","author":"Mach","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1002\/wcm.1203","article-title":"A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches","volume":"13","author":"Dinh","year":"2013","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1408","DOI":"10.1016\/j.future.2012.03.011","article-title":"High Performance Cloud Computing","volume":"29","author":"Mauch","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MCOM.2017.1700328","article-title":"Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems","volume":"55","author":"Ficco","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/JIOT.2013.2296516","article-title":"An Information Framework for Creating a Smart City through International of Things","volume":"1","author":"Jin","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s10796-014-9489-2","article-title":"The Internet of Things-A Survey of Topics and Trends","volume":"17","author":"Whitmore","year":"2015","journal-title":"Inf. Syst. Front."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Li, X., Chen, X., and Xie, Y. (2015). Agreement of Networks of Discrete-Time Agents with Mixed Dynamics and Time Delays. Math. Probl. Eng.","DOI":"10.1155\/2015\/957028"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","article-title":"The Byzantine general Problem","volume":"4","author":"Lamport","year":"1982","journal-title":"ACM Trans. Progr. Lang. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/71.89066","article-title":"Consensus with Dual Failure Modes","volume":"2","author":"Meyer","year":"1991","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/0020-0190(82)90033-3","article-title":"A Lower Bound for the Time to Assure Interactive Consistency","volume":"14","author":"Fischer","year":"1981","journal-title":"Inf. Process. Lett."},{"key":"ref_18","first-page":"205","article-title":"Reaching Optimal Interactive Consistency in a Fallible Cloud Computing Environment","volume":"34","author":"Wang","year":"2018","journal-title":"J. Inf. Sci. Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/0890-5401(92)90035-E","article-title":"Shifting Gears: Changing Algorithms on the Fly to Expedite Byzantine Agreement","volume":"97","author":"Dolev","year":"1992","journal-title":"Inf. Comput."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Agrawal, S., and Daudjee, K. (2016, January 5\u20139). A Performance Comparison of Algorithms for Byzantine Agreement in Distributed Systems. Proceedings of the 12th European Dependable Computing Conference (EDCC), Gothenburg, Sweden.","DOI":"10.1109\/EDCC.2016.17"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/2455.214112","article-title":"Bounds on Information Exchange for Byzantine Agreement","volume":"32","author":"Dolev","year":"1985","journal-title":"J. ACM"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/2\/167\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:30:20Z","timestamp":1760185820000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/11\/2\/167"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,1]]},"references-count":21,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2019,2]]}},"alternative-id":["sym11020167"],"URL":"https:\/\/doi.org\/10.3390\/sym11020167","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2019,2,1]]}}}