{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T10:06:45Z","timestamp":1774951605646,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,1,15]],"date-time":"2023-01-15T00:00:00Z","timestamp":1673740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"KTH Royal Institute of Technology"},{"name":"Ismail Butun"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>This article investigates and discusses challenges in the telecommunication field from multiple perspectives, both academic and industry sides are catered for, surveying the main points of technological transformation toward edge-cloud continuum from the view of a telco operator to show the complete picture, including the evolution of cloud-native computing, Software-Defined Networking (SDN), and network automation platforms. The cultural shift in software development and management with DevOps enabled the development of significant technologies in the telecommunication world, including network equipment, application development, and system orchestration. The effect of the aforementioned cultural shift to the application area, especially from the IoT point of view, is investigated. The enormous change in service diversity and delivery capabilities to mass devices are also discussed. During the last two decades, desktop and server virtualization has played an active role in the Information Technology (IT) world. With the use of OpenFlow, SDN, and Network Functions Virtualization (NFV), the network revolution has got underway. The shift from monolithic application development and deployment to micro-services changed the whole picture. On the other hand, the data centers evolved in several generations where the control plane cannot cope with all the networks without an intelligent decision-making process, benefiting from the AI\/ML techniques. AI also enables operators to forecast demand more accurately, anticipate network load, and adjust capacity and throughput automatically. Going one step further, zero-touch networking and service management (ZSM) is proposed to get high-level human intents to generate a low-level configuration for network elements with validated results, minimizing the ratio of faults caused by human intervention. Harmonizing all signs of progress in different communication technologies enabled the use of edge computing successfully. Low-powered (from both energy and processing perspectives) IoT networks have disrupted the customer and end-point demands within the sector, as such paved the path towards devising the edge computing concept, which finalized the whole picture of the edge-cloud continuum.<\/jats:p>","DOI":"10.3390\/s23021004","type":"journal-article","created":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T01:31:15Z","timestamp":1673832675000},"page":"1004","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Technological Transformation of Telco Operators towards Seamless IoT Edge-Cloud Continuum"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2483-8070","authenticated-orcid":false,"given":"Kasim","family":"Oztoprak","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Konya Food and Agriculture University, 42080 Konya, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3585-129X","authenticated-orcid":false,"given":"Yusuf Kursat","family":"Tuncel","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Konya Food and Agriculture University, 42080 Konya, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1723-5741","authenticated-orcid":false,"given":"Ismail","family":"Butun","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Konya Food and Agriculture University, 42080 Konya, Turkey"},{"name":"Department of Computer Engineering, KTH Royal Institute of Technology, SE-114 28 Stockholm, Sweden"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","article-title":"OpenFlow: Enabling innovation in campus networks","volume":"38","author":"McKeown","year":"2008","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","article-title":"Software-defined networking: A comprehensive survey","volume":"103","author":"Kreutz","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_3","unstructured":"Open Networking Foundation (2023, January 10). Software-Defined Networking: The New Norm for Networks; Technical Report; April 2012. Available online: http:\/\/opennetworking.wpengine.com\/wp-content\/uploads\/2011\/09\/wp-sdn-newnorm.pdf."},{"key":"ref_4","unstructured":"Henthorn-Iwane, A. (2022, November 20). Why DevOps Is the Imperative Companion to SDN & NFV?. Available online: https:\/\/www.sdxcentral.com\/articles\/contributed\/devops-sdn-nfv-imperative-companion-alex-henthorn-iwane."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MC.2020.3007297","article-title":"The edge-to-cloud continuum","volume":"53","author":"Milojicic","year":"2020","journal-title":"Computer"},{"key":"ref_6","unstructured":"Conroy, S. (2022, November 20). History of Virtualization. Available online: https:\/\/www.idkrtm.com\/history-of-virtualization\/."},{"key":"ref_7","unstructured":"(2022, November 20). eBrief: The Impact of Edge Computing on the Data Center. Available online: https:\/\/www.sdxcentral.com\/resources\/sponsored\/ebriefs\/ebrief-the-impact-of-edge-computing-on-the-data-center\/."},{"key":"ref_8","unstructured":"Tuncel, Y.K. (2021). Application Layer Processing with Protocol Independent Switch Architecture. [Master\u2019s Thesis, \u00c7ankaya \u00dcniversitesi]. Available online: https:\/\/kursattuncel.github.io\/663639.pdf."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sadique, K.M., Rahmani, R., and Johannesson, P. (2020). Identity management in internet of things: A software-defined networking approach. Proceedings of the 2nd International Conference on Communication, Devices and Computing, Springer.","DOI":"10.1007\/978-981-15-0829-5_48"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Barguil, S., Lopez, V., and Gimenez, J.P.F.P. (2020, January 18\u201321). Towards an open networking architecture. Proceedings of the 2020 International Conference on Optical Network Design and Modeling (ONDM), Barcelona, Spain.","DOI":"10.23919\/ONDM48393.2020.9133038"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.comcom.2020.07.013","article-title":"Benchmarking open source NFV MANO systems: OSM and ONAP","volume":"161","author":"Yilma","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_12","unstructured":"(2022, November 20). LF Networking: \u2019Onboarding 5G CNFs with ONAP. Available online: https:\/\/events.linuxfoundation.org\/archive\/2020\/open-networking-edge-summit-north-america\/features\/lfn-lfe-demos\/."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Tourani, R., Bos, A., Misra, S., and Esposito, F. (2019, January 7\u20139). Towards security-as-a-service in multi-access edge. Proceedings of the 4th ACM\/IEEE Symposium on Edge Computing, Arlington, VA, USA.","DOI":"10.1145\/3318216.3363335"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MIC.2019.2956712","article-title":"State of the art and research challenges in the security technologies of network function virtualization","volume":"24","author":"Wu","year":"2019","journal-title":"IEEE Internet Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13677-022-00351-0","article-title":"Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm","volume":"11","author":"Shitharth","year":"2022","journal-title":"J. Cloud Comput."},{"key":"ref_16","unstructured":"Theimer, M., and Jones, M.B. (2002, January 2\u20135). Overlook: Scalable name service on an overlay network. Proceedings of the 22nd International Conference on Distributed Computing Systems, Vienna, Austria."},{"key":"ref_17","unstructured":"Reznik, A. (2022, November 20). What Is Edge?. Available online: https:\/\/www.etsi.org\/newsroom\/blogs\/entry\/what-is-edge."},{"key":"ref_18","unstructured":"Bank, E. (2022, November 20). Software-Defined WAN: A Primer. Available online: https:\/\/www.networkcomputing.com\/networking\/software-defined-wan-primer."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Dzhunev, P. (2022, January 19\u201320). Helium Network\u2013Integration of Blockchain Technologies in the Field of Telecommunications. Proceedings of the 2022 13th National Conference with International Participation (ELECTRONICA), Sofia, Bulgaria.","DOI":"10.1109\/ELECTRONICA55578.2022.9874363"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1109\/TNSM.2021.3123680","article-title":"A Survey on Blockchain-Based Telecommunication Services Marketplaces","volume":"19","author":"Tkachuk","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MCOM.001.2100603","article-title":"BEAT: Blockchain-Enabled Accountable and Transparent Network Sharing in 6G","volume":"60","author":"Faisal","year":"2022","journal-title":"IEEE Commun. Mag."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Harillo, E.C., and Freitag, F. (2022, January 2\u20135). LoRaCoin: Towards a blockchain-based platform for managing LoRa devices. Proceedings of the INFOCOM WKSHPS 2022\u2014IEEE Conference on Computer Communications Workshops, New York, NY, USA.","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798276"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Kihtir, F., Yazici, M.A., Oztoprak, K., Alpaslan, F.N., Kihtir, F., Yazici, M.A., Oztoprak, K., and Alpaslan, F.N. (2022). Next-Generation Payment System for Device-to-Device Content and Processing Sharing. Sensors, 22.","DOI":"10.3390\/s22072451"},{"key":"ref_24","unstructured":"Dwivedi, A.D., Singh, R., Kaushik, K., Mukkamala, R.R., and Alnumay, W.S. (2021). Blockchain and artificial intelligence for 5G-enabled Internet of Things: Challenges, opportunities, and solutions. Trans. Emerg. Telecommun. Technol., e4329."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sharma, T., Prasad, S.K., and Sharma, V. (2022, January 11\u201313). Research challenges of Blockchain in 6G Network. Proceedings of the 2022 IEEE Delhi Section Conference, DELCON 2022, New Delhi, India.","DOI":"10.1109\/DELCON54057.2022.9753098"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"274","DOI":"10.23919\/JCC.2022.01.020","article-title":"Blockchain technology empowers telecom network operation","volume":"19","author":"Li","year":"2022","journal-title":"China Commun."},{"key":"ref_27","unstructured":"Deloitte Blockchain Institute, Technical Report (2023, January 10). Blockchain @ Telco How Blockchain Can Impact the Telecommunications Industry and Its Relevance to the C-Suite. Available online: https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/za\/Documents\/technology-media-telecommunications\/za_TMT_Blockchain_TelCo.pdf."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/JIOT.2021.3103320","article-title":"6G Internet of Things: A Comprehensive Survey","volume":"9","author":"Nguyen","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Oztoprak, K. (November, January 29). Profiling subscribers according to their internet usage characteristics and behaviors. Proceedings of the 2015 IEEE International Conference on Big Data (Big Data), Santa Clara, CA, USA.","DOI":"10.1109\/BigData.2015.7363912"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/MNET.001.1900252","article-title":"AI-Driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research Directions","volume":"34","author":"Benzaid","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1109\/TCCN.2020.2988486","article-title":"End-to-End Performance-Based Autonomous VNF Placement With Adopted Reinforcement Learning","volume":"6","author":"Bunyakitanon","year":"2020","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Butun, I., Sari, A., and \u00d6sterberg, P. (2020). Hardware security of fog end-devices for the internet of things. Sensors, 20.","DOI":"10.3390\/s20205729"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/2\/1004\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:06:42Z","timestamp":1760119602000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/2\/1004"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,15]]},"references-count":32,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,1]]}},"alternative-id":["s23021004"],"URL":"https:\/\/doi.org\/10.3390\/s23021004","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,15]]}}}