<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Review of modern tools for edge computing systems quality assurance</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Viktor O. Maliarskyi</string-name>
          <email>maliarskyi_vo@fizmat.tnpu.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl P. Oleksiuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>PCWrEooUrckResehdoinpgs ISSNc1e6u1r-3w-0s0.o7r3g</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Digitalisation of Education of the NAES of Ukraine</institution>
          ,
          <addr-line>9 M. Berlynskoho Str., Kyiv, 04060</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ternopil Volodymyr Hnatiuk National Pedagogical University</institution>
          ,
          <addr-line>2 Maxyma Kryvonosa Str., Ternopil, 46027</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>67</fpage>
      <lpage>80</lpage>
      <abstract>
        <p>Reviewing relevant QA tools is essential for improving eficiency, collaboration, and software quality while reducing costs. It enables QA teams to meet the fast-changing demands of software development and deliver reliable software on time and within budget. Strategic tool selection, emphasizing standardization, integration, and alignment with business goals, streamlines processes and reduces complexity. Edge computing environments require a fundamentally diferent approach to testing compared to traditional cloud or on-premise applications. While traditional testing tools are valuable, edge computing requires specialized solutions that can handle distributed architectures and variable network conditions. This paper aims to analyze challenges and key approaches of Edge Computing systems' testing, evaluate the most suitable QA tools, organize them, and highlight their benefits to help QA teams identify tools that meet their requirements. Bibliometric analysis of researched field discovered that the topic of quality assurance of diferent types of edge computing systems is highly discussed and important nowadays. The main features of providing eficient quality assurance process for edge computing systems is to set up appropriate testing of their performance, reliability, security, integrity and usability. The authors have defined the criteria for selecting edge computing system testing tools, such as scalability, compatibility, integrity, cost savings, licensing, and ease of use. For each of them, several indicators are proposed that allow measuring the value of these indicators. The most relevant tools that match defined criteria are suggested.</p>
      </abstract>
      <kwd-group>
        <kwd>Edge computing</kwd>
        <kwd>quality assurance</kwd>
        <kwd>tools</kwd>
        <kwd>challenges</kwd>
        <kwd>approaches</kwd>
        <kwd>criteria and indicators</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Modern software applications are more complex than ever, involving multiple platforms, devices, APIs,
and integrations [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Modern businesses demand a greater transparency and accountability of their
products. Standardized QA tools provide consistent metrics and insights into testing progress and
quality. Also they enable traceability of bugs and test cases, which is crucial for audits and compliance.
      </p>
      <p>
        Edge computing can be defined as an emerging technology that uses cloud computing to leverage
edge data centers to process, store, and analyze data close to the source. Traditional cloud computing
architectures are not designed for latency-critical applications such as AI (artificial intelligence) and
IoT (Internet of things) because they rely on low data volumes generated by applications running near
highly-populated areas [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>Performing functional and integration testing, along with scalability and robustness assessments on
the codebases is generally limited to configurations involving a single or a small number of physical
servers. In contrast, edge architectures necessitate rigorous evaluation of functionalities designed to
address the challenges posed by geographically distributed infrastructures, particularly when
architectural models exhibit fundamentally distinct configurations. To ensure stable and reliable results, it is
advisable to adopt best practices from the scientific community.</p>
      <p>
        Testing, should not only be rooted in precision engineering, but also involve creative problem-solving.
Low-level code testing, such as unit tests or API response validation, is relatively straightforward and
facilitates the creation of frameworks capable of executing automated test suites that meet criteria such
as repeatability, replicability, and reproducibility. However, testing integrated systems to replicate the
configurations and operational conditions of production environments presents considerably greater
complexity [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        Reviewing and continuous monitoring of modern QA tools is crucial for eficiency, collaboration,
cost savings, and quality improvement. It helps QA teams adapt to the fast-paced, dynamic demands of
software development while maintaining high standards of software reliability and user satisfaction.
With proper systematization, teams are better equipped to deliver exceptional software on time and
within budget [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. To address this, QA teams must take a strategic approach to tool selection, focusing
on standardization, integration, and alignment with business goals. By managing this variety efectively,
organizations can streamline their QA processes and maintain high-quality software delivery without
unnecessary complexity. Modern QA increasingly relies on advanced features like AI-driven test
generation, defect prediction, and analytics. Systematized tools help QA teams stay up-to-date and
integrate innovative technologies without disrupting workflows [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>The purpose of this article is to analyze and estimate the most suitable QA tools for edge computing
systems in 2024, review them and highlight their benefits to help QA teams to find tools that meet their
requirements.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Bibliometric analysis of research field</title>
      <p>
        To explore the development of research in edge computing system’s quality assurance field and to define
the key concepts of the research by studying the keywords of related scientific papers and articles,
the bibliometric analyses was performed using data from two sources: Scopus and Web of Science
databases. As an example of bibliometric analysis workflow, the methodologies of Mintii and Semerikov
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], Vinueza-Naranjo et al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] were used. In accordance with these methodologies, some search queries
were performed.
      </p>
      <p>Scopus search query from January 6, 2025:
TITLE-ABS-KEY ( software ) AND TITLE-ABS-KEY ( "Edge Computing" )
AND TITLE-ABS-KEY ( testing OR "quality assurance" ) AND ( tool* )
AND PUBYEAR &gt; 2014 AND PUBYEAR &lt; 2026 AND ( LIMIT-TO ( SUBJAREA , "COMP" )
OR LIMIT-TO ( SUBJAREA , "ENGI" ) OR LIMIT-TO ( SUBJAREA , "MATH" )
OR LIMIT-TO ( SUBJAREA , "DECI" ) OR LIMIT-TO ( SUBJAREA , "ECON" )
OR LIMIT-TO ( SUBJAREA , "MULT" ) ) AND ( LIMIT-TO ( DOCTYPE , "ar" )
OR LIMIT-TO ( DOCTYPE , "cp" ) ) AND ( LIMIT-TO ( LANGUAGE , "English" ) )</p>
      <sec id="sec-2-1">
        <title>Web of Science search query from January 6, 2025:</title>
        <p>AK="Edge Computing" AND AK=(test* OR "quality assurance") AND AK=software</p>
        <p>
          The Web of Science query line is much shorter than it is for Scopus, because the functionality of Web
of Science platform’s user interface is not automatically adding used checkbox filters to its searching
query. But all the searching conditions was the same for both sources. After uniting duplicate results,
the final documents list contained 70 files. VOSviewer [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] was used as a tool for bibliometric analysis.
Analysis was performed on keywords using default algorithm of clustering. The result of bibliometric
analysis is a map of 21 keywords divided into 4 clusters that is displayed on figure 1.
        </p>
        <p>Analyzing the researched field’s keywords grouped by VOSviewer and identifying associated thematic
areas, we suggest to name formed clusters next way:
• Cluster 1 (red) – Edge computing system types and their performance.
• Cluster 2 (green) – Usage of machine learning in edge computing systems testing.
• Cluster 3 (Blue) – Open source systems.
• Cluster 4 (Yellow) – Network architecture.</p>
        <p>To analyze generated map, we can use 4 main attributes:
• weight&lt;Links&gt; (wl) – the number of links of an element with other elements
• weight&lt;Total link strength&gt; (wtls) – general strength of links between target element and other
elements
• weight&lt;Occurrences&gt; (wo) – related to keywords it shows the number of their occurrences in
analyzed documents
• score&lt;Avg. pub. year&gt; (sapy) – average year of documents’ publication where target keyword is
used.</p>
      </sec>
      <sec id="sec-2-2">
        <title>All the keywords and their analysis attributes values are visualized in table 1.</title>
        <p>Analysis data discovers that keywords Edge Computing and Software Testing from cluster 2 have
the highest numbers of all attributes between all the other keywords (edge computing: wl – 20, wtls –
143, wo – 55; software testing: wl – 19, wtls – 70, wo – 27). It means that the topic of quality assurance
of diferent types of edge computing systems is highly discussed and important. Moreover it keeps
changing, developing and always requires new investigations due to average year of documents’
publication attribute values (edge computing: sapy – 2021,95; software testing: sapy – 2021.89).</p>
        <p>
          The Internet of Things (IoT) is one of the largest and most influential network architectures. It
describes access and processing of the data given by devices with sensors via wired and wireless
networks. IoT requires scalable and flexible management of many interconnected devices and sensors
today [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Due to the analysis result (wl – 19, wtls – 61), it can be caused by the fact that its errors can
have direct and significant consequences on human lives. Addressing these errors requires rigorous
testing and validation processes; however, testing and validating a heterogeneous, dynamically evolving,
and planetary-scale ecosystem presents unique challenges [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Considering some challenges in testing
IoT architectures, such as the variety and large numbers of devices, dynamic environments, security
challenges, and real-time performance, the authors [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] designed the framework for modelling the
behaviour of the Internet of Things and edge computing environments. Its eficacy was validated using
a case study for an electricity management and billing application within a smart city [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>
          Also due to Occurrences and Avg. Pub. Year attributes’ values we can note that the most relevant
and popular keywords of investigated field are cloud-computing systems ( wo – 10, sapy – 2023,43) and
general edge computing system’s performance testing (sapy – 2023,40). It shows that the discussion of
cloud computing and edge computing systems’ synergy is developing and becoming more attractive
for developers and scientists in many fields such as distributed computing [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ], software engineering
[
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], computer networks [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], education [
          <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
          ], etc. At the same time the problem of these systems’
performance is rising and its solution will allow to develop more eficient and useful projects.
        </p>
        <p>
          The bibliometric analysis shows the rise of attention to such studies as the use of AI for deep learning
of edge devices [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], solving classification and segmentation tasks [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], reliability assessment of
AIsystems, vehicle control [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ], video monitoring [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], etc. Another direction of current research is the
integration of Machine learning into the testing process of edge computing systems. This approach
extends and speeds up the analyzes of edge computing capabilities, enabling real-time data processing
and more intelligent decision-making.
3. Review of modern edge computing system’s testing challenges and
features
Edge computing environments become more popular and require a fundamentally diferent approach to
testing compared to traditional cloud or on-premise applications. As emphasized in the ISTQB Advanced
Level Test Automation Engineer syllabus [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ], software designed for edge computing must be capable
of efectively managing challenges such as intermittent connectivity, resource-constrained devices, and
highly variable network conditions. These unique characteristics necessitate tailored testing strategies
to ensure reliability, performance, and resilience in edge deployments. Basic test strategies must be
expanded and account the requirements of edge computing environment (figure 2).
        </p>
        <p>Edge computing applications, such as autonomous vehicles and smart manufacturing systems, demand
instantaneous data processing and response, leaving minimal tolerance for delay or error. Latency
in data handling can lead to critical safety risks or significant operational ineficiencies. Data testing
should ensure that systems meet the stringent time-sensitive requirements of edge environments by
validating that data is processed and acted upon within milliseconds. For instance, in an autonomous
vehicle, real-time testing verifies that the vehicle’s sensors and AI algorithms accurately detect obstacles
and respond promptly, thereby mitigating the risk of accidents and ensuring safe operation.</p>
        <p>System reliability is a critical consideration in edge computing, where edge devices function
autonomously, often without direct dependence on centralized data centers. Testing should identify
potential system failures before they escalate into critical issues. By continuously monitoring the
performance of edge devices, testing must detect early indicators of hardware malfunctions, software
anomalies, or network disruptions.</p>
        <p>
          Security is a paramount concern in edge computing environments, where data is processed outside
the controlled and secure boundaries of traditional data centers. Data testing must enhance security
by continuous monitoring of data flows for vulnerabilities or breaches. For instance, real-time testing
can detect anomalous data patterns indicative of cyberattacks or unauthorized access to edge devices
[
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. By integrating real-time testing with robust security protocols, organizations can rapidly identify
and respond to potential threats, thereby protecting sensitive data and ensuring adherence to industry
compliance standards.
        </p>
        <p>
          In edge computing, the seamless coordination and performance of multiple devices operating across
a distributed network are essential for ensuring smooth and eficient operations. Data testing plays
a crucial role in verifying that each component within the edge network functions optimally. This
involves validating the eficiency of inter-device communication, evaluating the speed and accuracy
of data processing, and identifying potential bottlenecks that could impair overall performance. By
implementing continuous testing, organizations can enhance the performance of their edge systems,
achieving greater speed, reliability, and operational efectiveness [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
        <p>Edge computing applications often operate in dynamic and challenging environments, such as ofshore
oil rigs, remote industrial sites, or aerospace systems. These settings pose unique dificulties, including
variable network connectivity, extreme environmental conditions, and restricted access to centralized
resources. Testing must address these challenges by validating the adaptability and resilience of edge
systems. We should ensure that edge devices maintain functionality and reliability under unstable
network conditions or harsh environmental factors, thereby supporting continuous and dependable
operations in critical applications.</p>
        <p>Edge computing relies on uninterrupted data flow and processing to deliver the low-latency and
highperformance advantages it promises. Continuous monitoring and verifying that data flows seamlessly
from edge devices to local processing units is essential. This ongoing evaluation ensures that any
interruptions, delays, or inconsistencies in data transmission are promptly detected and resolved,
enabling edge systems to sustain a consistent and reliable flow of real-time data for optimal performance.</p>
        <p>
          In edge computing, where data processing occurs closer to its source, real-time data testing plays a
pivotal role in ensuring systems operate with precision, eficiency, and dependability. Edge
environments frequently manage time-critical data, where delays, inaccuracies, or failures can lead to severe
consequences, particularly in domains such as autonomous vehicles, industrial IoT, and healthcare
monitoring. By continuously validating the integrity, performance, and functionality of edge devices
and systems under live conditions, real-time data testing mitigates these risks, enabling reliable and
responsive operations in dynamic and high-stakes scenarios [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
        </p>
        <p>The primary objective of real-time data testing is to guarantee the accuracy and reliability of data
processed at the edge. In decentralized systems, edge devices—such as sensors, cameras, and smart
gateways—generate and collect substantial volumes of data. Real-time testing ensures that this data is
correctly formatted, transmitted, and synchronized across distributed networks. By detecting
inconsistencies or corruptions in the data flow, real-time testing prevents potential inaccuracies that could
otherwise result in erroneous decisions or malfunctioning operations in edge-based applications.</p>
        <p>
          Burn-in testing is a rigorous process aimed at identifying early failures in components and minimizing
the likelihood of defects and malfunctions during field operation. This testing subjects computing
components to extreme operating conditions, such as high and low temperature extremes, intensive
usage cycles, and elevated voltages. The goal is to identify and eliminate defective components or those
with inherently short lifespans before their deployment in operational systems. The primary purpose of
burn-in testing is to ensure that components can endure severe environmental and operational stresses,
demonstrating their durability and dependability under diverse and challenging conditions. By doing
so, burn-in testing helps prevent costly or potentially catastrophic system failures, thereby enhancing
the reliability and safety of mission-critical applications [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Tools for edge computing systems‘ testing review</title>
      <p>
        Manual and automation testing leverages a wide array of tools designed to help QA engineers create,
organize, and track test cases, manage bugs, and ensure overall software quality. These tools can
focus on specific testing areas, such as functional, API, or web service testing, or be used for broader
approaches like exploratory testing. Comprehensive QA management systems support the entire
process, from planning and execution to analysis and reporting. They often integrate seamlessly with
collaboration platforms, making it easier to assign tasks and coordinate eforts within teams [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]. This
combination of tools and services allows specialists to streamline Edge Computing systems testing
workflows, improve eficiency, and optimize the software testing process.
      </p>
      <p>In general we can categorize testing tools by their usage in diferent test types (functional, performance,
API, load, etc), by test management area (test case management, bug tracking, logging, monitoring, etc.)
and by general testing purposes (test data generation, device simulation, screen recording). Suggested
categorization is displayed on figure 3</p>
      <p>Considering all the testing challenges and features of edge computing systems’ testing described at
previous chapter, we can formulate list of criteria to provide appropriate QA tools selection (table 2).</p>
      <p>Most of the above indicators can be assessed based on oficial documentation from software vendors
or cloud service providers. However, such indicators as load handling, horizontal scaling, vertical
scaling, stress testing, latency maintenance and tool customizability should be determined based on
expert assessment with subsequent verification of the respondents’ degree of agreement. So, developing
a methodology for integrated assessment according to the criteria and indicators we have defined using
both approaches is advisable.</p>
      <p>In general, QA team must aggregate full set of tools to be able to provide:
• functional testing;
• latency and performance testing;
• security testing;
• fault tolerance and resilience testing;</p>
      <p>• monitoring and measurement.</p>
      <p>To achieve a comprehensive coverage of special requirements to edge computing systems’ testing,
there is a need for detailed selection of appropriate tools. As a result of investigation, tools indicated in
table 3 can be suggested as the most suitable to perform needed workflows and assertions.</p>
      <p>While traditional testing tools are valuable, edge computing requires specialized solutions that can
handle distributed architectures and variable network conditions. Based on the papers analyzed above
and our own experience, we ofer the set of essential tools for edge computing QA:</p>
      <p>
        The Linux-based network emulation tool NetEm (Network Emulator) [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] simulates network
conditions such as latency, packet loss, duplication, and jitter. It is commonly employed to test application
performance under adverse network scenarios. By configuring kernel parameters, it allows developers to
mimic real-world network behaviors, enabling testing of edge systems in highly dynamic and unreliable
network environments, such as those seen in remote or mobile edge nodes.
      </p>
      <p>NetEm’s flexibility and granular control make it a valuable tool for testing the resilience of edge
applications under challenging conditions. It helps developers assess system behavior during network
disruptions, which is critical for applications requiring high reliability and low latency.</p>
      <p>
        WANem (Wide Area Network Emulator) [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] is an open-source tool designed to replicate WAN
characteristics such as high latency, limited bandwidth, and network congestion. It is widely used to
test distributed applications that operate over wide geographic distances. WANem ofers a user-friendly
interface for creating scenarios that emulate the communication between edge nodes and cloud data
centers, allowing organizations to assess system behavior in geographically distributed edge computing
setups.
      </p>
      <p>WANem provides a straightforward approach to emulating WAN scenarios, ensuring that edge
systems can handle bandwidth constraints and varying latency. While it is efective for general testing,
it may lack some advanced features required for highly specific edge environments.</p>
      <p>
        Simple yet efective tool for injecting network faults into local network communications is Clumsy
[
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. It allows users to introduce packet drops, latency, corruption, and duplication into a network to
test the resilience of software or devices. While primarily designed for smaller-scale or local testing
environments, Clumsy can be highly useful for edge system developers to evaluate edge device behavior
under adverse network conditions during early-stage development.
      </p>
      <p>Clumsy provides basic but efective network emulation, making it ideal for testing small edge
deployments. Its limited feature set may not sufice for more complex distributed environments, but it’s
a good starting point for basic network testing.</p>
      <p>
        For performance testing Apache JMeter [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] is a powerful open-source tool that supports a wide
range of protocols, including HTTP, FTP, JDBC, and SOAP. It is used to measure application performance,
load, and scalability under various conditions. In the context of edge computing, JMeter is particularly
      </p>
      <p>Indicators
1.1 Load Handling: Maximum number of concurrent users, devices, or data streams the
tool can manage.
1.2 Horizontal Scaling: Support for distributed environments by adding more edge nodes
or servers.
1.3 Vertical Scaling: Ability to optimize performance by increasing resource utilization
(CPU, memory, storage) on existing nodes.
1.4 Stress Testing: Performance under high data loads, network trafic, or concurrent
operations.
1.5 Latency Maintenance: Ability to maintain low latency as the system scales.
2.1 Multi-Platform Support: Compatibility with operating systems and hardware
architectures
2.2 Protocol Support: Support for edge-specific protocols
2.3 Containerization: Support for container technologies (e.g., Docker, Kubernetes) often
used in edge deployments.
2.4 Interoperability: Integration with diferent IoT platforms, cloud backends, and
middleware.
2.5 Real-Time Processing: Support for real-time data processing and decision-making
capabilities.
3.1 CI/CD Support: Compatibility with CI/CD tools like Jenkins, GitLab CI/CD, GitHub
Actions, Azure DevOps, or CircleCI.
3.2 Automated Test Execution: Capability to trigger tests automatically during build,
deployment, or code changes.
3.3 Version Control Integration: Compatibility with version control systems like Git for
managing code and configurations.
4.1 Upfront Cost: Competitive price of purchasing the tool or system.
4.2 Subscription Model: Availability of flexible pricing models, such as pay-as-you-go or
annual subscriptions.
4.3 Free Trial or Open Source: Availability of free versions or open-source alternatives.
5.1 Licensing Transparency: Support for commercial, academic, or non-profit licensing.
6.1 User Interface (UI): Presence of an intuitive and visually accessible graphical interface.
6.2 Documentation: Availability of comprehensive user guides, tutorials, and knowledge
bases.
6.3 Support Channels: Availability of help via chat, forums, email, or phone support.
6.4 Customizability: Flexibility to tailor the tool’s settings, workflows, or reports to
specific needs.
valuable for testing APIs, microservices, and edge-based web applications, helping organizations ensure
these components can handle real-world trafic loads and response times.</p>
      <p>JMeter’s ability to simulate heavy user loads and test APIs ensures thorough performance validation
in edge environments. While it excels in scalability testing, it may struggle to handle complex distributed
setups without additional configuration.</p>
      <p>
        As for the load testing Gatling[
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] is a popular open-source tool specifically designed for
highthroughput HTTP applications. Known for its performance and eficiency, Gatling is widely used
to simulate concurrent user behavior and analyze response times. For edge systems, Gatling can be
employed to test the responsiveness of services that require low latency, such as real-time IoT data
processing or edge-based decision-making systems.
      </p>
      <p>Gatling’s intuitive interface and eficient resource usage make it a strong choice for edge performance
testing. While it requires some initial learning, it provides comprehensive insights into system behavior
under load.</p>
      <p>
        Python-based load testing tool that enables developers to simulate user behavior across distributed
systems is Locust [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]. It supports thousands of concurrent simulated users, making it an excellent
choice for edge environments with multiple devices or nodes. Locust’s flexibility allows for custom test
      </p>
      <p>Type Name
Network em- Linux NetEM
ulators</p>
      <p>Benefits for edge computing systems’ testing
Simulates real-world network conditions like latency, packet loss, and
jitter, helping to test edge systems’ performance under diverse and
challenging network scenarios.</p>
      <p>Provides an easy-to-use interface for emulating wide-area network
conditions, enabling the testing of edge system performance under
unreliable and constrained connectivity.</p>
      <p>Allows network fault injection (latency, packet drops, etc.), ensuring
robustness and reliability of edge systems operating in fluctuating
network environments.</p>
      <p>Simulates high user loads to evaluate edge systems’ performance,
scalability, and ability to process simultaneous requests efectively.</p>
      <p>Delivers detailed performance metrics for edge systems by testing
data processing speeds, throughput, and response times under varying
loads.</p>
      <p>Facilitates distributed load testing, ideal for edge environments with
numerous connected devices, to ensure the scalability of the overall
system.</p>
      <p>Scans edge devices for open ports, which is key strategy to find network
vulnerabilities or system miss-configurations.</p>
      <p>Search engine that can be used to scan IoT devices connected to the
same network and find potential threats or vulnerabilities.</p>
      <p>Framework for penetration testing to simulate attacks on edge devices
and applications by supporting exploit matching, execution, and
development.</p>
      <p>Enables real-time monitoring of edge devices and applications,
identifying performance bottlenecks and ensuring reliable data collection
and processing.</p>
      <p>Provides visual analytics and dashboards for edge system metrics,
allowing quick identification of anomalies or performance trends.</p>
      <p>Ofers comprehensive logging, monitoring, and data analysis for edge
systems, ensuring eficient troubleshooting and root cause analysis in
distributed environments.</p>
      <p>Delivers full-stack monitoring for edge devices, providing actionable
insights on system health, performance, and end-user experiences.</p>
      <p>Monitors the health, uptime, and performance of edge devices and
infrastructure, ensuring early detection of issues in critical environments.</p>
      <p>Ex- Supports the end-to-end testing of AI/ML pipelines in edge
environments, ensuring accurate model deployment, data integrity, and
consistent predictions in real-time.</p>
      <p>Provides automated AI/ML model testing and monitoring, ideal for
validating the performance of intelligent systems deployed at the edge.</p>
      <p>Simplifies functional, API, and UI testing for edge applications, ensuring
robust performance across diverse device configurations.
scripts, making it highly adaptable for edge applications that demand specific interaction patterns, such
as smart manufacturing or autonomous vehicle networks.</p>
      <p>Locust’s flexibility and scalability allow for detailed performance evaluations of edge systems. Its
reliance on scripting requires programming knowledge but enables highly customizable testing scenarios.</p>
      <p>
        Moving to network security testing tools, we can suggest Nmap [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]. Open-source network scanning
tool that provides detailed insights into hosts, open ports, and potential vulnerabilities. It is widely used
to assess the security posture of edge devices and detect misconfigurations that could expose systems
to cyber threats.
      </p>
      <p>Nmap’s scripting engine enables automated scans and custom security assessments, making it
highly efective for distributed edge environments. Its command-line interface may be intimidating for
beginners, but its versatility and accuracy in network reconnaissance make it a crucial tool for security
professionals.</p>
      <p>
        Another useful tool is Shodan [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ]. A search engine for internet-connected devices that provides
visibility into exposed edge systems, open ports, and security risks. It is widely used to identify
vulnerable IoT devices, industrial control systems, and cloud-connected edge nodes.
      </p>
      <p>Shodan’s ability to scan and categorize devices based on their fingerprints makes it invaluable for
cybersecurity teams. Its premium features can be costly, but its powerful search capabilities make it an
essential tool for identifying and securing publicly exposed edge infrastructure.</p>
      <p>
        Penetration testing is a crucial stage of system’s security assurance flow. Metasploit [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ] is an
open-source security testing framework that allows teams to simulate real-world cyberattacks on edge
computing systems. It is widely used to exploit vulnerabilities in networks, applications, and connected
devices to assess their resilience against threats.
      </p>
      <p>Metasploit’s extensive exploit database and automation features make it a powerful tool for proactive
security testing. Its complexity may require a learning curve for new users, but its ability to simulate
advanced attack scenarios makes it indispensable for ethical hackers and security teams.</p>
      <p>
        Really useful would be Prometheus [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ]. It’s an open-source monitoring and alerting toolkit
designed for collecting and querying time-series data. It integrates well with edge systems to monitor
the health and performance of edge devices and microservices. Prometheus is particularly suited for
edge testing environments that require real-time insights into resource usage, network conditions, or
system availability.
      </p>
      <p>Prometheus’s detailed metrics and real-time alerts make it indispensable for maintaining edge system
reliability. Its complexity can pose a challenge for new users, but its integration with other tools like
Grafana enhances its utility.</p>
      <p>
        As an alternative tool for Prometheus, we can use Grafana [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ] – open-source data visualization
and monitoring tool that integrates with Prometheus and other data sources. It allows users to create
dynamic dashboards for real-time analysis. In edge computing, Grafana is invaluable for visualizing
metrics such as latency, throughput, and resource utilization across distributed edge systems.
      </p>
      <p>Grafana’s customizable dashboards provide clear insights into edge system performance. It requires
time to set up efectively, but its visualization capabilities make it a valuable monitoring tool.</p>
      <p>
        Also, the powerful kit is ELK Stack [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ], a combination of three powerful tools Elasticsearch for log
storage and search, Logstash for log collection and processing, and Kibana for visualization. This suite
is widely used for centralizing and analyzing logs from distributed systems. In edge environments, ELK
helps manage the extensive logging generated by edge devices and microservices, ensuring insights
into system performance and error tracking.
      </p>
      <p>It handles large volumes of log data eficiently, aiding in debugging and performance optimization.
Its resource intensity requires robust infrastructure, but its analytical power is unmatched for log-based
insights.</p>
      <p>
        One more monitoring tool is New Relic [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ], a cloud-based observability platform ofering
performance monitoring, distributed tracing, and analytics. It is widely used to analyze application and
system behavior in real-time, making it highly applicable for edge computing systems. New Relic
provides end-to-end visibility across the entire system, including edge devices, microservices, and cloud
backends, helping to ensure seamless and reliable operations.
      </p>
      <p>New Relic simplifies observability with intuitive dashboards and detailed traces, ensuring edge
systems operate smoothly. Its licensing costs and dependency on the internet may limit its applicability
for some teams.</p>
      <p>
        For infrastructure monitoring we would use Nagios [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ]. It is an open-source system monitoring
tool that provides real-time insights into network, server, and application performance. It is widely used
to monitor the health and availability of edge devices and nodes. Nagios can alert teams to hardware
failures, software issues, or network disruptions in edge environments, ensuring proactive problem
resolution.
      </p>
      <p>Nagios’s customization options ensure efective monitoring of distributed edge systems. It’s dated
interface may deter some users, but its reliability and plugin ecosystem are significant advantages.</p>
      <p>When working with artificial intelligence and machine learning systems, it’s important to use specific
tools, that are able to process models assessment and validation.</p>
      <p>
        End-to-end platform for deploying and managing machine learning models in production is
TensorFlow Extended (TFX) [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ]. It is often used in edge environments where AI models must run locally
on edge devices, such as image recognition in smart cameras or predictive analytics in industrial IoT.
TFX enables model testing, validation, and monitoring, ensuring robust and accurate AI deployment at
the edge.
      </p>
      <p>TFX ensures robust model validation and deployment in edge AI setups. Its steep learning curve
requires expertise but ofers unmatched reliability and performance for AI-driven edge applications.</p>
      <p>
        Also, it’s worth mentioning DataRobot [
        <xref ref-type="bibr" rid="ref44">44</xref>
        ], an automated machine learning (AutoML) platform
designed to simplify and accelerate the development and deployment of AI models. In edge computing,
it helps create models that can operate locally on edge devices, enabling predictive analytics, anomaly
detection, or AI-based decision-making directly at the edge. DataRobot ensures that models are eficient,
accurate, and optimized for deployment in resource-constrained edge environments.
      </p>
      <p>DataRobot accelerates AI development for edge applications, providing robust model validation. Its
cost and limited customization may pose challenges for small teams, but its capabilities significantly
enhance edge AI operations.</p>
      <p>
        As an optimal test automation tool we would suggest Katalon Studio [
        <xref ref-type="bibr" rid="ref45">45</xref>
        ]. It’s a versatile platform
that supports web, mobile, API, and desktop applications. For edge computing, Katalon can automate
functional testing of applications running on edge devices or microservices. Its simplicity and versatility
make it ideal for testing interfaces, workflows, and APIs in edge environments.
      </p>
      <p>Katalon simplifies functional and API testing for edge applications. While limited for system-level
testing, its ease of use and automation capabilities are ideal for validating workflows.</p>
      <p>
        To perform real-time testing on edge computing systems like IoT sensors that require continuous
data streaming it is necessary to use systems that allow to create custom data pipelines and analyze
them. For that porpose we would ofer to use Apache products: Kafka [
        <xref ref-type="bibr" rid="ref46">46</xref>
        ] and Flink [
        <xref ref-type="bibr" rid="ref47">47</xref>
        ]. Though
these are not a testing tools but their usage can bring great benefits to QA processes.
      </p>
      <p>Apache Kafka is a distributed messaging system designed for real-time data streaming. It is commonly
used in edge computing to facilitate the movement of data between edge devices, processing nodes, and
cloud systems. Kafka is particularly useful for building scalable and fault-tolerant edge architectures
that handle high volumes of real-time data from IoT devices or edge sensors.</p>
      <p>Kafka’s high throughput and scalability make it essential for edge data streaming. Its configuration
complexity requires expertise, but its ability to handle real-time data flows ensures reliable edge
operations.</p>
      <p>Apache Flink is a distributed stream-processing framework optimized for real-time analytics. It
supports low-latency processing of data streams, making it an excellent choice for edge applications
like predictive maintenance, real-time monitoring, and analytics. Flink’s ability to process massive data
streams in distributed environments ensures reliable edge data handling and analysis.</p>
      <p>Flink’s low-latency processing capabilities make it a top choice for edge applications requiring
real-time insights. Its complexity makes it suitable for advanced use cases and experienced teams.</p>
    </sec>
    <sec id="sec-4">
      <title>5. Conclusions</title>
      <p>Today, edge computing introduces challenges, including decentralized operations, time-sensitive data
processing, and security vulnerabilities, all of which demand robust testing strategies.</p>
      <p>Due to performed bibliometric analysis we can note that current state of edge computing system’s
quality assurance field is mostly oriented on IoT, cloud-computing, embedded and open-source systems
testing. But the problems of justification and definition criteria for selections edge computing systems’
testing tools are still releavant. At the same time, it is necessary to consider the specifics of modern
peripheral devices.</p>
      <p>Continuous validation of system reliability, adaptability to harsh environments, and seamless data
lfow are essential to maintaining operational eficiency and safeguarding against failures or breaches.
These testing approaches collectively ensure that edge systems meet stringent performance, safety, and
security requirements, supporting their deployment in mission-critical and dynamic environments.</p>
      <p>Burn-in testing and real-time data testing are fundamental methodologies in ensuring the reliability
and performance of edge computing systems, particularly in critical applications. Burn-in testing
identifies and eliminates defective components through rigorous stress testing, which enhances the
durability and dependability of hardware in challenging operational environments. Real-time data
testing, on the other hand, plays a pivotal role in validating the integrity, accuracy, and responsiveness
of edge devices, ensuring smooth operations in dynamic and high-stakes scenarios.</p>
      <p>To provide appropriate QA tools selection, next list of criteria is suggested: scalability, compatibility
with edge architectures, integration with CI/CD pipelines, cost suitability, licensing and ease of use.
Most of these criteria can be estimated by checking tool’s documentation or by their exploratory use.
But the assessment of more complicated and data-driven indicators require expert analysis which can
be discovered in future investigations.</p>
      <p>So the main task for QA teams is to aggregate full set of tools to be able to provide functional
latency, performance, security, fault tolerance, and resilience testing. Also, the tools for monitoring and
measurement are required.</p>
      <p>Author Contributions: Conceptualization, Viktor O. Maliarskyi and Vasyl P. Oleksiuk; writing – original draft, Viktor O.
Maliarskyi; writing—review and editing, Vasyl P. Oleksiuk. All authors have read and agreed to the published version of the
manuscript.</p>
      <p>Funding: This research received no external funding.</p>
      <p>Data Availability Statement: No new data were created or analysed during this study. Data sharing is not applicable.
Conflicts of Interest: The authors declare no conflict of interest.</p>
      <p>Declaration on Generative AI: While preparing this work, the authors used ChatGPT and Grammarly to improve sentence
structure and word choice.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>F.</given-names>
            <surname>Okezie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Odun-Ayo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bogle</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Critical</surname>
          </string-name>
          <article-title>Analysis of Software Testing Tools</article-title>
          ,
          <source>Journal of Physics: Conference Series</source>
          <volume>1378</volume>
          (
          <year>2019</year>
          )
          <article-title>042030</article-title>
          . doi:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -6596/1378/4/042030.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V. B.</given-names>
            <surname>Ramu</surname>
          </string-name>
          , Edge Computing Performance Amplification, arXiv:
          <fpage>2305</fpage>
          .16175 (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .48550/ arXiv.2305.16175.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>B.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Csatári</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Jones</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lebre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Paterson</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Váncsa</surname>
          </string-name>
          , Edge Computing: Next Steps in Architecture,
          <source>Design and Testing</source>
          ,
          <year>2023</year>
          . URL: https://www.openstack.org/
          <article-title>use-cases/ edge-computing/edge-computing-next-steps-in-architecture-design-and-testing.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Timbó</surname>
          </string-name>
          , Best QA Testing Tools in
          <year>2023</year>
          ,
          <year>2023</year>
          . URL: https://www.revelo.com/blog/qa-testing-tools.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Sujatha</surname>
          </string-name>
          , 10 AI Testing Tools to Streamline Your QA Process in
          <year>2024</year>
          ,
          <year>2024</year>
          . URL: https://www. digitalocean.com/resources/articles/ai-testing-tools.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>I.</given-names>
            <surname>Mintii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <article-title>Optimizing Teacher Training and Retraining for the Age of AI-Powered Personalized Learning: A Bibliometric Analysis</article-title>
          , in: E. Faure,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tryus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Vartiainen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Danchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bondarenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Bazilo</surname>
          </string-name>
          , G. Zaspa (Eds.),
          <source>Information Technology for Education, Science, and Technics</source>
          , volume
          <volume>222</volume>
          <source>of Lecture Notes on Data Engineering and Communications Technologies</source>
          , Springer Nature Switzerland, Cham,
          <year>2024</year>
          , pp.
          <fpage>339</fpage>
          -
          <lpage>357</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -71804-5_
          <fpage>23</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P. G.</given-names>
            <surname>Vinueza-Naranjo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chicaiza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rumipamba-Zambrano</surname>
          </string-name>
          ,
          <article-title>Fog Computing Technology Research: A Retrospective Overview and Bibliometric Analysis</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>57</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .1145/ 3702313.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>N. J. van Eck</surname>
          </string-name>
          , L. Waltman, VOSviewer Manual,
          <year>2023</year>
          . URL: https://www.vosviewer.com/ documentation/Manual_VOSviewer_1.6.20.pdf .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Andreiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. F.</given-names>
            <surname>Dubyna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. L.</given-names>
            <surname>Korenivska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. O.</given-names>
            <surname>Andreieva</surname>
          </string-name>
          ,
          <article-title>Wireless technologies in IoT projects with distributed computing</article-title>
          , in: T. A.
          <string-name>
            <surname>Vakaliuk</surname>
            ,
            <given-names>S. O.</given-names>
          </string-name>
          <string-name>
            <surname>Semerikov</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the 4th Edge Computing Workshop</source>
          (doors
          <year>2024</year>
          ), Zhytomyr, Ukraine, April 5,
          <year>2024</year>
          , volume
          <volume>3666</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>4</fpage>
          -
          <lpage>13</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3666</volume>
          /paper01.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>F.</given-names>
            <surname>Nikolaidis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chazapis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Marazakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bilas</surname>
          </string-name>
          ,
          <string-name>
            <surname>Event-Driven Testing For Edge Applications</surname>
          </string-name>
          ,
          <year>2022</year>
          . URL: http://arxiv.org/abs/2212.12370v1.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D. N.</given-names>
            <surname>Jha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Alwasel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alshoshan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Naha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Battula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Garg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Puthal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>James</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zomaya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dustdar</surname>
          </string-name>
          , R. Ranjan,
          <string-name>
            <surname>IoTSim-Edge</surname>
          </string-name>
          :
          <article-title>A simulation framework for modeling the behavior of Internet of Things and edge computing environments</article-title>
          ,
          <source>Software - Practice and Experience</source>
          <volume>50</volume>
          (
          <year>2020</year>
          )
          <fpage>844</fpage>
          -
          <lpage>867</lpage>
          . doi:
          <volume>10</volume>
          .1002/spe.2787.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Alwasel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. N.</given-names>
            <surname>Jha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Habeeb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Demirbaga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Rana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Baker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dustdar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Villari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>James</surname>
          </string-name>
          , E. Solaiman, R. Ranjan,
          <string-name>
            <surname>IoTSim-Osmosis</surname>
          </string-name>
          :
          <article-title>A framework for modeling and simulating IoT applications over an edge-cloud continuum</article-title>
          ,
          <source>Journal of Systems Architecture</source>
          <volume>116</volume>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1016/j.sysarc.
          <year>2020</year>
          .
          <volume>101956</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Daneshmand</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. C.</given-names>
            <surname>Subratie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Figueiredo</surname>
          </string-name>
          , PolyNet: Cost- and
          <string-name>
            <surname>Performance-Aware MultiCriteria Link</surname>
          </string-name>
          <article-title>Selection in Software-Defined Edge-to-Cloud Overlay Networks</article-title>
          ,
          <source>in: 2024 IEEE 10th International Conference on Network Softwarization (NetSoft)</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>135</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Varghese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Leitner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ray</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Barker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Elkhatib</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Herry</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.-H. Hong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Singer</surname>
            ,
            <given-names>F. P.</given-names>
          </string-name>
          <string-name>
            <surname>Tso</surname>
          </string-name>
          , E. Yoneki,
          <string-name>
            <surname>M.-F. Zhani</surname>
          </string-name>
          , Cloud Futurology,
          <source>Computer</source>
          <volume>52</volume>
          (
          <year>2019</year>
          )
          <fpage>68</fpage>
          -
          <lpage>77</lpage>
          . doi:
          <volume>10</volume>
          .1109/
          <string-name>
            <surname>MC</surname>
          </string-name>
          .
          <year>2019</year>
          .
          <volume>2895307</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O. S.</given-names>
            <surname>Holovnia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. P.</given-names>
            <surname>Oleksiuk</surname>
          </string-name>
          ,
          <article-title>Selecting cloud computing software for a virtual online laboratory supporting the Operating Systems course</article-title>
          , in: A. E. Kiv,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. P.</surname>
          </string-name>
          Shyshkina (Eds.),
          <source>Proceedings of the 9th Workshop on Cloud Technologies in Education, CTE</source>
          <year>2021</year>
          ,
          <string-name>
            <given-names>Kryvyi</given-names>
            <surname>Rih</surname>
          </string-name>
          , Ukraine, December
          <volume>17</volume>
          ,
          <year>2021</year>
          , volume
          <volume>3085</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>216</fpage>
          -
          <lpage>227</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Papadakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Kravtsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Shyshkina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Marienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. B.</given-names>
            <surname>Danylchuk</surname>
          </string-name>
          ,
          <article-title>Embracing digital innovation and cloud technologies for transformative learning experiences</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3679</volume>
          (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3679</volume>
          / paper00.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. S.</given-names>
            <surname>Mintii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Hamaniuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Bondarenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. P.</given-names>
            <surname>Nechypurenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Shokaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. V.</given-names>
            <surname>Moiseienko</surname>
          </string-name>
          ,
          <article-title>Designing an immersive cloud-based educational environment for universities: a comprehensive approach</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3844</volume>
          (
          <year>2024</year>
          )
          <fpage>107</fpage>
          -
          <lpage>116</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3844</volume>
          /paper09.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Busaeed</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Katib</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Albeshri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Corchado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Yigitcanlar</surname>
          </string-name>
          , R. Mehmood,
          <source>LidSonic V2</source>
          .
          <article-title>0: A LiDAR and Deep-Learning-Based Green Assistive Edge Device to Enhance Mobility for the Visually Impaired</article-title>
          ,
          <source>Sensors</source>
          <volume>22</volume>
          (
          <year>2022</year>
          )
          <article-title>7435</article-title>
          . doi:
          <volume>10</volume>
          .3390/s22197435.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>K.</given-names>
            <surname>Memon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Yahya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Z.</given-names>
            <surname>Yusof</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Remli</surname>
          </string-name>
          , A.
          <string-name>
            <surname>-W. M. M. Mustapha</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Hashim</surname>
            ,
            <given-names>S. S. A.</given-names>
          </string-name>
          <string-name>
            <surname>Ali</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Siddiqui</surname>
          </string-name>
          ,
          <article-title>Edge Computing for AI-Based Brain MRI Applications: A Critical Evaluation of Real-Time Classification and Segmentation</article-title>
          ,
          <source>Sensors</source>
          <volume>24</volume>
          (
          <year>2024</year>
          )
          <article-title>7091</article-title>
          . doi:
          <volume>10</volume>
          .3390/s24217091.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Grigorescu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Cocias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Trasnea</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Margheri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Lombardi</surname>
          </string-name>
          , L. Aniello,
          <article-title>Cloud2Edge Elastic AI Framework for Prototyping and Deployment of AI Inference Engines in Autonomous Vehicles</article-title>
          ,
          <source>Sensors</source>
          <volume>20</volume>
          (
          <year>2020</year>
          )
          <article-title>5450</article-title>
          . doi:
          <volume>10</volume>
          .3390/s20195450.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>F. P.</given-names>
            <surname>Scalcon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tahal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ahrabi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Huangfu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Nahid-Mobarakeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shirani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Vidal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A</given-names>
            . Emadi,
            <surname>AI-Powered Video</surname>
          </string-name>
          <article-title>Monitoring: Assessing the NVIDIA Jetson Orin Devices for Edge Computing Applications</article-title>
          , in: 2024
          <source>IEEE Transportation Electrification Conference and Expo, ITEC</source>
          <year>2024</year>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1109/ITEC60657.
          <year>2024</year>
          .
          <volume>10598994</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>ISTQB® Certified Tester Advanced Level - Test Automation</surname>
          </string-name>
          Engineering certification,
          <year>2023</year>
          . URL: https://www.istqb.org/certifications/ certified-tester
          <article-title>-advanced-level-test-automation-engineering-ctal-tae-v2-0/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>B.</given-names>
            <surname>Fellows</surname>
          </string-name>
          , How to Test
          <source>Software for Edge Computing Environments</source>
          ,
          <year>2024</year>
          . URL: https://www. workwithloop.com/blog/how-to
          <article-title>-test-software-for-edge-computing-environments.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>J.</given-names>
            <surname>Malik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Pastore</surname>
          </string-name>
          ,
          <article-title>An empirical study of vulnerabilities in edge frameworks to support security testing improvement</article-title>
          ,
          <source>Empirical Software Engineering</source>
          <volume>28</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1007/ s10664-023-10330-x.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J.</given-names>
            <surname>Beilharz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Wiesner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Boockmeyer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Pirl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Friedenberger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Brokhausen</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Behnke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polze</surname>
          </string-name>
          , L. Thamsen,
          <article-title>Continuously Testing Distributed IoT Systems: An Overview of the State of the Art</article-title>
          ,
          <source>in: Service-Oriented Computing - ICSOC 2021 Workshops</source>
          , Springer International Publishing,
          <year>2022</year>
          , pp.
          <fpage>336</fpage>
          -
          <lpage>350</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -14135-5_
          <fpage>30</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>P.</given-names>
            <surname>Gupta</surname>
          </string-name>
          , Edge Computing and
          <string-name>
            <surname>Real-Time Data Testing: Enhancing System Reliability</surname>
          </string-name>
          ,
          <year>2023</year>
          . URL: https://fpgainsights.com/test-measurement/
          <article-title>edge-computing-and-real-time-data-testing.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>S.</given-names>
            <surname>Durrett</surname>
          </string-name>
          , Ensure Reliability in Edge Computing with
          <string-name>
            <surname>Burn-In</surname>
            <given-names>Testing</given-names>
          </string-name>
          ,
          <year>2023</year>
          . URL: https://www.smithsinterconnect.
          <article-title>com/smiths-interconnect-blog/ ensure-reliability-in-edge-computing-with-burn-in-testing.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>T.</given-names>
            <surname>Khomenko</surname>
          </string-name>
          , Top 15 Manual Testing Tools Checklist To Know In
          <year>2024</year>
          ,
          <year>2023</year>
          . URL: https://testomat. io/blog/top-15
          <string-name>
            <surname>-</surname>
          </string-name>
          manual
          <article-title>-testing-tools-to-know/#what-tools-are-used-in-manual-testing.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Linux</surname>
            <given-names>NetEM manual</given-names>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://man7.org/linux/man-pages
          <source>/man8/tc-netem.8</source>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <article-title>The Wide Area Network emulator</article-title>
          ,
          <year>2014</year>
          . URL: https://wanem.sourceforge.net/.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <source>[31] Clumsy 0.3</source>
          ,
          <year>2021</year>
          . URL: https://jagt.github.io/clumsy/.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Apache</surname>
            <given-names>JMeter™</given-names>
          </string-name>
          ,
          <year>2024</year>
          . URL: https://jmeter.apache.org/index.html.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>Gatling</given-names>
            <surname>Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://gatling.io/.
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>Locust</given-names>
            <surname>Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://locust.io/.
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>Nmap</given-names>
            <surname>Oficial Page</surname>
          </string-name>
          ,
          <year>2021</year>
          . URL: https://nmap.org/.
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>Shodan</given-names>
            <surname>Oficial Page</surname>
          </string-name>
          ,
          <year>2023</year>
          . URL: https://www.shodan.io/.
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>Metasploit</given-names>
            <surname>Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://www.metasploit.com/.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>Prometheus</given-names>
            <surname>Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://prometheus.io/.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>Grafana</given-names>
            <surname>Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://grafana.com/.
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>Elastic</given-names>
            <surname>Stack Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://www.elastic.co/elastic-stack.
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>NewRelic</given-names>
            <surname>Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://newrelic.com/.
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>Nagios</given-names>
            <surname>Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://www.nagios.org/.
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>TensorFlow</given-names>
            <surname>Extended (TFX) Oficial</surname>
          </string-name>
          <string-name>
            <surname>Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://www.tensorflow.org/tfx/.
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>DataRobot</given-names>
            <surname>Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://www.datarobot.com/.
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>Katalon</given-names>
            <surname>Studio Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://katalon.com/.
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>Apache</given-names>
            <surname>Kafka Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://kafka.apache.org/.
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>Apache</given-names>
            <surname>Flink Oficial Page</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://flink.apache.org/.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>