By Javier Surasky
We continue to seek a simple explanation of the key elements of AI to understand how this technology impacts international relations. We have already made significant progress, addressing tensions between China and the United States, regulatory disputes, computing power, human talent, and cloud computing. Now it’s time to focus on edge computing and the Internet of Things (IoT).
IoT: When the Physical
World Becomes Digital Infrastructure
We begin by
entering the space of new digital transformations through perhaps the most
familiar entry point: IoT, which is present in our daily lives, even if we
don’t always perceive it. Industrial sensors, medical devices, transportation
systems, and electrical grids are already part of the infrastructure where the
internet blends with the physical world. A simple way to think of IoT is as the
incorporation of physical objects into the digital informational ecosystem
through devices that continuously generate data, embedded in local contexts,
sensitive to the passage of time, and often representing critical segments for
personal security and privacy (Atzori et al., 2010; Gubbi et al., 2013).
Consider
smart heating systems equipped with sensors that measure temperature and the
presence of people in a home, automatically adjusting the temperature; wearable
heart monitors that constantly track heart rate in communication with a medical
platform, sending alerts when abnormal values appear; or traffic lights that
change the timing of lights based on real-time traffic. These examples
illustrate IoT and allow us to identify its three constituent elements: sensors
that capture physical world phenomena, web connectivity that enables data
transmission and reception, and the ability to make decisions and act on them.
From Local Data to the
Cloud: A Geopolitical Tension
IoT can
provide us with comfort and security, but at the cost of generating an
increasing volume of data that must travel to and from data centers, typically
in the cloud. That makes the speed of data circulation (technically known as
latency) critical to the proper functioning of these systems (Atzori et al.,
2010). The growth of IoT-connected devices poses a threat to latency, creating
bandwidth bottlenecks and exacerbating security issues related to data
transmission, as many devices handle sensitive information (remember, these
devices can monitor whether someone is in the house or how a heart is
functioning).
It is
essential to understand this point because, from a geopolitical perspective,
IoT does not create a virtual layer around physical objects; rather, it
objectifies a digital infrastructure. Data is generated in specific locations,
but its management and use, which give it value, occur in transnationally
distributed servers, generating a tension between the national and the
international. That has driven the transition from centralized to distributed
computing architectures that are “closer” to where data is produced, thereby
minimizing latency (Shi et al., 2016; Shi & Dustdar, 2016).
Edge Computing: Processing
Data Where It Is Generated
We are now
at the threshold of edge computing, defined as “any computing and network
resources along the path between data sources and cloud data centers. The logic
of edge computing is that computation should occur at the proximity of data
sources.” (Shi et al., 2016:638)
Gateways
play an important role here. What is a gateway? Let’s see: sensors typically
use short-range communication technologies, such as Bluetooth, whose signals
are received by amplifying centers that extend their range. In doing so, they
“change” the technical composition of the data to align it with the internet’s
IP language (the same one used by any computer to connect to the network). In
some cases, they also “clean” irrelevant information and execute simple rules
(if I receive X data, I must start process Y). When all this happens, the
gateway becomes an edge node. After all, a gateway is literally a “gateway”
because it connects locally produced data to the internet.
Fog and Edge: Redistributing
Decision-Making Power
Edge
computing is not alone in producing and managing locally generated data; it is
accompanied by fog computing. While similar “and they are regularly confused
with one another, there is a slight distinction between them. In fog computing,
there is just one centralized processing device responsible for handling
information from various endpoints in the systems. In edge computing, each
system participates in processing information” (Singla et al., 2021:44)
The
relationship between “internet-connected device → cloud data processing” is now
mediated by layers (edge computing and fog computing) that coordinate services,
manage available resources, and apply security enhancements to particularly
sensitive data (Shi & Dustdar, 2016). Edge and fog computing do not
compete; they work together to enhance the quality of functional
decentralization processes required by IoT.
However, as
we mentioned earlier, these models shift processing and analysis capabilities
from a central layer to several distributed layers connected through the
network, fundamentally changing the functional organization of digital
computing and directly affecting where and how automated decisions are made:
devices at the edge (either edge or fog) no longer act as mere data consumers,
but as active nodes capable of filtering information, executing computational
logic, and conditioning the operation of the system as a whole (Shi &
Dustdar, 2016). From this perspective, edge computing is a critical part of the
entire digital information infrastructure, without which the current levels of
resilience in advanced networks, particularly in contexts of high digital
dependence, low tolerance for failure, and the need for continuous operation,
could not be achieved. By acting as the first point of contact with the
emission device, the edge can isolate failures, reduce collapse points, and
sustain essential services when connectivity to large data centers is affected,
with direct impacts on areas such as security, health, or crisis management.
Standards, Corporations,
States: Who Controls the Edge
It is
precisely because of this dedicated role that edge computing standards,
including the ITU-T Recommendation X.1648 on data security in edge computing
(ITU, 2025), are set to play a fundamental role. Advances have already been
made in this area, but as we know, the establishment of standards is not purely
a technical issue or, if you prefer, not politically neutral. The setting of
standards becomes a key factor in defining interoperability patterns, which
implies strengthening some systems over others, technological dependence, and
the ability to control the flow of data in the short, medium, and long term:
those who prevail in the competition to set global edge computing standards
will have the capacity to dictate the operating guidelines for future critical
infrastructures.
Clearly,
these disputes involve not only States but primarily large tech companies and
digital infrastructure providers that design and operate the technical
equipment enabling edge and fog computing.
At the
international level, this results in alliances between States and corporations
to promote particular strategies for managing edge computing, framed in a
relationship of tension, given that the State lacks control over the
technologies and data flow processes at the edge that the company possesses.
Therefore, these priorities will not always align with the public sector’s, as
they operate within their own logics.
States seek
to balance their “capacity deficit” in the field through their normative power
to establish which data should be processed and stored locally, which should be
considered sensitive, and which can or cannot be sent to centralized processing
infrastructures located outside the national territory.
Thus,
States and companies form a partnership in which each needs the other more than
they would like.
Edge AI and Uneven
Development: Global Scenarios
The
complexity grows even further: “the convergence of edge computing and
artificial intelligence has given birth to a new research area, namely ‘edge
intelligence’ or ‘edge AI.’ Instead of relying entirely on the cloud, edge
intelligence makes full use of pervasive edge resources to gain AI insights.”
(Zhou et al., 2019:1). Technologies like autonomous vehicles, surveillance
systems, and digital health require real-time responses based on sensitive
data. Edge intelligence seeks to filter data and make decisions locally,
sending only processed information to the cloud.
This
process is linked to the “Industry 4.0” paradigm, also known as the “smart
industry,” which is based “on the use of emerging technologies to improve
manufacturing processes, machine maintenance, optimize production costs,
enhance employee training and conditions, boost customer relationships, or
create new high-quality services and products” (Rodal Montero, 2020:6). All of
this requires advanced energy systems and robust edge infrastructures,
projecting a high degree of complexity recognized by both the European Union
(European Commission, 2020 and 2025) and UNESCO (2021). The existence of these
elements, or lack thereof, becomes an international asset (OECD, 2025).
Furthermore,
edge computing and IoT do not unfold in a vacuum. The UN Development Program’s
Digital Development Compass shows how different dimensions of technology
management and human capacities combine to deploy edge computing and IoT,
clearly revealing highly unequal structures across countries and regions (UNDP,
2023).
The United
States, given its high digital capabilities and strong human capital in
technological and STEM fields, has turned edge computing into an extension of
its digital power, replicating its territorial models and exporting de facto
architectures and standards that end up conditioning the options of the
countries receiving them.
China, on
the other hand, uses its capabilities to establish edge-processing networks to
manage the enormous amount of locally generated data without relying on
external infrastructure. At the same time, it provides the government with
better tools to exercise control over its population, while also gaining
valuable experience to join the race to export edge and IoT solutions (UNDP,
2023).
Brazil is a
good case to illustrate what happens in several emerging economies. It has
significant digital infrastructure and digital economy capabilities, but these
are unevenly distributed across its territory, with hyper-concentrated zones.
As a result, it can deploy sectoral edge and IoT strategies but faces
difficulties consolidating a coherent national strategy that would allow it to
accumulate power, which means it does not substantially change its dependent
position in the global digital value chain (UNDP, 2023), even if it gains
functional autonomy in specific areas.
In Kenya,
an example of digitalization in Africa, the Digital Development Compass shows
edge computing as a possibility still subject to the consolidation of the
country’s nascent capabilities, where its deployment remains fundamentally
dependent on external actors, generating a situation of high fragility for the
government: local data processing without effective control over the
infrastructure or equitable appropriation of the value generated by that data
(UNDP, 2023).
The Edge as a New
Geopolitical Battleground
These
multiple dynamics help us understand why edge computing and IoT are
increasingly present in digital policy strategies, international cooperation,
and development. Edge not only shapes technical processes for efficient data
management but, hand in hand, raises debates about insertion into international
technological chains, the development of global digital infrastructures, the
enhancement of human capacities to manage frontier technologies within
countries, and the determination of possible margins of maneuver.
Edge
computing does not address digital inequalities; rather, depending on political
management and power relations in the global field, it can amplify existing
asymmetries. It is a technology that relies on sovereign decisions about data
but expresses inequalities in its capacity for management and exploitation. The
paradox we highlighted earlier reappears, but with different protagonists:
leading countries with high technological capacity need data from those
trailing in the race, but these, through regulatory strategies, appropriate
that data they cannot leverage unless through the systems of leading countries.
Both are called to work together in win-win relationships, but is that
practicable in a world where power inequality sets the pace?
There is no
single answer to this question. Still, there is a reality that governments and
scientists must integrate into any geopolitical analysis of digital technology
in general and AI in particular: edge computing and IoT are here to stay and
will grow in quantity and quality.
References
Atzori, L.,
Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer
Networks, 54(15), 2787–2805. https://www.researchgate.net/profile/Antonio-Iera/publication/222571757_The_Internet_of_Things_A_Survey/links/60314f3b92851c4ed587859f/The-Internet-of-Things-A-Survey.pdf
Deng, S.; Zhao, H.; Fang, W.; Yin, J.; Dustdar, S. y Zomaya,
A. Y. (2020). Edge
intelligence: The confluence of edge computing and artificial intelligence. IEEE
Internet of Things Journal, 7(8), 7457-7469.
European Commission
(2020). Shaping Europe’s digital future. European Union. https://eufordigital.eu/wp-content/uploads/2020/04/communication-shaping-europes-digital-future-feb2020_en_4.pdf
European Commission
(2025). Rolling plan for ICT standardisation: Cloud and edge computing
(RP 2025). Interoperable Europe Portal. https://interoperable-europe.ec.europa.eu/sites/default/files/custom-page/attachment/2025-04/RollingPlan_ICT_2025.pdf
Gubbi, J.;
Buyya, R.; Marusic, S. y Palaniswami, M. (2013). Internet of Things (IoT): A
vision, architectural elements, and future directions. Future Generation
Computer Systems. Future Generation Computer Systems, 29, 1645-1660. https://doi.org/10.1016/j.future.2013.01.010
ITU
(International Telecommunication Union) (2025). Recommendation ITU-T X.1648:
Guideline on edge computing data security. https://www.itu.int/epublications/publication/itu-t-x-1648-2025-04-guideline-on-edge-computing-data-security
Marcham, A.
(2020). Understanding infrastructure edge computing. O’Reilly Media.
OECD
(Organisation for Economic Co-operation and Development) (2025). OECD
science, technology and innovation outlook 2025. https://www.oecd.org/content/dam/oecd/en/publications/reports/2025/10/oecd-science-technology-and-innovation-outlook-2025_bae3698d/5fe57b90-en.pdf
Rodal Montero, E. (2020). Industria 4.0: Empresa y
gestión. Alfaomega.
Shi, W.;
Cao, J.; Zhang, Q; Li, Y. y Xu, L. (2016). Edge Computing: Vision and
Challenges. IEEE Internet of Things Journal, 3(5), 637-646. https://ieeexplore.ieee.org/document/7488250
Shi, W.,
and Dustdar, S. (2016). The promise of edge computing. Computer, 49(5),
78–81. https://ieeexplore.ieee.org/document/7469991
Singla, S;
Bhati, N.K. and Aswath, S (2021). Future Opportunistic Fog/Edge Computational
Models and their Limitations. Gupta, D., & Khamparia, A. (2021). Fog,
edge, and pervasive computing in intelligent IoT driven applications.
Springer.
UNCTAD
(United Nations Conference on Trade and Development) (2024). Digital economy
report 2024: Shaping an environmentally sustainable and inclusive digital
economy. https://unctad.org/system/files/official-document/der2024_en.pdf
UNDP (UN
Development Programme) (2023). Digital Development Compass: Measuring digital transformation for
sustainable development. https://digitaldevelopmentcompass.PNUD.org
UNESCO
(United Nations Educational, Scientific and Cultural Organization) (2021). UNESCO
science report: The race against time for smarter development. https://unesdoc.unesco.org/ark:/48223/pf0000377433
Zhou, Z.,
Chen, X., Li, E., Zeng, L., Luo, K., and Zhang, J. (2019). Edge intelligence:
Paving the last mile of artificial intelligence with edge computing. Proceedings
of the IEEE, 107(8), 1738–1762. https://ieeexplore.ieee.org/document/8736011
