{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:09:52Z","timestamp":1758845392615},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030004095"},{"type":"electronic","value":"9783030004101"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00410-1_9","type":"book-chapter","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T22:32:21Z","timestamp":1539729141000},"page":"64-72","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework"],"prefix":"10.1007","author":[{"given":"Vishal","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Jiyoon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Soonhyun","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,18]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the Internet of Things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13\u201316. ACM (2012)","DOI":"10.1145\/2342509.2342513"},{"key":"9_CR2","unstructured":"Sharma, V., Srinivasan, K., Jayakody, D.N.K., Rana, O., Kumar, R.: Managing service-heterogeneity using osmotic computing, arXiv preprint arXiv:1704.04213 (2017)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data, pp. 37\u201342. ACM (2015)","DOI":"10.1145\/2757384.2757397"},{"key":"9_CR4","first-page":"77","volume":"7","author":"H Sbeyti","year":"2016","unstructured":"Sbeyti, H., Malli, M., Al-Tahat, K., Fadlallah, A., Youssef, M.: Scalable extensible middleware framework for context-aware mobile applications (SCAMMP). Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl. (JoWUA) 7, 77\u201398 (2016)","journal-title":"Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl. (JoWUA)"},{"key":"9_CR5","first-page":"41","volume":"7","author":"F Baiardi","year":"2016","unstructured":"Baiardi, F., Tonelli, F., Isoni, L.: Application vulnerabilities in risk assessment and management. J. Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl. (JoWUA) 7, 41\u201359 (2016)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl. (JoWUA)"},{"key":"9_CR6","first-page":"53","volume":"6","author":"Q He","year":"2016","unstructured":"He, Q., Dong, Q., Zhao, B., Wang, Y., Qiang, B.: P2p traffic optimization based on congestion distance and DHT. J. Internet Serv. Inf. Secur. (JISIS) 6, 53\u201369 (2016)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"9_CR7","first-page":"1","volume":"7","author":"X Jiang","year":"2017","unstructured":"Jiang, X., Ge, X., Yu, J., Kong, F., Cheng, X., Hao, R.: An efficient symmetric searchable encryption scheme for cloud storage. J. Internet Serv. Inf. Secur. (JISIS) 7, 1\u201318 (2017)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"issue":"99","key":"9_CR8","first-page":"1","volume":"PP","author":"V Sharma","year":"2017","unstructured":"Sharma, V., You, I., Kumar, R., Kim, P.: Computational offloading for efficient trust management in pervasive online social networks using osmotic computing. IEEE Access PP(99), 1 (2017)","journal-title":"IEEE Access"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCC.2016.124","volume":"3","author":"M Villari","year":"2016","unstructured":"Villari, M., Fazio, M., Dustdar, S., Rana, O., Ranjan, R.: Osmotic computing: a new paradigm for edge\/cloud integration. IEEE Cloud Comput. 3, 76\u201383 (2016)","journal-title":"IEEE Cloud Comput."},{"issue":"4","key":"9_CR10","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MWC.2008.4599227","volume":"15","author":"A Oliva De La","year":"2008","unstructured":"De La Oliva, A., Banchs, A., Soto, I., Melia, T., Vidal, A.: An overview of IEEE 802.21: media-independent handover services. IEEE Wirel. Commun. 15(4), 96\u2013103 (2008)","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"9_CR11","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MWC.2013.6704478","volume":"20","author":"R Marin-Lopez","year":"2013","unstructured":"Marin-Lopez, R., Bernal-Hidalgo, F., Das, S., Chen, L., Ohba, Y.: A new standard for securing media independent handover: IEEE 802.21a. IEEE Wirel. Commun. 20(6), 82\u201390 (2013)","journal-title":"IEEE Wirel. Commun."},{"issue":"2","key":"9_CR12","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1282221.1282224","volume":"11","author":"A Oliva de la","year":"2007","unstructured":"de la Oliva, A., Melia, T., Vidal, A., Bernardos, C.J., Soto, I., Banchs, A.: IEEE 802.21 enabled mobile terminals for optimized WLAN\/3G handovers: a case study. ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(2), 29\u201340 (2007)","journal-title":"ACM SIGMOBILE Mob. Comput. Commun. Rev."},{"issue":"1","key":"9_CR13","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.comcom.2008.09.034","volume":"32","author":"W-S Lim","year":"2009","unstructured":"Lim, W.-S., Kim, D.-W., Suh, Y.-J., Won, J.-J.: Implementation and performance study of IEEE 802.21 in integrated IEEE 802.11\/802.16 e networks. Comput. Commun. 32(1), 134\u2013143 (2009)","journal-title":"Comput. Commun."},{"key":"9_CR14","unstructured":"802.21a-2012 - IEEE standard for local and metropolitan area networks: media independent handover services - amendment for security extensions to media independent handover services and protocol. IEEE 802.21a, May 2012"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Park, H., Lee, H.H., Lee, S.-H.: IEEE 802 standardization on heterogeneous network interworking. In: 2014 16th International Conference on Advanced Communication Technology (ICACT), pp. 1140\u20131145. IEEE (2014)","DOI":"10.1109\/ICACT.2014.6779137"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","IoT as a Service"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00410-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T19:20:11Z","timestamp":1572117611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00410-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030004095","9783030004101"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00410-1_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"IoTaaS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Internet of Things as a Service","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichun","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iotaas2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iotaas2017.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}