{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:52:18Z","timestamp":1774896738029,"version":"3.50.1"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030736880","type":"print"},{"value":"9783030736897","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-73689-7_88","type":"book-chapter","created":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T11:29:51Z","timestamp":1618486191000},"page":"934-945","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Edge Computing Enabled Technologies for Secure 6G Smart Environment-An Overview"],"prefix":"10.1007","author":[{"given":"Syed Usman","family":"Jamil","sequence":"first","affiliation":[]},{"given":"M. Arif","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Sabih ur","family":"Rehman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,16]]},"reference":[{"key":"88_CR1","doi-asserted-by":"publisher","first-page":"117802","DOI":"10.1109\/ACCESS.2020.3004662","volume":"8","author":"S Arif","year":"2020","unstructured":"Arif, S., Khan, M.A., Rehman, S.U., Kabir, M.A., Imran, M.: Investigating smart home security: is blockchain the answer? IEEE Access 8, 117802\u2013117816 (2020)","journal-title":"IEEE Access"},{"key":"88_CR2","doi-asserted-by":"crossref","unstructured":"Jamil, S.U., Khan, M.A., Ali, M.: Security embedded offloading requirements for IoT-fog paradigm. In: 2019 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), vol.\u00a01, pp.\u00a047\u201351. IEEE (2019)","DOI":"10.1109\/MTTW.2019.8897219"},{"issue":"8","key":"88_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.2019.1900271","volume":"57","author":"KB Letaief","year":"2019","unstructured":"Letaief, K.B., Chen, W., Shi, Y., Zhang, J., Zhang, Y.-J.A.: The roadmap to 6G: AI empowered wireless networks. IEEE Commun. Mag. 57(8), 84\u201390 (2019)","journal-title":"IEEE Commun. Mag."},{"key":"88_CR4","doi-asserted-by":"crossref","unstructured":"Mukherjee, M., Kumar, S., Shojafar, M., Zhang, Q., Mavromoustakis, C.X.: Joint task offloading and resource allocation for delay-sensitive fog networks. In: ICC 2019\u20132019 IEEE International Conference on Communications (ICC), pp.\u00a01\u20137. IEEE (2019)","DOI":"10.1109\/ICC.2019.8761239"},{"key":"88_CR5","doi-asserted-by":"crossref","unstructured":"Ning, Z., Zhang, K., Wang, X., Guo, L., Hu, X., Huang, J., Hu, B., Kwok, R.Y.: Intelligent edge computing in internet of vehicles: a joint computation offloading and caching solution. IEEE Transactions on Intelligent Transportation Systems (2020)","DOI":"10.1109\/TITS.2020.2997832"},{"issue":"11","key":"88_CR6","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/JPROC.2019.2941458","volume":"107","author":"J Park","year":"2019","unstructured":"Park, J., Samarakoon, S., Bennis, M., Debbah, M.: Wireless network intelligence at the edge. Proc. IEEE 107(11), 2204\u20132239 (2019)","journal-title":"Proc. IEEE"},{"key":"88_CR7","doi-asserted-by":"crossref","unstructured":"Qureshi, K.N., Jeon, G., Piccialli, F.: Anomaly detection and trust authority in artificial intelligence and cloud computing. Computer Networks, p. 107647 (2020)","DOI":"10.1016\/j.comnet.2020.107647"},{"key":"88_CR8","doi-asserted-by":"crossref","unstructured":"Shojaiemehr, B., Rahmani, A.M., Qader, N.N.: Automated negotiation for ensuring composite service requirements in cloud computing. J. Syst. Archit. 99, 101632 (2019)","DOI":"10.1016\/j.sysarc.2019.08.005"},{"key":"88_CR9","doi-asserted-by":"crossref","unstructured":"Sinaeepourfard, A., Krogstie, J., Petersen, S.A., Ahlers, D.: F2c2C-DM: a fog-to-cloudlet-to-cloud data management architecture in smart city. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp.\u00a0590\u2013595. IEEE (2019)","DOI":"10.1109\/WF-IoT.2019.8767226"},{"key":"88_CR10","doi-asserted-by":"crossref","unstructured":"Tukur, Y.M., Ali, Y.S.: Demonstrating the effect of insider attacks on perception layer of Internet of Things (IoT) systems. In: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO), pp.\u00a01\u20136. IEEE (2019)","DOI":"10.1109\/ICECCO48375.2019.9043248"},{"issue":"4","key":"88_CR11","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MNET.2019.1800418","volume":"33","author":"P Yang","year":"2019","unstructured":"Yang, P., Xiao, Y., Xiao, M., Li, S.: 6G wireless communications: vision and potential techniques. IEEE Netw. 33(4), 70\u201375 (2019)","journal-title":"IEEE Netw."},{"key":"88_CR12","doi-asserted-by":"crossref","unstructured":"Zheng, T., Wan, J., Zhang, J., Jiang, C., Jia, G.: A survey of computation offloading in edge computing. In: 2020 International Conference on Computer, Information and Telecommunication Systems (CITS), pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/CITS49457.2020.9232457"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-73689-7_88","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T14:47:11Z","timestamp":1618498031000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-73689-7_88"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030736880","9783030736897"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-73689-7_88","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"16 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SoCPaR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socpar2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/socpar20\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}