{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:49:19Z","timestamp":1767116959056,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,6,22]],"date-time":"2018-06-22T00:00:00Z","timestamp":1529625600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,6,22]],"date-time":"2018-06-22T00:00:00Z","timestamp":1529625600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1547411"],"award-info":[{"award-number":["1547411"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005825","name":"National Institute of Food and Agriculture","doi-asserted-by":"publisher","award":["2017-67003-26057"],"award-info":[{"award-number":["2017-67003-26057"]}],"id":[{"id":"10.13039\/100005825","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00607-018-0639-0","type":"journal-article","created":{"date-parts":[[2018,6,22]],"date-time":"2018-06-22T02:28:07Z","timestamp":1529634487000},"page":"729-742","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Multi-access edge computing aided mobility for privacy protection in Internet of Things"],"prefix":"10.1007","volume":"101","author":[{"given":"Ping","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Mimoza","family":"Durresi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5827-0877","authenticated-orcid":false,"given":"Arjan","family":"Durresi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,22]]},"reference":[{"key":"639_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed A, Ahmed E (2016) A survey on mobile edge computing. In: 2016 10th International conference on intelligent systems and control (ISCO), pp 1\u20138","DOI":"10.1109\/ISCO.2016.7727082"},{"key":"639_CR2","doi-asserted-by":"crossref","unstructured":"Aleisa N, Renaud K (2017) Privacy of the Internet of Things: a systematic literature review. In: Hawaii international conference on system sciences","DOI":"10.24251\/HICSS.2017.717"},{"key":"639_CR3","unstructured":"Beck MT, Werner M, Feld S, Schimper T (2014) Mobile edge computing: a taxonomy. In: Proceedings of the sixth international conference on advances in future internet, pp 48\u201354"},{"key":"639_CR4","unstructured":"ETSI. Multi-access edge computing. \n                    http:\/\/www.etsi.org\/technologies-clusters\/technologies\/multi-access-edge-computing\n                    \n                  . Accessed 20 June 2018"},{"key":"639_CR5","unstructured":"Garvelink B (2015) Mobile edge computing: a building block for 5G. \n                    https:\/\/www.telecompaper.com\/background\/mobile-edge-computing-a-building-block-for-5g--1092281\n                    \n                  . Accessed 20 June 2018"},{"key":"639_CR6","doi-asserted-by":"crossref","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gen Comput Syst 29(7):1645\u20131660. Including Special sections: Cyber-enabled Distributed Computing for Ubiquitous Cloud and Network Services and Cloud Computing and Scientific Applications Big Data, Scalable Analytics, and Beyond","DOI":"10.1016\/j.future.2013.01.010"},{"key":"639_CR7","volume-title":"Pax Technica: how the Internet of Things may set us free or lock us up","author":"PN Howard","year":"2015","unstructured":"Howard PN (2015) Pax Technica: how the Internet of Things may set us free or lock us up. Yale University Press, New Haven"},{"issue":"10","key":"639_CR8","doi-asserted-by":"publisher","first-page":"3846","DOI":"10.1109\/JSEN.2013.2263379","volume":"13","author":"SDT Kelly","year":"2013","unstructured":"Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13(10):3846\u20133853","journal-title":"IEEE Sens J"},{"key":"639_CR9","volume-title":"Designing the Internet of Things","author":"A McEwen","year":"2013","unstructured":"McEwen A, Cassimally H (2013) Designing the Internet of Things. Wiley, New York"},{"key":"639_CR10","doi-asserted-by":"crossref","unstructured":"Nunna S, Kousaridas A, Ibrahim M, Dillinger M, Thuemmler C, Feussner H, Schneider A (2015) Enabling real-time context-aware collaboration through 5G and mobile edge computing. In: 2015 12th International conference on information technology\u2014new generations, pp 601\u2013605","DOI":"10.1109\/ITNG.2015.155"},{"issue":"Part 2","key":"639_CR11","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gen Comput Syst 78(Part 2):680\u2013698","journal-title":"Future Gen Comput Syst"},{"key":"639_CR12","doi-asserted-by":"crossref","unstructured":"Sain M, Kang YJ, Lee HJ (2017) Survey on security in Internet of Things: state of the art and challenges. In: 2017 19th International conference on advanced communication technology (ICACT), pp 699\u2013704","DOI":"10.23919\/ICACT.2017.7890183"},{"issue":"Supplement C","key":"639_CR13","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.bjp.2013.12.020","volume":"61","author":"L Sanchez","year":"2014","unstructured":"Sanchez L, Muoz L, Galache JA, Sotres P, Santana JR, Gutierrez V, Ramdhany R, Gluhak Alex, Krco S, Theodoridis E, Pfisterer D (2014) Smartsantander: Iot experimentation over a smart city testbed. Comput Netw 61(Supplement C):217\u2013238 (Special issue on Future Internet Testbeds Part I)","journal-title":"Comput Netw"},{"issue":"5","key":"639_CR14","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637\u2013646","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"639_CR15","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/TII.2014.2306397","volume":"10","author":"F Tao","year":"2014","unstructured":"Tao F, Zuo Y, Xu LD, Zhang L (2014) IoT-based intelligent perception and access of manufacturing resource toward cloud manufacturing. IEEE Trans Ind Inform 10(2):1547\u20131557","journal-title":"IEEE Trans Ind Inform"},{"issue":"4","key":"639_CR16","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MCOM.2017.1600863","volume":"55","author":"TX Tran","year":"2017","unstructured":"Tran TX, Hajisami A, Pandey P, Pompili D (2017) Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges. IEEE Commun Mag 55(4):54\u201361","journal-title":"IEEE Commun Mag"},{"key":"639_CR17","unstructured":"Tran TX, Pompili D (2017) Joint task offloading and resource allocation for multi-server mobile-edge computing networks. CoRR. \n                    arXiv:1705.00704"},{"key":"639_CR18","unstructured":"Yoshigoe K, Dai W, Abramson M, Jacobs A (2014) Overcoming invasion of privacy in smart home environment with synthetic packet injection. In: 2015 TRON symposium (TRONSHOW), pp 1\u20137"},{"key":"639_CR19","doi-asserted-by":"crossref","unstructured":"Zhang P, Durresi A (2017) Cloud aided internet mobility for privacy protection. In: 2017 IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2017.7996686"},{"key":"639_CR20","doi-asserted-by":"crossref","unstructured":"Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S (2014) IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications, pp 230\u2013234","DOI":"10.1109\/SOCA.2014.58"},{"key":"639_CR21","doi-asserted-by":"crossref","unstructured":"Zhao K, Ge L (2013) A survey on the Internet of Things security. In: 2013 Ninth international conference on computational intelligence and security, pp 663\u2013667","DOI":"10.1109\/CIS.2013.145"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0639-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-0639-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0639-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T08:04:30Z","timestamp":1589443470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-0639-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,22]]},"references-count":21,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["639"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-0639-0","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2018,6,22]]},"assertion":[{"value":"13 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}