{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:54:44Z","timestamp":1770335684178,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps","award":["No.2017DB005"],"award-info":[{"award-number":["No.2017DB005"]}]},{"name":"Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps","award":["No.2020DB005"],"award-info":[{"award-number":["No.2020DB005"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11276-020-02537-3","type":"journal-article","created":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T07:03:17Z","timestamp":1611298997000},"page":"3643-3656","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing"],"prefix":"10.1007","volume":"30","author":[{"given":"Mengmeng","family":"Cui","sequence":"first","affiliation":[]},{"given":"Haochen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhanyang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Qingzhan","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,22]]},"reference":[{"issue":"1","key":"2537_CR1","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","volume":"5","author":"N Abbas","year":"2017","unstructured":"Abbas, N., Zhang, Y., Taherkordi, A., & Skeie, T. (2017). Mobile edge computing: A survey. IEEE Internet of Things Journal, 5(1), 450.","journal-title":"IEEE Internet of Things Journal"},{"issue":"9","key":"2537_CR2","doi-asserted-by":"publisher","first-page":"6172","DOI":"10.1109\/TII.2019.2959258","volume":"19","author":"X Xu","year":"2019","unstructured":"Xu, X., Mo, R., Dai, F., Lin, W., Wan, S., & Dou, W. (2019). Dynamic resource provisioning with fault tolerance for data-intensive meteorological workflows in cloud. IEEE Transactions on Industrial Informatics, 19(9), 6172.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"2537_CR3","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/MWC.2017.1700011","volume":"25","author":"A Machen","year":"2017","unstructured":"Machen, A., Wang, S., Leung, K. K., Ko, B. J., & Salonidis, T. (2017). Live service migration in mobile edge clouds. IEEE Wireless Communications, 25(1), 140.","journal-title":"IEEE Wireless Communications"},{"key":"2537_CR4","doi-asserted-by":"crossref","unstructured":"Ha, K., Abe, Y., Eiszler, T., Chen, Z., Hu, W., Amos, B., Upadhyaya, R., Pillai, P., Satyanarayanan, M. (2017). You can teach elephants to dance: Agile VM handoff for edge computing. In Proceedings of the second ACM\/IEEE symposium on edge computing, pp. 1\u201314","DOI":"10.1145\/3132211.3134453"},{"key":"2537_CR5","doi-asserted-by":"crossref","unstructured":"Ksentini, A., Taleb, T., Chen, M. A Markov decision process-based service migration procedure for follow me cloud. In 2014 IEEE international conference on communications (ICC) (IEEE, 2014), pp. 1350\u20131354","DOI":"10.1109\/ICC.2014.6883509"},{"key":"2537_CR6","unstructured":"Taleb, T., Ksentini, A., Frangoudis, P. (2016). Follow-me cloud: When cloud services follow mobile users. IEEE Transactions on Cloud Computing"},{"key":"2537_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2982186","author":"X Xu","year":"2020","unstructured":"Xu, X., Zhang, X., Liu, X., Jiang, J., Qi, L., & Bhuiyan, M. Z. A. (2020). Adaptive computation offloading with edge for 5G-envisioned internet of connected vehicles. IEEE Transactions on Intelligent Transportation Systems. https:\/\/doi.org\/10.1109\/TITS.2020.2982186.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"2537_CR8","doi-asserted-by":"publisher","first-page":"23511","DOI":"10.1109\/ACCESS.2018.2828102","volume":"6","author":"S Wang","year":"2018","unstructured":"Wang, S., Xu, J., Zhang, N., & Liu, Y. (2018). A survey on service migration in mobile edge computing. IEEE Access, 6, 23511.","journal-title":"IEEE Access"},{"issue":"5","key":"2537_CR9","doi-asserted-by":"publisher","first-page":"7737","DOI":"10.1109\/JIOT.2019.2903120","volume":"6","author":"Q Wu","year":"2019","unstructured":"Wu, Q., Chen, X., Zhou, Z., & Chen, L. (2019). Mobile social data learning for user-centric location prediction with application in mobile edge service migration. IEEE Internet of Things Journal, 6(5), 7737.","journal-title":"IEEE Internet of Things Journal"},{"key":"2537_CR10","doi-asserted-by":"crossref","unstructured":"Mahfouz, A.M., Rahman, M.L., Shiva, S.G. Secure live virtual machine migration through runtime monitors. In 2017 tenth international conference on contemporary computing (IC3) (IEEE, 2017), pp. 1\u20135","DOI":"10.1109\/IC3.2017.8284316"},{"issue":"1","key":"2537_CR11","first-page":"14","volume":"24","author":"HM Hamad","year":"2016","unstructured":"Hamad, H. M., & AlQazzaz, A. B. (2016). Secure live virtual machine migration by proposed security center. IUG Journal of Natural Studies, 24(1), 14\u201320.","journal-title":"IUG Journal of Natural Studies"},{"key":"2537_CR12","unstructured":"Khan, R., McLaughlin, K., Kang, B., D.\u00a0Laverty, S.\u00a0Sezer, In 2020 IEEE 6th world forum on internet of things (WF-IoT) (IEEE, 2020), pp. 1\u20136"},{"key":"2537_CR13","doi-asserted-by":"publisher","unstructured":"Xu, X., Huang, Q., Yin, X., Abbasi, M., Khosravi, M. R., & Qi, L. (2020). Intelligent offloading for collaborative smart city services in edge computing. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2020.3000871.","DOI":"10.1109\/JIOT.2020.3000871"},{"key":"2537_CR14","unstructured":"Ding, W., Ren, P., Du, Q. In 2019 11th international conference on wireless communications and signal processing (WCSP) (IEEE, 2019), pp. 1\u20136"},{"key":"2537_CR15","doi-asserted-by":"publisher","unstructured":"Xu, X., Wu, Q., Qi, L., Dou, W., Tsai, S. B., & Bhuiyan, M. Z. A. (2020). Trust-Aware Service Offloading for Video Surveillance in Edge Computing Enabled Internet of Vehicles. IEEE Transactions on Intelligent Transportation Systems. https:\/\/doi.org\/10.1109\/TITS.2020.2995622.","DOI":"10.1109\/TITS.2020.2995622"},{"key":"2537_CR16","doi-asserted-by":"publisher","first-page":"31186","DOI":"10.1109\/ACCESS.2019.2903523","volume":"7","author":"L He","year":"2019","unstructured":"He, L., Lei, J., & Huang, Y. (2019). A greedy spreading serial decoding of LT codes. IEEE Access, 7, 31186.","journal-title":"IEEE Access"},{"key":"2537_CR17","doi-asserted-by":"publisher","first-page":"8102","DOI":"10.1109\/ACCESS.2018.2890452","volume":"7","author":"J He","year":"2019","unstructured":"He, J., Hussain, I., Li, Y., Juntti, M., & Matsumoto, T. (2019). Distributed LT codes with improved error floor performance. IEEE Access, 7, 8102.","journal-title":"IEEE Access"},{"issue":"5","key":"2537_CR18","doi-asserted-by":"publisher","first-page":"4084","DOI":"10.1109\/JIOT.2019.2959124","volume":"7","author":"X Xu","year":"2019","unstructured":"Xu, X., Liu, X., Xu, Z., Dai, F., Zhang, X., & Qi, L. (2019). Trust-oriented IoT service placement for smart cities in edge computing. IEEE Internet of Things Journal, 7(5), 4084.","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"2537_CR19","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TII.2015.2509442","volume":"12","author":"L Sun","year":"2015","unstructured":"Sun, L., Ren, P., Du, Q., & Wang, Y. (2015). Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 12(1), 291.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"7","key":"2537_CR20","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TIFS.2013.2261060","volume":"8","author":"S Luo","year":"2013","unstructured":"Luo, S., Li, J., & Petropulu, A. P. (2013). Uncoordinated cooperative jamming for secret communications. IEEE Transactions on Information Forensics and Security, 8(7), 1081.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"2537_CR21","doi-asserted-by":"publisher","first-page":"1272","DOI":"10.1109\/TNET.2019.2916577","volume":"27","author":"S Wang","year":"2019","unstructured":"Wang, S., Urgaonkar, R., Zafer, M., He, T., Chan, K., & Leung, K. K. (2019). Dynamic service migration in mobile edge computing based on markov decision process. IEEE\/ACM Transactions on Networking, 27(3), 1272.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"2537_CR22","doi-asserted-by":"crossref","unstructured":"Karthick, G., Mapp, G., Kammueller, F., Aiash, M. Formalization and analysis of a resource allocation security protocol for secure service migration. In 2018 IEEE\/ACM international conference on utility and cloud computing companion (UCC companion) (IEEE, 2018), pp. 207\u2013212","DOI":"10.1109\/UCC-Companion.2018.00058"},{"issue":"11","key":"2537_CR23","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.3923\/itj.2011.2044.2051","volume":"10","author":"AA Alsaffar","year":"2011","unstructured":"Alsaffar, A. A., & Huh, E. N. (2011). Secure migration service for mobile IPTV Using DCAS. Information Technology Journal, 10(11), 2044.","journal-title":"Information Technology Journal"},{"key":"2537_CR24","doi-asserted-by":"crossref","unstructured":"Nie, H., Jiang, X., Tang, W., Zhang, S., Dou, W. (2020). Data security over wireless transmission for enterprise multimedia security with fountain codes. Multimedia tools and applications pp. 1\u201323","DOI":"10.1007\/s11042-019-08479-z"},{"issue":"1","key":"2537_CR25","first-page":"23","volume":"65","author":"B Jun","year":"2016","unstructured":"Jun, B., Yang, P., No, J. S., & Park, H. (2016). New fountain codes with improved intermediate recovery based on batched zigzag coding. IEEE Transactions on Communications, 65(1), 23.","journal-title":"IEEE Transactions on Communications"},{"key":"2537_CR26","doi-asserted-by":"crossref","unstructured":"Li, Z., Jing, T., Cheng, X., Huo, Y., Zhou, W., Chen, D. Cooperative jamming for secure communications in MIMO cooperative cognitive radio networks. In 2015 IEEE international conference on communications (ICC) (IEEE, 2015), pp. 7609\u20137614","DOI":"10.1109\/ICC.2015.7249543"},{"issue":"6","key":"2537_CR27","doi-asserted-by":"publisher","first-page":"3265","DOI":"10.1109\/TWC.2019.2912611","volume":"18","author":"Y Huo","year":"2019","unstructured":"Huo, Y., Fan, X., Ma, L., Cheng, X., Tian, Z., & Chen, D. (2019). Secure communications in tiered 5G wireless networks with cooperative jamming. IEEE Transactions on Wireless Communications, 18(6), 3265.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2537_CR28","doi-asserted-by":"crossref","unstructured":"Hung, D., Duy, T., & Trinh, D. (2019). Security-reliability analysis of multi-hop LEACH protocol with fountain codes and cooperative jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 6(18)","DOI":"10.4108\/eai.28-3-2019.157120"},{"key":"2537_CR29","doi-asserted-by":"crossref","unstructured":"Kadi, N., Al\u00a0Agha, K. New degree distribution to improve LT-code in network coding for broadcasting in ad-hoc wireless networks. In 21st annual ieee international symposium on personal, indoor and mobile radio communications (IEEE, 2010), pp. 1820\u20131825","DOI":"10.1109\/PIMRC.2010.5671636"},{"key":"2537_CR30","doi-asserted-by":"crossref","unstructured":"Li, W., Du, Q., Sun, L., Ren, P., Wang, Y. Security enhanced via dynamic fountain code design for wireless delivery. In 2016 IEEE wireless communications and networking conference (IEEE, 2016), pp. 1\u20136","DOI":"10.1109\/WCNC.2016.7565065"},{"issue":"3","key":"2537_CR31","doi-asserted-by":"publisher","first-page":"1739","DOI":"10.1109\/TCOMM.2018.2877391","volume":"67","author":"A Severinson","year":"2018","unstructured":"Severinson, A., & A.G. i Amat, E. Rosnes,. (2018). Block-diagonal and LT codes for distributed computing with straggling servers. IEEE Transactions on Communications, 67(3), 1739.","journal-title":"IEEE Transactions on Communications"},{"issue":"8","key":"2537_CR32","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LCOMM.2016.2578920","volume":"20","author":"W Yao","year":"2016","unstructured":"Yao, W., Yi, B., Huang, T., & Li, W. (2016). Poisson robust soliton distribution for LT codes. IEEE Communications Letters, 20(8), 1499.","journal-title":"IEEE Communications Letters"},{"key":"2537_CR33","doi-asserted-by":"crossref","unstructured":"Vishwakarma, S., Chockalingam, A. Sum secrecy rate in miso full-duplex wiretap channel with imperfect csi. In 2015 IEEE Globecom workshops (GC Wkshps) (IEEE, 2015), pp. 1\u20136","DOI":"10.1109\/GLOCOMW.2015.7414075"},{"issue":"12","key":"2537_CR34","doi-asserted-by":"publisher","first-page":"12373","DOI":"10.1109\/TVT.2018.2872874","volume":"67","author":"L Fan","year":"2018","unstructured":"Fan, L., Zhao, N., Lei, X., Chen, Q., Yang, N., & Karagiannidis, G. K. (2018). Outage probability and optimal cache placement for multiple amplify-and-forward relay networks. IEEE Transactions on Vehicular Technology, 67(12), 12373.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3","key":"2537_CR35","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/LCOMM.2016.2627055","volume":"21","author":"H Lee","year":"2016","unstructured":"Lee, H., Song, C., Choi, S. H., & Lee, I. (2016). Outage probability analysis and power splitter designs for SWIPT relaying systems with direct link. IEEE Communications Letters, 21(3), 648.","journal-title":"IEEE Communications Letters"},{"issue":"4","key":"2537_CR36","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1109\/LCOMM.2019.2903040","volume":"23","author":"G Im","year":"2019","unstructured":"Im, G., & Lee, J. H. (2019). Outage probability for cooperative NOMA systems with imperfect SIC in cognitive radio networks. IEEE Communications Letters, 23(4), 692.","journal-title":"IEEE Communications Letters"},{"issue":"3","key":"2537_CR37","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1109\/18.490565","volume":"42","author":"D Raphaeli","year":"1996","unstructured":"Raphaeli, D. (1996). Distribution of noncentral indefinite quadratic forms in complex normal variables. IEEE Transactions on Information Theory, 42(3), 1002.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2537_CR38","doi-asserted-by":"crossref","unstructured":"Wang, J., Swindlehurst, A.L. Cooperative jamming in MIMO ad-hoc networks. In 2009 conference record of the forty-third asilomar conference on signals, systems and computers (IEEE, 2009), pp. 1719\u20131723","DOI":"10.1109\/ACSSC.2009.5469718"},{"issue":"3","key":"2537_CR39","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2009","unstructured":"Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2009). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875.","journal-title":"IEEE Transactions on Signal Processing"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02537-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02537-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02537-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T15:41:56Z","timestamp":1720021316000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02537-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,22]]},"references-count":39,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["2537"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02537-3","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,22]]},"assertion":[{"value":"27 December 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}