{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:55:56Z","timestamp":1772063756883,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,1,17]],"date-time":"2018-01-17T00:00:00Z","timestamp":1516147200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,17]],"date-time":"2018-01-17T00:00:00Z","timestamp":1516147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s12652-017-0677-z","type":"journal-article","created":{"date-parts":[[2018,1,17]],"date-time":"2018-01-17T07:38:49Z","timestamp":1516174729000},"page":"1353-1363","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Differential flow space allocation scheme in SDN based fog computing for IoT applications"],"prefix":"10.1007","volume":"15","author":[{"given":"Abebe Abeshu","family":"Diro","sequence":"first","affiliation":[]},{"given":"Haftu Tasew","family":"Reda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5396-8897","authenticated-orcid":false,"given":"Naveen","family":"Chilamkurti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,17]]},"reference":[{"key":"677_CR1","doi-asserted-by":"crossref","unstructured":"Al Shayokh M, Abeshu A, Satrya GB, Nugroho MA (2016) Efficient and secure data delivery in software defined WBAN for virtual hospital. In Control, Electronics, Renewable Energy and Communications (ICCEREC), 2016 International Conference on IEEE, pp.\u00a012\u201316","DOI":"10.1109\/ICCEREC.2016.7814973"},{"issue":"5","key":"677_CR2","first-page":"75","volume":"50","author":"JM Batalla","year":"2017","unstructured":"Batalla JM, Vasilakos A, Gajewski M (2017) Secure smart homes: opportunities and challenges. ACM Comput Surv 50(5):75","journal-title":"ACM Comput Surv"},{"issue":"4","key":"677_CR3","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/BF01149260","volume":"13","author":"H Chen","year":"1993","unstructured":"Chen H, Whitt W (1993) Diffusion approximations for open queueing networks with service interruptions. Queueing Syst 13(4):335\u2013359","journal-title":"Queueing Syst"},{"issue":"4","key":"677_CR4","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1145\/2043164.2018466","volume":"41","author":"AR Curtis","year":"2011","unstructured":"Curtis AR, Mogul JC, Tourrilhes J, Yalagandula P, Sharma P, Banerjee S (2011) DevoFlow: scaling flow management for high-performance networks. ACM SIGCOMM Comput Commun Rev 41(4):254\u2013265","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"677_CR5","doi-asserted-by":"crossref","unstructured":"Diro AA, Chilamkurti N, 2017. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems","DOI":"10.1016\/j.future.2017.08.043"},{"key":"677_CR6","doi-asserted-by":"crossref","unstructured":"Diro AA, Chilamkurti N, Veeraraghavan P (2016) Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things. In International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. Springer, Cham, pp.\u00a0258\u2013268","DOI":"10.1007\/978-3-319-60717-7_26"},{"key":"677_CR7","doi-asserted-by":"crossref","unstructured":"Diro AA, Chilamkurti N, Kumar N, 2017. Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing. Mobile Networks and Applications, pp\u00a01\u201311","DOI":"10.1007\/s11036-017-0851-8"},{"key":"677_CR8","doi-asserted-by":"crossref","unstructured":"Gajewski M, Batalla JM, Mastorakis G, Mavromoustakis CX, 2017. A distributed IDS architecture model for Smart Home systems. Cluster Computing, pp\u00a01\u201311","DOI":"10.1007\/s10586-017-1105-z"},{"key":"677_CR9","doi-asserted-by":"crossref","unstructured":"Hassas Yeganeh S, Ganjali Y (2012) August. Kandoo: a framework for efficient and scalable offloading of control applications. In: Proceedings of the first workshop on Hot topics in software defined networks. ACM, pp.\u00a019\u201324","DOI":"10.1145\/2342441.2342446"},{"issue":"4","key":"677_CR10","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/COMST.2014.2326417","volume":"16","author":"F Hu","year":"2014","unstructured":"Hu F, Hao Q, Bao K (2014) A survey on software-defined network and openflow: from concept to implementation. IEEE Commun Surveys Tutorials 16(4):2181\u20132206","journal-title":"IEEE Commun Surveys Tutorials"},{"issue":"7","key":"677_CR11","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1109\/TCOM.1980.1094756","volume":"28","author":"F Kamoun","year":"1980","unstructured":"Kamoun F, Kleinrock L (1980) Analysis of shared finite storage in a computer network node environment under general traffic conditions. IEEE Trans Commun 28(7):992\u20131003","journal-title":"IEEE Trans Commun"},{"issue":"6","key":"677_CR12","first-page":"97","volume":"3","author":"DG Kendall","year":"1959","unstructured":"Kendall DG (1959) Stochastic processes occurring in the theory of queues and their analysis by the method of the imbedded Markov chain. Matematika 3(6):97\u2013112","journal-title":"Matematika"},{"issue":"1","key":"677_CR13","first-page":"1","volume":"10","author":"W Kim","year":"2010","unstructured":"Kim W, Sharma P, Lee J, Banerjee S, Tourrilhes J, Lee SJ, Yalagandula P (2010) Automated and scalable QoS control for network convergence. INM\/WREN 10(1):1\u20131","journal-title":"INM\/WREN"},{"issue":"8","key":"677_CR14","doi-asserted-by":"publisher","first-page":"2178","DOI":"10.1587\/transinf.E97.D.2178","volume":"97","author":"Y Kyung","year":"2014","unstructured":"Kyung Y, Yim T, Kim T, Nguyen TM, Park J (2014) A QoS-aware differential processing control scheme for openflow-based mobile networks. IEICE TRANSACTIONS Inf Syst 97(8):2178\u20132181","journal-title":"IEICE TRANSACTIONS Inf Syst"},{"key":"677_CR15","doi-asserted-by":"crossref","unstructured":"Mavromoustakis CX, Mastorakis G, Batalla JM, Chatzimisios P (2017) Social-oriented Mobile Cloud Offload processing with delay constraints for efficient energy conservation. In Communications (ICC), 2017 IEEE International Conference on IEEE, pp.\u00a01\u20137","DOI":"10.1109\/ICC.2017.7996633"},{"issue":"2","key":"677_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69\u201374","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"677_CR17","doi-asserted-by":"publisher","first-page":"19293","DOI":"10.1109\/ACCESS.2017.2749422","volume":"5","author":"M Mukherjee","year":"2017","unstructured":"Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, Kumar V (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293\u201319304","journal-title":"IEEE Access"},{"key":"677_CR18","unstructured":"Shahmir K, 2013. Stochastic switching using OpenFlow. Master of Telematics-Communication Networks and Networked Services"},{"issue":"11","key":"677_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MCOM.2013.6658651","volume":"51","author":"MA Sharkh","year":"2013","unstructured":"Sharkh MA, Jammal M, Shami A, Ouda A (2013) Resource allocation in a network-based cloud computing environment: design challenges. IEEE Commun Mag 51(11):46\u201352","journal-title":"IEEE Commun Mag"},{"key":"677_CR20","unstructured":"Sharma P, Banerjee S, Tandel S, Aguiar R, Amorim R, Pinheiro D (2013) Enhancing network management frameworks with SDN-like control. In Integrated Network Management (IM 2013), 2013 IFIP\/IEEE International Symposium on IEEE, pp.\u00a0688\u2013691"},{"issue":"1","key":"677_CR21","first-page":"43","volume":"6","author":"DK Smith","year":"2002","unstructured":"Smith DK (2002) Calculation of steady-state probabilities of M\/M queues: further approaches. Adv Decision Sci 6(1):43\u201350","journal-title":"Adv Decision Sci"},{"key":"677_CR22","doi-asserted-by":"crossref","unstructured":"Tomovic S, Yoshigoe K, Maljevic I, Pejanovic-Djurisic M, Radusinovic I (2014) SDN-based concept of QoS aware heterogeneous wireless network operation. Telecommunications Forum Telfor (TELFOR), 2014 22nd IEEE, pp\u00a027\u201330","DOI":"10.1109\/TELFOR.2014.7034350"},{"issue":"1","key":"677_CR23","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s11277-016-3845-0","volume":"92","author":"S Tomovic","year":"2017","unstructured":"Tomovic S, Yoshigoe K, Maljevic I, Radusinovic I (2017) Software-defined fog Network architecture for IoT. Wireless Pers Commun 92(1):181\u2013196","journal-title":"Wireless Pers Commun"},{"key":"677_CR24","doi-asserted-by":"crossref","unstructured":"Vishnoi A, Poddar R, Mann V, Bhattacharya S (2014) Effective switch memory management in OpenFlow networks. In Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems ACM, pp.\u00a0177\u2013188","DOI":"10.1145\/2611286.2611301"},{"issue":"4","key":"677_CR25","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1851275.1851224","volume":"40","author":"M Yu","year":"2010","unstructured":"Yu M, Rexford J, Freedman MJ, Wang J (2010) Scalable flow-based networking with DIFANE. ACM SIGCOMM Comput Commun Rev 40(4):351\u2013362","journal-title":"ACM SIGCOMM Comput Commun Rev"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-017-0677-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-017-0677-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-017-0677-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T16:28:15Z","timestamp":1709224095000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-017-0677-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,17]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["677"],"URL":"https:\/\/doi.org\/10.1007\/s12652-017-0677-z","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,17]]},"assertion":[{"value":"30 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}