{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:06:20Z","timestamp":1773921980848,"version":"3.50.1"},"reference-count":125,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2018R1A2B6002399"],"award-info":[{"award-number":["2018R1A2B6002399"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2884536","type":"journal-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T00:03:30Z","timestamp":1543881810000},"page":"73465-73488","source":"Crossref","is-referenced-by-count":63,"title":["Information-Centric Networking With Edge Computing for IoT: Research Challenges and Future Directions"],"prefix":"10.1109","volume":"6","author":[{"given":"Rehmat","family":"Ullah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1381-5095","authenticated-orcid":false,"given":"Syed Hassan","family":"Ahmed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9824-1950","authenticated-orcid":false,"given":"Byung-Seo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2017","journal-title":"An Open Interoperable Fog Computing Architecture"},{"key":"ref38","first-page":"1","article-title":"The Fog computing paradigm: Scenarios and security issues","author":"stojmenovic","year":"2014","journal-title":"Proc Fed Conf Comput Sci Inf Syst"},{"key":"ref33","year":"2018","journal-title":"European Telecommunications Standards Institute"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145315"},{"key":"ref31","year":"2017","journal-title":"Open Edge Computing"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1322-z"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0477-4"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.jnca.2015.11.009","article-title":"Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges","volume":"62","author":"shaukat","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobicase.2014.257757"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1425-9"},{"key":"ref20","year":"2017","journal-title":"Ericsson Mobility Report SE-164 80 Stockholm Sweden"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.12.006"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.jnca.2015.05.016","article-title":"Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing","volume":"59","author":"gai","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00090"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2013.37"},{"key":"ref101","year":"2017","journal-title":"The Docker Project Page"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2660129.2660150"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2015.32"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7060484"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ISCO.2016.7727082"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2013.6750178"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594383"},{"key":"ref56","year":"2017","journal-title":"European Telecommunications Standards Institute PoC 2 Edge Video Orchestration and Video Clip Replay"},{"key":"ref55","year":"2017","journal-title":"European Telecommunications Standards Institute Industry Specifications Group MEC Proofs of Concept"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2016.54"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2014.06.015"},{"key":"ref40","author":"byers","year":"2017","journal-title":"OpenFog Consortium&#x2014;Out of the Fog Use Case Scenarios"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2799000"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2845844"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2717482"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2731971"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.119"},{"key":"ref49","year":"0","journal-title":"European Telecommunications Standards Institute Industry Specifications Group Mobile-Edge Computing&#x2014;Service Scenarios"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSGRC.2014.6908721"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883656"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2016.24"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.06.024"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.155"},{"key":"ref42","first-page":"8","article-title":"Fog computing: Will it be the future of cloud computing?","author":"firdhous","year":"2014","journal-title":"Proc 3rd Int Conf Inf Appl"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.83"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2607178"},{"key":"ref43","author":"luan","year":"2015","journal-title":"Fog Computing Focusing on Mobile Users at the Edge"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2597850"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125727"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2016.4"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402268"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.061411.00019"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2543720"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00063"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2394307"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815890"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384450"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402268"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/Ubi-HealthTech.2015.7203325"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2013.77"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2016.60"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEM.2012.12"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2728623"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2014.7020884"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500486"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2015.2456213"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6616114"},{"key":"ref2","first-page":"1","article-title":"IoT data processing at the edge with named data networking","author":"amadeo","year":"2018","journal-title":"Proc Eur Wireless Conf"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3229625.3229627"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.062613.00160"},{"key":"ref109","year":"0","journal-title":"InterDigital"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591119"},{"key":"ref108","year":"0","journal-title":"Artesyn"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736753"},{"key":"ref107","year":"0","journal-title":"Advantech"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref106","year":"2018","journal-title":"ADLINK Technology"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437030"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2814571"},{"key":"ref91","author":"trossen","year":"2015","journal-title":"IP over ICN&#x2013;The better IP? An unusual take on information-centric networking"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2015.44"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437030"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451167"},{"key":"ref102","year":"2017","journal-title":"Amazon Lambda Project Page&#x2014;Run Code Not Servers&#x2014;Serverless Computing"},{"key":"ref111","year":"2018","journal-title":"Vasona Networks"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2668838"},{"key":"ref110","year":"0","journal-title":"Qwilt"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3098208.3098210"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2017.8264880"},{"key":"ref96","year":"2018","journal-title":"ADLINK Technologies"},{"key":"ref97","author":"paolini","year":"2018","journal-title":"How to control latency and benefit from it An expanded role for latency"},{"key":"ref10","first-page":"166","article-title":"The impact of mobile multimedia applications on data center consolidation","author":"ha","year":"2013","journal-title":"Proc of the IEEE Int Conf on Cloud Engineering (IC2E)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073804"},{"key":"ref12","author":"barnett","year":"2017","journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update"},{"key":"ref13","first-page":"48","article-title":"Mobile edge computing: A taxonomy","author":"beck","year":"2014","journal-title":"Proc 6th Int Conf Adv Future Internet"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-319-05029-4_7","article-title":"Fog computing: A platform for Internet of Things and analytics","author":"bonomi","year":"2014","journal-title":"Big Data and Internet of Things A Roadmap for Smart Environments"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700325"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2009.8.3.c4"},{"key":"ref82","year":"0","journal-title":"Information-centric Networking Research Group"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6301"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-34208-5_21"},{"key":"ref81","year":"0","journal-title":"3rd generation partnership project (3GPP)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7405725"},{"key":"ref84","year":"2017","journal-title":"Alliance for Telecommunications Industry Solutions"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref19","article-title":"Power at the edge: Processing and storage move from Central core to the network edge","author":"paoloni","year":"2017"},{"key":"ref83","year":"0","journal-title":"SG13 Future Networks With focus on IMT-2020 Cloud Computing and Trusted Network Infrastructures"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3132112"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2792016"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562050"},{"key":"ref80","year":"2017","journal-title":"Cloudlet-based Edge Computing"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2796720"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2010.6388306"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2417016"},{"key":"ref121","first-page":"452","article-title":"Certificateless public key cryptography","volume":"2894","author":"al-riyami","year":"2003","journal-title":"Adv Cryptology"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2747158"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510841"},{"key":"ref85","author":"recchione","year":"2016","journal-title":"Understanding information centric networking and mobile edge computing"},{"key":"ref86","first-page":"1","author":"el hattachi","year":"2015","journal-title":"A Deliverable by NGMN (Next Generation Mobile Networks)"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6871674"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525398"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08555552.pdf?arnumber=8555552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:15:21Z","timestamp":1643289321000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8555552\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":125,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2884536","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}