{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T15:56:24Z","timestamp":1774281384533,"version":"3.50.1"},"reference-count":54,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/comapp.2018.8460182","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T21:46:11Z","timestamp":1536875171000},"page":"399-406","source":"Crossref","is-referenced-by-count":23,"title":["Fog Computing Potentials, Applications, and Challenges"],"prefix":"10.1109","author":[{"given":"Fatima","family":"Haouari","sequence":"first","affiliation":[]},{"given":"Ranim","family":"Faraj","sequence":"additional","affiliation":[]},{"given":"Jihad M.","family":"AlJa'am","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2659783"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2607178"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2815989"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2603219"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2679740"},{"key":"ref30","article-title":"ifogsim: A toolkit for modeling and simulation of resource management techniques in internet of things, edge and fog computing environments","author":"gupta","year":"2016","journal-title":"CoRR vol abs\/1606 02007"},{"key":"ref37","first-page":"1","article-title":"Wide area video surveillane based on edge and fog computing concept","author":"kioumourtzis","year":"2017","journal-title":"2017 th International Conference on Information Intelligence Systems and Applications (IISA)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2724845"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2803439"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.093"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842736"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2545559"},{"key":"ref2","article-title":"Fog computing: Will it be the future of cloud computing?","author":"firdhous","year":"2014","journal-title":"The Third International Conference on Informatics & Applications (ICIA2014)"},{"key":"ref1","first-page":"159","article-title":"Cloud computing: A survey on its limitations and potential solutions","volume":"10","author":"islam","year":"2013","journal-title":"International Journal of Computer Science Issues"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2704100"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2017.09.002","article-title":"Survey on fog computing: architecture, key technologies, applications and open issues","author":"hu","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3154815"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2017.2684981"},{"key":"ref25","first-page":"1","article-title":"Extending the cloud with fog: Security challenges & opportunities","author":"shropshire","year":"2014"},{"key":"ref50","article-title":"Machine learning and fog-to-cloud computing - mf2c project","author":"salis","year":"2017"},{"key":"ref51","article-title":"Sea: A secure and efficient authentication and authorization architecture for iot-based healthcare using smart gateways","author":"moosavi","year":"2015","journal-title":"ANT\/SEIT p"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2749422"},{"key":"ref52","article-title":"Secure intelligent traffic light control using fog computing","author":"liu","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2370056"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2803201"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2319555"},{"key":"ref13","article-title":"Enabling advanced iot, 5g, ai with fog computing","year":"2018"},{"key":"ref14","article-title":"Openfog reference architecture by the openfog consortium","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.10.002"},{"key":"ref16","article-title":"A comprehensive survey on fog computing: State-of-the-art and research challenges","author":"mouradian","year":"2017","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"ref17","article-title":"Securing fog computing for internet of things applications: Challenges and solutions","author":"ni","year":"2017","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2749422"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3057266"},{"key":"ref4","article-title":"Iot: number of connected devices worldwide 2012&#x2013;2025","year":"2018","journal-title":"The Statisticain"},{"key":"ref3","article-title":"Cisco visual networking index: Forecast and methodology, 2016&#x2013;2021","year":"2018"},{"key":"ref6","article-title":"Cisco global cloud index: Forecast and methodology, 2016&#x2013;2021","year":"2018"},{"key":"ref5","article-title":"Idc forecasts shipments of wearable devices to nearly double by 2021 as smart watches and new product categories gain traction","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.7901470"},{"key":"ref49","article-title":"technical limitations of drones - bbc academy","year":"2015"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.2018.2814571","article-title":"Survey of fog computing: Fundamental, network applications, and research challenges","author":"mukherjee","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref46","article-title":"Rock64 4k60p hdr media board computer","year":"2018"},{"key":"ref45","article-title":"Intel edison - intel developer zone","year":"2018"},{"key":"ref48","article-title":"5 unstoppable drone security threats you should be aware of","year":"2015"},{"key":"ref47","article-title":"sensor-based collision avoidance for drone fleets","year":"2016"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-0991-5"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.014"},{"key":"ref44","article-title":"Raspberry pi - teach, learn, and make with raspberry pi","year":"2018"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3122865.3122876"}],"event":{"name":"2018 International Conference on Computer and Applications (ICCA)","location":"Beirut","start":{"date-parts":[[2018,8,25]]},"end":{"date-parts":[[2018,8,26]]}},"container-title":["2018 International Conference on Computer and Applications (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8449906\/8460181\/08460182.pdf?arnumber=8460182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T11:03:09Z","timestamp":1643194989000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8460182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/comapp.2018.8460182","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}