{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:43:00Z","timestamp":1775281380653,"version":"3.50.1"},"reference-count":111,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/jiot.2017.2750180","type":"journal-article","created":{"date-parts":[[2017,9,8]],"date-time":"2017-09-08T18:24:31Z","timestamp":1504895071000},"page":"450-465","source":"Crossref","is-referenced-by-count":2138,"title":["Mobile Edge Computing: A Survey"],"prefix":"10.1109","volume":"5","author":[{"given":"Nasir","family":"Abbas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8561-5092","authenticated-orcid":false,"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1672-054X","authenticated-orcid":false,"given":"Amir","family":"Taherkordi","sequence":"additional","affiliation":[]},{"given":"Tor","family":"Skeie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2011.6092372"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"ref33","year":"2016","journal-title":"Brocade and the Mobile Edge"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.7236\/JIWIT.2012.12.6.297"},{"key":"ref31","year":"2016","journal-title":"Radio Access Network (RAN) Optimization"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2009.108"},{"key":"ref37","author":"sharpe","year":"2015","journal-title":"How Mobile Edge Computing Is Helping Operators Face the Challenges of Today&#x2019;s Evolving Mobile Networks"},{"key":"ref36","author":"zhong","year":"2015","journal-title":"Mobile Edge Computing Unleashing the Value Chain"},{"key":"ref35","article-title":"Fog computing: Focusing on mobile users at the edge","author":"luan","year":"2015","journal-title":"CoRR"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7018201"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3057295"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CCBD.2015.54"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/9781118555262"},{"key":"ref20","first-page":"27","article-title":"Mobile cloud computing","volume":"6","author":"huang","year":"2011","journal-title":"IEEE COMSOC Multimedia Commun Tech Committee E-Lett"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.61"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2504091"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7414063"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.282"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2307849.2307858"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2015.7507145"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1161\/CIR.0b013e31820a55f5"},{"key":"ref51","first-page":"121","article-title":"Smart items, fog and cloud computing as enablers of servitization in healthcare","volume":"185","author":"stantchev","year":"2015","journal-title":"Sens Transducers"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7474340"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref57","year":"2011","journal-title":"Big Data Analytics"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905099"},{"key":"ref55","year":"2016","journal-title":"Big Data&#x2014;Wikipedia the Free Encyclopedia"},{"key":"ref54","first-page":"1","article-title":"The mobile data challenge: Big data for mobile computing research","author":"laurila","year":"2012","journal-title":"Proc Pervasive Comput"},{"key":"ref53","year":"2009","journal-title":"Computer Technology Increasingly Aids Traffic Management"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2491266.2491270"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468527"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543776"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2015.10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.040"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MELCON.2016.7495388"},{"key":"ref49","first-page":"28e","article-title":"Heart disease and stroke statistics&#x2014;2014 update: A report from the American heart association","volume":"129","author":"go","year":"2014","journal-title":"Circulation"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500486"},{"key":"ref9","first-page":"48","article-title":"Mobile edge computing: A taxonomy","author":"beck","year":"2014","journal-title":"Proc 6th Int Conf Adv Future Internet"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.15439\/2014F503"},{"key":"ref45","first-page":"266","article-title":"Fog computing and its real time applications","volume":"5","author":"peter","year":"2015","journal-title":"Int J Emerg Technol Adv Eng"},{"key":"ref48","first-page":"2","article-title":"Fast: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation","author":"cao","year":"2015","journal-title":"Proc IEEE Int Conf Netw Archit Stor (NAS)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.015"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.18785\/jetde.0401.10"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/38.963459"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.173"},{"key":"ref43","author":"buyya","year":"2016","journal-title":"Internet of Things Principles and Paradigms"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2015.23"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.98"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SECONW.2015.7328146"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/RNDM.2016.7608300"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.12"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2015.2448520"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2497263"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.155"},{"key":"ref60","first-page":"1","article-title":"Big data analytics","author":"russom","year":"2011"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2015.7177778"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019700"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2015.7293374"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2311"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491220"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6658648"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6616112"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-012-0368-0"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2012.115"},{"key":"ref2","year":"2016","journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update 20122017 Cisco White Paper"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2016.24"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2014.46"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.03.001"},{"key":"ref94","first-page":"23","article-title":"Talking to strangers: Authentication in ad-hoc wireless networks","author":"balfanz","year":"2002","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.02.003"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.125"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.037"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046664"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.04.011"},{"key":"ref91","first-page":"546","article-title":"A reference model of information assurance & security","author":"cherdantseva","year":"2013","journal-title":"Proc 2nd Int Conf Availability Rel Security"},{"key":"ref105","article-title":"Extended privacy in crowdsourced location-based services using mobile cloud computing","volume":"2016","author":"abdo","year":"2016","journal-title":"Mobile Inf Syst"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2016.16"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195664"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046720"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","article-title":"EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications","volume":"23","author":"lu","year":"2012","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2014.07.001"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT.2013.6732790"},{"key":"ref98","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/2480741.2480757","article-title":"A survey of security issues in hardware virtualization","volume":"45","author":"p\u00e9k","year":"2013","journal-title":"ACM Comput Surveys"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-011-0138-0"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7060484"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620773"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(16)60021-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IC2EW.2016.45"},{"key":"ref13","article-title":"Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges","author":"roman","year":"2016","journal-title":"Future Gener Comput Syst"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCO.2016.7727082"},{"key":"ref15","volume":"11","author":"hu","year":"2015","journal-title":"Mobile edge computing A key technology towards 5G"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073804"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.06.024"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.265"},{"key":"ref17","author":"patel","year":"2014","journal-title":"Mobile-Edge Computing&#x2014;Introductory Technical White Paper"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2016.7561054"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2545559"},{"key":"ref19","first-page":"606","article-title":"Mobile cloud computing","volume":"2","author":"asrani","year":"2013","journal-title":"Int J Eng Adv Technol"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7588230"},{"key":"ref89","article-title":"An overview of fog computing and its security issues","volume":"28","author":"stojmenovic","year":"2015","journal-title":"Concurrency and Computation Practice and Experience"},{"key":"ref85","year":"2016","journal-title":"Small Cells Deliver Cost-Effective Capacity and Coverage Indoors and Outdoors"},{"key":"ref86","year":"2016","journal-title":"Small Cells Mobile Edge Computing Cover All the Bases For Taiwan Baseball Fans"},{"key":"ref87","year":"2016","journal-title":"Connected Cars Use Case for Mobile Edge Computing"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21837-3_67"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8288638\/08030322.pdf?arnumber=8030322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:27:44Z","timestamp":1642004864000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8030322\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":111,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2017.2750180","relation":{},"ISSN":["2327-4662"],"issn-type":[{"value":"2327-4662","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2]]}}}