{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T08:18:29Z","timestamp":1768810709523,"version":"3.49.0"},"reference-count":97,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/jiot.2019.2924182","type":"journal-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T20:04:30Z","timestamp":1561147470000},"page":"8897-8910","source":"Crossref","is-referenced-by-count":37,"title":["Opportunistic Fog for IoT: Challenges and Opportunities"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3668-1242","authenticated-orcid":false,"given":"Niroshinie","family":"Fernando","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5339-9305","authenticated-orcid":false,"given":"Seng W.","family":"Loke","sequence":"additional","affiliation":[]},{"given":"Iman","family":"Avazpour","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5455-3792","authenticated-orcid":false,"given":"Fei-Fei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Amin B.","family":"Abkenar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8747-1419","authenticated-orcid":false,"given":"Amani","family":"Ibrahim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.31"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2013.6623445"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.040413.121174"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.98"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355153"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2864426"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807161"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.45"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2950047"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2018.64004"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701111"},{"key":"ref29","article-title":"The Internet of flying-things: Opportunities and challenges with airborne fog computing and mobile cloud in the clouds","volume":"abs 1507 4492","author":"loke","year":"2015","journal-title":"CoRR"},{"key":"ref20","year":"2015","journal-title":"Fog Computing and the Internet of Things Extend the Cloud to Where the Things Are"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2015.7356560"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2488222.2488266"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2532863"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2753775"},{"key":"ref51","year":"2018","journal-title":"The Apache Software Foundation Apache JMeter"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.62"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SECONW.2015.7328145"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-319-05029-4_7","article-title":"Fog computing: A platform for Internet of Things and analytics","author":"bonomi","year":"2014","journal-title":"Big Data and Internet of Things A Roadmap for Smart Environments"},{"key":"ref56","year":"0","journal-title":"Azure IoT Edge"},{"key":"ref55","year":"2018","journal-title":"Foghorn Systems Edge Intelligence Software for IIoT"},{"key":"ref54","year":"2017","journal-title":"Edgent Version 1 2 0-Incubating Apache"},{"key":"ref53","year":"0","journal-title":"Cisco iox"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2016.030"},{"key":"ref40","article-title":"Above the clouds: A Berkeley view of cloud computing","author":"fox","year":"2009"},{"key":"ref4","year":"2016","journal-title":"Openfog architecture overview"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2508382"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2014.7020884"},{"key":"ref49","article-title":"The asymptotic configuration of application components in a distributed system","author":"pollock","year":"1998"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.245"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.002"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.05.016"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2083-x"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2799230"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2014.7033259"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2724845"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2491266.2491270"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7445510"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2016.34"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-012-0368-0"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.040"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref77","first-page":"224","article-title":"Honeybee: A programming framework for mobile crowd computing","author":"fernando","year":"2012","journal-title":"Proc Int Conf Mobile Ubiquitous Syst Comput Netw Services"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.265"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2488222.2488265"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2780885"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Foundations and Trends\ufffd in Theoretical Computer Science"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427078"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2509"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.06.412"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3147234.3148101"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2017.7946405"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876242"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SECONW.2015.7328146"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717742073"},{"key":"ref68","first-page":"4","article-title":"Energy efficiency of mobile clients in cloud computing","volume":"10","author":"miettinen","year":"2010","journal-title":"Proc HotCloud"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2565516"},{"key":"ref1","author":"abdelshkour","year":"2015","journal-title":"IoT From Cloud to Fog Computing"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-0-387-35612-9_9","article-title":"Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks","author":"michiardi","year":"2002","journal-title":"Advanced Communications and Multimedia Security"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5560597"},{"key":"ref92","first-page":"134","article-title":"Opportunistic networks: The concept and research challenges in privacy and security","author":"leszek","year":"2006","journal-title":"Proc WSPWN"},{"key":"ref91","first-page":"849","article-title":"Quality of service in large scale mobile distributed systems based on opportunistic networks","author":"tanase","year":"2011","journal-title":"Proc Int Conf Adv Inf Netw and Appl"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/1810931.1810937"},{"key":"ref96","article-title":"Observation-based cooperation enforcement in ad hoc networks","volume":"cs ni 307012","author":"bansal","year":"2003","journal-title":"CoRR"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.127"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700363"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.27"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4018\/IJMCMC.2017100101"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2560163"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771153"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400436"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2017.2684981"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2830340"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref19","first-page":"28","article-title":"A hierarchical distributed fog computing architecture for big data analysis in smart cities","author":"tang","year":"2015","journal-title":"Proceedings of the ACM ASE BigData & SocialInformatics"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741147"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.043"},{"key":"ref89","year":"2017","journal-title":"OpenFog Reference Architecture for Fog Computing"},{"key":"ref85","author":"pearson","year":"2003","journal-title":"Trusted Computing Platforms TCPA Technology in Context"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.001"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.21540"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2822875"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8863548\/08743456.pdf?arnumber=8743456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:52:09Z","timestamp":1657745529000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8743456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":97,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2019.2924182","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}