{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T00:31:10Z","timestamp":1771633870211,"version":"3.50.1"},"reference-count":101,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471035"],"award-info":[{"award-number":["61471035"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672131"],"award-info":[{"award-number":["61672131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Civil Aviation Joint Funds of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1633121"],"award-info":[{"award-number":["U1633121"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1109\/jiot.2020.2996615","type":"journal-article","created":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T20:56:34Z","timestamp":1590180994000},"page":"10733-10744","source":"Crossref","is-referenced-by-count":17,"title":["A Survey and Tutorial on \u201cConnection Exploding Meets Efficient Communication\u201d in the Internet of Things"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6413-193X","authenticated-orcid":false,"given":"Huansheng","family":"Ning","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3894-7913","authenticated-orcid":false,"given":"Fadi","family":"Farha","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9133-4326","authenticated-orcid":false,"given":"Ziarmal Nazar","family":"Mohammad","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing, China"}]},{"given":"Mahmoud","family":"Daneshmand","sequence":"additional","affiliation":[{"name":"School of Business, Stevens Institute of Technology, Hoboken, NJ, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.062613.00160"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2016.7501692"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SECONW.2015.7328145"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.83"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866491"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58280-1_11"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.083"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63618-4_15"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2485206"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7871-2_70"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.049"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2019.00054"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2001.912412"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/641007.641060"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2016.18"},{"key":"ref101","article-title":"Trends, opportunities and challenges driving architecture and design of next generation mobile computing and IoT devices","author":"arabi","year":"2015","journal-title":"Proc MTL Seminar Series"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref100","article-title":"Mobile computing opportunities, challenges and technology drivers","author":"arabi","year":"2014","journal-title":"Proc Design Autom Conf"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref50","author":"pham","year":"2019","journal-title":"A Survey of Multi-Access Edge Computing in 5G and Beyond Fundamentals Technology Integration and State-of-the-Art"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2016.24"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767608"},{"key":"ref58","first-page":"1","author":"west","year":"2016","journal-title":"How 5G technology enables the health internet of things"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800498"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900323"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900271"},{"key":"ref54","first-page":"16","article-title":"Scalable distributed computing hierarchy: Cloud, fog and dew computing","volume":"2","author":"skala","year":"2015","journal-title":"Open Journal of Cloud Computing (OJCC)"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1504\/IJCC.2015.071717"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2392"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/9781118600146"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.066"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0305-7"},{"key":"ref49","first-page":"1","author":"hu","year":"2015","journal-title":"Mobile edge computing&#x2014;A key technology towards 5G"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2831347.2831354"},{"key":"ref46","first-page":"20","article-title":"Overview of Cloudlet, fog computing, edge computing, and dew computing","author":"pan","year":"2018","journal-title":"Proc 3rd Int Work Dew Comput"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405527"},{"key":"ref48","first-page":"1089","author":"patel","year":"2014","journal-title":"Mobile-edge computing - introductory technical white paper"},{"key":"ref47","first-page":"48","article-title":"Mobile edge computing: A taxonomy","author":"beck","year":"2014","journal-title":"Proc 6th Int Conf Adv Future Internet"},{"key":"ref42","author":"klas","year":"2015","journal-title":"Fog Computing and Mobile Edge Cloud Gain Momentum Open Fog Consortium Etsi Mec and Cloudlets"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2013.77"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2014.7051866"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2307849.2307856"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2590100"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.328"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPEIC.2015.7259486"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2388851"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2261605.2261646"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2803201"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.15"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"ref62","first-page":"1","article-title":"Software defined wireless networks (SDWNs): Unbridling SDNs","author":"costanzo","year":"2012","journal-title":"Proceedings of European Workshop on Software Defined Networking"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.092812.121712"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500391"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7386160"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/I-SPAN.2009.71"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3390\/s150407768"},{"key":"ref2","author":"evans","year":"2011","journal-title":"The Internet of Things How the next Evolution of the Internet Is Changing Everything"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2011.0085"},{"key":"ref1","first-page":"97","article-title":"That &#x2018;Internet of Things&#x2019; thing","volume":"22","author":"ashton","year":"2009","journal-title":"RFID J"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2011.6162695"},{"key":"ref94","first-page":"668","year":"2014","journal-title":"NISTIR 7628 Revision 1 &#x2013; Guidelines for Smart Grid Cybersecurity"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.08.004"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.14257\/ijsh.2016.10.2.18"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.014"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1634-x"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2546259"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700882"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2012.26"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2388479"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2015.0034"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-325"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.09.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-291v1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600514"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2017.7960034"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00090"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3390\/s90604056"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.82"},{"key":"ref83","article-title":"Who is investing in machine-to-machine communications?","author":"laya","year":"2013","journal-title":"Proc 29th Eur Regional Conf Int Telecommun Soc (ITS)"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700210"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2016.42"},{"key":"ref85","first-page":"1","article-title":"A hierarchical distributed fog computing architecture for big data analysis in smart cities","author":"tang","year":"2015","journal-title":"Proceedings of the ACM ASE BigData & SocialInformatics"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800254"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2016.7501719"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2015.2461555"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9257586\/09098906.pdf?arnumber=9098906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T17:38:54Z","timestamp":1683308334000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9098906\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11]]},"references-count":101,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.2996615","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11]]}}}