{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:26:31Z","timestamp":1778347591588,"version":"3.51.4"},"reference-count":204,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"16","license":[{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Science and Technology Council (NSTC) of Taiwan","award":["111-2221-E-002-097-MY3"],"award-info":[{"award-number":["111-2221-E-002-097-MY3"]}]},{"name":"National Science and Technology Council (NSTC) of Taiwan","award":["111-2622-8-002-030-"],"award-info":[{"award-number":["111-2622-8-002-030-"]}]},{"name":"National Science and Technology Council (NSTC) of Taiwan","award":["109-2221-E-002-148-MY2"],"award-info":[{"award-number":["109-2221-E-002-148-MY2"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,8,15]]},"DOI":"10.1109\/jiot.2023.3245611","type":"journal-article","created":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T23:09:14Z","timestamp":1676588954000},"page":"14307-14331","source":"Crossref","is-referenced-by-count":76,"title":["Management and Orchestration of Edge Computing for IoT: A Comprehensive Survey"],"prefix":"10.1109","volume":"10","author":[{"given":"Yao","family":"Chiang","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8991-1983","authenticated-orcid":false,"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1900-279X","authenticated-orcid":false,"given":"Hao","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0855-1662","authenticated-orcid":false,"given":"Tse-Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0008-2643","authenticated-orcid":false,"given":"Guan-Hao","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan"}]},{"given":"Huan-Ting","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan"}]},{"given":"Yan-Jhu","family":"Wang","sequence":"additional","affiliation":[{"name":"Graduate Institute of Communication Engineering, National Taiwan University, Taipei, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3116-306X","authenticated-orcid":false,"given":"Hung-Yu","family":"Wei","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan"}]},{"given":"Chun-Ting","family":"Chou","sequence":"additional","affiliation":[{"name":"Graduate Institute of Communication Engineering, National Taiwan University, Taipei, Taiwan"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2685578"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT46805.2019.8947060"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2019.8801980"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3331453.3361637"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944695"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.07.013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2968941"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3312592"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900463"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885703"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2957130"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2017.7980775"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2017.17"},{"key":"ref46","first-page":"190","article-title":"Open baton: A framework for virtual network function management and orchestration for emerging software-based 5G networks","volume":"2016","author":"carella","year":"2016","journal-title":"Newsletter"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-28.2016.212"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2019.8792987"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2018.00016"},{"key":"ref42","author":"shrivastwa","year":"2018","journal-title":"Hybrid Cloud for Architects Build Robust Hybrid Cloud Solutions Using AWS and OpenStack"},{"key":"ref41","first-page":"295","article-title":"A general and practical consolidation framework in CloudNFV","author":"pham","year":"2015","journal-title":"Proc ICOIN"},{"key":"ref44","year":"2022","journal-title":"Intel com&#x2014;RIFT"},{"key":"ref43","year":"2016","journal-title":"Open Source MANO"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.14.12.1110-1118"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2685434"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953172"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866491"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983253"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2966500"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878435"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7158071"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.013013.00155"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1592648.1592659"},{"key":"ref37","year":"2019","journal-title":"Mobile Edge Computing (MEC) Framework and Reference Architecture"},{"key":"ref36","year":"2015","journal-title":"Network Functions Virtualisation (NFV) Resiliency Requiremetns"},{"key":"ref31","author":"luan","year":"2015","journal-title":"Fog Computing Focusing on Mobile Users at the Edge"},{"key":"ref30","author":"goundar","year":"2019","journal-title":"Architecture and Security Issues in Fog Computing Applications"},{"key":"ref33","year":"2014","journal-title":"Network Function Virtualisation (NFV) Management and Orchestration"},{"key":"ref32","year":"2016","journal-title":"SDN Architecture Issue 1 1 ONF TR-521"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015432"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109344"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6035827"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8886332"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598420"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2011.5963565"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644384"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9448705"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3046968"},{"key":"ref28","year":"2020","journal-title":"Multi-access edge computing"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.005"},{"key":"ref29","year":"2017","journal-title":"P1935&#x2014;Standard for edge\/fog manageability and orchestration"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883423"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2599530"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2873002"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3179363"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3108508"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761212"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3092790"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377343"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3090179"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC.2018.8372737"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646131"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2830395"},{"key":"ref92","article-title":"Approximation algorithms for disjoint paths problems","author":"kleinberg","year":"1996"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3067002"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644285"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2890685"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2726120"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2019.8802020"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2978830"},{"key":"ref91","first-page":"1","article-title":"Theoretical approaches to node assignment","author":"andersen","year":"2002","journal-title":"Proc Journal of Computer Science"},{"key":"ref90","author":"kurose","year":"2010","journal-title":"Computer Networks A Top Down Approach Featuring the Internet"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700627"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037523"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407697"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2961081"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2016.7527328"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2850370"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3005570"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3052355"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470948"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2955129"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510997"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2880483"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888056"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2636139"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2580150"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864877"},{"key":"ref83","first-page":"1","article-title":"On delay-aware embedding of virtual networks","author":"beck","year":"2014","journal-title":"Proc 6th Int Conf Adv Future Internet (AFIN)"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883811"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2611845"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2734081"},{"key":"ref80","first-page":"2391","article-title":"Survivable virtual network embedding across multiple domains","author":"gong","year":"2016","journal-title":"Proc 2nd IEEE Int Conf Comput Commun (ICCC)"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2558598"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2900530"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2693404"},{"key":"ref109","doi-asserted-by":"crossref","first-page":"152911","DOI":"10.1109\/ACCESS.2019.2941741","article-title":"Task data offloading and resource allocation in fog computing with multi-task delay guarantee","volume":"7","author":"m","year":"2019","journal-title":"IEEE Access"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908263"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3100253"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.030912.120082"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3082291"},{"key":"ref74","first-page":"1142","article-title":"An approach to energy-efficient virtual network embeddings","author":"fischer","year":"2013","journal-title":"Proc IFIP\/IEEE Int Symp Integr Netw Manage"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876279"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2013.013013.110202"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2372852"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.07.027"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2593486"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963442"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942052"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355737"},{"key":"ref112","doi-asserted-by":"crossref","first-page":"13065","DOI":"10.1109\/JIOT.2021.3064225","article-title":"A novel framework for mobile edge computing by optimizing task offloading","volume":"8","author":"abdenacer","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.10.000B58"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892993"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2019.000046"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971543"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2899887"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991986"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936869"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254072"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2896064"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3434770.3459730"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3062546"},{"key":"ref63","author":"mathew","year":"2014","journal-title":"Overview of Amazon Web Services"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05272-0"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC.2019.8770635"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.3390\/s21248226"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2939534"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918437"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.51"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09498-8"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796778"},{"key":"ref62","first-page":"83","author":"ifrah","year":"2019","journal-title":"Deploying Containerized Applications With Amazon ECS"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2997091"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2996890.3007869"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3182211"},{"key":"ref168","first-page":"1","article-title":"Mobile panoramic video maps over MEC networks","author":"ghazal","year":"2016","journal-title":"Proc IEEE Wireless Commun Netw Conf"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2876044"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2019.8806058"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC47284.2019.8969779"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.23919\/EETA.2019.8804512"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/IoTSMS.2018.8554533"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops48775.2020.9156251"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2019.8802012"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/3349801.3349807"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2017.7915547"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999604"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2019.8802049"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2018.8443193"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/SEC50012.2020.00017"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3113875"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/3318216.3363300"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938529"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3001355"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud.2018.00152"},{"key":"ref185","first-page":"2","article-title":"FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation","author":"cao","year":"2015","journal-title":"Proc IEEE Int Conf Netw Archit Storage (NAS)"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2019.8835341"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2019.8835373"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2947334"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2877645"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2844961"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3077072"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3068369"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3040532"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3052971"},{"key":"ref154","doi-asserted-by":"crossref","first-page":"52261","DOI":"10.1109\/ACCESS.2018.2870855","article-title":"QoE-traffic optimization through collaborative dge caching in adaptive mobile video streaming","volume":"6","author":"thar","year":"2018","journal-title":"IEEE Access"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760184"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3087719"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973705"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8368984"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-021-00939-7"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/BMSB.2018.8436904"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885803"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302358"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2889196"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406989"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986347"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024583"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2019.2954097"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00095"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3101460"},{"key":"ref12","first-page":"97","article-title":"Resource management in fog\/edge computing: A survey on architectures, infrastructure, and algorithms","volume":"52","author":"hong","year":"2019","journal-title":"ACM Comput Surveys"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2016.11.016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106401"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2970550"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2015.2448520"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2018.8549500"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3304109.3306217"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2019.8847130"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927538"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3213548"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2783682"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2019.00055"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2862350"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951593"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986621"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2018.2869242"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2999684"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701231"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2951169"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10210448\/10045724.pdf?arnumber=10045724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T18:04:59Z","timestamp":1693245899000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10045724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,15]]},"references-count":204,"journal-issue":{"issue":"16"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3245611","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,15]]}}}