{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T10:56:46Z","timestamp":1777633006171,"version":"3.51.4"},"reference-count":278,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Instituto de Telecomunica\u00e7\u00f5es (IT) - Instituto Universit\u00e1rio de Lisboa","award":["UID\/EEA\/50008\/2019"],"award-info":[{"award-number":["UID\/EEA\/50008\/2019"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/comst.2018.2863030","type":"journal-article","created":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T20:16:38Z","timestamp":1533327398000},"page":"260-288","source":"Crossref","is-referenced-by-count":177,"title":["Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3516-8781","authenticated-orcid":false,"given":"Jose","family":"Moura","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6052-0559","authenticated-orcid":false,"given":"David","family":"Hutchison","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2518085"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E97.B.1728"},{"key":"ref277","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3057268","article-title":"Game theory for cyber security and privacy","volume":"50","author":"do","year":"2017","journal-title":"ACM Comput Surveys"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2012-285"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E98.B.502"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2419632"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2800749"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2424395"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2366136"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2566584"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659059"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2440471"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2490280"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2403363"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848040"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2015.2488649"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2402680"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2692375.2692378"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BF01766706"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2015.2490076"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-010-0005-9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2416178"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.251"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2678167"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2418297"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1007\/s10472-015-9450-1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2034631"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600399CM"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6189413"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120118"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2350503"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2644760"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2438292"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477603"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2325552"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2011.6139767"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2387282"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2379953"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.08.001"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2015.2469724"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218600"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"9055","DOI":"10.3390\/s120709055","article-title":"Game theory for wireless sensor networks: A survey","volume":"12","author":"shi","year":"2012","journal-title":"SENSORS"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2329835"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2159735"},{"key":"ref20","first-page":"1","article-title":"Resource management in cloud networking using economic analysis and pricing models: A survey","volume":"19","author":"nguyen","year":"2017","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/380752.380846"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1500371WC"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2742949"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2445789"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1257\/jep.30.4.151"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2883615"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10287-014-0206-x"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600690CM"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2015.2397883"},{"key":"ref154","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1109\/LCOMM.2002.801326","article-title":"Equilibria of a noncooperative game for heterogeneous users of an ALOHA network","volume":"6","author":"jin","year":"2002","journal-title":"IEEE Commun Lett"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.170"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292872"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209181"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.361602"},{"key":"ref152","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.1109\/JSAC.2007.070808","article-title":"Reverse-engineering MAC: A non-cooperative game model","volume":"25","author":"lee","year":"2007","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/VTCF.2006.509"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2435311"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/26.983324"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2012.6221257"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015578321066"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2070-9"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962511"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2010.5700285"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161129"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2942358.2942382"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107478732"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659338"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.04.012"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2307\/1911307"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2550218"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2499182"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2343219"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2014.0337"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7880988"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2421496"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2452908"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2339271"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1201\/b10975","author":"zhang","year":"2011","journal-title":"Game Theory for Wireless Communications and Networking"},{"key":"ref3","author":"han","year":"2012","journal-title":"Game Theory in Wireless and Communication Networks Theory Models and Applications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2539923"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2200\/S00014ED1V01Y200508COM001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2329956"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470936"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.3390\/s16071003","article-title":"Game theory meets wireless sensor networks security requirements and threats mitigation: A survey","volume":"16","author":"abdalzaher","year":"2016","journal-title":"SENSORS"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600746CM"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374660"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845058"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2432802"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2464218"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2506580"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2343628"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2011.06.004"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2009.4907555"},{"key":"ref41","first-page":"23","article-title":"Stackelberg game for utility-based cooperative cognitiveradio networks","author":"zhang","year":"2009","journal-title":"Proc 10th ACM Int Symp Mobile Ad Hoc Netw Comput"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2440422"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2412116"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7064905"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2374606"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2388588"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130812"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/JSEE.2012.00019"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010515"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2547994"},{"key":"ref78","article-title":"Mobile edge computing (MEC); technical requirements","year":"2017"},{"key":"ref79","year":"2017","journal-title":"White Paper 5G-PPP"},{"key":"ref60","first-page":"1","article-title":"Mobile edge computation offloading using game theory and reinforcement learning","author":"ranadheera","year":"2017","journal-title":"arXiv 1711 09012v1 [cs GT]"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2745099"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.12.031"},{"key":"ref63","first-page":"1","article-title":"Machine learning for wireless networks with artificial intelligence: A tutorial on neural networks","author":"chen","year":"2017","journal-title":"arXiv 1710 02913v1 [cs IT]"},{"key":"ref64","first-page":"464","article-title":"Multi-agent reinforcement learning in sequential social dilemmas","author":"leibo","year":"2017","journal-title":"Proc 16th Conf Autonomous Agents and MultiAgent Systems"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2382095"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2325823"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2412940"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2361092"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2485304"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2451994"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7105641"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.000000"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2373369"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2558581"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2481202"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2342791"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2654119"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2685434"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4435901"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2509638"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2014.02.001"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6549281"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.922775"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2702013"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1601165"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2717482"},{"key":"ref82","article-title":"Utility function design for strategic radio resource management games: An overview, taxonomy, and research challenges","volume":"28","author":"yang","year":"2016","journal-title":"Trans Emerg Telecommun Technol"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2696539"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659098"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2017.2654365"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"ref85","article-title":"Hyrax: Cloud computing on mobile devices using MapReduce","author":"marinelli","year":"2009"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00090"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.021"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.933370"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/11767886_10"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2539346"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7537175"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070814"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2384510"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.12.023"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2334655"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2453170"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6134218"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600568CM"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2402662"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2393303"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2338293"},{"key":"ref214","doi-asserted-by":"crossref","first-page":"1760","DOI":"10.3390\/s150101760","article-title":"Research trends in wireless visual sensor networks when exploiting prioritization","volume":"15","author":"costa","year":"2015","journal-title":"SENSORS"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0456-1"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2641930"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2384372"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2407355"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2315194"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2366559"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2416177"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2481279"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2430865"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2477088"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2413394"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2344434"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2377156"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2520249"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2420233"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070402"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2014.000109"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2365721"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2562498"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139524421.018"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-006-5192-y"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2497682"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2385068"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2370046"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2406338"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2633038"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0195-x"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2439636"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2422735"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2371818"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS.2016.7761346"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600587CM"},{"key":"ref235","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.jnca.2016.02.016","article-title":"Machine-to-machine (M2M) communications: A survey","volume":"66","author":"verma","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2624022"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2472395"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2481792"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2362914"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2672239"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437018"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2500200"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4518875"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.02.070158"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2009.02.009"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.810314"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2351406"},{"key":"ref2","author":"gibbons","year":"1992","journal-title":"A Primer in Game Theory"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.09.010"},{"key":"ref1","author":"dutta","year":"1999","journal-title":"Strategies and Games Theory and Practice"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2425397"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2482462"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2424242"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2499783"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2481204"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS-Genova.2015.7271413"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470948"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2613512"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2769106"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2416715"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1017\/S0263574713000192"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.gaceta.2008.07.003"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593279"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00081"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.051111.00121"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.314548"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.111412.00167"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122310.000119"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.06.020"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.03.011"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/2692385.2692386"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2582841"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2463281"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2316834"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7498074"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700410"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2431714"},{"key":"ref253","first-page":"1","article-title":"Optimal pricing for a peer-to-peer sharing platform under network externalities","author":"li","year":"2018","journal-title":"arXiv 1805 09616v2 [cs GT]"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2565198"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2017.1700023"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2015.10.006"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2368151"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-015-0881-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIM.2015.7108393"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096962"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2851510"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2032039"},{"key":"ref18","first-page":"1","article-title":"Mobile edge computing: Survey and research outlook","author":"mao","year":"2017","journal-title":"arXiv 1701 01090v4 [cs IT]"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.04.010"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2186410"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.04.004"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080907"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1225-6"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110418"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2409651"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2010.5757866"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.06.005"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2318700"},{"key":"ref260","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.jnca.2016.09.001","article-title":"A survey on service function chaining","volume":"75","author":"bhamare","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2651578"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2692240"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2631530"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525418"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2624078"},{"key":"ref266","first-page":"25","article-title":"In defence of NATs","volume":"20","author":"huston","year":"2017","journal-title":"Internet Protocol J"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8649699\/08424815.pdf?arnumber=8424815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:52:59Z","timestamp":1657745579000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8424815\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":278,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2018.2863030","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}