{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T22:22:14Z","timestamp":1773872534863,"version":"3.50.1"},"reference-count":345,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB1001801"],"award-info":[{"award-number":["2017YFB1001801"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["61672276"],"award-info":[{"award-number":["61672276"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["61872219"],"award-info":[{"award-number":["61872219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2019MF001"],"award-info":[{"award-number":["ZR2019MF001"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Jiangsu Province","award":["BE2019104"],"award-info":[{"award-number":["BE2019104"]}]},{"DOI":"10.13039\/501100008048","name":"Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008048","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/comst.2020.2997475","type":"journal-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T19:43:21Z","timestamp":1590522201000},"page":"1761-1804","source":"Crossref","is-referenced-by-count":320,"title":["Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-0162-6921","authenticated-orcid":false,"given":"Wajid","family":"Rafique","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-9875-9856","authenticated-orcid":false,"given":"Lianyong","family":"Qi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-8438-3429","authenticated-orcid":false,"given":"Ibrar","family":"Yaqoob","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-6946-2591","authenticated-orcid":false,"given":"Muhammad","family":"Imran","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-9966-2466","authenticated-orcid":false,"given":"Raihan Ur","family":"Rasool","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-4833-2023","authenticated-orcid":false,"given":"Wanchun","family":"Dou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2815555"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2822275"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.050"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.09.021"},{"key":"ref271","first-page":"1578","article-title":"Towards IoT-DDoS prevention using edge computing","author":"bhardwaj","year":"2018","journal-title":"Proceedings of USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18)"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2805600"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2695525"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2015.7116078"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701062"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.11.001"},{"key":"ref171","author":"hakiri","year":"2017","journal-title":"Publish\/subscribe-enabled software defined networking for efficient and scalable IoT communications"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.009"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2019.01.005"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04277-0_18"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838226"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.53"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2015.87"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.040"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96550-5_1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2814571"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771153"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2817685"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831284"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2626287"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2717482"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2589245"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2017.8280481"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.016"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2894573"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3497"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.070"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2871296"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389118"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904236"},{"key":"ref281","author":"seals","year":"2019","journal-title":"IoT Botnet Bursts on the Scene With Massive DDoS&#x2014;Attack"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098264"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7848825"},{"key":"ref184","first-page":"1","article-title":"Empowering the Internet of Things with software defined networking","author":"martinez-julia","year":"2014","journal-title":"FP7 European research project on the future Internet of Things"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2805191"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.058"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7366240"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-015-0290-y"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2714638"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2015.7324414"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767608"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702545"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2849509"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.09.014"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.040"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.015"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4735"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2902878"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2746186"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700120"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2799425"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2862350"},{"key":"ref279","author":"baker","year":"2019","journal-title":"Recent IoT-Based Attacks What Is the Impact on Managed DNS Operators?"},{"key":"ref25","author":"jonas","year":"2019","journal-title":"Cloud programming simplified A berkeley view on serverless computing"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2764095"},{"key":"ref50","author":"alam","year":"2019","journal-title":"IoT virtualization A survey of software definition & function virtualization techniques for Internet of Things"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2016.27"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2015.32"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2772291"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.003"},{"key":"ref297","year":"2019","journal-title":"Proofpoint Uncovers Internet of Things (IoT) Cyberattack"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2723953"},{"key":"ref299","author":"khandelwal","year":"2019","journal-title":"Friday&#x2019;s Massive DDoS Attack Came from Just 100 000 Hacked IoT Devices"},{"key":"ref298","year":"2019","journal-title":"13th World Wide Infrastructure Security Report"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.019"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.06.024"},{"key":"ref156","year":"2019","journal-title":"Put the Most Trusted Independent Location Data and Technology Platform to Work for Your Business"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.09.004"},{"key":"ref150","author":"mahalingam","year":"2019","journal-title":"Virtual eXtensible Local Area Network (VXLAN) A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2016.29"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2326169"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355149"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3268"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700882"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2837161"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.058"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3292674"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2878710"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906793"},{"key":"ref55","first-page":"250","article-title":"Extreme SDN framework for IoT and mobile applications flexible privacy at the edge","volume":"200","author":"uddin","year":"2019","journal-title":"Heart"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2900097"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2018.8364045"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.07.001"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/ITC.2015.33"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014207"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.050"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2797187"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-015-8231-7"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.007"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600885"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"ref4","year":"2018","journal-title":"50 billion connections 2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2018.10.032"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.030"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-7432-3.ch001"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2018.07.001"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2888622"},{"key":"ref157","year":"2019","journal-title":"The Right Information at Just the Right Time"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.09.005"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1900120"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1601158"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904123"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.038"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-02889-8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.11.008"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.031"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.10.012"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2597193"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057009"},{"key":"ref321","year":"2019","journal-title":"Multi-access Edge Computing (MEC)"},{"key":"ref73","author":"lee","year":"2011","journal-title":"The Internet of Things&#x2014;Concept and Problem Statement"},{"key":"ref72","article-title":"Towards a definition of the Internet of Things (IoT)","author":"minerva","year":"2015"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2615180"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.019"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.150"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2313861"},{"key":"ref77","year":"2019","journal-title":"The Internet of Everything Global Public Sector Economic Analysis"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.01.002"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0494-4"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.02.016"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1145\/2412096.2412098"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1109\/SICE.2016.7749210"},{"key":"ref312","year":"2019","journal-title":"Join the Community Accelerating Analytics at the Edge"},{"key":"ref78","author":"mcfarlane","year":"2018","journal-title":"Industrial Internet of Things Applying IoT in the Industrial Context"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2102319"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800505"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878154"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref60","author":"alfonso","year":"2015","journal-title":"Predicts 2015 The Internet of Things"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.04.003"},{"key":"ref61","author":"afshar","year":"2017","journal-title":"Cisco Enterprises Are Leading The Internet of Things Innovation"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_3"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.083"},{"key":"ref304","year":"2019","journal-title":"New DDoS Attack LFA From May 11th Netease Attacked"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref307","author":"john","year":"2019","journal-title":"Biggest Ddos Attack in History Hammers Spamhaus"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7178164"},{"key":"ref306","first-page":"127","article-title":"The crossfire attack","author":"kang","year":"2013","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2018.12.002"},{"key":"ref301","year":"2019","journal-title":"SmartCam Products SNH-p6410bn"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref300","first-page":"33","article-title":"Protecting IoT from MIRAI botnets; IoT device hardening","volume":"11","author":"frank","year":"2018","journal-title":"J of Inform Syst Appl Research"},{"key":"ref68","year":"2019","journal-title":"Scopus"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2016.10.003"},{"key":"ref302","year":"2019","journal-title":"Samsung smart things hub"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2619686"},{"key":"ref308","first-page":"45","article-title":"A wireless sensor network protocol for the OMG Data Distribution Service","author":"beckmann","year":"2012","journal-title":"Proceedings of the 10th International Workshop on Intelligent Solutions in Embedded Systems WISES"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2012.113012.120310"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30146-0_6"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00080"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/831974"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4919"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2015.7387950"},{"key":"ref95","author":"doyle","year":"2019","journal-title":"Facebook Google Use SDN to Boost Data Center Connectivity"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6979984"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238182"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2905275"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928365"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1800519"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700284"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.10.004"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800229"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.10.030"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.019"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC.2017.7"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700822"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757955"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09473-3"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30146-0_34"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2012.24"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900178"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.023"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.10.001015"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"ref97","year":"2019","journal-title":"Software-Defined Networking The New Norm for Networks"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.4258\/hir.2016.22.3.156"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.020"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.comcom.2019.03.009","article-title":"Social Internet of Things (SIoT): Foundations, thrust areas, systematic review and future directions","volume":"139","author":"roopa","year":"2019","journal-title":"Comput Commun"},{"key":"ref83","first-page":"424","article-title":"The Web of Things: A survey","volume":"6","author":"zeng","year":"2011","journal-title":"J Clin Microbiol"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/310308"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2863545"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2950048"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2971013"},{"key":"ref323","year":"2019","journal-title":"Octeon Fusion-M Integrated Baseband Processors"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.036"},{"key":"ref322","year":"2019","journal-title":"Octeon Fusion-M Integrated Baseband Processors"},{"key":"ref325","article-title":"Named data networking (NDN) project","author":"zhang","year":"2010"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1109\/ISCO.2016.7727082"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.05.007"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-6207-8.ch005"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2899679"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600514"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018502"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.022021657"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101911"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2015.12"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2611578"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.027"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2026415"},{"key":"ref209","article-title":"Charging infrastructure for electric vehicles in Germany progress report and recommendations 2015","year":"2015"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1145\/3229574.3229579"},{"key":"ref204","year":"2019","journal-title":"Tizen Project Linux Foundation"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.03.020"},{"key":"ref202","article-title":"ENORM: A framework for edge node resource management","author":"wang","year":"2017","journal-title":"IEEE Trans Services Comput"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800628"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.039"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref206","author":"varghese","year":"2017","journal-title":"Edge-as-a-service Towards distributed cloud architectures"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-018-0705-6"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780087"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04095-y"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61300-0_10"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.112102200"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.3390\/info7030044"},{"key":"ref216","year":"2019","journal-title":"Internet of Things Related Standards"},{"key":"ref217","year":"2019","journal-title":"Connecting Devices Where We Live and Work"},{"key":"ref218","year":"2019","journal-title":"Open Connectivity Foundation Unlocking the Massive Opportunity in the Internet of Things"},{"key":"ref219","author":"stackowiak","year":"2015","journal-title":"Big Data and the Internet of Things Enterprise Information Architecture for a New Age"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2018.8502624"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700053"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2018.2855640"},{"key":"ref229","year":"2019","journal-title":"P1913 1&#x2014;Standard for Software Defined Quantum Communication"},{"key":"ref228","year":"2019","journal-title":"P1917 1&#x2014;Standard for Software Defined Networking and Network Function Virtualization Reliability"},{"key":"ref227","year":"2019","journal-title":"P1916 1&#x2014;Standard for Software Defined Networking and Network Function Virtualization Performance"},{"key":"ref226","year":"2019","journal-title":"P1915 1&#x2014;Standard for Software Defined Networking and Network Function Virtualization Security"},{"key":"ref225","year":"2019","journal-title":"P1903 1&#x2014;Standard for Content Delivery Protocols of Next Generation Service Overlay Network (NGSON)"},{"key":"ref224","year":"2019","journal-title":"Standard for Self-Organizing Management Protocols of Next Generation Service Overlay Network (NGSON)"},{"key":"ref223","year":"2019","journal-title":"P1903 2&#x2014;Standard for Service Composition Protocols of Next Generation Service Overlay Network (NGSON)"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3132479.3132490"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2894306"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2489183"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2493-4"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.017"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2865583"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2491939"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701016"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-3640-6.ch003"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2016.1276416"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2790081"},{"key":"ref232","year":"2019","journal-title":"IEEE P802 1CF&#x2014;Recommended Practice for Network Reference Model and Functional Description of IEEE 802 Access Network"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-802119-4.00001-8"},{"key":"ref230","year":"2019","journal-title":"IEEE P1921 1&#x2014;Software-Defined Networking Bootstrapping Procedures"},{"key":"ref231","year":"2019","journal-title":"IEEE P1930 1&#x2014;SDN Based Middleware for Control and Management of Networks"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29003-4_2"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6094017"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2019.103357"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7665"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248401"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889868"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2592241"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2014.0680"},{"key":"ref137","doi-asserted-by":"crossref","first-page":"1420","DOI":"10.1109\/JLT.2018.2800660","article-title":"Integration of IoT, transport SDN, and edge\/cloud computing for dynamic distribution of IoT analytics and efficient use of network resources","volume":"36","author":"mu\u00f1oz","year":"2018","journal-title":"J Lightw Technol"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815418"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.023"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.038"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2830782"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.03.006"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.12.008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.993141"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.05.022"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7060487"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.04.022"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"ref244","year":"2017","journal-title":"OpenFog Reference Architecture for Fog Computing"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-1076-7"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.019"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-015-9356-5"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"ref245","year":"2020","journal-title":"Octeon Fusion-mIntegrated Baseband Processors"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.027"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2014.153"},{"key":"ref108","year":"2019","journal-title":"SDN architecture"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889943"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2866917"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.02.026"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2661061.2661063"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.01.016"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.08.009"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.09.002"},{"key":"ref110","year":"2019","journal-title":"OpenFlow Switch Specification Version 1 1 0"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2018.00028"},{"key":"ref251","year":"2019","journal-title":"European Telecommunications Standards Institute Industry Specifications Group Mobile-Edge Computing&#x2014;MEC Metrics Best Practice and Guidelines"},{"key":"ref254","year":"2019","journal-title":"European Telecommunications Standards Institute PoC 7 Multi-Service MEC Platform for Advanced Service Delivery"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.011"},{"key":"ref252","year":"2019","journal-title":"European Telecommunications Standards Institute Industry Specifications Group MEC Proofs of Concept"},{"key":"ref253","year":"2019","journal-title":"European Telecommunications Standards Institute PoC 2 Edge Video Orchestration and Video Clip Replay"},{"key":"ref257","first-page":"42","article-title":"Microsoft threat modeling tool 2014: Identify & mitigate","volume":"39","author":"mcree","year":"2014","journal-title":"The ISSA J"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2685596"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-375165-2.00003-X"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.031"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155558252-4\/50029-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2863180"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875912"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.055"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02773-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2898113"},{"key":"ref118","year":"2019","journal-title":"European Telecommunications Standards Institute Industry Specifications Group Mobile-Edge Computing&#x2014;Network Functions Virtualisation"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3243929"},{"key":"ref117","year":"2019","journal-title":"Huawei Observation to NFV"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3226644"},{"key":"ref119","first-page":"1","article-title":"Cloudlet- and NFV-based carrier Wi-Fi architecture for a wider range of services","volume":"71","author":"jemaa","year":"2016","journal-title":"Ann Telecommun"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7060484"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.035"},{"key":"ref115","first-page":"1","article-title":"Edge-as-a-service: Towards distributed cloud architectures","author":"varghese","year":"2017","journal-title":"Proc Int Conf Parallel Computing (ParCo)"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.050"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2018.03.004"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3172866"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.11.00A111"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4683982"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.3390\/jsan8010015"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2017.11.023"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.09.025"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875542"},{"key":"ref266","first-page":"356","article-title":"Disrupting SDN via the data plane: A low-rate flow table overflow attack","author":"cao","year":"2017","journal-title":"Proc Int Conf Secur Privacy Commun Syst"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/9739\/9173582\/09099866.pdf?arnumber=9099866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:58:58Z","timestamp":1651078738000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/9099866\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":345,"journal-issue":{"issue":"3"},"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/comst.2020.2997475","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}