Fig.4From: Fog computing network security based on resources managementFormat of exchanged messageBack to article page