Fig. 6From: Fog computing network security based on resources managementOperating architectureBack to article page