Fig. 7From: Fog computing network security based on resources managementSimulation architectureBack to article page