Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Figure 1

The architecture of mobile-edge security service chaining.