Research Article

[Retracted] Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment

Figure 2

Schematic diagram of the fog computing structure.