Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Table 1

Service state list.

Flow IDMatching infoService state

1(src_ip1, dst_ip1, protocol1, src_port1, dst_port1)STATE1
2(src_ip2, dst_ip2, protocol2, src_port2, dst_port2)STATE2