Fig. 5From: Security-Aware computation offloading for Mobile edge computing-Enabled smart cityComparison of energy consumptionBack to article page