Cross-layer design for mission-critical IoT in mobile edge computing systems
In this paper, we establish a cross-layer framework for optimizing user association, packet
offloading rates, and bandwidth allocation for mission-critical Internet-of-Things (MC-IoT) …
offloading rates, and bandwidth allocation for mission-critical Internet-of-Things (MC-IoT) …
On the reliability of industrial internet of things from systematic perspectives: Evaluation approaches, challenges, and open issues
In the light of Industry 4.0 revolution, the Industrial Internet of Things (IIoT) allows digitalizing
manufacturing processes and increasing the digital connectivity and automation in the smart …
manufacturing processes and increasing the digital connectivity and automation in the smart …
STEC-IoT: A security tactic by virtualizing edge computing on IoT
To a large extent, the deployment of edge computing (EC) can reduce the burden of the
explosive growth of the Internet of Things. As a powerful hub between the Internet of Things …
explosive growth of the Internet of Things. As a powerful hub between the Internet of Things …
Reliability analysis in cyber-physical system using deep learning for smart cities industrial IoT network node
The reliability, availability, security, and survivability analysis of any IoT (Internet-of-things)
device is important because it provides all necessary information about the IoT device …
device is important because it provides all necessary information about the IoT device …
A multi-layer security model for internet of things
X Yang, Z Li, Z Geng, H Zhang - … , IOT 2012, Changsha, China, August 17 …, 2012 - Springer
Since the open architecture at the perception layer, the IoT not only faces the traditional
security risks in TCP/IP network, but also faces the new emerging risks. In this paper …
security risks in TCP/IP network, but also faces the new emerging risks. In this paper …
Reliability and robust resource allocation for Cache-enabled HetNets: QoS-aware mobile edge computing
Mobile edge computing is a key feature of next-generation mobile networks aimed at
providing a variety of services for different applications by performing related processing …
providing a variety of services for different applications by performing related processing …
[PDF][PDF] Security of internet of things for a reliable internet of services
The Internet of Things (IoT) consists of resource-constrained devices (eg, sensors and
actuators) which form low power and lossy networks to connect to the Internet. With billions …
actuators) which form low power and lossy networks to connect to the Internet. With billions …
Quantify resilience enhancement of UTS through exploiting connected community and internet of everything emerging technologies
This work aims at investigating and quantifying the Urban Transport System (UTS) resilience
enhancement enabled by the adoption of emerging technology such as Internet of …
enhancement enabled by the adoption of emerging technology such as Internet of …
A comprehensive study of security of internet-of-things
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …
transformative approach for providing numerous services. Compact smart devices constitute …
Security analysis of CPS systems under different swapping strategies in IoT environments
In this paper, we give attention to the robustness of the Cyber-Physical System, which
consists of interdependent physical resources and computational resources. Numerous …
consists of interdependent physical resources and computational resources. Numerous …