Cross-layer design for mission-critical IoT in mobile edge computing systems

C She, Y Duan, G Zhao, TQS Quek… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In this paper, we establish a cross-layer framework for optimizing user association, packet
offloading rates, and bandwidth allocation for mission-critical Internet-of-Things (MC-IoT) …

On the reliability of industrial internet of things from systematic perspectives: Evaluation approaches, challenges, and open issues

DS Kim, TD Hoa, HT Thien - IETE Technical Review, 2022 - Taylor & Francis
In the light of Industry 4.0 revolution, the Industrial Internet of Things (IIoT) allows digitalizing
manufacturing processes and increasing the digital connectivity and automation in the smart …

STEC-IoT: A security tactic by virtualizing edge computing on IoT

P Zhang, C Jiang, X Pang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
To a large extent, the deployment of edge computing (EC) can reduce the burden of the
explosive growth of the Internet of Things. As a powerful hub between the Internet of Things …

Reliability analysis in cyber-physical system using deep learning for smart cities industrial IoT network node

AS Rajawat, P Bedi, SB Goyal, RN Shaw… - AI and IoT for Smart City …, 2022 - Springer
The reliability, availability, security, and survivability analysis of any IoT (Internet-of-things)
device is important because it provides all necessary information about the IoT device …

A multi-layer security model for internet of things

X Yang, Z Li, Z Geng, H Zhang - … , IOT 2012, Changsha, China, August 17 …, 2012 - Springer
Since the open architecture at the perception layer, the IoT not only faces the traditional
security risks in TCP/IP network, but also faces the new emerging risks. In this paper …

Reliability and robust resource allocation for Cache-enabled HetNets: QoS-aware mobile edge computing

X Li, X Lan, A Mirzaei, MJA Bonab - Reliability Engineering & System Safety, 2022 - Elsevier
Mobile edge computing is a key feature of next-generation mobile networks aimed at
providing a variety of services for different applications by performing related processing …

[PDF][PDF] Security of internet of things for a reliable internet of services

A Arıs, SF Oktug, T Voigt - 2018 - library.oapen.org
The Internet of Things (IoT) consists of resource-constrained devices (eg, sensors and
actuators) which form low power and lossy networks to connect to the Internet. With billions …

Quantify resilience enhancement of UTS through exploiting connected community and internet of everything emerging technologies

E Bellini, P Ceravolo, P Nesi - ACM Transactions on Internet Technology …, 2017 - dl.acm.org
This work aims at investigating and quantifying the Urban Transport System (UTS) resilience
enhancement enabled by the adoption of emerging technology such as Internet of …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

Security analysis of CPS systems under different swapping strategies in IoT environments

H Peng, C Liu, D Zhao, H Ye, Z Fang, W Wang - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we give attention to the robustness of the Cyber-Physical System, which
consists of interdependent physical resources and computational resources. Numerous …