A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022 - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising

P Manoharan, R Walia, C Iwendi, TA Ahanger… - Expert …, 2023 - Wiley Online Library
Abstract Machine learning are vulnerable to the threats. The Intruders can utilize the
malicious nature of the nodes to attack the training dataset to worsen the process and …

Blockchain based solutions to secure IoT: Background, integration trends and a way forward

S Saxena, B Bhushan, MA Ahad - Journal of Network and Computer …, 2021 - Elsevier
The lack of intrinsic security technologies in the current Internet of Things (IoT) systems
brings forth numerous security vulnerabilities and privacy risks. To this end, a distributed and …

Privacy-preserved data sharing towards multiple parties in industrial IoTs

X Zheng, Z Cai - IEEE journal on selected areas in …, 2020 - ieeexplore.ieee.org
The effective physical data sharing has been facilitating the functionality of Industrial IoTs,
which is believed to be one primary basis for Industry 4.0. These physical data, while …

Internet of things (IoT) security dataset evolution: Challenges and future directions

B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P Xiong… - Internet of Things, 2023 - Elsevier
The evolution of mobile technologies has introduced smarter and more connected objects
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …

Blockchain-empowered space-air-ground integrated networks: Opportunities, challenges, and solutions

Y Wang, Z Su, J Ni, N Zhang… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The terrestrial networks face the challenges of severe cost inefficiency and low feasibility to
provide seamless services anytime and anywhere, especially in the extreme or hotspot …

A survey of IoT security based on a layered architecture of sensing and data analysis

H Mrabet, S Belguith, A Alhomoud, A Jemai - Sensors, 2020 - mdpi.com
The Internet of Things (IoT) is leading today's digital transformation. Relying on a
combination of technologies, protocols, and devices such as wireless sensors and newly …

The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial

MA Ferrag, L Shu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
This article presents research challenges and a tutorial on performance evaluation of
blockchain-based security and privacy systems for the Internet of Things (IoT). We start by …

A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones

A Heidari, NJ Navimipour… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The Internet of Drones (IoD) is built on the Internet of Things (IoT) by replacing “Things” with
“Drones” while retaining incomparable features. Because of its vital applications, IoD …

Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions

B Bhushan, C Sahoo, P Sinha, A Khamparia - Wireless Networks, 2021 - Springer
Abstract The Internet of Things (IoTs) enables coupling of digital and physical objects using
worthy communication technologies and introduces a future vision where computing …