Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

[HTML][HTML] Open RAN security: Challenges and opportunities

M Liyanage, A Braeken, S Shahabuddin… - Journal of Network and …, 2023 - Elsevier
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …

[HTML][HTML] A survey on security in internet of things with a focus on the impact of emerging technologies

P Williams, IK Dutta, H Daoud, M Bayoumi - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) have opened the door to a world of unlimited possibilities for
implementations in varied sectors in society, but it also has many challenges. One of those …

A review of security standards and frameworks for IoT-based smart environments

NM Karie, NM Sahri, W Yang, C Valli… - IEEE Access, 2021 - ieeexplore.ieee.org
Assessing the security of IoT-based smart environments such as smart homes and smart
cities is becoming fundamentally essential to implementing the correct control measures and …

[HTML][HTML] Digitalization in omnichannel healthcare supply chain businesses: The role of smart wearable devices

V Chang, QA Xu, K Hall, YA Wang, MM Kamal - Journal of Business …, 2023 - Elsevier
The advancement in technology has fostered the prevalence of the Internet of Things (IoT),
which enhances healthcare business quality, offers a seamless customer experience, and …

Dependable intrusion detection system for IoT: A deep transfer learning based approach

ST Mehedi, A Anwar, Z Rahman… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Security concerns for Internet of Things (IoT) applications have been alarming because of
their widespread use in different enterprise systems. The potential threats to these …

[HTML][HTML] Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

Toward design of an intelligent cyber attack detection system using hybrid feature reduced approach for iot networks

P Kumar, GP Gupta, R Tripathi - Arabian Journal for Science and …, 2021 - Springer
With simple connectivity and fast-growing demand of smart devices and networks, IoT has
become more prone to cyber attacks. In order to detect and prevent cyber attacks in IoT …

[HTML][HTML] IoT-based solutions to monitor water level, leakage, and motor control for smart water tanks

F Jan, N Min-Allah, S Saeed, SZ Iqbal, R Ahmed - Water, 2022 - mdpi.com
Today, a large portion of the human population around the globe has no access to
freshwater for drinking, cooking, and other domestic applications. Water resources in …

A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …