Fast, reliable, and secure drone communication: A comprehensive survey

V Hassija, V Chamola, A Agrawal… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Drone security is currently a major topic of discussion among researchers and industrialists.
Although there are multiple applications of drones, if the security challenges are not …

Smart home security: challenges, issues and solutions at different IoT layers

H Touqeer, S Zaman, R Amin, M Hussain… - The Journal of …, 2021 - Springer
Abstract The Internet of Things is a rapidly evolving technology in which interconnected
computing devices and sensors share data over the network to decipher different problems …

An empirical study on system level aspects of Internet of Things (IoT)

SN Swamy, SR Kota - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an integration of the Sensor, Embedded, Computing, and
Communication technologies. The purpose of the IoT is to provide seamless services to …

Intrusion detection based on autoencoder and isolation forest in fog computing

K Sadaf, J Sultana - IEEE Access, 2020 - ieeexplore.ieee.org
Fog Computing has emerged as an extension to cloud computing by providing an efficient
infrastructure to support IoT. Fog computing acting as a mediator provides local processing …

Security challenges for drone communications: Possible threats, attacks and countermeasures

M Krichen, WYH Adoni, A Mihoub… - … Conference of Smart …, 2022 - ieeexplore.ieee.org
The current development of drones and the prospects in this field have positive
repercussions, in particular for employment and industrial development, with the key to …

Machine-learning-assisted security and privacy provisioning for edge computing: A survey

S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …

Optimized machine learning-based intrusion detection system for fog and edge computing environment

OA Alzubi, JA Alzubi, M Alazab, A Alrabea, A Awajan… - Electronics, 2022 - mdpi.com
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …

An overview of fog computing and edge computing security and privacy issues

AM Alwakeel - Sensors, 2021 - mdpi.com
With the advancement of different technologies such as 5G networks and IoT the use of
different cloud computing technologies became essential. Cloud computing allowed …

IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques

S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac - Electronics, 2021 - mdpi.com
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …

On the control of microgrids against cyber-attacks: A review of methods and applications

A Solat, GB Gharehpetian, MS Naderi… - Applied Energy, 2024 - Elsevier
Nowadays, the use of renewable generations, energy storage systems (ESSs) and
microgrids (MGs) has been developed due to better controllability of distributed energy …