BIM security: A critical review and recommendations using encryption strategy and blockchain

M Das, X Tao, JCP Cheng - Automation in construction, 2021 - Elsevier
Security of information in collaborative BIM platforms is crucial particularly for critical projects
such as that of government buildings, prisons, and power plants. Inappropriate distribution …

Cloud-edge orchestration for the Internet of Things: Architecture and AI-powered data processing

Y Wu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has been deeply penetrated into a wide range of important and
critical sectors, including smart city, water, transportation, manufacturing, and smart factory …

Intelligent fog computing surveillance system for crime and vulnerability identification and tracing

R Rawat, RK Chakrawarti, P Vyas… - International Journal of …, 2023 - igi-global.com
IoT devices generate enormous amounts of data, which deep learning algorithms can learn
from more effectively than shallow learning algorithms. The approach for threat detection …

Lightweight cryptographic protocols for IoT-constrained devices: A survey

MN Khan, A Rao, S Camtepe - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …

Elliptic curve lightweight cryptography: A survey

CA Lara-Nino, A Diaz-Perez… - IEEE Access, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …

Rooted learning model at fog computing analysis for crime incident surveillance

R Rawat, V Mahor, J Díaz-Álvarez… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
Cyber Loopholes in smart devices' applications invited intruders to conduct malicious
activities. The growing quantity and diversity of smart devices has posed significant cyber …

[PDF][PDF] Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey.

FA Alhaidari, EJ Alqahtani - J. Commun., 2020 - jocm.us
Nowadays, cloud computing and IoT devices are widely used and involved in our life.
However, the current cloud computing paradigm still have some limitation mainly related to …

Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions

AA Alfa, JK Alhassan, OM Olaniyi, M Olalere - Journal of Reliable …, 2021 - Springer
The growth of Internet of Things (IoT) took center stage universally due their capability to
advance the course of human lives. Consequent upon this, several challenges were thrown …

Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment

OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central
processing of the vast amount of IoT data. Although fog computing has the advantages of …

End-to-end image classification and compression with variational autoencoders

LD Chamain, S Qi, Z Ding - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
The past decade has witnessed the rising dominance of deep learning and artificial
intelligence in a wide range of applications. In particular, the ocean of wireless smartphones …