Data‐centric approaches in the internet of vehicles: a systematic review on techniques, open issues, and future directions

Z Partovi, M Zarei, AM Rahmani - International Journal of …, 2023 - Wiley Online Library
Summary The Internet of Vehicles (IoV) is an emerging network of connected vehicles as a
branch of dynamic objects in the Internet of Things (IoT) ecosystem. With the rapid …

Cybersecurity of Satellite Communications Systems: A Comprehensive Survey of the Space, Ground, and Links Segments

S Salim, N Moustafa, M Reisslein - … Communications Surveys & …, 2024 - ieeexplore.ieee.org
Satellite communications (Satcoms) systems have become an integral part of modern
society, providing critical infrastructure for a wide range of applications. However, as the …

ECC-based authenticated key agreement protocol for industrial control system

Y Chen, F Yin, S Hu, L Sun, Y Li, B Xing… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Nowadays, Industrial Internet of Things (IIoT) technology has made a great progress and the
industrial control systems (ICSs) have been used extensively, which has brought more and …

Secure advance metering infrastructure protocol for smart grid power system enabled by the Internet of Things

PD Halle, S Shiyamala - Microprocessors and Microsystems, 2022 - Elsevier
Abstract The incorporation of Advanced Metering Infrastructure (AMI) into Smart Grid
applications has piqued the interest of Internet of Things (IoT) experts, who have aided smart …

Control of two satellites relative motion over the packet erasure communication channel with limited transmission rate based on adaptive coder

B Andrievsky, AL Fradkov, EV Kudryashova - Electronics, 2020 - mdpi.com
The paper deals with the navigation data exchange between two satellites moving in a
swarm. It is focused on the reduction of the inter-satellite demanded communication channel …

PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment

S Pachala, C Rupa, L Sumalatha - Automated Software Engineering, 2022 - Springer
The user authenticity with proper identification is a significant challenge where the defects
on the authenticity scheme can directly influence the sensitive data over the multi-cloud data …

Asynchronous federated learning for intrusion detection in vehicular cyber-physical systems

S Safavat, DB Rawat - IEEE INFOCOM 2023-IEEE Conference …, 2023 - ieeexplore.ieee.org
In recent years, development in IoV technologies has reached more promising progress. IoV
technology helps vehicles interact and exchange information between public networks and …

PkT-SIN: A Secure Communication Protocol for Space Information Networks with Periodic k-Time Anonymous Authentication

Y Yang, W Xue, J Sun, G Yang, Y Li… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Space Information Network (SIN) enables universal Internet connectivity for any object, even
in remote and extreme environments where deploying a cellular network is difficult. Access …

Authentication for Satellite Internet Resource Slicing Access Based on Trust Measurement

C Guo, G Hu, C Pan, F Li, H Xu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The introduction of satellite Internet resource-slicing technology can efficiently allocate
satellite network resources and meet the personalized needs of different users. This article …

IoT security review: a case study of IIoT, IoV, and smart home

J Ma, X Shangguan, Y Zhang - Wireless Communications and …, 2022 - Wiley Online Library
The Internet of Things (IoT) acts as a tremendous network that is constructed by fusing
diverse sensors. IoT can achieve the interconnection of individuals, things, and machines at …