Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things

B Ghimire, DB Rawat - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Decentralized paradigm in the field of cybersecurity and machine learning (ML) for the
emerging Internet of Things (IoT) has gained a lot of attention from the government …

Lightweight cryptography in IoT networks: A survey

M Rana, Q Mamun, R Islam - Future Generation Computer Systems, 2022 - Elsevier
With the advent of advanced technology, the IoT has made possible the connection of
numerous devices that can collect vast volumes of data. Hence, the demands of IoT security …

Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

Optimal resource allocation in energy-efficient Internet-of-Things networks with imperfect CSI

JA Ansere, G Han, L Liu, Y Peng… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging networking paradigm that enhances smart device
communications through Internet-enabled systems. Due to massive IoT devices connectivity …

Survey on edge computing security

H Zeyu, X Geming, W Zhaohang… - … Conference on Big Data …, 2020 - ieeexplore.ieee.org
With the advent of the Internet of Everything, emerging application scenarios including
autonomous driving, immersive games based on VR or AR technology, and Industrial …

Perspectives of cybersecurity for ameliorative Industry 4.0 era: A review-based framework

A Haleem, M Javaid, RP Singh, S Rab… - Industrial Robot: the …, 2022 - emerald.com
Purpose Industry 4.0 refers to the interconnection of cyber-physical systems, which connects
the physical and digital worlds by collecting digital data from physical objects/processes …

Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms

F Thabit, O Can, RUZ Wani, MA Qasem… - Concurrency and …, 2023 - Wiley Online Library
Cloud computing (CC) refers to the on‐demand availability of network resources, particularly
data storage and processing power, without requiring special or direct administration by …

The Future Development Direction of Cloud‐Associated Edge‐Computing Security in the Era of 5G as Edge Intelligence

OR Devi, J Webber, A Mehbodniya… - Scientific …, 2022 - Wiley Online Library
By introducing the Internet‐of‐Everything, new usage situations such as self‐directed
movement and vivid competitions constructed upon Virtual Reality or Augmented Reality …

Secure user authentication and key agreement scheme for IoT device access control based smart home communications

S Uppuluri, G Lakshmeeswari - Wireless Networks, 2023 - Springer
The upcoming paradigm in Internet of Things (IoT) based applications is to afford effective
interactional communication strategies between the devices in the smart home system. With …

Energy-efficient resource allocation and data transmission of cell-free Internet of Things

X Zhang, H Qi, X Zhang, L Han - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a huge network consisting of various information-sensing
devices combined with the Internet. The IoT aims to connect all things with the network to …