Security and privacy on 6g network edge: A survey

B Mao, J Liu, Y Wu, N Kato - IEEE communications surveys & …, 2023 - ieeexplore.ieee.org
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …

A survey on machine learning-based misbehavior detection systems for 5g and beyond vehicular networks

A Boualouache, T Engel - IEEE Communications Surveys & …, 2023 - ieeexplore.ieee.org
Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly
accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G …

A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

A Hybrid Mutual Authentication Approach for Artificial Intelligence of Medical Things

MA Jan, W Zhang, A Akbar, H Song… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Artificial Intelligence of Medical Things (AIoMT) is a hybrid of the Internet of Medical Things
(IoMT) and artificial intelligence to materialize the acquisition of real-time data via the smart …

Reconfigurable UAV-aided 3D sustainable surveillance in classified air-spaces

M Kim, J Ben-Othman, H Kim - Vehicular Communications, 2024 - Elsevier
The recent advancement of smart UAVs (Unmanned Aerial Vehicles) allows its applicability
to wide-range fields covering time-critical reports, emergent item delivery, virtual emotion …

AI-driven EEC for healthcare IoT: Security challenges and future research directions

M Adil, MK Khan, A Farouk, MA Jan… - IEEE Consumer …, 2022 - ieeexplore.ieee.org
Emerging edge computing (EEC) has been introduced as an innovative paradigm for the
healthcare applications of the Internet of Things (IoT) that aims to distribute the network …

Developing a Testbed with P4 to Generate Datasets for the Analysis of 5G-MEC Security

OA Fernando, H Xiao, J Spring - 2022 IEEE Wireless …, 2022 - ieeexplore.ieee.org
Service providers have now entered the implementation phase for 5G mobile
telecommunication networks. With this, the concept of Multi-access Edge Computing (MEC) …

On cooperative federated defense to secure multi-access edge computing

H Sedjelmaci, N Ansari - IEEE Consumer Electronics Magazine, 2022 - ieeexplore.ieee.org
The research of cyber security for multiaccess edge computing (MEC) has not yet received
great interest. Specifically, the attack detection issue is considered as a major concern since …

An intelligent trusted edge data production method for distributed Internet of things

J Zhang, Z Ning, H Cao - Neural Computing and Applications, 2023 - Springer
The rapid development of distributed edge intelligence in the Internet of things (IoT)
scenarios has resulted in massive edge devices continuously generating data, leading to …

Semantic-based Federated Defense for Distributed Malicious Attacks

F Ullah, D Cacciagrano, CM Chen… - IEEE Consumer …, 2024 - ieeexplore.ieee.org
Consumer electronics, particularly Android, has become the leading mobile ecosystem due
to its accessibility and adaptability. However, the constant connectivity of Android apps …