Post-quantum distributed ledger technology: a systematic survey

NK Parida, C Jatoth, VD Reddy, MM Hussain… - Scientific Reports, 2023 - nature.com
Blockchain technology finds widespread application across various fields due to its key
features such as immutability, reduced costs, decentralization, and transparency. The …

Security of open radio access networks

D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt… - Computers & …, 2022 - Elsevier
Abstract The Open Radio Access Network (O-RAN) is a promising radio access network
(RAN) architecture aimed at reshaping the RAN industry toward an open, adaptive, and …

Flying through the secure fog: a complete study on UAV‐fog in heterogeneous networks

A Gupta, SK Gupta - International journal of communication …, 2022 - Wiley Online Library
A drone or unmanned aerial vehicles (UAVs) is becoming a trending area for researchers
worldwide. UAV's contribution is increasing in day‐to‐day life, whether it is in a military zone …

Evaluating the security of open radio access networks

D Mimran, R Bitton, Y Kfir, E Klevansky, O Brodt… - arXiv preprint arXiv …, 2022 - arxiv.org
The Open Radio Access Network (O-RAN) is a promising RAN architecture, aimed at
reshaping the RAN industry toward an open, adaptive, and intelligent RAN. In this paper, we …

A blockchain-based framework for automatic SLA management in fog computing environments

SK Battula, S Garg, R Naha, MB Amin, B Kang… - The Journal of …, 2022 - Springer
Fog computing has become a prominent paradigm in providing shared resources to serve
different applications near the edge. Similar to other computing paradigms such as cloud …

Unboxing fog security: a review of fog security and authentication mechanisms

N Kaliya, D Pawar - Computing, 2023 - Springer
Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a
strong need to bring connectivity to a very accessible level. To enable the execution of real …

Novel security models for IoT–Fog–cloud architectures in a real-world environment

MA Aleisa, A Abuhussein, FS Alsubaei, FT Sheldon - Applied Sciences, 2022 - mdpi.com
With the rise of the Internet of Things (IoT), there is a demand for computation at network
edges because of the limited processing capacity of IoT devices. Fog computing is a middle …

A Blockchain assisted fog computing for secure distributed storage system for IoT Applications

HK Apat, B Sahoo - Journal of Industrial Information Integration, 2024 - Elsevier
With the rapid development of Internet of Things (IoT) devices, the volume of data generate
across various fields, such as smart healthcare, smart home, smart transportation has …

Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm

R Agrawal, S Singhal, A Sharma - Cluster Computing, 2024 - Springer
Blockchain technology ensures the integrity and transparency of data access control by
keeping an unchangeable record of all transactions. Fog computing increases efficiency by …

Fog computing security assessment for device authentication in the internet of things

S Al Harbi, T Halabi, M Bellaiche - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
The Fog is an emergent computing architecture that will support the mobility and geographic
distribution of Internet of Things (IoT) nodes and deliver context-aware applications with low …