Post-quantum distributed ledger technology: a systematic survey
Blockchain technology finds widespread application across various fields due to its key
features such as immutability, reduced costs, decentralization, and transparency. The …
features such as immutability, reduced costs, decentralization, and transparency. The …
Security of open radio access networks
Abstract The Open Radio Access Network (O-RAN) is a promising radio access network
(RAN) architecture aimed at reshaping the RAN industry toward an open, adaptive, and …
(RAN) architecture aimed at reshaping the RAN industry toward an open, adaptive, and …
Flying through the secure fog: a complete study on UAV‐fog in heterogeneous networks
A drone or unmanned aerial vehicles (UAVs) is becoming a trending area for researchers
worldwide. UAV's contribution is increasing in day‐to‐day life, whether it is in a military zone …
worldwide. UAV's contribution is increasing in day‐to‐day life, whether it is in a military zone …
Evaluating the security of open radio access networks
The Open Radio Access Network (O-RAN) is a promising RAN architecture, aimed at
reshaping the RAN industry toward an open, adaptive, and intelligent RAN. In this paper, we …
reshaping the RAN industry toward an open, adaptive, and intelligent RAN. In this paper, we …
A blockchain-based framework for automatic SLA management in fog computing environments
Fog computing has become a prominent paradigm in providing shared resources to serve
different applications near the edge. Similar to other computing paradigms such as cloud …
different applications near the edge. Similar to other computing paradigms such as cloud …
Unboxing fog security: a review of fog security and authentication mechanisms
N Kaliya, D Pawar - Computing, 2023 - Springer
Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a
strong need to bring connectivity to a very accessible level. To enable the execution of real …
strong need to bring connectivity to a very accessible level. To enable the execution of real …
Novel security models for IoT–Fog–cloud architectures in a real-world environment
With the rise of the Internet of Things (IoT), there is a demand for computation at network
edges because of the limited processing capacity of IoT devices. Fog computing is a middle …
edges because of the limited processing capacity of IoT devices. Fog computing is a middle …
A Blockchain assisted fog computing for secure distributed storage system for IoT Applications
HK Apat, B Sahoo - Journal of Industrial Information Integration, 2024 - Elsevier
With the rapid development of Internet of Things (IoT) devices, the volume of data generate
across various fields, such as smart healthcare, smart home, smart transportation has …
across various fields, such as smart healthcare, smart home, smart transportation has …
Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm
R Agrawal, S Singhal, A Sharma - Cluster Computing, 2024 - Springer
Blockchain technology ensures the integrity and transparency of data access control by
keeping an unchangeable record of all transactions. Fog computing increases efficiency by …
keeping an unchangeable record of all transactions. Fog computing increases efficiency by …
Fog computing security assessment for device authentication in the internet of things
S Al Harbi, T Halabi, M Bellaiche - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
The Fog is an emergent computing architecture that will support the mobility and geographic
distribution of Internet of Things (IoT) nodes and deliver context-aware applications with low …
distribution of Internet of Things (IoT) nodes and deliver context-aware applications with low …