Edge-computing-enabled smart cities: A comprehensive survey
Recent years have disclosed a remarkable proliferation of compute-intensive applications in
smart cities. Such applications continuously generate enormous amounts of data which …
smart cities. Such applications continuously generate enormous amounts of data which …
Vehicular edge computing: Architecture, resource management, security, and challenges
Vehicular Edge Computing (VEC), based on the Edge Computing motivation and
fundamentals, is a promising technology supporting Intelligent Transport Systems services …
fundamentals, is a promising technology supporting Intelligent Transport Systems services …
Security concepts in emerging 6G communication: Threats, countermeasures, authentication techniques and research directions
Challenges faced in network security have significantly steered the deployment timeline of
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …
Greener, energy-efficient and sustainable networks: State-of-the-art and new trends
Although information and communications technologies (ICTs) have the potential of
enabling powerful social, economic and environmental benefits, ICT systems give a non …
enabling powerful social, economic and environmental benefits, ICT systems give a non …
The security and privacy of mobile edge computing: An artificial intelligence perspective
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …
and information technology (IT) services to be delivered at the network's edge. By shifting …
Using machine learning for dynamic authentication in telehealth: A tutorial
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …
remote locations and at their homes via smart devices and 5G systems. Protecting the …
Proof of evaluation-based energy and delay aware computation offloading for digital twin edge network
The increasing availability of Internet of Things (IoT) applications has led to the development
of new technologies. Specifically, the deployment of edge servers close to IoT devices has …
of new technologies. Specifically, the deployment of edge servers close to IoT devices has …
A P2P network based edge computing smart grid model for efficient resources coordination
WJ Hou, Y Jiang, W Lei, A Xu, H Wen… - Peer-to-Peer Networking …, 2020 - Springer
Smart grid (SG) is a dynamic distributed grid that the production, storage and users of
electricity will work together under specific control, in which an important challenge is how to …
electricity will work together under specific control, in which an important challenge is how to …
A lightweight cross-domain authentication protocol for trusted access to industrial internet
This paper proposes a hierarchical framework for industrial Internet device authentication
and trusted access as well as a mechanism for industrial security state perception, and …
and trusted access as well as a mechanism for industrial security state perception, and …
A Lightweight, Secure Authentication Model for the Smart Agricultural Internet of Things
F Pan, B Zhang, X Zhao, L Shuai, P Chen, X Duan - Agronomy, 2023 - mdpi.com
The advancement of smart agriculture, with information technology serving as a pivotal
enabling factor, plays a crucial role in achieving food security, optimizing production …
enabling factor, plays a crucial role in achieving food security, optimizing production …