Edge-computing-enabled smart cities: A comprehensive survey

LU Khan, I Yaqoob, NH Tran… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Recent years have disclosed a remarkable proliferation of compute-intensive applications in
smart cities. Such applications continuously generate enormous amounts of data which …

Vehicular edge computing: Architecture, resource management, security, and challenges

R Meneguette, R De Grande, J Ueyama… - ACM Computing …, 2021 - dl.acm.org
Vehicular Edge Computing (VEC), based on the Edge Computing motivation and
fundamentals, is a promising technology supporting Intelligent Transport Systems services …

Security concepts in emerging 6G communication: Threats, countermeasures, authentication techniques and research directions

SHA Kazmi, R Hassan, F Qamar, K Nisar, AAA Ibrahim - Symmetry, 2023 - mdpi.com
Challenges faced in network security have significantly steered the deployment timeline of
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …

Greener, energy-efficient and sustainable networks: State-of-the-art and new trends

J Lorincz, A Capone, J Wu - Sensors, 2019 - mdpi.com
Although information and communications technologies (ICTs) have the potential of
enabling powerful social, economic and environmental benefits, ICT systems give a non …

The security and privacy of mobile edge computing: An artificial intelligence perspective

C Wang, Z Yuan, P Zhou, Z Xu, R Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …

Using machine learning for dynamic authentication in telehealth: A tutorial

M Hazratifard, F Gebali, M Mamun - Sensors, 2022 - mdpi.com
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …

Proof of evaluation-based energy and delay aware computation offloading for digital twin edge network

E Bozkaya, M Erel-Özçevik, T Bilen, Y Özçevik - Ad Hoc Networks, 2023 - Elsevier
The increasing availability of Internet of Things (IoT) applications has led to the development
of new technologies. Specifically, the deployment of edge servers close to IoT devices has …

A P2P network based edge computing smart grid model for efficient resources coordination

WJ Hou, Y Jiang, W Lei, A Xu, H Wen… - Peer-to-Peer Networking …, 2020 - Springer
Smart grid (SG) is a dynamic distributed grid that the production, storage and users of
electricity will work together under specific control, in which an important challenge is how to …

A lightweight cross-domain authentication protocol for trusted access to industrial internet

T Zhang, Z Zhang, K Zhao, BB Gupta… - International Journal on …, 2023 - igi-global.com
This paper proposes a hierarchical framework for industrial Internet device authentication
and trusted access as well as a mechanism for industrial security state perception, and …

A Lightweight, Secure Authentication Model for the Smart Agricultural Internet of Things

F Pan, B Zhang, X Zhao, L Shuai, P Chen, X Duan - Agronomy, 2023 - mdpi.com
The advancement of smart agriculture, with information technology serving as a pivotal
enabling factor, plays a crucial role in achieving food security, optimizing production …