[HTML][HTML] Analysis of the implementation of urban computing in smart cities: A framework for the transformation of Saudi cities

HM Alshuwaikhat, YA Aina, L Binsaedan - Heliyon, 2022 - cell.com
Smart city development is gaining widespread acceptance as a means of mitigating urban
development problems. However, the implementation of smart cities faces challenges …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things

X Li, J Niu, MZA Bhuiyan, F Wu… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

X Li, J Niu, S Kumari, F Wu, AK Sangaiah… - Journal of Network and …, 2018 - Elsevier
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

J Shen, Z Gui, S Ji, J Shen, H Tan, Y Tang - Journal of Network and …, 2018 - Elsevier
With the development of cloud computing and wireless body area networks (WBANs),
wearable equipments are able to become new intelligent terminals to provide services for …

Anonymous and traceable group data sharing in cloud computing

J Shen, T Zhou, X Chen, J Li… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Group data sharing in cloud environments has become a hot topic in recent decades. With
the popularity of cloud computing, how to achieve secure and efficient data sharing in cloud …

An efficient centroid-based routing protocol for energy management in WSN-assisted IoT

J Shen, A Wang, C Wang, PCK Hung, CF Lai - Ieee Access, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) distribute hundreds to thousands of inexpensive
microsensor nodes in their regions, and these nodes are important parts of Internet of Things …

Dynamic resource allocation for load balancing in fog environment

X Xu, S Fu, Q Cai, W Tian, W Liu, W Dou… - Wireless …, 2018 - Wiley Online Library
Fog computing is emerging as a powerful and popular computing paradigm to perform IoT
(Internet of Things) applications, which is an extension to the cloud computing paradigm to …

A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment

L Qi, X Zhang, W Dou, C Hu, C Yang, J Chen - Future Generation …, 2018 - Elsevier
With the increasing popularity of service computing paradigm, tremendous resources or
services are emerging rapidly on the Web, imposing heavy burdens on the service selection …

Privacy-preserving quality prediction for edge-based IoT services

Y Zhang, J Pan, L Qi, Q He - Future Generation Computer Systems, 2021 - Elsevier
Abstract Quality of Service (QoS) prediction and privacy preservation are two key challenges
in service recommendation. Nevertheless, the existing QoS prediction methods cannot be …