L Duan, W Xu, W Ni, W Wang - Journal of Systems Architecture, 2023 - Elsevier
… communication and access authorization verification. Second, a blockchain network can address single-point failures resulting from the downtime of a centralized server. The exit of any …
Y Liang, HV Poor, L Ying - … Information Forensics and Security, 2011 - ieeexplore.ieee.org
… This motivates a joint design of rate control at the transport layer, rate scheduling at the medium access control layer, and power control and secure coding at the physical layer. Without …
… Assuming security at lower level, the second key component is the format of communications. We propose here a major innovation: the typical exchange of messages in access control …
… security services for WSNs is access control; perhaps, this is why access control for WSNs is one of the security … We believe that part of this is because it is hard to formulate an access …
Z Yan, P Zhang, AV Vasilakos - Security and communication …, 2016 - Wiley Online Library
… analyze that the framework can support and satisfy all security … framework and discuss the advantages of our framework in … access control can be configured in the proposed security …
… We consider an adversary with the following capabilities: (i) it has full access to the network communications, and (ii) it can listen, capture, store, modify, replay, delay and drop …
… in this section to showcase the latest works in access control management, privacy, and security in IoT. … Finally, both the devices establish a securecommunication using a session key. …
MS Haque, MU Chowdhury - Security and Privacy in Communication …, 2018 - Springer
… same access rights. In hierarchical network systems access to information brings a new level of security to … The framework also provides a securecommunication mechanism in terms of: …
… can easily access edge nodes to train local models. The proposed framework creates a … • We design a blockchain-based FL framework to achieve secure and reliable FL as well as …