A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic

WR Bezerra, JE Martina, CB Westphall - Sensors, 2023 - mdpi.com
There are many security challenges in IoT, especially related to the authentication of
restricted devices in long-distance and low-throughput networks. Problems such as …

ODEL: an On-Demand Edge-Learning framework exploiting Flying Ad-hoc NETworks (FANETs)

GM Cappello, G Colajanni, P Daniele… - Proceedings of the …, 2023 - dl.acm.org
1 The evolution of smart objects towards the Internet of Softwarized Things (IoST) in 6G
networks will provide the society with dynamic and programmable systems of interconnected …