An intelligent trust cloud management method for secure clustering in 5G enabled internet of medical things

L Yang, K Yu, SX Yang, C Chakraborty… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
5G edge computing enabled Internet of Medical Things (IoMT) is an efficient technology to
provide decentralized medical services while device-to-device (D2D) communication is a …

Generative adversarial learning for intelligent trust management in 6G wireless networks

L Yang, Y Li, SX Yang, Y Lu, T Guo, K Yu - IEEE Network, 2022 - ieeexplore.ieee.org
The emerging sixth generation (6G) is the integration of heterogeneous wireless networks,
which can seamlessly support anywhere and anytime networking. But high quality of trust …

[HTML][HTML] IoT trust and reputation: a survey and taxonomy

M Aaqib, A Ali, L Chen, O Nibouche - Journal of Cloud Computing, 2023 - Springer
IoT is one of the fastest-growing technologies and it is estimated that more than a billion
devices would be utilised across the globe by the end of 2030. To maximise the capability of …

A deep learning approach for intrusion detection in Internet of Things using focal loss function

AS Dina, AB Siddique, D Manivannan - Internet of Things, 2023 - Elsevier
Abstract Internet of Things (IoT) is likely to revolutionize healthcare, energy, education,
transportation, manufacturing, military, agriculture, and other industries. However, for the …

AI-enabled Trust in Distributed Networks

Z Li, W Fang, C Zhu, Z Gao, W Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
Cybersecurity, as a crucial aspect of the information society, requires significant attention.
Fortunately, the concept of trust, originating from the field of sociology, has been under …

Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model

Y Jia, Z Gu, L Du, Y Long, Y Wang, J Li… - Knowledge-Based …, 2023 - Elsevier
Smart cities have attracted a lot of attention from interdisciplinary research, and plenty of
artificial intelligence based solutions have been proposed. However, cyber security has …

Etd: An efficient time delay attack detection framework for uav networks

W Zhai, L Liu, Y Ding, S Sun… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In recent years, Unmanned Aerial Vehicle (UAV) networks are widely used in both military
and civilian scenarios. However, due to the distributed nature, they are also vulnerable to …

An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach

T Khan, K Singh, M Shariq, K Ahmad, KS Savita… - Computer …, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are often used for critical applications where
trust and security are of paramount importance. Trust evaluation is one of the key …

[HTML][HTML] A trust-based model for secure routing against RPL attacks in internet of things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …

[HTML][HTML] Protocol-specific and sensor network-inherited attack detection in IoT using machine learning

F Zahra, NZ Jhanjhi, NA Khan, SN Brohi, M Masud… - Applied Sciences, 2022 - mdpi.com
For networks with limited resources, such as IoT-enabled smart homes, smart industrial
equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy …