Internet of things and cognitive radio: Motivations and challenges

B Benmammar - … Journal of Organizational and Collective Intelligence …, 2021 - igi-global.com
Internet of things (IoT) is a worldwide network of interconnected objects. However, the things-
oriented, internet-oriented, semantic-oriented, and tactile-oriented versions of IoT are …

Sieve: A middleware approach to scalable access control for database management systems

P Pappachan, R Yus, S Mehrotra… - arXiv preprint arXiv …, 2020 - arxiv.org
Current approaches of enforcing FGAC in Database Management Systems (DBMS) do not
scale in scenarios when the number of policies are in the order of thousands. This paper …

Privacy-preserving location-based data queries in fog-enhanced sensor networks

H Xie, Y Guo, X Jia - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Fog computing has emerged as a promising framework with the rapid growth of the Internet
of Things (IoT). In fog computing, the new entity, named fog device, can help the cloud …

Optimal IoT service offloading with uncertainty in SDN-based mobile edge computing

H Hao, J Zhang, Q Gu - Mobile Networks and Applications, 2022 - Springer
To solve the problem of limited computing ability in mobile devices, edge computing is
adopted as a feasible solution which provides services for IoT devices in different …

Cache-based privacy preserving solution for location and content protection in location-based services

Y Cui, F Gao, W Li, Y Shi, H Zhang, Q Wen… - Sensors, 2020 - mdpi.com
Location-Based Services (LBSs) are playing an increasingly important role in people's daily
activities nowadays. While enjoying the convenience provided by LBSs, users may lose …

Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data

H Zhang, P Li - Journal of Cyber Security and Mobility, 2023 - journals.riverpublishers.com
The digital footprint in wireless sensor networks can bring great academic and commercial
value, but it will also bring the risk of privacy disclosure to users. This study discusses the …

Efficient algorithm for traffic engineering in cloud-of-things and edge computing

J Sun, S Sun, K Li, D Liao, AK Sangaiah… - Computers & Electrical …, 2018 - Elsevier
We propose a scheme for Cloud-of-Things and Edge Computing (CoTEC) traffic
management in multi-domain networks. To direct the traffic flow through the service nodes …

An efficient multi-bit steganography algorithm in spatial domain with two-layer security

N Mukherjee, G Paul, SK Saha - Multimedia Tools and Applications, 2018 - Springer
Steganography is a very useful technique which aims at preventing loss of privacy during
the process of data communication, especially over the internet. It can involve different forms …

Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures

S Pérez, D Garcia-Carrillo, R Marín-López… - Future Generation …, 2019 - Elsevier
The next generation of IoT scenarios must consider security aspects as a first class
component. As a core aspect, key management is crucial for the establishment of security …

From things to services: A social IoT approach for tourist service management

GA Stelea, V Popescu, F Sandu, L Jalal, M Farina… - IEEE …, 2020 - ieeexplore.ieee.org
In the context of Internet of Things (IoT), the cooperation and synergy between varied and
disparate communicating objects is strained by trustworthiness, confidentiality and …