Swarm of UAVs for network management in 6G: A technical review

MA Khan, N Kumar, SAH Mohsan… - … on Network and …, 2022 - ieeexplore.ieee.org
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G)
networks, which are capable of incorporating autonomous services to swarm of unmanned …

Low earth orbit satellite security and reliability: Issues, solutions, and the road ahead

P Yue, J An, J Zhang, J Ye, G Pan… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-
increasing user demands, reduced costs, and technological progress. Since there is a lack …

A survey on cyber security threats in IoT-enabled maritime industry

I Ashraf, Y Park, S Hur, SW Kim… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Impressive technological advancements over the past decades commenced significant
advantages in the maritime industry sector and elevated commercial, operational, and …

A survey on UAV-aided maritime communications: Deployment considerations, applications, and future challenges

N Nomikos, PK Gkonis, PS Bithas… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Maritime activities represent a major domain of economic growth with several emerging
maritime Internet of Things use cases, such as smart ports, autonomous navigation, and …

Towards an open, intelligent, and end-to-end architectural framework for network slicing in 6G communication systems

MA Habibi, B Han, A Fellan, W Jiang… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
The definition of the fundamental concepts and the design of the architectural framework for
network slicing in fifth-generation communication systems have been successfully …

Security concepts in emerging 6G communication: Threats, countermeasures, authentication techniques and research directions

SHA Kazmi, R Hassan, F Qamar, K Nisar, AAA Ibrahim - Symmetry, 2023 - mdpi.com
Challenges faced in network security have significantly steered the deployment timeline of
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …

LAP-IoHT: A lightweight authentication protocol for the internet of health things

CM Chen, Z Chen, S Kumari, MC Lin - Sensors, 2022 - mdpi.com
The Internet of Health Things (IoHT), which is an extension of the Internet of Things (IoT) in
healthcare, has provided a new type of telemedicine approach. In IoHT, wearable sensors …

[HTML][HTML] Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective

MA Naeem, YB Zikria, R Ali, U Tariq, Y Meng… - Digital Communications …, 2023 - Elsevier
The massive growth of diversified smart devices and continuous data generation poses a
challenge to communication architectures. To deal with this problem, communication …

SUSIC: A secure user access control mechanism for SDN-enabled IIoT and cyber–physical systems

A Irshad, GA Mallah, M Bilal… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The integration of thriving information and communications technology (ICT) and cyber–
physical systems (CPSs) has spawned several innovative applications, such as remote …

[HTML][HTML] The drone delivery services: An innovative application in an emerging economy

NTK Chi, NT Hanh - The Asian Journal of Shipping and Logistics, 2023 - Elsevier
The rapid development of the Internet of Things (IoT) devices led to new era in the maritime
and road transportation industry and research. This article studies the critical determinants of …