Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities

M Yahuza, MYIB Idris, AWBA Wahab, ATS Ho… - IEEE …, 2020 - ieeexplore.ieee.org
Edge computing is a promising paradigm that enhances the capabilities of cloud computing.
In order to continue patronizing the computing services, it is essential to conserve a good …

Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends

MA Ferrag, L Maglaras, A Derhab - Security and …, 2019 - Wiley Online Library
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …

[HTML][HTML] A survey of edge computing-based designs for IoT security

K Sha, TA Yang, W Wei, S Davari - Digital Communications and Networks, 2020 - Elsevier
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the
traditional physical systems. Recently, security breaches in many IoT applications have …

Blockchain and IoT-based cognitive edge framework for sharing economy services in a smart city

MA Rahman, MM Rashid, MS Hossain… - Ieee …, 2019 - ieeexplore.ieee.org
In this paper, we propose a Blockchain-based infrastructure to support security-and privacy-
oriented spatio-temporal smart contract services for the sustainable Internet of Things (IoT) …

Effective task scheduling algorithm with deep learning for Internet of Health Things (IoHT) in sustainable smart cities

SM Nagarajan, GG Deverajan, P Chatterjee… - Sustainable Cities and …, 2021 - Elsevier
In the recent years, important key factor for urban planning is to analyze the sustainability
and its functionality towards smart cities. Presently, many researchers employ the …

Blockchain-based mobile edge computing framework for secure therapy applications

MDA Rahman, MS Hossain, G Loukas… - IEEE …, 2018 - ieeexplore.ieee.org
Mobile edge computing (MEC) is being introduced and leveraged in many domains, but few
studies have addressed MEC for secure in-home therapy management. To this end, this …

[HTML][HTML] A novel QKD approach to enhance IIOT privacy and computational knacks

KK Singamaneni, G Dhiman, S Juneja, G Muhammad… - Sensors, 2022 - mdpi.com
The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend
their capabilities for production amenities, security, and efficacy. IIoT establishes an …

Voice pathology detection using deep learning on mobile healthcare framework

M Alhussein, G Muhammad - IEEE Access, 2018 - ieeexplore.ieee.org
The feasibility and popularity of mobile healthcare are currently increasing. The
advancement of modern technologies, such as wireless communication, data processing …

[HTML][HTML] Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

A Alagappan, SK Venkatachary, LJB Andrews - Energy Reports, 2022 - Elsevier
Abstract Zero Trust Network Architecture implementation is gaining popularity in the ICT
sector to defend and deter cyber threats or cyber crime. Considering the architecture's …

Multimodal biometric authentication based on deep fusion of electrocardiogram (ECG) and finger vein

BA El-Rahiem, FEA El-Samie, M Amin - Multimedia Systems, 2022 - Springer
Biometric identification depends on the statistical analysis of the unique physical and
behavioral characteristics of individuals. However, a unimodal biometric system is …