A survey on emerging SDN and NFV security mechanisms for IoT systems

I Farris, T Taleb, Y Khettab… - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
The explosive rise of Internet of Things (IoT) systems have notably increased the potential
attack surfaces for cybercriminals. Accounting for the features and constraints of IoT devices …

A survey of network virtualization techniques for Internet of Things using SDN and NFV

I Alam, K Sharif, F Li, Z Latif, MM Karim… - ACM Computing …, 2020 - dl.acm.org
Internet of Things (IoT) and Network Softwarization are fast becoming core technologies of
information systems and network management for the next-generation Internet. The …

A machine learning security framework for iot systems

M Bagaa, T Taleb, JB Bernabe, A Skarmeta - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things security is attracting a growing attention from both academic and industry
communities. Indeed, IoT devices are prone to various security attacks varying from Denial …

Blockchain-based incentives for secure and collaborative data sharing in multiple clouds

M Shen, J Duan, L Zhu, J Zhang, X Du… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
The prosperity of cloud computing has driven an increasing number of enterprises and
organizations to store their data on private or public cloud platforms. Due to the limitation of …

Virtual IoT HoneyNets to mitigate cyberattacks in SDN/NFV-enabled IoT networks

AM Zarca, JB Bernabe, A Skarmeta… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
As the IoT adoption is growing in several fields, cybersecurity attacks involving low-cost end-
user devices are increasing accordingly, undermining the expected deployment of IoT …

Securing massive IoT in 6G: Recent solutions, architectures, future directions

A Alotaibi, A Barnawi - Internet of Things, 2023 - Elsevier
Abstract The Internet of things (IoT) is a fast evolving technology that enables the
development of smart services in numerous domains, such as transportation, health care …

A network function virtualization system for detecting malware in large IoT based networks

N Guizani, A Ghafoor - IEEE Journal on Selected Areas in …, 2020 - ieeexplore.ieee.org
The exponential growth in the use of Internet of Things (IoT) devices has introduced
numerous challenges, in particular dealing with new security threats. In addition, for …

An optimal task scheduling method in IoT-Fog-Cloud network using multi-objective moth-flame algorithm

T Salehnia, A Seyfollahi, S Raziani, A Noori… - Multimedia Tools and …, 2024 - Springer
Nowadays, cloud and fog computing have been leveraged to enhance Internet of Things
(IoT) performance. The outstanding potential of cloud platforms accelerates the processing …

Autonomy and intelligence in the computing continuum: Challenges, enablers, and future directions for orchestration

H Kokkonen, L Lovén, NH Motlagh, A Kumar… - arXiv preprint arXiv …, 2022 - arxiv.org
Future AI applications require performance, reliability and privacy that the existing, cloud-
dependant system architectures cannot provide. In this article, we study orchestration in the …

A comprehensive survey on secure software‐defined network for the Internet of Things

M Babiker Mohamed, O Matthew Alofe… - Transactions on …, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) is the network of smart devices, sensors, and machines
that continuously monitored the surrounding environment and execute meaningful decisions …