Edge-computing-driven internet of things: A survey

L Kong, J Tan, J Huang, G Chen, S Wang, X Jin… - ACM Computing …, 2022 - dl.acm.org
The Internet of Things (IoT) is impacting the world's connectivity landscape. More and more
IoT devices are connected, bringing many benefits to our daily lives. However, the influx of …

[HTML][HTML] Network optimizations in the Internet of Things: A review

NN Srinidhi, SMD Kumar, KR Venugopal - Engineering Science and …, 2019 - Elsevier
The Internet was initially used to transfer data packets between users and data sources with
a specific IP address. Due to advancements, the Internet is being used to share data among …

[HTML][HTML] A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …

A survey on security and privacy issues of UAVs

Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti… - Computer Networks, 2023 - Elsevier
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …

A survey of MANET intrusion detection & prevention approaches for network layer attacks

A Nadeem, MP Howarth - IEEE communications surveys & …, 2013 - ieeexplore.ieee.org
In the last decade, mobile ad hoc networks (MANETs) have emerged as a major next
generation wireless networking technology. However, MANETs are vulnerable to various …

Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview

P Nayak, G Swapna - Internet of Things, 2023 - Elsevier
Security is one of the major concerns in IoT networks which consists of a huge number of
objects that have given an alarm with the risen number of threats in our day-to-day life …

Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks

G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural Computing and Applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

Impacts of mobility models on RPL-based mobile IoT infrastructures: An evaluative comparison and survey

B Safaei, A Mohammadsalehi, KT Khoosani… - IEEE …, 2020 - ieeexplore.ieee.org
With the widespread use of IoT applications and the increasing trend in the number of
connected smart devices, the concept of routing has become very challenging. In this …

Dynamic and comprehensive trust model for IoT and its integration into RPL

SY Hashemi, F Shams Aliee - The Journal of Supercomputing, 2019 - Springer
Ensuring security in IoT routing protocols is more challenging due to the fact that devices are
mobile, resource constrained, and heterogeneous. The routing protocol for low-power and …