A survey on network methodologies for real-time analytics of massive IoT data and open research issues

S Verma, Y Kawamoto, ZM Fadlullah… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
With the widespread adoption of the Internet of Things (IoT), the number of connected
devices is growing at an exponential rate, which is contributing to ever-increasing, massive …

Small cells in the forthcoming 5G/IoT: Traffic modelling and deployment overview

F Al-Turjman, E Ever… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides an overview of the use of small cells (eg, femtocells) in the Internet of
Things (IoT) environments. As a result of rapid increase in the number of mobile connected …

Mobile internet of things under data physical fusion technology

Z Lv, H Song - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
In order to investigate security and privacy issues in the mobile Internet of Things (IoT), the
access control four states (AC4E) IoT model is constructed, data physical fusion technology …

GPU-accelerated compression and visualization of large-scale vessel trajectories in maritime IoT industries

Y Huang, Y Li, Z Zhang, RW Liu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The automatic identification system (AIS), an automatic vessel-tracking system, has been
widely adopted to perform intelligent traffic management and collision avoidance services in …

EOMR: An energy-efficient optimal multi-path routing protocol to improve QoS in wireless sensor network for IoT applications

K Jaiswal, V Anand - Wireless Personal Communications, 2020 - Springer
The wireless sensor network based IoT applications mainly suffers from end to end delay,
loss of packets during transmission, reduced lifetime of sensor nodes due to loss of energy …

Prediction and detection of fdia and ddos attacks in 5g enabled iot

H Moudoud, L Khoukhi, S Cherkaoui - IEEE Network, 2020 - ieeexplore.ieee.org
Security in fifth generation (5G) networks has become one of the prime concerns in the
telecommunication industry. 5G security challenges come from the fact that 5G networks …

An IoT blockchain architecture using oracles and smart contracts: The use-case of a food supply chain

H Moudoud, S Cherkaoui… - 2019 IEEE 30th Annual …, 2019 - ieeexplore.ieee.org
The blockchain is a distributed technology which allows establishing trust among unreliable
users who interact and perform transactions with each other. While blockchain technology …

Practical lessons from the deployment and management of a smart city internet-of-things infrastructure: The smartsantander testbed case

P Sotres, JR Santana, L Sánchez, J Lanza… - IEEE Access, 2017 - ieeexplore.ieee.org
The smart cities vision is inexorably turning into a reality. Among the different approaches
used to realize more intelligent and sustainable environments, a common denominator is …

Detection and prediction of fdi attacks in iot systems via hidden markov model

H Moudoud, Z Mlika, L Khoukhi… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
False data injection (FDI) attacks aim to threaten the security of Internet of Things (IoT)
systems by falsifying a device's measurements without being detected. In this paper, we …

Management of service level agreements for cloud services in IoT: A systematic mapping study

S Mubeen, SA Asadollah, AV Papadopoulos… - IEEE …, 2017 - ieeexplore.ieee.org
Cloud computing and Internet of Things (IoT) are computing technologies that provide
services to consumers and businesses, allowing organizations to become more agile and …