Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

A Attkan, V Ranga - Complex & Intelligent Systems, 2022 - Springer
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …

Multi-access edge computing architecture, data security and privacy: A review

B Ali, MA Gregory, S Li - IEEE Access, 2021 - ieeexplore.ieee.org
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …

A survey on cyber security threats in IoT-enabled maritime industry

I Ashraf, Y Park, S Hur, SW Kim… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Impressive technological advancements over the past decades commenced significant
advantages in the maritime industry sector and elevated commercial, operational, and …

[HTML][HTML] A BN driven FMEA approach to assess maritime cybersecurity risks

C Park, C Kontovas, Z Yang, CH Chang - Ocean & Coastal Management, 2023 - Elsevier
Cybersecurity risks present a growing concern in the maritime industry, especially due to the
fast development of digitalised technologies, also vis-à-vis autonomous shipping. Research …

Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions

J Cook, SU Rehman, MA Khan - IEEE Access, 2023 - ieeexplore.ieee.org
The growth in the use of small sensor devices, commonly known as the Internet of Things
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …

A survey of privacy risks and mitigation strategies in the Artificial Intelligence life cycle

S Shahriar, S Allana, SM Hazratifard, R Dara - IEEE Access, 2023 - ieeexplore.ieee.org
Over the decades, Artificial Intelligence (AI) and machine learning has become a
transformative solution in many sectors, services, and technology platforms in a wide range …

A systematic review of federated learning incentive mechanisms and associated security challenges

A Ali, I Ilahi, A Qayyum, I Mohammed… - Computer Science …, 2023 - Elsevier
In response to various privacy risks, researchers and practitioners have been exploring
different paradigms that can leverage the increased computational capabilities of consumer …

Light weight authentication scheme for smart home iot devices

V Kumar, N Malik, J Singla, NZ Jhanjhi, F Amsaad… - Cryptography, 2022 - mdpi.com
In today's world, the use of computer networks is everywhere, and to access the home
network we use the Internet. IoT networks are the new range of these networks in which we …

Hybrid cryptographic approach to enhance the mode of key management system in cloud environment

S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …

A content poisoning attack detection and prevention system in vehicular named data networking

AH Magsi, LV Yovita, A Ghulam, G Muhammad, Z Ali - Sustainability, 2023 - mdpi.com
Named data networking (NDN) is gaining momentum in vehicular ad hoc networks
(VANETs) thanks to its robust network architecture. However, vehicular NDN (VNDN) faces …