Requirements, deployments, and challenges of LoRa technology: A survey

M Ayoub Kamal, MM Alam, AAB Sajak… - Computational …, 2023 - Wiley Online Library
LoRa is an ISM‐band based LPWAN communication protocol. Despite their wide network
penetration of approximately 20 kilometers or higher using lower than 14 decibels …

Towards an intelligent intrusion detection system to detect malicious activities in cloud computing

H Attou, M Mohy-eddine, A Guezzaz, S Benkirane… - Applied Sciences, 2023 - mdpi.com
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics,
such as scalability and flexibility. However, despite these advantages, security concerns …

DBTP2SF: a deep blockchain‐based trustworthy privacy‐preserving secured framework in industrial internet of things systems

R Kumar, R Tripathi - Transactions on Emerging …, 2021 - Wiley Online Library
By providing ubiquitous connectivity, effective data analytics tools, and better decision
support systems for improved market competitiveness, the industrial internet of things (IIoT) …

EPS-Ledger: Blockchain hyperledger sawtooth-enabled distributed power systems chain of operation and control node privacy and security

AA Khan, AA Laghari, DS Liu, AA Shaikh, DD Ma… - Electronics, 2021 - mdpi.com
A distributed power system operation and control node privacy and security are attractive
research questions that deliver electrical energy systems to the participating stakeholders …

A hybrid deep learning model with self-improved optimization algorithm for detection of security attacks in IoT environment

A Sagu, NS Gill, P Gulia, JM Chatterjee, I Priyadarshini - Future Internet, 2022 - mdpi.com
With the growth of the Internet of Things (IoT), security attacks are also rising gradually.
Numerous centralized mechanisms have been introduced in the recent past for the detection …

Stacked recurrent neural network for botnet detection in smart homes

SI Popoola, B Adebisi, M Hammoudeh… - Computers & Electrical …, 2021 - Elsevier
Abstract Internet of Things (IoT) devices in Smart Home Network (SHN) are highly
vulnerable to complex botnet attacks. In this paper, we investigate the effectiveness of …

Dependable federated learning for IoT intrusion detection against poisoning attacks

R Yang, H He, Y Wang, Y Qu, W Zhang - Computers & Security, 2023 - Elsevier
Network intrusion detection methods based on federated learning (FL) and edge computing
have great potential for protecting the cybersecurity of the Internet of Things. It overcomes …

Deep learning-based mobile application design for smart parking

H Canli, S Toklu - IEEE Access, 2021 - ieeexplore.ieee.org
In the era of Internet of Things (IoT) and smart city ecosystems, there is a need for innovative
smart parking systems for more sustainable cities. With the increasing number of vehicles in …

Effective multitask deep learning for iot malware detection and identification using behavioral traffic analysis

S Ali, O Abusabha, F Ali, M Imran… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Despite the benefits of the Internet of Things (IoT), the growing influx of IoT-specific malware
coordinating large-scale cyberattacks via infected IoT devices has created a substantial …

Machine learning for mobile network payment security evaluation system

F Wang, N Yang, PM Shakeel… - Transactions on …, 2024 - Wiley Online Library
In the recent past, different types of Mobile Network payments gateways have been
explosively growing, which allows consumers to access services using various types of …