Fbia: A fog-based identity authentication scheme for privacy preservation in internet of vehicles

L Song, G Sun, H Yu, X Du… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In recent years, the Internet of vehicles (IoV) has become an indispensable part of wireless
communication. To protect users' privacy and communication security, an increasing number …

[HTML][HTML] Survey of distributed and decentralized IoT securities: approaches using deep learning and blockchain technology

A Falayi, Q Wang, W Liao, W Yu - Future Internet, 2023 - mdpi.com
The Internet of Things (IoT) continues to attract attention in the context of computational
resource growth. Various disciplines and fields have begun to employ IoT integration …

5G virtualized multi-access edge computing platform for IoT applications

HC Hsieh, JL Chen, A Benslimane - Journal of Network and Computer …, 2018 - Elsevier
The next generation of fifth generation (5G) network, which is implemented using Virtualized
Multi-access Edge Computing (vMEC), Network Function Virtualization (NFV) and Software …

[HTML][HTML] A multi-level random forest model-based intrusion detection using fuzzy inference system for internet of things networks

JB Awotunde, FE Ayo, R Panigrahi, A Garg… - International Journal of …, 2023 - Springer
Intrusion detection (ID) methods are security frameworks designed to safeguard network
information systems. The strength of an intrusion detection method is dependent on the …

Heterogeneous edge offloading with incomplete information: A minority game approach

M Hu, Z Xie, D Wu, Y Zhou, X Chen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Task offloading is one of key operations in edge computing, which is essential for reducing
the latency of task processing and boosting the capacity of end devices. However, the …

TPPR: A trust-based and privacy-preserving platoon recommendation scheme in VANET

C Zhang, L Zhu, C Xu, K Sharif, K Ding… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Vehicle platoon, a novel vehicle driving paradigm that organizes a group of vehicles in the
nose-to-tail structure, has been considered as a potential solution to reduce traffic …

[HTML][HTML] Intelligent cyber-security system for iot-aided drones using voting classifier

R Majeed, NA Abdullah, M Faheem Mushtaq, M Umer… - Electronics, 2021 - mdpi.com
Developments in drones have opened new trends and opportunities in different fields,
particularly in small drones. Drones provide interlocation services for navigation, and this …

Cooperative edge computing with sleep control under nonuniform traffic in mobile edge networks

S Wang, X Zhang, Z Yan… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Mobile edge computing (MEC) is one of the key technologies for fifth generation networks
and beyond, which brings computation resources in proximity to end users. While enabling …

Deep reinforcement learning-based computation offloading and resource allocation in security-aware mobile edge computing

HC Ke, H Wang, HW Zhao, WJ Sun - Wireless Networks, 2021 - Springer
Owing to the insufficient processing ability of wireless devices (WDs), it is difficult for WDs to
process these data within the deadline associated with the quality of service requirements …

ViT4Mal: Lightweight Vision Transformer for Malware Detection on Edge Devices

A Ravi, V Chaturvedi, M Shafique - ACM Transactions on Embedded …, 2023 - dl.acm.org
There has been a tremendous growth of edge devices connected to the network in recent
years. Although these devices make our life simpler and smarter, they need to perform …