[HTML][HTML] A survey on the adoption of blockchain in iot: Challenges and solutions

MA Uddin, A Stranieri, I Gondal… - Blockchain: Research …, 2021 - Elsevier
Abstract Conventional Internet of Things (IoT) ecosystems involve data streaming from
sensors, through Fog devices to a centralized Cloud server. Issues that arise include privacy …

[HTML][HTML] Network attacks detection methods based on deep learning techniques: a survey

Y Wu, D Wei, J Feng - Security and Communication Networks, 2020 - hindawi.com
With the development of the fifth-generation networks and artificial intelligence technologies,
new threats and challenges have emerged to wireless communication system, especially in …

Digital twin-assisted real-time traffic data prediction method for 5G-enabled internet of vehicles

C Hu, W Fan, E Zeng, Z Hang, F Wang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The development of Internet of Vehicles (IoV) has produced a considerable amount of real-
time traffic data. These traffic data constitute a kind of digital twin that connects the physical …

Blockchain-based secure spectrum trading for unmanned-aerial-vehicle-assisted cellular networks: An operator's perspective

J Qiu, D Grace, G Ding, J Yao… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are envisioned to be widely deployed as an integral
component in the next generation cellular networks, where spectrum sharing between the …

Cooperative computation offloading in blockchain-based vehicular edge computing networks

P Lang, D Tian, X Duan, J Zhou… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
As a novel computing paradigm, multiaccess edge computing (MEC) migrates computing
and storage capabilities to edge nodes of the network to meet the requirements of executing …

[HTML][HTML] Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time

MS Akhtar, T Feng - Symmetry, 2022 - mdpi.com
Cyber-attacks on the numerous parts of today's fast developing IoT are only going to
increase in frequency and severity. A reliable method for detecting malicious attacks such as …

Toward secure data sharing for the IoV: A quality-driven incentive mechanism with on-chain and off-chain guarantees

W Chen, Y Chen, X Chen… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Currently, data sharing for the Internet of Vehicles (IoV) applications has drawn much
attention in the framework of developing smart cities and smart transportation. A critical …

DWFCAT: Dual watermarking framework for industrial image authentication and tamper localization

A Kamili, NN Hurrah, SA Parah, GM Bhat… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The image data received through various sensors are of significant importance in Industry
4.0. Unfortunately, these data are highly vulnerable to various malicious attacks during its …

Privacy-preserving quality prediction for edge-based IoT services

Y Zhang, J Pan, L Qi, Q He - Future Generation Computer Systems, 2021 - Elsevier
Abstract Quality of Service (QoS) prediction and privacy preservation are two key challenges
in service recommendation. Nevertheless, the existing QoS prediction methods cannot be …

[HTML][HTML] Research advances on blockchain-as-a-service: Architectures, applications and challenges

J Song, P Zhang, M Alkubati, Y Bao, G Yu - Digital Communications and …, 2022 - Elsevier
Due to the complexity of blockchain technology, it usually costs too much effort to build,
maintain and monitor a blockchain system that supports a targeted application. To this end …