Zero trust architecture empowered attack detection framework to secure 6G edge computing

H Sedjelmaci, N Ansari - IEEE Network, 2023 - ieeexplore.ieee.org
Recent advances in edge computing and its imminent adoption in Sixth Generation (6G)
wireless networks have led to a propitious paradigm defined as 6G edge computing …

A trusted hybrid learning approach to secure edge computing

H Sedjelmaci, SM Senouci, N Ansari… - IEEE Consumer …, 2021 - ieeexplore.ieee.org
Securing edge computing has drawn much attention due to the vital role of edge computing
in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to …

Edge learning for 6g-enabled internet of things: A comprehensive survey of vulnerabilities, datasets, and defenses

MA Ferrag, O Friha, B Kantarci… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …

Security in IoT-driven mobile edge computing: New paradigms, challenges, and opportunities

S Garg, K Kaur, G Kaddoum, P Garigipati… - IEEE Network, 2021 - ieeexplore.ieee.org
With the exponential growth in the number of connected devices, in recent years there has
been a paradigm shift toward mobile edge computing. As a promising edge technology, it …

Probabilistic distributed intrusion detection for zero-trust multi-access edge computing

R Sharma, CA Chan, C Leckie - NOMS 2023-2023 IEEE/IFIP …, 2023 - ieeexplore.ieee.org
With the advent of Multi-Access Edge Computing (MEC) in 5G, there is a shift in the core
processing and deployment of applications to the edge of the network. This enables …

Deep learning: The frontier for distributed attack detection in fog-to-things computing

A Abeshu, N Chilamkurti - IEEE Communications Magazine, 2018 - ieeexplore.ieee.org
The increase in the number and diversity of smart objects has raised substantial
cybersecurity challenges due to the recent exponential rise in the occurrence and …

Lockedge: Low-complexity cyberattack detection in iot edge computing

TT Huong, TP Bac, DM Long, BD Thang, NT Binh… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) and its applications are becoming commonplace with more devices,
but always at risk of network security. It is therefore crucial for an IoT network design to …

Cooperative and smart attacks detection systems in 6G-enabled Internet of Things

H Sedjelmaci, N Kheir, A Boudguiga… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
The Sixth Generation (6G) of mobile networks offers the promise of a global interconnected
system, serving a large set of applications across multiple fields such as satellite, air …

Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

Multiattack intrusion detection algorithm for edge-assisted internet of things

D Wu, J Yan, H Wang, R Wang - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
With the continuous development of edge-assisted internet of things (IoT) applications, a
large number of computing tasks need to be offloaded into the edge servers. It is critical to …