IoT elements, layered architectures and security issues: A comprehensive survey

M Burhan, RA Rehman, B Khan, BS Kim - sensors, 2018 - mdpi.com
The use of the Internet is growing in this day and age, so another area has developed to use
the Internet, called Internet of Things (IoT). It facilitates the machines and objects to …

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems

E Benkhelifa, T Welsh… - … communications surveys & …, 2018 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous
nature of devices and protocols in use, the sensitivity of the data contained within, as well as …

Man-in-the-middle attacks in vehicular ad-hoc networks: Evaluating the impact of attackers' strategies

F Ahmad, A Adnane, VNL Franqueira, F Kurugollu… - Sensors, 2018 - mdpi.com
Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems
(ITS) technology, relies on communication between dynamically connected vehicles and …

Privacy-preserving wireless communications using bipartite matching in social big data

M Qiu, K Gai, Z Xiong - Future Generation Computer Systems, 2018 - Elsevier
The enhanced wireless data transmissions have enabled the dramatical improvement of the
service deployment, such as social networks and big data applications. The multi-channel …

A systematic review of data protection and privacy preservation schemes for smart grid communications

MA Ferrag, LA Maglaras, H Janicke, J Jiang… - Sustainable cities and …, 2018 - Elsevier
In this paper, we present a comprehensive survey of privacy-preserving schemes for smart
grid communications. Specifically, we select and in-detail examine thirty-two privacy …

Anatomy of a vulnerable fitness tracking system: Dissecting the fitbit cloud, app, and firmware

J Classen, D Wegemer, P Patras, T Spink… - Proceedings of the ACM …, 2018 - dl.acm.org
Fitbit fitness trackers record sensitive personal information, including daily step counts, heart
rate profiles, and locations visited. By design, these devices gather and upload activity data …

Fog orchestration for the Internet of Everything: state-of-the-art and research challenges

K Velasquez, DP Abreu, MRM Assis, C Senna… - Journal of Internet …, 2018 - Springer
Recent developments in telecommunications have allowed drawing new paradigms,
including the Internet of Everything, to provide services by the interconnection of different …

AITSteg: An innovative text steganography technique for hidden transmission of text message via social media

MT Ahvanooey, Q Li, J Hou, HD Mazraeh… - IEEE Access, 2018 - ieeexplore.ieee.org
With the popularity of smartphones and widespread use of high-speed Internet, social media
has become a vital part of people's daily life. Currently, text messages are used in many …

How to make key 5G wireless technologies environmental friendly: A review

MH Alsharif, R Nordin, NF Abdullah… - Transactions on …, 2018 - Wiley Online Library
Energy efficiency in cellular networks has increasingly become important to the cellular
network operators due to its significant economic and ecological influence in the forthcoming …