[HTML][HTML] The security of big data in fog-enabled IoT applications including blockchain: A survey

N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi… - Sensors, 2019 - mdpi.com
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …

An overview of dynamic spectrum sharing: Ongoing initiatives, challenges, and a roadmap for future research

S Bhattarai, JMJ Park, B Gao, K Bian… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We are in the midst of a major paradigm shift in how we manage radio spectrum. This
paradigm shift is necessitated by the growth of wireless services of all types and the demand …

Security and privacy issues of fog computing: A survey

S Yi, Z Qin, Q Li - Wireless Algorithms, Systems, and Applications: 10th …, 2015 - Springer
Fog computing is a promising computing paradigm that extends cloud computing to the
edge of networks. Similar to cloud computing but with distinct characteristics, fog computing …

A survey on spectrum management for unmanned aerial vehicles (UAVs)

MA Jasim, H Shakhatreh, N Siasi, AH Sawalmeh… - IEEE …, 2021 - ieeexplore.ieee.org
The operation of unmanned aerial vehicles (UAV) imposes various challenges on radio
spectrum management to achieve safe operation, efficient spectrum utilization, and …

[HTML][HTML] Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control

AAN Patwary, RK Naha, S Garg, SK Battula… - Electronics, 2021 - mdpi.com
Fog computing is an emerging computing paradigm that has come into consideration for the
deployment of Internet of Things (IoT) applications amongst researchers and technology …

Privacy-preserving crowdsourced spectrum sensing

X Jin, Y Zhang - IEEE/ACM Transactions on Networking, 2018 - ieeexplore.ieee.org
Dynamic spectrum access is promising for mitigating worldwide wireless spectrum shortage.
Crowdsourced spectrum sensing (CSS) refers to recruiting ubiquitous mobile users to …

Protecting the primary users' operational privacy in spectrum sharing

B Bahrak, S Bhattarai, A Ullah, JMJ Park… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
Although using geolocation databases is a practical approach for enabling spectrum
sharing, it poses a potentially serious privacy problem. Secondary users (queriers), through …

Blockchain for secure location verification

MR Nosouhi, S Yu, W Zhou, M Grobler… - Journal of Parallel and …, 2020 - Elsevier
In location-sensitive applications, dishonest users may submit fake location claims to
illegally access a service or obtain benefit. To address this issue, a number of location proof …

A geo-indistinguishable location perturbation mechanism for location-based services supporting frequent queries

J Hua, W Tong, F Xu, S Zhong - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
As location-based services (LBSs) on smartphones become increasingly popular, such
services are causing serious privacy concerns, because many users are unwilling to see …

Security and enforcement in spectrum sharing

JM Park, JH Reed, AA Beex, TC Clancy… - Proceedings of the …, 2014 - ieeexplore.ieee.org
When different stakeholders share a common resource, such as the case in spectrum
sharing, security and enforcement become critical considerations that affect the welfare of all …