Zero trust architecture (zta): A comprehensive survey

NF Syed, SW Shah, A Shaghaghi, A Anwar… - IEEE …, 2022 - ieeexplore.ieee.org
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …

[HTML][HTML] Security in IoMT communications: A survey

D Koutras, G Stergiopoulos, T Dasaklis… - Sensors, 2020 - mdpi.com
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in
order to support real-time, remote patient monitoring and treatment. However, the …

[HTML][HTML] A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …

Motor anomaly detection for unmanned aerial vehicles using reinforcement learning

H Lu, Y Li, S Mu, D Wang, H Kim… - IEEE internet of things …, 2017 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are used in many fields including weather observation,
farming, infrastructure inspection, and monitoring of disaster areas. However, the currently …

DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things

Y Ding, G Wu, D Chen, N Zhang, L Gong… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) can connect many medical imaging equipment to the
medical information network to facilitate the process of diagnosing and treating doctors. As …

A survey on service migration in mobile edge computing

S Wang, J Xu, N Zhang, Y Liu - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile edge computing (MEC) provides a promising approach to significantly reduce
network operational cost and improve quality of service (QoS) of mobile users by pushing …

Integration of blockchain and edge computing in internet of things: A survey

H Xue, D Chen, N Zhang, HN Dai, K Yu - Future Generation Computer …, 2023 - Elsevier
As an important technology to ensure data security, consistency, traceability, etc., blockchain
has been increasingly used in Internet of Things (IoT) applications. The integration of …

Energy efficient dynamic offloading in mobile edge computing for internet of things

Y Chen, N Zhang, Y Zhang, X Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With proliferation of computation-intensive Internet of Things (IoT) applications, the limited
capacity of end devices can deteriorate service performance. To address this issue …

Imaging and fusing time series for wearable sensor-based human activity recognition

Z Qin, Y Zhang, S Meng, Z Qin, KKR Choo - Information Fusion, 2020 - Elsevier
To facilitate data-driven and informed decision making, a novel deep neural network
architecture for human activity recognition based on multiple sensor data is proposed in this …

Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …