A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions

AS Khan, MA Sattar, K Nisar, AAA Ibrahim, NB Annuar… - Applied Sciences, 2022 - mdpi.com
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

The Entropian Threshold Theorems for the Steady State Probabilities of the Stable M/G/1 Queue with Heavy Tails with Applications of Probability Density Functions to …

IA Mageed - electronic Journal of Computer Science and …, 2023 - ejcsit.uniten.edu.my
An exposition is undertaken for the threshold of both Rényian and Tsallisian steady-state
probabilities of the stable queueing system with 'long-range interactions'(LRIs). The current …

Improving Application Support in 6G Networks with CAPOM: Confluence-Aided Process Organization Method

JAJ Alsayaydeh, AJA Al-Gburi, SG Herawan - IEEE Access, 2023 - ieeexplore.ieee.org
Systems requiring terahertz transmission and high sampling capabilities can be supported
by sixth-generation (6G) technology with minimal latency and excellent service throughput …

A survey on 802.11 MAC industrial standards, architecture, supporting emergency traffic and security: Future directions

SK Memon, M Hanafi Ahmad Hijazi, K Nisar… - Journal of Industrial …, 2022 - ray.yorksj.ac.uk
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Secure UAV adhoc network with blockchain technology

MA Alqarni - Plos one, 2024 - journals.plos.org
Recent advances in aerial robotics and wireless transceivers have generated an enormous
interest in networks constituted by multiple compact unmanned aerial vehicles (UAVs). UAV …

Mitigating and Analysis of Memory Usage Attack in IoE System

Z Alwaisi, S Soderi, R De Nicola - International Conference on Industrial …, 2023 - Springer
Abstract Internet of Everything (IoE) is a newly emerging trend, especially in homes.
Marketing forces toward smart homes are also accelerating the spread of IoE devices in …

Optimized Monitoring and Detection of Internet of Things resources-constraints Cyber Attacks

A Waisi, Z Ali - 2023 - e-theses.imtlucca.it
This research takes place in the context of the optimized monitoring and detec-tion of
Internet of Things (IoT) resource-constraints attacks. Meanwhile, the In-ternet of Everything …

Challenges and Key Issues in IoT Privacy and Security

AB Kathole, VV Kimbahune, SD Patil… - … and Security Challenges …, 2024 - Springer
Abstract “Internet of Things”(IoT) refers to a system that enables the interconnection of many
different types of things and intelligent devices. In order to function, devices connected to the …

Determination of Energy Efficient Routing Protocol for Underwater Optical Wireless Sensor Networks Using Reinforcement Learning Algorithm

S Agarwal, V Agarwal - 2023 IEEE 4th Annual Flagship India …, 2023 - ieeexplore.ieee.org
underwater optical wireless sensor networks (OWSNs) are rapidly emerging networking
technologies due to their quick response and wide transmission range. The light signals in …

A Review of Machine Learning-Based Routing Protocols for Wireless Sensor Network Lifetime

AR Gaidhani, AD Potgantwar - Engineering Proceedings, 2024 - mdpi.com
Wireless sensor networks (WSNs) grapple with a challenging and pivotal issue: how to
maximize the network's lifespan. To improve the quality of service (QoS) and extend the life …