A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022 - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0

Y Wu, HN Dai, H Wang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Critical infrastructure systems are vital to underpin the functioning of a society and economy.
Due to the ever-increasing number of Internet-connected Internet-of-Things (IoT)/Industrial …

A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

Deep-learning-based physical layer authentication for industrial wireless sensor networks

RF Liao, H Wen, J Wu, F Pan, A Xu, Y Jiang, F Xie… - sensors, 2019 - mdpi.com
In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is
proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three …

Threshold-free physical layer authentication based on machine learning for industrial wireless CPS

F Pan, Z Pang, H Wen, M Luvisotto… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Wireless industrial cyber-physical systems are increasingly popular in critical manufacturing
processes. These kinds of systems, besides high performance, require strong security and …

Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks

JA Alzubi - Transactions on Emerging Telecommunications …, 2021 - Wiley Online Library
Attack detection is a significant problem to be resolved to attain security in industrial sensor
network. Few research works have been designed for performing attack discovery process …

Security enhancement for mobile edge computing through physical layer authentication

RF Liao, H Wen, J Wu, F Pan, A Xu, H Song… - IEEE …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet
of things, and propose a deep-learning (DL)-based physical (PHY) layer authentication …

Multiuser physical layer authentication in Internet of Things with data augmentation

RF Liao, H Wen, S Chen, F Xie, F Pan… - IEEE internet of …, 2019 - ieeexplore.ieee.org
Unlike most of the upper layer authentication mechanisms, the physical (PHY) layer
authentication takes advantages of channel impulse response from wireless propagation to …

Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks

S Chen, Z Pang, H Wen, K Yu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article, a scheme to detect both clone and Sybil attacks by using channel-based
machine learning is proposed. To identify malicious attacks, channel responses between …