Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning

ZM Fadlullah, B Mao, N Kato - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
While the emerging 6G networks are anticipated to meet the high-end service quality
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …

AI-based joint optimization of QoS and security for 6G energy harvesting Internet of Things

B Mao, Y Kawamoto, N Kato - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The data privacy and confidentiality in Internet-of-Things (IoT) networks have been one of
the most concerned problems due to increasing threats. The commonly utilized IoT chips …

A frame work of security attacks, issues classifications and configuration strategy for IoT networks for the successful implementation

V Bansal, S Pandey, SK Shukla, D Singh… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The IEEE 802.15. 4 standard offers a number of security requirements that provide varying
degrees of protections at the link layer. The decision of which security level to use while …

Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges

M Mahamat, G Jaber, A Bouabdallah - Wireless Networks, 2023 - Springer
The advent of the Internet of Things (IoT), with thousands of connected, heterogeneous, and
energy-constrained devices, enables new application domains and improves our everyday …

" If security is required" engineering and security practices for machine learning-based IoT devices

NK Gopalakrishna, D Anandayuvaraj, A Detti… - Proceedings of the 4th …, 2022 - dl.acm.org
The latest generation of IoT systems incorporate machine learning (ML) technologies on
edge devices. This introduces new engineering challenges to bring ML onto resource …

Harvesting and threat aware security configuration strategy for IEEE 802.15. 4 based IoT networks

B Mao, Y Kawamoto, J Liu… - IEEE communications …, 2019 - ieeexplore.ieee.org
IEEE 802.15. 4 protocol defines multiple security specifications to provide different levels of
safety protection in the link layer. How to choose the security level for harvesting enabled …

Authentication security level and resource optimization of computation offloading in edge computing systems

H Xiao, Q Pei, X Song, W Shi - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Edge computing brings computation and storage resources to the edge of the mobile
network to meet strict delay and high demanding applications. However, edge network …

[图书][B] Deep Learning Techniques for IoT Security and Privacy

M Abdel-Basset, N Moustafa, H Hawash, W Ding - 2022 - Springer
Deep Learning Techniques for IoT Security and Privacy Page 1 Studies in Computational
Intelligence 997 Mohamed Abdel-Basset Nour Moustafa Hossam Hawash Weiping Ding Deep …

[PDF][PDF] Security challenges and limitations in IoT environments

SI Al-Sharekh, KHA Al-Shqeerat - Int. J. Comput. Sci. Netw. Secur, 2019 - academia.edu
Many regions in the world have recently sought to integrate and apply advanced
technologies in various aspects of life. Internet of things applications have become popular …