While the emerging 6G networks are anticipated to meet the high-end service quality demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …
B Mao, Y Kawamoto, N Kato - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The data privacy and confidentiality in Internet-of-Things (IoT) networks have been one of the most concerned problems due to increasing threats. The commonly utilized IoT chips …
The IEEE 802.15. 4 standard offers a number of security requirements that provide varying degrees of protections at the link layer. The decision of which security level to use while …
M Mahamat, G Jaber, A Bouabdallah - Wireless Networks, 2023 - Springer
The advent of the Internet of Things (IoT), with thousands of connected, heterogeneous, and energy-constrained devices, enables new application domains and improves our everyday …
The latest generation of IoT systems incorporate machine learning (ML) technologies on edge devices. This introduces new engineering challenges to bring ML onto resource …
IEEE 802.15. 4 protocol defines multiple security specifications to provide different levels of safety protection in the link layer. How to choose the security level for harvesting enabled …
H Xiao, Q Pei, X Song, W Shi - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Edge computing brings computation and storage resources to the edge of the mobile network to meet strict delay and high demanding applications. However, edge network …
M Abdel-Basset, N Moustafa, H Hawash, W Ding - 2022 - Springer
Deep Learning Techniques for IoT Security and Privacy Page 1 Studies in Computational Intelligence 997 Mohamed Abdel-Basset Nour Moustafa Hossam Hawash Weiping Ding Deep …
SI Al-Sharekh, KHA Al-Shqeerat - Int. J. Comput. Sci. Netw. Secur, 2019 - academia.edu
Many regions in the world have recently sought to integrate and apply advanced technologies in various aspects of life. Internet of things applications have become popular …