MEC-enabled 5G use cases: a survey on security vulnerabilities and countermeasures

P Ranaweera, A Jurcut, M Liyanage - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The future of mobile and internet technologies are manifesting advancements beyond the
existing scope of science. The concepts of automated driving, augmented-reality, and …

Deep belief network integrating improved kernel-based extreme learning machine for network intrusion detection

Z Wang, Y Zeng, Y Liu, D Li - IEEE Access, 2021 - ieeexplore.ieee.org
Deep learning has become a research hotspot in the field of network intrusion detection. In
order to further improve the detection accuracy and performance, we proposed an intrusion …

Body temperature—indoor condition monitor and activity recognition by mems accelerometer based on IoT-alert system for people in quarantine due to COVID-19

ML Hoang, M Carratù, V Paciello, A Pietrosanto - Sensors, 2021 - mdpi.com
Coronavirus disease 19 (COVID-19) is a virus that spreads through contact with the
respiratory droplets of infected persons, so quarantine is mandatory to break the infection …

A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities …

MA Obaidat, S Obeidat, J Holst, A Al Hayajneh… - Computers, 2020 - mdpi.com
The Internet of Things (IoT) has experienced constant growth in the number of devices
deployed and the range of applications in which such devices are used. They vary widely in …

Hybrid data transmission scheme based on source node centrality and community reconstruction in opportunistic social networks

Y Deng, F Gou, J Wu - Peer-to-Peer Networking and Applications, 2021 - Springer
With the advent of 5G era and the development of personal mobile devices, people's
demand for information and bandwidth is growing exponentially. In the traditional social …

Hybrid optimization enabled deep learning technique for multi-level intrusion detection

ES GSR, M Azees, CHR Vinodkumar… - … in Engineering Software, 2022 - Elsevier
The intrusion detection system identifies the attack through the reputation and progression of
network methodology and the Internet. Moreover, conventional intrusion recognition …

Extensive review of cloud based Internet of Things architecture and current trends

E Akanksha, A Debnath, B Dey - 2021 6th International …, 2021 - ieeexplore.ieee.org
IoT is a future network model and a vision where the heterogeneous devices become
smarter. The embedded devices interact with remote objects through Internet or Near-field …

Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study

M Abu-Tair, S Djahel, P Perry, B Scotney, U Zia… - Sensors, 2020 - mdpi.com
Internet of Things (IoT) technology is increasingly pervasive in all aspects of our life and its
usage is anticipated to significantly increase in future Smart Cities to support their myriad of …

Optimization of achievable rate in the multiuser satellite IoT system with SWIPT and MEC

J Fu, J Hua, J Wen, K Zhou, J Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Satellite communication is an important technology for the coverage of open country, and
plays a vital role of link channel in remote Internet of Things (IoT). However, various kinds of …

Energy-efficient optimal power allocation for swipt based iot-enabled smart meter

Z Masood, Ardiansyah, Y Choi - Sensors, 2021 - mdpi.com
This paper presents an internet of things (IoTs) enabled smart meter with energy-efficient
simultaneous wireless information and power transfer (SWIPT) for the wireless powered …