Wireless powered mobile edge computing networks: A survey

X Wang, J Li, Z Ning, Q Song, L Guo, S Guo… - ACM Computing …, 2023 - dl.acm.org
Wireless Powered Mobile Edge Computing (WPMEC) is an integration of Mobile Edge
Computing (MEC) and Wireless Power Transfer (WPT) technologies, to both improve …

On the edge of the deployment: A survey on multi-access edge computing

P Cruz, N Achir, AC Viana - ACM Computing Surveys, 2022 - dl.acm.org
Multi-Access Edge Computing (MEC) attracts much attention from the scientific community
due to its scientific, technical, and commercial implications. In particular, the European …

[HTML][HTML] Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

[HTML][HTML] Machine learning for physical layer in 5G and beyond wireless networks: A survey

J Tanveer, A Haider, R Ali, A Kim - Electronics, 2021 - mdpi.com
Fifth-generation (5G) technology will play a vital role in future wireless networks. The
breakthrough 5G technology will unleash a massive Internet of Everything (IoE), where …

Operating systems and hypervisors for network functions: A survey of enabling technologies and research studies

AS Thyagaturu, P Shantharama, A Nasrallah… - IEEE …, 2022 - ieeexplore.ieee.org
Scalable and flexible communication networks increasingly conduct the packet processing
for Network Functions (NFs) in General Purpose Computing (GPC) platforms. The …

Edge computing in IoT: A 6G perspective

M Ishtiaq, N Saeed, MA Khan - arXiv preprint arXiv:2111.08943, 2021 - arxiv.org
Edge computing is one of the key driving forces to enable Beyond 5G (B5G) and 6G
networks. Due to the unprecedented increase in traffic volumes and computation demands …

[HTML][HTML] Autonomous vehicles: The cybersecurity vulnerabilities and countermeasures for big data communication

A Algarni, V Thayananthan - Symmetry, 2022 - mdpi.com
The possible applications of communication based on big data have steadily increased in
several industries, such as the autonomous vehicle industry, with a corresponding increase …

[HTML][HTML] Improved handover authentication in fifth-generation communication networks using fuzzy evolutionary optimisation with nanocore elements in mobile …

J Divakaran, SK Prashanth, GB Mohammad… - Journal of Healthcare …, 2022 - hindawi.com
Authentication is a suitable form of restricting the network from different types of attacks,
especially in case of fifth-generation telecommunication networks, especially in healthcare …

Mobile Edge Computing and Machine Learning in The Internet of Unmanned Aerial Vehicles: A Survey

Z Ning, H Hu, X Wang, L Guo, S Guo, G Wang… - ACM Computing …, 2023 - dl.acm.org
Unmanned Aerial Vehicles (UAVs) play an important role in the Internet of Things (IoT), and
form the paradigm of the Internet of UAVs, due to their characteristics of flexibility, mobility …

The Role of Network Slicing and Edge Computing in the Metaverse Realization

S Karunarathna, S Wijethilaka, P Ranaweera… - IEEE …, 2023 - ieeexplore.ieee.org
Metaverse is the latest technological hype in the modern world due to its potential for
revolutionizing the digital visual perspective. With the COVID-19 pandemic, most industries …