MEC-enabled 5G use cases: a survey on security vulnerabilities and countermeasures

P Ranaweera, A Jurcut, M Liyanage - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The future of mobile and internet technologies are manifesting advancements beyond the
existing scope of science. The concepts of automated driving, augmented-reality, and …

Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

Security considerations for Internet of Things: A survey

A Jurcut, T Niculcea, P Ranaweera, NA Le-Khac - SN Computer Science, 2020 - Springer
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …

Blockchain assisted clustering with intrusion detection system for industrial internet of things environment

RF Mansour - Expert Systems with Applications, 2022 - Elsevier
Industry 4.0 has the potential to create new industrial revolution by offering intelligent,
secure, independent, and self-adaptive Industrial Internet of Things (IIoT) networks. These …

Towards blockchain-enabled security technique for industrial internet of things based decentralized applications

AH Sodhro, S Pirbhulal, M Muzammal… - Journal of Grid …, 2020 - Springer
Abstract As the Industrial Internet of Things (IIoT) is one of the emerging trends and
paradigm shifts to revolutionize the traditional industries with the fourth wave of evolution or …

Towards cognitive authentication for smart healthcare applications

AH Sodhro, C Sennersten, A Ahmad - Sensors, 2022 - mdpi.com
Secure and reliable sensing plays the key role for cognitive tracking ie, activity identification
and cognitive monitoring of every individual. Over the last years there has been an …

Federated learning for distributed iiot intrusion detection using transfer approaches

J Zhang, C Luo, M Carpenter… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Considering that low-cost and resource-cons-trained sensors coupled inherently could be
vulnerable to growing numbers of intrusion threats, industrial Internet-of-Things (IIoT) …

Decentralized energy efficient model for data transmission in IoT-based healthcare system

AH Sodhro, MS Al-Rakhami, L Wang… - 2021 IEEE 93rd …, 2021 - ieeexplore.ieee.org
The growing world population is facing challenges such as increased chronic diseases and
medical expenses. Integrate the latest modern technology into healthcare system can …

[HTML][HTML] A survey of virtual private LAN services (VPLS): Past, present and future

K Gaur, A Kalla, J Grover, M Borhani, A Gurtov… - Computer Networks, 2021 - Elsevier
Abstract Virtual Private LAN services (VPLS) is a Layer 2 Virtual Private Network (L2VPN)
service that has gained immense popularity due to a number of its features, such as protocol …

Comeback kid: Resilience for mixed-critical wireless network resource management

RJ Reifert, S Roth, AA Ahmad… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The future sixth generation (6G) of communication systems is envisioned to provide
numerous applications in safety-critical contexts, eg, driverless traffic, modular industry, and …