Blockchain for edge of things: Applications, opportunities, and challenges

TR Gadekallu, QV Pham, DC Nguyen… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
In recent years, blockchain networks have attracted significant attention in many research
areas beyond cryptocurrency, one of them being the Edge of Things (EoT) that is enabled by …

[HTML][HTML] Physical layer authentication in wireless networks-based machine learning approaches

L Alhoraibi, D Alghazzawi, R Alhebshi, OBJ Rabie - Sensors, 2023 - mdpi.com
The physical layer security of wireless networks is becoming increasingly important because
of the rapid development of wireless communications and the increasing security threats. In …

Machine-learning-assisted security and privacy provisioning for edge computing: A survey

S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …

A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …

Edge computing technology enablers: A systematic lecture study

S Douch, MR Abid, K Zine-Dine, D Bouzidi… - IEEE …, 2022 - ieeexplore.ieee.org
With the increasing stringent QoS constraints (eg, latency, bandwidth, jitter) imposed by
novel applications (eg, e-Health, autonomous vehicles, smart cities, etc.), as well as the …

A secured and intelligent communication scheme for IIoT-enabled pervasive edge computing

F Khan, MA Jan, A ur Rehman… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) ensures reliable and efficient data exchanges among the
industrial processes using artificial intelligence within the cyber–physical systems. In the IIoT …

Multiagent deep reinforcement learning for task offloading and resource allocation in cybertwin-based networks

W Hou, H Wen, H Song, W Lei… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
In this article, a hierarchical task offloading strategy is presented for delay-tolerant and delay-
sensitive missions by integrating edge computing and artificial intelligence into Cybertwin …

The security and privacy of mobile edge computing: An artificial intelligence perspective

C Wang, Z Yuan, P Zhou, Z Xu, R Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …

Security and privacy in 5g-iiot smart factories: Novel approaches, trends, and challenges

CC Lin, CT Tsai, YL Liu, TT Chang… - Mobile Networks and …, 2023 - Springer
To implement various artificial intelligence and automation applications in smart factories,
edge computing and industrial Internet of Things (IIoT) devices must be widely deployed, so …

MAGLeak: A learning-based side-channel attack for password recognition with multiple sensors in IIoT environment

D Chen, Z Zhao, X Qin, Y Luo, M Cao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors
and actuators to empower industrial sectors being smart, autonomous, efficient, and safety …