Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey

JW Kim, K Edemacu, B Jang - Journal of Network and Computer …, 2022 - Elsevier
With the advancement in communication techniques and sensor technologies, mobile
crowdsensing (MCS)—one of the most successful applications of crowdsourcing—has …

Cybersecurity in the AI-Based metaverse: A survey

M Pooyandeh, KJ Han, I Sohn - Applied Sciences, 2022 - mdpi.com
The Metaverse is a multi-user virtual world that combines physical reality with digital virtual
reality. The three basic technologies for building the Metaverse are immersive technologies …

An empirical study on system level aspects of Internet of Things (IoT)

SN Swamy, SR Kota - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an integration of the Sensor, Embedded, Computing, and
Communication technologies. The purpose of the IoT is to provide seamless services to …

Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks

A Yazdinejad, RM Parizi… - … on Network Science …, 2019 - ieeexplore.ieee.org
5G mobile networks provide additional benefits in terms of lower latency, higher data rates,
and more coverage, in comparison to 4G networks, and they are also coming close to …

STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things

G Wu, L Xie, H Zhang, J Wang, S Shen, S Yu - Journal of Network and …, 2023 - Elsevier
Abstract Social Internet of Things (SIoT) with deep integration of Internet of Things and social
networks has become a target of a large number of hackers who attempt to spread viruses …

Cross-layer defense methods for jamming-resistant CBTC systems

L Zhu, Y Li, FR Yu, B Ning, T Tang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Communication-based Train Control (CBTC) systems are the burgeoning directions for
developing future train control systems. With the adoption of wireless communication and …

A trust-based security system for data collection in smart city

W Fang, N Cui, W Chen, W Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The authenticity and integrity of sensed data in the data collection stage is a very critical
aspect for the smart city industrial environment. They impact the accuracy of data analysis …

Intelligent jamming defense using DNN Stackelberg game in sensor edge cloud

J Liu, X Wang, S Shen, Z Fang, S Yu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
To ensure an accurate power allocation against increasing intelligent jamming attacks on
the offloading link of computation tasks, we investigate interactions between a cluster head …

Artificial intelligence in smart logistics cyber-physical systems: State-of-the-arts and potential applications

Y Liu, X Tao, X Li, AW Colombo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Logistics creates tremendous economic value through supporting the trading of goods
between firms and customers, thereby improving the welfare of the society. In order to …

Malware propagation model in wireless sensor networks under attack–defense confrontation

H Zhou, S Shen, J Liu - Computer Communications, 2020 - Elsevier
An important security problem faced by wireless sensor networks (WSNs) is malware
propagation. Traditional malware propagation models take less consideration of the impact …