Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

Blockchain for smart cities: A review of architectures, integration trends and future research directions

B Bhushan, A Khamparia, KM Sagayam… - Sustainable Cities and …, 2020 - Elsevier
In recent years, smart city has emerged as a new paradigm to provide high quality facilities
to the citizens by dynamically optimising the city resources. Smart cities can offer finest …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

[HTML][HTML] Intelligent authentication of 5G healthcare devices: A survey

AH Sodhro, AI Awad, J van de Beek, G Nikolakopoulos - Internet of Things, 2022 - Elsevier
The dynamic nature of wireless links and the mobility of devices connected to the Internet of
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …

LT-SEI: Long-tailed specific emitter identification based on decoupled representation learning in low-resource scenarios

H Zha, H Wang, Z Feng, Z Xiang, W Yan… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In the case of COVID-19, which requires stable and reliable tracking of personnel
movement, aircraft identification by specific emitter identification (SEI) is a hot-button issue. It …

Smart applications in edge computing: Overview on authentication and data security

X Li, T Chen, Q Cheng, S Ma… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
As a new computing paradigm, edge computing has appeared in the public field of vision
recently. Owing to its advantages of low delay and fast response, edge computing has …

Towards a unified framework for physical layer security in 5G and beyond networks

MSJ Solaija, H Salman, H Arslan - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Wireless systems have become an increasingly pivotal part of our lives. Various critical
applications and use cases such as healthcare, financial transactions, e-commerce …

Exploiting channel gain and phase noise for PHY-layer authentication in massive MIMO systems

P Zhang, J Liu, Y Shen, X Jiang - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
By exploiting two intrinsic physical (PHY)-layer features in terms of location-specific channel
gain and transmitter-specific phase noise, this paper proposes a new PHY-layer …

{PhyAuth}:{Physical-Layer} Message Authentication for {ZigBee} Networks

A Li, J Li, D Han, Y Zhang, T Li, T Zhu… - 32nd USENIX Security …, 2023 - usenix.org
ZigBee is a popular wireless communication standard for Internet of Things (IoT) networks.
Since each ZigBee network uses hop-by-hop network-layer message authentication based …

An efficient cross-layer authentication scheme for secure communication in vehicular ad-hoc networks

MA Shawky, M Bottarelli, G Epiphaniou… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Intelligent transportation systems contribute to improved traffic safety by facilitating real-time
communication between vehicles and infrastructures. In this context, message …