Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

Security of unmanned aerial vehicle systems against cyber-physical attacks

C Rani, H Modares, R Sriram… - The Journal of …, 2016 - journals.sagepub.com
The federal aviation administration has estimated that by the year 2020, the United States
will have over 30,000 drones. Nowadays, drones, also known as unmanned aerial vehicles …

Security, privacy, and dependability evaluation in verification and validation life cycles for military IoT systems

M Pradhan, J Noll - IEEE Communications Magazine, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a disruptive technology that complements the usage of
modern day information and communications technology (ICT) systems. IoT systems, with …

Information System for Connection to the Access Point with Encryption WPA2 Enterprise

L Chyrun, L Chyrun, Y Kis, L Rybak - … of Decision Making and Problems of …, 2020 - Springer
This work is to create an information system that would provide a connection to the access
point with encryption WPA2 Enterprise. The practical value of the results obtained is to …

Propuesta de protocolos de seguridad para la red inalámbrica local de la Universidad de Cienfuegos

A González Paz, D Beltrán Casanova… - Revista Universidad y …, 2016 - scielo.sld.cu
En este trabajo se caracterizan las posibles amenazas en redes inalámbricas, los
protocolos de seguridad creados para las redes WLAN como: WEP, 802.11 i, WPA y WPA2 …

Attacks and Countermeasures on AES and ECC

H Tange, B Andersen - 2013 16th International Symposium on …, 2013 - ieeexplore.ieee.org
AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication
systems. AES has recently been exposed to new attacks which have questioned the overall …

Anti-forensic digital investigation for unauthorized intrusion on a wireless network

W Li - 2013 - openrepository.aut.ac.nz
In the last decade, the digital forensic methodologies and techniques have advanced
rapidly. They have many variations such as computer forensics, network forensics and in this …

Estudio de la Seguridad de las Redes WLAN de la Zona Urbana de Latacunga

DGF Punguil - Ciencias de la Ingeniería y Aplicadas, 2023 - 190.15.139.149
Este artículo aborda la seguridad de las redes WLAN en la zona urbana de Latacunga,
evaluando la preferencia entre redes de acceso abierto y cerrado, así como las diferencias …

Secure Handover in WSN using FLAP

M Kaur, S Kaur, KS Saini - 2016 2nd International Conference …, 2016 - ieeexplore.ieee.org
In today's world abundant data travelled from node to node or from cluster head to node or
vice versa in a Wireless Sensor Network (WSN). This data can be of any type but it must …

[PDF][PDF] Research and development of an unmanned aerial vehicle to automate monitoring of wireless access points

KL Bernstein - 2015 - Citeseer
Dr. Novadean Watson-Stone, Thesis Professor The proliferation of wireless access to
privileged networks in the enterprise introduces a potentially large attack surface and a …