A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …

Quantum cryptography in 5G networks: a comprehensive overview

M Mehic, L Michalek, E Dervisevic… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …

Security assessment and evaluation of VPNs: a comprehensive survey

H Abbas, N Emmanuel, MF Amjad, T Yaqoob… - ACM Computing …, 2023 - dl.acm.org
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to
provide confidentiality and anonymity to communication. Despite this enormous and …

5G network slice isolation with WireGuard and open source MANO: A VPNaaS proof-of-concept

S Haga, A Esmaeily, K Kralevska… - 2020 IEEE Conference …, 2020 - ieeexplore.ieee.org
The fifth-generation (5G) mobile networks aim to host different types of services on the same
physical infrastructure. Network slicing is considered as the key enabler for achieving this …

Automated VPN configuration using DevOps

L Firdaouss, B Ayoub, B Manal, Y Ikrame - Procedia Computer Science, 2022 - Elsevier
Enterprise networks are becoming increasingly sophisticated and large in scale due to the
critical need for interconnectivity. For the interconnection of sites, VPN technology is …

Bayesian filtering for joint multi-user positioning, synchronization and anchor state calibration

Y Lu, O Kaltiokallio, M Koivisto, J Talvitie… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Millimeter (mmWave) positioning can go beyond classical localization, allowing to extract
more complete situational awareness in terms of, eg clock offsets, antenna orientations or …

Enabling and optimizing MACsec for industrial environments

T Lackorzynski, G Garten, JS Huster… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Industry 4.0 will revolutionize industrial automation. Yet, future smart factories will not be
created from scratch. They will rather evolve from existing legacy installations …

[HTML][HTML] Моделирование телекоммуникационной сети средствами сетевых инструментов Linux: инструменты создания цифровых двойников

АГ Уймин, ОР Никитин - I-methods, 2023 - cyberleninka.ru
Введение: В работе осуществлено обоснование использования операционной
системы Linux, как инструмент создания цифровых двойников. Постановка задачи: при …

Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard

S Yao, X Tian, J Chen, Y Xiong - International Journal of …, 2023 - Wiley Online Library
Smart grid has drawn a lot of attention and investment in recent years, which not only helps
the modern generation and distribution of traditional power but also highly widens the …

On the network slicing for enterprise services with hybrid SDN

LMM Zorello, S Troia, S Giannotti… - 2020 IEEE Latin …, 2020 - ieeexplore.ieee.org
Nowadays, companies strongly rely on Virtual Private Networks (VPNs) to deliver services
between geographically distributed branch offices. Internet Service Providers (ISPs) must …