Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …

Edge YOLO: Real-time intelligent object detection system based on edge-cloud cooperation in autonomous vehicles

S Liang, H Wu, L Zhen, Q Hua, S Garg… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Driven by the ever-increasing requirements of autonomous vehicles, such as traffic
monitoring and driving assistant, deep learning-based object detection (DL-OD) has been …

[HTML][HTML] Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine

J Zhang, Q Yan, X Zhu, K Yu - Digital Communications and Networks, 2023 - Elsevier
The crowd sensing technology can realize the sensing and computing of people, machines,
and environment in smart industrial IoT-based coal mine, which provides a solution for …

Reliability–Security Tradeoff Analysis in mmWave Ad Hoc–based CPS

Y Ju, M Yang, C Chakraborty, L Liu, Q Pei… - ACM Transactions on …, 2024 - dl.acm.org
Cyber-physical systems (CPS) offer integrated resolutions for various applications by
combining computer and physical components and enabling individual machines to work …

Identification and resolution for industrial internet: Architecture and key technology

Y Liu, C Chi, Y Zhang, T Tang - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
As a key component of Industrial Internet, identification and resolution has been considered
as a promising technology to realize the interconnections among physical and virtual entities …

[HTML][HTML] A Cross-Layer Secure and Energy-Efficient Framework for the Internet of Things: A Comprehensive Survey

R Mustafa, NI Sarkar, M Mohaghegh… - Sensors (Basel …, 2024 - pmc.ncbi.nlm.nih.gov
This survey delves into cross-layer energy-efficient solutions and cutting-edge security
measures for Internet of Things (IoT) networks. The conventional security techniques are …

Elliptic curve cryptography considerations for securing automation and SCADA systems

A Tidrea, A Korodi, I Silea - Sensors, 2023 - mdpi.com
Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things
and Industry 4.0 is a challenge today due to the increased number of attacks against …

Short-packet communications in multihop networks with WET: Performance analysis and deep learning-aided optimization

TV Nguyen, VD Nguyen, DB da Costa… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
In this paper, we study short-packet communications in multi-hop networks with wireless
energy transfer, where relay nodes harvest energy from power beacons to transmit short …

Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things

H Zhong, C Gu, Q Zhang, J Cui, C Gu, D He - Ad Hoc Networks, 2023 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a key technology for building intelligent
manufacturing, optimizing industrial device management, and improving productivity …

Sustainable authentication and key agreement protocol using chaotic maps for industry 5.0

T Zhang, J Shen, H Yang, P Vijayakumar… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the rapid development and maturity of human-machine interaction and industrial
Internet technology, the concept of a human-machine collaborative industrial model has …