Bio-inspired network security for 5G-enabled IoT applications

K Saleem, GM Alabduljabbar, N Alrowais… - IEEE …, 2020 - ieeexplore.ieee.org
Every IPv6-enabled device connected and communicating over the Internet forms the
Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform …

Declarative application management in the fog: A bacteria-inspired decentralised approach

A Brogi, S Forti, C Guerrero, I Lera - Journal of Grid Computing, 2021 - Springer
Orchestrating next-gen applications over heterogeneous resources along the Cloud-IoT
continuum calls for new strategies and tools to enable scalable and application-specific …

Secure secondary authentication framework for efficient mutual authentication on a 5G data network

S Gong, A El Azzaoui, J Cha, JH Park - Applied Sciences, 2020 - mdpi.com
The service-based architecture of the Fifth Generation (5G) had combined the services and
security architectures and enhanced the authentication process of services to expand the …

A high security symmetric key generation by using genetic algorithm based on a novel similarity model

MY Tsai, HH Cho - Mobile Networks and Applications, 2021 - Springer
Encryption technology has a great influence on data security. There are many encryptions
have been proposed. In general, the encryptions with higher complexity will provide higher …

Detecting LDoS in NB-IoTs by using metaheuristic-based CNN

CY Chen, HH Cho, MY Tsai… - … Journal of Ad Hoc …, 2021 - inderscienceonline.com
The number of IoT devices will grow explosively due to great potential of the NB-IoT so that
the IoT network environment will become a hotbed of botnets. Various IoT devices and …

LDoS Attacks Detection for ICPS NB-IoTs Environment via SE-Based CNN

HH Cho, MY Tsai, JY Zeng, CM Yu… - IEEE Systems …, 2023 - ieeexplore.ieee.org
After Industry 4.0 was proposed, cyber–physical systems (CPS) were also introduced into
the industrial environment called the industrial CPS. Internet-of-Things (IoT) services in the …

Using poisson distribution to enhance CNN-based NB-IoT LDoS attack detection

JY Zeng, LE Chang, HH Cho, CY Chen… - … IEEE Conference on …, 2022 - ieeexplore.ieee.org
Because the hardware capabilities of narrowband IoT devices are not enough to carry
powerful antivirus software or security mechanisms so that some scholars have used deep …

[Retracted] Radio Frequency Link and User Selection Algorithm for 5G Mobile Communication System

Z Lv, Z Xi - Complexity, 2021 - Wiley Online Library
Based on the millimetre‐wave time‐domain channel detector, this paper conducts channel
measurement and modelling for different scenarios and antenna types in typical frequency …

Differential-evolution-based weights fine tuning mechanism for GRU to predict 5G traffic flow

MY Tsai, HH Cho - 2021 International Symposium on Intelligent …, 2021 - ieeexplore.ieee.org
Gated recurrent unit (GRU) neural network has been widely used in mobile communication
traffic prediction. This is because that GRU can obtain acceptable prediction accuracy with …

Improving randomness of symmetric encryption for consumer privacy using metaheuristic-based framework

HH Cho, MY Tsai, FH Tseng, HT Wu… - IEEE Consumer …, 2021 - ieeexplore.ieee.org
In order to maintain data privacy and security for consumers, data encryption is closely
related to our daily lives. Symmetric encryption is currently the most widely used encryption …