Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning

ZM Fadlullah, B Mao, N Kato - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
While the emerging 6G networks are anticipated to meet the high-end service quality
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …

A survey of intrusion detection in wireless network applications

R Mitchell, R Chen - Computer Communications, 2014 - Elsevier
Abstract Information systems are becoming more integrated into our lives. As this integration
deepens, the importance of securing these systems increases. Because of lower installation …

Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy

Q Wang, Y Zhang, X Lu, Z Wang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Nowadays gigantic crowd-sourced data from mobile devices have become widely available
in social networks, enabling the possibility of many important data mining applications to …

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Q Jiang, J Ma, X Lu, Y Tian - Peer-to-peer Networking and Applications, 2015 - Springer
User authentication with unlinkability is one of the corner stone services for many security
and privacy services which are required to secure communications in wireless sensor …

Secure and privacy preserving protocol for cloud-based vehicular DTNs

J Zhou, X Dong, Z Cao… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cloud-assisted vehicular delay tolerant networks (DTNs) have been utilized in wide-ranging
applications where a continuous end-to-end connection is unavailable, the message …

[HTML][HTML] A method for defensing against multi-source Sybil attacks in VANET

X Feng, C Li, D Chen, J Tang - Peer-to-Peer Networking and Applications, 2017 - Springer
Sybil attack can counterfeit traffic scenario by sending false messages with multiple
identities, which often causes traffic jams and even leads to vehicular accidents in vehicular …

A novel design for content delivery over software defined mobile social networks

Z Su, Q Xu, H Zhu, Y Wang - IEEE Network, 2015 - ieeexplore.ieee.org
With the rapid development of mobile communication technologies, various kinds of content
can be delivered among mobile users for content sharing. Due to the complexity of networks …

Efficient privacy-preserving scheme for real-time location data in vehicular ad-hoc network

J Cui, J Wen, S Han, H Zhong - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
The development of vehicular ad-hoc network (VANET) allows vehicle users to enjoy
location-based services through the network at any time and place. However, it also raises …

A context-aware trust-based information dissemination framework for vehicular networks

K Rostamzadeh, H Nicanfar, N Torabi… - IEEE Internet of …, 2015 - ieeexplore.ieee.org
Reliable, secure, private, and fast communication in vehicular networks is extremely
challenging due to the highly mobile nature of these networks. Contact time between …

FogRoute: DTN-based data dissemination model in fog computing

L Gao, TH Luan, S Yu, W Zhou… - IEEE Internet of Things …, 2016 - ieeexplore.ieee.org
Fog computing, known as “cloud closed to ground,” deploys light-weight compute facility,
called Fog servers, at the proximity of mobile users. By precatching contents in the Fog …