Wireless communication technologies for IoT in 5G: Vision, applications, and challenges
Communication technologies are develo** very rapidly and achieving many breakthrough
results. The advent of 5th generation mobile communication networks, the so‐called 5G, has …
results. The advent of 5th generation mobile communication networks, the so‐called 5G, has …
A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities
B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …
Access control and authorization in smart homes: A survey
ZN Mohammad, F Farha… - Tsinghua Science …, 2021 - ieeexplore.ieee.org
With the rapid development of cyberspace and smart home technology, human life is
changing to a new virtual dimension with several promises for improving its quality …
changing to a new virtual dimension with several promises for improving its quality …
Reinforcement learning solution for cyber-physical systems security against replay attacks
Y Yu, W Yang, W Ding, J Zhou - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The security problem of state estimation plays a critical role in monitoring and managing
operation of cyber-physical systems (CPS). This paper considers the problem of network …
operation of cyber-physical systems (CPS). This paper considers the problem of network …
A survey of iot privacy security: Architecture, technology, challenges, and trends
P Sun, S Shen, Y Wan, Z Wu, Z Fang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control
and report environmental changes, prevent fires, and perform many more beneficial …
and report environmental changes, prevent fires, and perform many more beneficial …
[HTML][HTML] A review of Power System False data attack Detection Technology based on Big data
Z Chang, J Wu, H Liang, Y Wang, Y Wang, X **ong - Information, 2024 - mdpi.com
As power big data plays an increasingly important role in the operation, maintenance, and
management of power systems, complex and covert false data attacks pose a serious threat …
management of power systems, complex and covert false data attacks pose a serious threat …
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
The Internet of Things (IoT) has provided substantial enhancements to the communication of
sensors, actuators, and their controllers, particularly in the field of home automation. Home …
sensors, actuators, and their controllers, particularly in the field of home automation. Home …
Lightweight secure detection service for malicious attacks in wsn with timestamp-based mac
Sensors in wireless sensor network (WSN) are usually deployed in the wild or even hostile
circumstance. What is worse, most of the sensors have limited communication bandwidth …
circumstance. What is worse, most of the sensors have limited communication bandwidth …
A comparative study of machine learning classifiers for secure RF-PUF-based authentication in internet of things
This paper presents a RF-PUF-based authentication framework which exploits the intrinsic
non-idealities in the physical characteristic of devices to generate a unique identity for …
non-idealities in the physical characteristic of devices to generate a unique identity for …
Zigbee-Based Low Power Consumption Wearables Device for Voice Data Transmission
Short-range wireless technologies can transmit real-time voice, audio, picture, and video
communications. Such networks' energy usage and transmission reach are crucial …
communications. Such networks' energy usage and transmission reach are crucial …