Edge computing and sensor-cloud: Overview, solutions, and directions

T Wang, Y Liang, X Shen, X Zheng, A Mahmood… - ACM Computing …, 2023 - dl.acm.org
Sensor-cloud originates from extensive recent applications of wireless sensor networks and
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …

A survey on security attacks in VANETs: Communication, applications and challenges

M Arif, G Wang, MZA Bhuiyan, T Wang… - Vehicular Communications, 2019 - Elsevier
Over the past few decades, the intelligent transportation system (ITS) have emerged with
new technologies and becomes the data-driven ITS, because the substantial amount of data …

[HTML][HTML] Blockchain-based recommender systems: Applications, challenges and future opportunities

Y Himeur, A Sayed, A Alsalemi, F Bensaali… - Computer Science …, 2022 - Elsevier
Recommender systems have been widely used in different application domains including
energy-preservation, e-commerce, healthcare, social media, etc. Such applications require …

A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing

T Wang, G Zhang, A Liu… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT)-Cloud combines the IoT and cloud computing, which not only
enhances the IoT's capability but also expands the scope of its applications. However, it …

Trust management in a blockchain based fog computing platform with trustless smart oracles

P Kochovski, S Gec, V Stankovski, M Bajec… - Future Generation …, 2019 - Elsevier
Trust is a crucial aspect when cyber-physical systems have to rely on resources and
services under ownership of various entities, such as in the case of Edge, Fog and Cloud …

The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications

AA Alli, MM Alam - Internet of Things, 2020 - Elsevier
The Fog computing paradigms are becoming popular means of utilizing resources optimally
by the IoT devices, extending quality of service to the vicinity of the user, and achieve fast …

ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs

T Khan, K Singh, MH Hasan, K Ahmad… - Future Generation …, 2021 - Elsevier
Trust-based secure routing schemes are more effective than cryptographic routing protocols
to convey energy-efficient data in WSNs since cryptographic protocols require high …

Edge-computing-based trustworthy data collection model in the internet of things

T Wang, L Qiu, AK Sangaiah, A Liu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
It is generally accepted that the edge computing paradigm is regarded as capable of
satisfying the resource requirements for the emerging mobile applications such as the …

Economic perspective analysis of protecting big data security and privacy

H Tao, MZA Bhuiyan, MA Rahman, G Wang… - Future Generation …, 2019 - Elsevier
This paper investigates the economic perspective analysis of protecting security and privacy
of big data. Traditionally, the pressing cyberthreats appear from emailed attachments …

Coupling resource management based on fog computing in smart city systems

T Wang, Y Liang, W Jia, M Arif, A Liu, M **e - Journal of Network and …, 2019 - Elsevier
The smart city is set to be the next important stage in human history. It consists of numerous
Cyber-physical systems (CPS) that can be endowed with different levels of intelligence …