A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022‏ - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

Blockchain for smart cities: A review of architectures, integration trends and future research directions

B Bhushan, A Khamparia, KM Sagayam… - Sustainable Cities and …, 2020‏ - Elsevier
In recent years, smart city has emerged as a new paradigm to provide high quality facilities
to the citizens by dynamically optimising the city resources. Smart cities can offer finest …

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024‏ - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm

S Subbiah, KSM Anbananthen… - Journal of …, 2022‏ - ieeexplore.ieee.org
Attacks in wireless sensor networks (WSNs) aim to prevent or eradicate the network's ability
to perform its anticipated functions. Intrusion detection is a defense used in wireless sensor …

Securing wireless sensor networks using machine learning and blockchain: A review

S Ismail, DW Dawoud, H Reza - Future Internet, 2023‏ - mdpi.com
As an Internet of Things (IoT) technological key enabler, Wireless Sensor Networks (WSNs)
are prone to different kinds of cyberattacks. WSNs have unique characteristics, and have …

Securing IOT devices against emerging security threats: Challenges and mitigation techniques

M Aziz Al Kabir, W Elmedany… - Journal of Cyber Security …, 2023‏ - Taylor & Francis
The increasing prevalence of IoT devices has brought about numerous security challenges
due to their relatively simple internal architecture and low-powered hardware warranted by …

[HTML][HTML] Wireless sensor networks: Active and passive attacks-vulnerabilities and countermeasures

M Keerthika, D Shanmugapriya - Global Transitions Proceedings, 2021‏ - Elsevier
Wireless sensor network has attracted significant attention in research and development due
to its tremendous applications in medical, military and defence, medical, environmental …

A unified architectural approach for cyberattack-resilient industrial control systems

C Zhou, B Hu, Y Shi, YC Tian, X Li… - Proceedings of the …, 2020‏ - ieeexplore.ieee.org
With the rapid development of functional requirements in the emerging Industry 4.0 era,
modern industrial control systems (ICSs) are no longer isolated islands, making them more …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020‏ - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022‏ - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …