A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

A survey on trust models in heterogeneous networks

J Wang, Z Yan, H Wang, T Li… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …

[PDF][PDF] Robust cluster-based routing protocol for IoT-assisted smart devices in WSN.

M Shafiq, H Ashraf, A Ullah, M Masud… - … Materials & Continua, 2021 - cdn.techscience.cn
The Internet of Things (IoT) is gaining attention because of its broad applicability, especially
by integrating smart devices for massive communication during sensing tasks. IoT-assisted …

A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things

TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …

Dynamic bargain game theory in the internet of things for data trustworthiness

AC Sumathi, M Akila, R Pérez de Prado, M Wozniak… - Sensors, 2021 - mdpi.com
Smart home and smart building systems based on the Internet of Things (IoT) in smart cities
currently suffer from security issues. In particular, data trustworthiness and efficiency are two …

A review on trust management in fog/edge computing: Techniques, trends, and challenges

M Nikravan, MH Kashani - Journal of Network and Computer Applications, 2022 - Elsevier
Cloud computing provides software, infrastructure, and platform as services and reduces the
cost of usage for cloud customers. Recently, a system architecture called Fog and Edge …

[HTML][HTML] A comprehensive survey on data aggregation techniques in UAV-enabled Internet of things

AM Raivi, S Moh - Computer Science Review, 2023 - Elsevier
In recent years, unmanned aerial vehicles (UAVs) have been used to extend the Internet of
things (IoT) framework owing to their vast applications, monitoring and surveillance …

A survey study on trust-based security in Internet of Things: Challenges and issues

MH Shirvani, M Masdari - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is an emerging communication technology which
connects all of the network-enabled devises in all of the world. It is being pervasively utilized …

Cybersecurity and blockchain usage in contemporary business

IA Shah, NZ Jhanjhi, A Laraib - Handbook of Research on …, 2023 - igi-global.com
The use of computers is becoming more and more common. The power and maliciousness
of powerful attackers are increasing. Organizations must improve their ability to mitigate …

Performance evaluation of mobile RPL-based IoT networks under version number attack

G Sharma, J Grover, A Verma - Computer Communications, 2023 - Elsevier
Abstract The Internet of Things (IoT) has a vital role in communication and has many cross-
platform applications which generate a massive volume of data. IoT interconnects various …