A survey of physical layer techniques for secure wireless communications in industry
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …
service production and delivery. Communications are not an exception. Wired systems …
A survey on trust models in heterogeneous networks
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …
network system, which has become a hot research area in recent years towards next …
[PDF][PDF] Robust cluster-based routing protocol for IoT-assisted smart devices in WSN.
The Internet of Things (IoT) is gaining attention because of its broad applicability, especially
by integrating smart devices for massive communication during sensing tasks. IoT-assisted …
by integrating smart devices for massive communication during sensing tasks. IoT-assisted …
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things
Abstract The Internet of Things (IoT) is one of the most rapidly evolving networking concepts,
offering various applications for human benefit. Advances in embedded system architecture …
offering various applications for human benefit. Advances in embedded system architecture …
Dynamic bargain game theory in the internet of things for data trustworthiness
Smart home and smart building systems based on the Internet of Things (IoT) in smart cities
currently suffer from security issues. In particular, data trustworthiness and efficiency are two …
currently suffer from security issues. In particular, data trustworthiness and efficiency are two …
A review on trust management in fog/edge computing: Techniques, trends, and challenges
Cloud computing provides software, infrastructure, and platform as services and reduces the
cost of usage for cloud customers. Recently, a system architecture called Fog and Edge …
cost of usage for cloud customers. Recently, a system architecture called Fog and Edge …
[HTML][HTML] A comprehensive survey on data aggregation techniques in UAV-enabled Internet of things
In recent years, unmanned aerial vehicles (UAVs) have been used to extend the Internet of
things (IoT) framework owing to their vast applications, monitoring and surveillance …
things (IoT) framework owing to their vast applications, monitoring and surveillance …
A survey study on trust-based security in Internet of Things: Challenges and issues
Abstract The Internet of Things (IoT) is an emerging communication technology which
connects all of the network-enabled devises in all of the world. It is being pervasively utilized …
connects all of the network-enabled devises in all of the world. It is being pervasively utilized …
Cybersecurity and blockchain usage in contemporary business
The use of computers is becoming more and more common. The power and maliciousness
of powerful attackers are increasing. Organizations must improve their ability to mitigate …
of powerful attackers are increasing. Organizations must improve their ability to mitigate …
Performance evaluation of mobile RPL-based IoT networks under version number attack
Abstract The Internet of Things (IoT) has a vital role in communication and has many cross-
platform applications which generate a massive volume of data. IoT interconnects various …
platform applications which generate a massive volume of data. IoT interconnects various …