AI-empowered fog/edge resource management for IoT applications: A comprehensive review, research challenges and future perspectives

GK Walia, M Kumar, SS Gill - IEEE Communications Surveys & …, 2023 - ieeexplore.ieee.org
The proliferation of ubiquitous Internet of Things (IoT) sensors and smart devices in several
domains embracing healthcare, Industry 4.0, transportation and agriculture are giving rise to …

Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends

AKMB Haque, B Bhushan, G Dhiman - Expert Systems, 2022 - Wiley Online Library
The emergence of smart cities and sustainable development has become a globally
accepted form of urbanization. The epitome of smart city development has become possible …

Experts and intelligent systems for smart homes' Transformation to Sustainable Smart Cities: A comprehensive review

NU Huda, I Ahmed, M Adnan, M Ali, F Naeem - Expert Systems with …, 2024 - Elsevier
In this constantly evolving landscape of urbanization, the relationship between technology
and automation, in regards to sustainability, holds immense significance. The intricate …

A review of security standards and frameworks for IoT-based smart environments

NM Karie, NM Sahri, W Yang, C Valli… - IEEE Access, 2021 - ieeexplore.ieee.org
Assessing the security of IoT-based smart environments such as smart homes and smart
cities is becoming fundamentally essential to implementing the correct control measures and …

“Baby, you can drive my car”: Psychological antecedents that drive consumers' adoption of AI-powered autonomous vehicles

L Meyer-Waarden, J Cloarec - Technovation, 2022 - Elsevier
Artificial intelligence (AI)-powered autonomous vehicles (AVs) are one of the most highly
anticipated technological advancements of our time, with potentially wide-ranging social …

Distributed denial of service attacks and its defenses in IoT: a survey

MM Salim, S Rathore, JH Park - The Journal of Supercomputing, 2020 - Springer
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …

Retracted article: maintaining security and privacy in health care system using learning based deep-Q-networks

P Mohamed Shakeel, S Baskar… - Journal of medical …, 2018 - Springer
In the recent past, Internet of Things (IoT) plays a significant role in different applications
such as health care, industrial sector, defense and research etc.… It provides effective …

A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

A review on smart home present state and challenges: linked to context-awareness internet of things (IoT)

ZA Almusaylim, N Zaman - Wireless networks, 2019 - Springer
The smart home is considered as an essential domain in Internet of Things (IoT)
applications, it is an interconnected home where all types of things interact with each other …

New enhanced authentication protocol for internet of things

M Azrour, J Mabrouki, A Guezzaz… - Big Data Mining and …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) refers to a new extended network that enables to any object to be
linked to the Internet in order to exchange data and to be controlled remotely. Nowadays …