Low-altitude unmanned aerial vehicles-based internet of things services: Comprehensive survey and future perspectives

NH Motlagh, T Taleb, O Arouk - IEEE internet of things journal, 2016 - ieeexplore.ieee.org
Recently, unmanned aerial vehicles (UAVs), or drones, have attracted a lot of attention,
since they represent a new potential market. Along with the maturity of the technology and …

GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications

C Lai, R Lu, D Zheng, H Li, XS Shen - Computer Networks, 2016 - Elsevier
Supporting a massive number of machine to machine (M2M) devices has been considered
as an essential requirement in M2M communications. Meanwhile, cyber security is of …

Zero-touch security management for mMTC network slices: DDoS attack detection and mitigation

R Niboucha, SB Saad, A Ksentini… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Massive machine-type communications (mMTCs) network slices in 5G aim to connect a
massive number of MTC devices, opening the door for a widened attack surface. Network …

Radio link failure prediction in 5G networks

K Boutiba, M Bagaa, A Ksentini - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
Radio Link Failure (RLF) is a challenging problem in 5G networks as it may decrease
communication reliability and increases latency. This is against the objectives of 5G …

LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks

C Lai, H Li, R Lu, R Jiang… - 2013 IEEE Global …, 2013 - ieeexplore.ieee.org
Supporting a massive number of machine-type communication (MTC) devices has been
considered as an essential requirement in machine to machine (M2M) communications …

Mvnocoresim: A digital twin for virtualized iot-centric mobile core networks

S Geißler, F Wamser, W Bauer, S Gebert… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The rapid growth of connected devices has led to the implementation of Internet of Things
(IoT)-centric platforms designed to provide connectivity for machine-to-machine-type …

An end‐to‐end trusted architecture for network slicing in 5G and beyond networks

S Ben Saad, A Ksentini, B Brik - Security and Privacy, 2022 - Wiley Online Library
Abstract 5G opens the door not only for new network services but also for a new business
model involving new business actors. Particularly, the introduction of Network Slicing …

LEGA: A lightweight and efficient group authentication protocol for massive machine type communication in 5G networks

S Basudan - Journal of Communications and Information …, 2020 - ieeexplore.ieee.org
Massive machine type communication (mMTC) is anticipated to be an essential part of fifth
generation (5G) networks. The main challenge for mMTC devices (mMTCDs) is the design of …

Congestion and overload control techniques in massive M2M systems: a survey

L Ferdouse, A Anpalagan… - Transactions on Emerging …, 2017 - Wiley Online Library
Smart applications, Internet of things, cloud computing technologies are becoming
connected together by autonomous and intelligent devices. Communication among those …

Beta/M/1 model for machine type communication

X Jian, X Zeng, Y Jia, L Zhang… - IEEE Communications …, 2013 - ieeexplore.ieee.org
In context of Machine Type Communication (MTC) applications, network has to face
increased load as well as possible surges of MTC traffic due to massive concurrent data and …