A survey on scalable LoRaWAN for massive IoT: Recent advances, potentials, and challenges

M Jouhari, N Saeed, MS Alouini… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Long-range (LoRa) technology is most widely used for enabling low-power wide area
networks (WANs) on unlicensed frequency bands. Despite its modest data rates, it provides …

Privacy and security concerns in generative AI: a comprehensive survey

A Golda, K Mekonen, A Pandey, A Singh… - IEEE …, 2024 - ieeexplore.ieee.org
Generative Artificial Intelligence (GAI) has sparked a transformative wave across various
domains, including machine learning, healthcare, business, and entertainment, owing to its …

A holistic review of machine learning adversarial attacks in IoT networks

H Khazane, M Ridouani, F Salahdine, N Kaabouch - Future Internet, 2024 - mdpi.com
With the rapid advancements and notable achievements across various application
domains, Machine Learning (ML) has become a vital element within the Internet of Things …

Ensemble technique of intrusion detection for IoT-edge platform

A Aldaej, I Ullah, TA Ahanger, M Atiquzzaman - Scientific Reports, 2024 - nature.com
Abstract Internet of Things (IoT) technology has revolutionized modern industrial sectors.
Moreover, IoT technology has been incorporated within several vital domains of …

Lightweight cnn-bilstm based intrusion detection systems for resource-constrained iot devices

M Jouhari, M Guizani - 2024 International Wireless …, 2024 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) have played a significant role in detecting and
preventing cyber-attacks within traditional computing systems. It is not surprising that the …

Mitigating data imbalance to improve the generalizability in IoT DDoS detection tasks

Y Qing, X Liu, Y Du - The Journal of Supercomputing, 2024 - Springer
DDoS attacks launched by IoT botnets can be classified into low-rate and high-rate DDoS
attacks, which depict two distinct scenarios of data imbalance, namely, the minimal and …

[HTML][HTML] AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications

S Khan, GS Gaba, A Braeken, P Kumar… - International Journal of …, 2023 - Elsevier
Abstract Controller-Pilot Data Link Communications (CPDLC) are rapidly replacing voice-
based Air Traffic Control (ATC) communications worldwide. Being digital, CPDLC is highly …

[PDF][PDF] Revolutionizing modern networks: advances in AI, machine learning, and blockchain for quantum satellites and UAV-based communication

A Kumar, AI Awad, G Sharma… - arxiv preprint arxiv …, 2023 - academia.edu
Quantum communication is the most secure technique of transmitting data available today.
Fiber communication lines and satellite-to-ground links have served as the basis for the …

Enhancing 6G network security: GANs for pilot contamination attack detection in massive MIMO systems

JD Yadav, VK Dwivedi, S Chaturvedi - AEU-International Journal of …, 2024 - Elsevier
Accurate channel estimation at the base station (BS) is crucial for reliable, high-throughput
communication in massive multiple input multiple output (MIMO) systems. However, the …

Federated deep learning for intrusion detection in IoT networks

O Belarbi, T Spyridopoulos, E Anthi… - … 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
The vast increase of Internet of Things (IoT) technologies and the ever-evolving attack
vectors have increased cyber-security risks dramatically. A common approach to …