[HTML][HTML] Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions

PP Ray - Internet of Things and Cyber-Physical Systems, 2023 - Elsevier
Web3, the next generation web, promises a decentralized and democratized internet that
puts users in control of their data and online identities. However, Web3 faces significant …

Edge intelligence—research opportunities for distributed computing continuum systems

VC Pujol, PK Donta, A Morichetta… - IEEE Internet …, 2023 - ieeexplore.ieee.org
Edge intelligence and, by extension, any distributed computing continuum system will bring
to our future society a plethora of new and useful applications, which will certainly …

[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

Security of zero trust networks in cloud computing: A comparative review

S Sarkar, G Choudhary, SK Shandilya, A Hussain… - Sustainability, 2022 - mdpi.com
Recently, networks have shifted from traditional in-house servers to third-party-managed
cloud platforms due to its cost-effectiveness and increased accessibility toward its …

[HTML][HTML] Federated learning optimization: A computational blockchain process with offloading analysis to enhance security

S Shitharth, H Manoharan, A Shankar… - Egyptian informatics …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technology in various applications used in data
processing systems requires high security because more data must be saved in cloud …

Machine learning in identity and access management systems: Survey and deep dive

S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …

Drone transportation system: Systematic review of security dynamics for smart mobility

SO Ajakwe, DS Kim, JM Lee - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The intelligence and integrity of a real-time cyber–physical system depend on how
trustworthy the data's legitimacy, appropriation, and authorization are during end-to-end …

Zero trust architecture empowered attack detection framework to secure 6g edge computing

H Sedjelmaci, N Ansari - IEEE Network, 2023 - ieeexplore.ieee.org
Recent advances in edge computing and its imminent adoption in Sixth Generation (6G)
wireless networks have led to a propitious paradigm defined as 6G edge computing …

Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey

VT Hoang, YA Ergu, VL Nguyen, RG Chang - Journal of Network and …, 2024 - Elsevier
The advent of sixth-generation (6G) networks is expected to start a new era in mobile
networks, characterized by unprecedented high demands on dense connectivity, ultra …