Security and privacy on 6g network edge: A survey

B Mao, J Liu, Y Wu, N Kato - IEEE communications surveys & …, 2023 - ieeexplore.ieee.org
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …

AI, blockchain, and vehicular edge computing for smart and secure IoV: Challenges and directions

A Hammoud, H Sami, A Mourad, H Otrok… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is turning into an undeniably develo** point of discussion in both
research and industrial fields. A key area that is witnessing a quick development in the …

A survey on federated learning: The journey from centralized to distributed on-site learning and beyond

S AbdulRahman, H Tout… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Driven by privacy concerns and the visions of deep learning, the last four years have
witnessed a paradigm shift in the applicability mechanism of machine learning (ML). An …

Artificial intelligence for edge service optimization in internet of vehicles: A survey

X Xu, H Li, W Xu, Z Liu, L Yao… - Tsinghua Science and …, 2021 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) plays a crucial role in providing diversified services because of
its powerful capability of collecting real-time information. Generally, collected information is …

FedMCCS: Multicriteria client selection model for optimal IoT federated learning

S AbdulRahman, H Tout, A Mourad… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
As an alternative centralized systems, which may prevent data to be stored in a central
repository due to its privacy and/or abundance, federated learning (FL) is nowadays a game …

Strengthening the security of smart contracts through the power of artificial intelligence

M Krichen - Computers, 2023 - mdpi.com
Smart contracts (SCs) are digital agreements that execute themselves and are stored on a
blockchain. Despite the fact that they offer numerous advantages, such as automation and …

Intrusion detection for secure social internet of things based on collaborative edge computing: a generative adversarial network-based approach

L Nie, Y Wu, X Wang, L Guo, G Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Social Internet of Things (SIoT) now penetrates our daily lives. As a strategy to alleviate
the escalation of resource congestion, collaborative edge computing (CEC) has become a …

AI-based cloud-edge-device collaboration in 6G space-air-ground integrated power IoT

Z Wang, Z Zhou, H Zhang, G Zhang… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
Space-air-ground integrated communication networks and artificial intelligence (AI) play
critical roles in future 6G wireless communication. The Power Internet of Things (PIoT) …

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection

A Mourad, H Tout, OA Wahab, H Otrok… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Vehicles and vehicular networks have been compelling targets for malicious
security attacks where several intrusion detection solutions have been proposed for …

Data security-based routing in MANETs using key management mechanism

P Bondada, D Samanta, M Kaur, HN Lee - Applied Sciences, 2022 - mdpi.com
A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless
mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can …