Toward a secure 5G-enabled internet of things: A survey on requirements, privacy, security, challenges, and opportunities

SF Ahmed, MSB Alam, S Afrin, SJ Rafa, SB Taher… - IEEE …, 2024 - ieeexplore.ieee.org
5G and the Internet of Things (IoT) are a potent combination that offers a vast IoT
infrastructure that can support billions of connected devices while maintaining reliability …

An overview of emergency communication networks

Q Wang, W Li, Z Yu, Q Abbasi, M Imran, S Ansari… - Remote Sensing, 2023 - mdpi.com
In recent years, major natural disasters and public safety accidents have frequently occurred
worldwide. In order to deal with various disasters and accidents using rapidly deployable …

Post-disaster communications: Enabling technologies, architectures, and open challenges

M Matracia, N Saeed, MA Kishk… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
The number of disasters has increased over the past decade where these calamities
significantly affect the functionality of communication networks. In the context of 6G, airborne …

[HTML][HTML] Sensors on the internet of things systems for urban disaster management: a systematic literature review

F Zeng, C Pang, H Tang - Sensors, 2023 - mdpi.com
The occurrence of disasters has the potential to impede the progress of sustainable urban
development. For instance, it has the potential to result in significant human casualties and …

IoT-Driven Transformation of Circular Economy Efficiency: An Overview

Z Turskis, V Šniokienė - Mathematical and Computational Applications, 2024 - mdpi.com
The intersection of the Internet of Things (IoT) and the circular economy (CE) creates a
revolutionary opportunity to redefine economic sustainability and resilience. This review …

IoTSecUT: Uncertainty-Based Hybrid Deep Learning Approach for Superior IoT Security Amidst Evolving Cyber Threats

AGM Mengara, Y Yoo… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The rapid expansion of digital infrastructure has led to increased security threats. Deep
learning (DL) algorithms have emerged as potent tools for detecting cyberattacks in Internet …

A flexible mmWave layer 2 protocol implementation for integrated access and backhaul architecture

R Verdecia-Peña, R Oliveira, JI Alonso - IEEE Access, 2023 - ieeexplore.ieee.org
In this paper, we present a 3GPP-inspired hardware implementation for the out-of-band
Integrated Access and Backhaul (IAB) network, which serves as a solution to both coverage …

Role-based user allocation driven by criticality in edge computing

E Liu, L Zheng, Q He, P Lai, B Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Edge computing is a promising solution to enabling highly accessible resources and latency-
sensitive services for nearby users. In public safety, it can provide critical support for urban …

Tactical edge iot in defense and national security

P Fraga‐Lamas… - IoT for Defense and …, 2022 - Wiley Online Library
The deployment of internet of things (IoT) systems in Defense and National Security faces
some limitations that can be addressed with Edge Computing approaches. The Edge …

[HTML][HTML] Petri-Net based multi-objective optimization in multi-UAV aided large-scale wireless power and information transfer networks

H Qin, B Zhao, L Xu, X Bai - Remote Sensing, 2021 - mdpi.com
Power consumption in wireless sensor networks is high, and the lifetime of a battery has
become a bottleneck, restricting network performance. Wireless power transfer with a …