Survey on multi-access edge computing security and privacy
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …
technologies and have wide range of applications in our surrounding environment. The …
Reinforcement learning-based physical cross-layer security and privacy in 6G
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
Optimal resource allocation for delay minimization in NOMA-MEC networks
Multi-access edge computing (MEC) can enhance the computing capability of mobile
devices, while non-orthogonal multiple access (NOMA) can provide high data rates …
devices, while non-orthogonal multiple access (NOMA) can provide high data rates …
Optimal energy-efficient resource allocation and fault tolerance scheme for task offloading in IoT-FoG computing networks
B Premalatha, P Prakasam - Computer networks, 2024 - Elsevier
Due to technology development in the recent past, it is observed that an exponential growth
in the usage of high speed intelligent devices which includes smart objects, smart home …
in the usage of high speed intelligent devices which includes smart objects, smart home …
Cooperative wireless-powered NOMA relaying for B5G IoT networks with hardware impairments and channel estimation errors
Massive connectivity and limited energy are main challenges for the beyond 5G (B5G)-
enabled massive Internet of Things (IoT) to maintain diversified Qualify of Service (QoS) of …
enabled massive Internet of Things (IoT) to maintain diversified Qualify of Service (QoS) of …
Robust design for NOMA-based multibeam LEO satellite Internet of Things
In this article, we investigate the issue of massive access in a beyond fifth-generation (B5G)
multibeam low-Earth orbit (LEO) satellite Internet-of-Things (IoT) network in the presence of …
multibeam low-Earth orbit (LEO) satellite Internet-of-Things (IoT) network in the presence of …
NOMA-assisted machine-type communications in UDN: State-of-the-art and challenges
The inevitable next era of smart living requires unprecedented advances in enabling
technologies. The building blocks of this era are devices such as sensors, actuators, and …
technologies. The building blocks of this era are devices such as sensors, actuators, and …
Energy-efficient resource allocation for NOMA-MEC networks with imperfect CSI
The combination of non-orthogonal multiple access (NOMA) and multi-access edge
computing (MEC) can significantly improve the system performance including …
computing (MEC) can significantly improve the system performance including …
Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …