Blockchain for edge of things: Applications, opportunities, and challenges
In recent years, blockchain networks have attracted significant attention in many research
areas beyond cryptocurrency, one of them being the Edge of Things (EoT) that is enabled by …
areas beyond cryptocurrency, one of them being the Edge of Things (EoT) that is enabled by …
Physical layer authentication in wireless networks-based machine learning approaches
The physical layer security of wireless networks is becoming increasingly important because
of the rapid development of wireless communications and the increasing security threats. In …
of the rapid development of wireless communications and the increasing security threats. In …
Machine-learning-assisted security and privacy provisioning for edge computing: A survey
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …
millions of sensors and provide services at the device end. The broad vision of EC integrates …
A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …
provide communication among them without human intervention. However, the extensive …
Edge computing technology enablers: A systematic lecture study
With the increasing stringent QoS constraints (eg, latency, bandwidth, jitter) imposed by
novel applications (eg, e-Health, autonomous vehicles, smart cities, etc.), as well as the …
novel applications (eg, e-Health, autonomous vehicles, smart cities, etc.), as well as the …
A secured and intelligent communication scheme for IIoT-enabled pervasive edge computing
Industrial Internet of Things (IIoT) ensures reliable and efficient data exchanges among the
industrial processes using artificial intelligence within the cyber–physical systems. In the IIoT …
industrial processes using artificial intelligence within the cyber–physical systems. In the IIoT …
The security and privacy of mobile edge computing: An artificial intelligence perspective
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …
and information technology (IT) services to be delivered at the network's edge. By shifting …
Multiagent deep reinforcement learning for task offloading and resource allocation in cybertwin-based networks
W Hou, H Wen, H Song, W Lei… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
In this article, a hierarchical task offloading strategy is presented for delay-tolerant and delay-
sensitive missions by integrating edge computing and artificial intelligence into Cybertwin …
sensitive missions by integrating edge computing and artificial intelligence into Cybertwin …
Security and privacy in 5g-iiot smart factories: Novel approaches, trends, and challenges
To implement various artificial intelligence and automation applications in smart factories,
edge computing and industrial Internet of Things (IIoT) devices must be widely deployed, so …
edge computing and industrial Internet of Things (IIoT) devices must be widely deployed, so …
MAGLeak: A learning-based side-channel attack for password recognition with multiple sensors in IIoT environment
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors
and actuators to empower industrial sectors being smart, autonomous, efficient, and safety …
and actuators to empower industrial sectors being smart, autonomous, efficient, and safety …