Study and investigation on 5G technology: A systematic review

R Dangi, P Lalwani, G Choudhary, I You, G Pau - Sensors, 2021 - mdpi.com
In wireless communication, Fifth Generation (5G) Technology is a recent generation of
mobile networks. In this paper, evaluations in the field of mobile communication technology …

Comprehensive review on misbehavior detection for vehicular ad hoc networks

X Xu, Y Wang, P Wang - Journal of Advanced Transportation, 2022 - Wiley Online Library
Vehicular ad hoc networks (VANETs) can increase road safety and comfort. It needs strong
demand for security because the data sent in VANETs influence vehicles' behavior. Existing …

Machine-learning-assisted security and privacy provisioning for edge computing: A survey

S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …

Cyber security challenges in aviation communication, navigation, and surveillance

G Dave, G Choudhary, V Sihag, I You, KKR Choo - Computers & Security, 2022 - Elsevier
As the aviation sector becomes digitized and increasingly reliant on wireless technology, so
has its attractiveness to cyber attackers including nation-state actors and terrorists. For …

Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment

A Mitra, B Bera, AK Das, SS Jamal, I You - Computer Communications, 2023 - Elsevier
Abstract Cognitive Internet of Things (CIoT) supports the organizations to learn from the
information (data) arriving from various connected devices, sensors, machines and other …

Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System

PV Astillo, DG Duguma, H Park, J Kim, B Kim… - Future Generation …, 2022 - Elsevier
Implantable internet of things medical devices (IoTMD) has drawn a disruptive
transformation in the healthcare domain. It has improved the services of healthcare …

[PDF][PDF] Cybsersecurity issues in robotics

G Lacava, A Marotta, F Martinelli, A Saracino… - 2021 - iris.sssup.it
Cybersecurity in Robotics is a rapidly develo** area that draws attention from practitioners
and researchers. An increase in cyber-attacks, combined with the development of …

Jamming detection in IoT wireless networks: An edge-AI based approach

A Hussain, N Abughanam, J Qadir… - Proceedings of the 12th …, 2022 - dl.acm.org
Wireless enabling technologies in critical infrastructures are increasing the efficiency of
communications. In the era of 5G and beyond, more technologies will be allowed to connect …

A jamming attack detection technique for opportunistic networks

J Singh, I Woungang, SK Dhurandher, K Khalid - Internet of Things, 2022 - Elsevier
Opportunistic networks (OppNets) are dispersed in nature, with nodes acting as resource
restrictions, with intermittent connectivity. These nodes are subject to various types of …

Group key agreement protocol among terminals of the intelligent information system for mobile edge computing

Q Zhang, L Zhu, R Wang, J Li, J Yuan… - … Journal of Intelligent …, 2022 - Wiley Online Library
Security communication and information sharing among mobile devices are important
application technologies of the intelligent information system (IIS). Because IIS is vulnerable …