[HTML][HTML] Federated learning for secure IoMT-applications in smart healthcare systems: A comprehensive review
Recent developments in the Internet of Things (IoT) and various communication
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
Abstract Internet of Things (IoT) is one of the most rapidly used technologies in the last
decade in various applications. The smart things are connected in wireless or wired for …
decade in various applications. The smart things are connected in wireless or wired for …
A survey of multi-access edge computing in 5G and beyond: Fundamentals, technology integration, and state-of-the-art
Driven by the emergence of new compute-intensive applications and the vision of the
Internet of Things (IoT), it is foreseen that the emerging 5G network will face an …
Internet of Things (IoT), it is foreseen that the emerging 5G network will face an …
The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …
An overview of fog computing and edge computing security and privacy issues
AM Alwakeel - Sensors, 2021 - mdpi.com
With the advancement of different technologies such as 5G networks and IoT the use of
different cloud computing technologies became essential. Cloud computing allowed …
different cloud computing technologies became essential. Cloud computing allowed …
Review on security of internet of things authentication mechanism
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
Machine learning and the Internet of Things security: Solutions and open challenges
Abstract Internet of Things (IoT) is a pervasively-used technology for the last few years. IoT
technologies are also responsible for intensifying various everyday smart applications …
technologies are also responsible for intensifying various everyday smart applications …
A review of security and privacy concerns in the internet of things (IoT)
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …
applications. There are more than 50 billion devices connected globally. IoT applications' …
Secure Internet of Vehicles (IoV) with decentralized consensus blockchain mechanism
The Internet of vehicles (IoV) is increasingly being used to realize the vision of intelligent
transportation systems with the rapid development of computation and communication …
transportation systems with the rapid development of computation and communication …
Reinforcement learning assisted impersonation attack detection in device-to-device communications
In device-to-device (D2D) communications, the channel gain between a transmitter and a
receiver is difficult to predict due to channel variations. Hence, an attacker can easily …
receiver is difficult to predict due to channel variations. Hence, an attacker can easily …