[HTML][HTML] A survey on the adoption of blockchain in iot: Challenges and solutions
Abstract Conventional Internet of Things (IoT) ecosystems involve data streaming from
sensors, through Fog devices to a centralized Cloud server. Issues that arise include privacy …
sensors, through Fog devices to a centralized Cloud server. Issues that arise include privacy …
Network attacks detection methods based on deep learning techniques: a survey
With the development of the fifth‐generation networks and artificial intelligence
technologies, new threats and challenges have emerged to wireless communication system …
technologies, new threats and challenges have emerged to wireless communication system …
Digital twin-assisted real-time traffic data prediction method for 5G-enabled internet of vehicles
C Hu, W Fan, E Zeng, Z Hang, F Wang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The development of Internet of Vehicles (IoV) has produced a considerable amount of real-
time traffic data. These traffic data constitute a kind of digital twin that connects the physical …
time traffic data. These traffic data constitute a kind of digital twin that connects the physical …
Blockchain-based secure spectrum trading for unmanned-aerial-vehicle-assisted cellular networks: An operator's perspective
Unmanned aerial vehicles (UAVs) are envisioned to be widely deployed as an integral
component in the next generation cellular networks, where spectrum sharing between the …
component in the next generation cellular networks, where spectrum sharing between the …
Cooperative computation offloading in blockchain-based vehicular edge computing networks
As a novel computing paradigm, multiaccess edge computing (MEC) migrates computing
and storage capabilities to edge nodes of the network to meet the requirements of executing …
and storage capabilities to edge nodes of the network to meet the requirements of executing …
Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time
MS Akhtar, T Feng - Symmetry, 2022 - mdpi.com
Cyber-attacks on the numerous parts of today's fast develo** IoT are only going to
increase in frequency and severity. A reliable method for detecting malicious attacks such as …
increase in frequency and severity. A reliable method for detecting malicious attacks such as …
[HTML][HTML] Research advances on blockchain-as-a-service: Architectures, applications and challenges
J Song, P Zhang, M Alkubati, Y Bao, G Yu - Digital Communications and …, 2022 - Elsevier
Due to the complexity of blockchain technology, it usually costs too much effort to build,
maintain and monitor a blockchain system that supports a targeted application. To this end …
maintain and monitor a blockchain system that supports a targeted application. To this end …
Toward secure data sharing for the IoV: A quality-driven incentive mechanism with on-chain and off-chain guarantees
W Chen, Y Chen, X Chen… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Currently, data sharing for the Internet of Vehicles (IoV) applications has drawn much
attention in the framework of develo** smart cities and smart transportation. A critical …
attention in the framework of develo** smart cities and smart transportation. A critical …
DWFCAT: Dual watermarking framework for industrial image authentication and tamper localization
The image data received through various sensors are of significant importance in Industry
4.0. Unfortunately, these data are highly vulnerable to various malicious attacks during its …
4.0. Unfortunately, these data are highly vulnerable to various malicious attacks during its …
Privacy-preserving quality prediction for edge-based IoT services
Abstract Quality of Service (QoS) prediction and privacy preservation are two key challenges
in service recommendation. Nevertheless, the existing QoS prediction methods cannot be …
in service recommendation. Nevertheless, the existing QoS prediction methods cannot be …