Results 71 to 80 of about 3,650 (187)
Optimising Internet of Things (IoT) Performance Through Cloud, Fog and Edge Computing Architecture
This review examines the integration of IoT with cloud, fog, and edge computing, highlighting their collective potential to enhance scalability, reduce latency, and improve computational efficiency. Whereas cloud computing offers scalable processing, fog and edge computing mitigate latency issues, improving response times by up to 40% and 30 ...
Shams Forruque Ahmed +5 more
wiley +1 more source
A survey of cyber attacks on blockchain based IoT systems for industry 4.0
Abstract The industry 4.0 revolution leads by technologies such as distributed digital ledgers, big data processing techniques, automation, and the internet of things (IoT). The interest in the industrial internet of things (IIoT) has progressed rapidly with huge internet areas such as research, academics, and industries.
Aarju Dixit +2 more
wiley +1 more source
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Fakoorian, S. A. A. +3 more
core +1 more source
Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain
Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an
Xin Zhou, Lin Yang, Linru MA, Huasen He
wiley +1 more source
Joint optimization of beamforming and power allocation for DAJ‐based untrusted relay networks
Destination‐assisted jamming (DAJ) is usually used to protect confidential information against untrusted relays and eavesdroppers in wireless networks. In this paper, a DAJ‐based untrusted relay network with multiple antennas installed is presented.
Rugui Yao +4 more
doaj +1 more source
Secure Quantum Key Distribution
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos +2 more
core +1 more source
The authors offer a systematic meta‐analysis of AI applications in network intrusion detection systems (NIDS) with a specific focus on deep learning (DL) and machine learning (ML) techniques within the domain of network security. Through a comprehensive meta‐analysis and rigorous evaluation of the effectiveness, dataset utilisation, attack detection ...
Ziadoon K. Maseer +4 more
wiley +1 more source
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can
Chen, Zhi +3 more
core +1 more source
Full‐mesh VPN performance evaluation for a secure edge‐cloud continuum
Abstract The recent introduction of full‐mesh virtual private network (VPN) solutions which offer near native performance, coupled with modern encryption algorithms and easy scalability as a result of a central control plane have a strong potential to enable the implementation of a seamless edge‐cloud continuum.
Vojdan Kjorveziroski +3 more
wiley +1 more source
Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments
In this work, we focus on the issue of secure communication in energy harvesting untrusted relay networks taking into account the impact of hardware impairments, where an energy-constrained relay, powered by received radio frequency signals, attempts to ...
Dechuan Chen +5 more
doaj +1 more source

