Results 71 to 80 of about 3,650 (187)

Optimising Internet of Things (IoT) Performance Through Cloud, Fog and Edge Computing Architecture

open access: yesIET Wireless Sensor Systems, Volume 15, Issue 1, January/December 2025.
This review examines the integration of IoT with cloud, fog, and edge computing, highlighting their collective potential to enhance scalability, reduce latency, and improve computational efficiency. Whereas cloud computing offers scalable processing, fog and edge computing mitigate latency issues, improving response times by up to 40% and 30 ...
Shams Forruque Ahmed   +5 more
wiley   +1 more source

A survey of cyber attacks on blockchain based IoT systems for industry 4.0

open access: yesIET Blockchain, Volume 4, Issue 4, Page 287-301, December 2024.
Abstract The industry 4.0 revolution leads by technologies such as distributed digital ledgers, big data processing techniques, automation, and the internet of things (IoT). The interest in the industrial internet of things (IIoT) has progressed rapidly with huge internet areas such as research, academics, and industries.
Aarju Dixit   +2 more
wiley   +1 more source

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

open access: yes, 2014
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Fakoorian, S. A. A.   +3 more
core   +1 more source

Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain

open access: yesIET Blockchain, Volume 4, Issue S1, Page 483-493, December 2024.
Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an
Xin Zhou, Lin Yang, Linru MA, Huasen He
wiley   +1 more source

Joint optimization of beamforming and power allocation for DAJ‐based untrusted relay networks

open access: yesETRI Journal, 2018
Destination‐assisted jamming (DAJ) is usually used to protect confidential information against untrusted relays and eavesdroppers in wireless networks. In this paper, a DAJ‐based untrusted relay network with multiple antennas installed is presented.
Rugui Yao   +4 more
doaj   +1 more source

Secure Quantum Key Distribution

open access: yes, 2014
Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography.
Curty, Marcos   +2 more
core   +1 more source

Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges

open access: yesIET Networks, Volume 13, Issue 5-6, Page 339-376, September-November 2024.
The authors offer a systematic meta‐analysis of AI applications in network intrusion detection systems (NIDS) with a specific focus on deep learning (DL) and machine learning (ML) techniques within the domain of network security. Through a comprehensive meta‐analysis and rigorous evaluation of the effectiveness, dataset utilisation, attack detection ...
Ziadoon K. Maseer   +4 more
wiley   +1 more source

Physical Layer Service Integration in 5G: Potentials and Challenges

open access: yes, 2018
High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can
Chen, Zhi   +3 more
core   +1 more source

Full‐mesh VPN performance evaluation for a secure edge‐cloud continuum

open access: yesSoftware: Practice and Experience, Volume 54, Issue 8, Page 1543-1564, August 2024.
Abstract The recent introduction of full‐mesh virtual private network (VPN) solutions which offer near native performance, coupled with modern encryption algorithms and easy scalability as a result of a central control plane have a strong potential to enable the implementation of a seamless edge‐cloud continuum.
Vojdan Kjorveziroski   +3 more
wiley   +1 more source

Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments

open access: yesInternational Journal of Distributed Sensor Networks
In this work, we focus on the issue of secure communication in energy harvesting untrusted relay networks taking into account the impact of hardware impairments, where an energy-constrained relay, powered by received radio frequency signals, attempts to ...
Dechuan Chen   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy