相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Computer Science, Hardware & Architecture
Shahbaz Siddiqui et al.
Summary: The Internet of Things (IoT) can provide smart and efficient solutions with less human intervention and higher accuracy. Smart Cities, including services like intelligent transportation and smart homes, rely on collaborative applications. However, ensuring data security and privacy remains a challenge due to the interoperability between heterogeneous services. This paper proposes a service security architecture based on authentication and authorization for collaborative tasks in smart cities and Software Defined Networking (SDN).
JOURNAL OF SYSTEMS ARCHITECTURE
(2023)
Review
Chemistry, Multidisciplinary
Vasiliki Demertzi et al.
Summary: A smart city utilizes digital technology to enhance existing facilities and services for the benefit of individuals and businesses. The interconnectivity of critical infrastructures and increased data exchange aim to automate city governance and optimize services. However, the lack of clear guidelines for modeling these data flows leads to scalability limitations. It is crucial to raise awareness and implement cybersecurity measures to protect citizens' privacy and security. This study provides an overview of cyber threats, attacks, and countermeasures in various domains of smart cities, serving as a resource for policymakers and the scientific community, and offers a reference model for infrastructure upgrades in smart city networks.
APPLIED SCIENCES-BASEL
(2023)
Article
Computer Science, Information Systems
Hassan Zeb et al.
Summary: The invention of batteries allows for the storage of electricity, which can be used to maintain uninterrupted operations of WSN. To overcome limited energy sources in IoT-based WSNs, researchers have introduced energy harvesting (EH) techniques, with radio frequency (RF)-based EH gaining attention due to its easy availability. This paper presents a real-world experiment on Powercast energy harvesting devices and investigates the behavior of sensed data in various scenarios. The experiments reveal the degradation of the energy scavenging process when a device is detached from the charger, leading to the introduction of a mobile charger technique and algorithms for directional and omni-directional antennas to optimize charging and mitigate energy scavenging issues. The results demonstrate the promising output of this technique.
Review
Computer Science, Information Systems
Muhammad Zulkifl Hasan et al.
Summary: The Internet of Things (IoT) and wireless sensor networks (WSNs) have rapidly developed due to computing technologies revolution. This article focuses on the importance of WSN-IoT applications and the architecture of WSN in IoT. It also presents security protocols at the data link layer for WSN and IoT-based frameworks, as well as proposes an architecture to enhance energy consumption, mobility, information transmission, QoS, and security in WSN-IoT using machine learning.
Article
Engineering, Multidisciplinary
Balvender Singh et al.
Ain Shams Engineering Journal
(2023)
Article
Biotechnology & Applied Microbiology
Yossra Hussain Ali et al.
Summary: The aim of this study was to develop a framework that combines IoT and DL for lung cancer identification. The proposed model utilizes a multi-layered non-local Bayes model to manage the process of early diagnosis. By analyzing its results in terms of accuracy, quality, and system process efficiency, we found that the model can make high-sensitivity and precise predictions based on images compared to other specific results. This model is suitable for real-time health monitoring systems in predicting lung cancer and enables effective decision-making through the use of DL techniques.
BIOENGINEERING-BASEL
(2023)
Article
Energy & Fuels
S. Nagaraj et al.
Summary: The use of wireless and IoT devices is growing rapidly, leading to the integration of mobile apps into low-cost, low-power platforms. To address security issues, we propose a secure encryption algorithm called SERPPA for network security and energy consumption.
Article
Physics, Multidisciplinary
Zhichao Zheng et al.
Summary: In this paper, a survey is conducted on RL-based MAC protocols in WANETs. Traditional MAC solutions are becoming obsolete due to the increasing scale of WANETs. Designing modern WANET architectures requires resolving crucial problems like dynamic topology, resource allocation, interference management, limited bandwidth, and energy constraint. To overcome the limitations in frequently changing WANETs, more intelligence needs to be deployed for efficient communications. The paper investigates existing state-of-the-art MAC protocols and proposed solutions, discusses their workings, and highlights the challenging issues on the MAC model components. Future research directions on utilizing RL for enabling high-performance MAC protocols are also discussed.
Article
Computer Science, Information Systems
Shahid Hussain et al.
Summary: This study presents a two-layer decentralized charging approach based on fuzzy data fusion to optimize the charging cost of residential electric vehicles. By using fuzzy integer linear programming and fuzzy fusion mechanism, the optimal charging schedule is determined considering multiple uncertain inputs. The results demonstrate that this approach reduces charging costs while meeting the charging requirements.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Hakeem Imad Mhaibes et al.
International Journal of Interactive Mobile Technologies
(2022)
Article
Computer Science, Information Systems
Usman Khalil et al.
Summary: Mechanisms based on the distributed environment have influenced various industries to develop robust privacy and security solutions. IoT-based smart devices are crucial for Cyber-Physical Systems, and security and privacy have become integral to their architectural frameworks. Blockchain technology has emerged as a leading solution for developing robust privacy and security mechanisms. Lightweight solutions for managing authentication data of IoT-enabled assets are essential, and further exploration is needed in decentralized ledger technology and lightweight cryptosystems.
Article
Mathematics, Applied
Hassan R. Yassein et al.
Summary: This article introduces a new NIRU-like cryptographic system called QOBTRU, which is based on a newly designed algebraic structure called Carternion algebra. QOBTRU has at least quadratic higher computational and space complexity compared to the original NTRU. Its comparison with other high-performance cryptographic systems highlights its strength, and some statistical and security analysis is conducted to demonstrate its efficiency.
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY
(2022)
Article
Computer Science, Hardware & Architecture
Tang Lei et al.
Summary: The Internet of Things is a promising innovation that plays an increasingly important role in global smart device connectivity, requiring compliance with different management preconditions. Additionally, emerging IoT standards aim to drive the success of future fifth-generation mobile networks.
MICROPROCESSORS AND MICROSYSTEMS
(2021)
Article
Computer Science, Artificial Intelligence
Mikail Mohammed Salim et al.
Summary: Smart cities rely on millions of heterogeneous sensors without standard security architecture. An AI-based framework for IoT fleet security management is proposed to enhance device security and prevent the formation of large botnets.
APPLIED SOFT COMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Ayesha Altaf et al.
Summary: Smart City technology utilizes IoT to collect data from sensors for various applications, improving performance for end-users. Research focuses on detecting malicious nodes causing service-oriented attacks in smart city applications and networks, using a Context-Based Trust Evaluation System Model.
JOURNAL OF SYSTEMS ARCHITECTURE
(2021)
Article
Computer Science, Theory & Methods
Mehdi Gheisari et al.
Summary: This paper introduces a three-module framework called Ontology-Based Privacy-Preserving (OBPP) to address the challenges of heterogeneity, privacy protection, and high-level services in IoT devices in smart city applications. By utilizing this framework, the performance can be improved and the risk of information leakage can be reduced effectively.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Review
Green & Sustainable Science & Technology
Nahla Nurelmadina et al.
Summary: This paper evaluates various technologies and protocols for industrial IoT applications, comparing key terms such as frequency, data rate, and power. The literature study found that the application of cognitive radio in LPWAN can significantly revolutionize commercial IIoT. The research suggests that essential design factors need to be considered to overcome critical research gaps in existing cognitive-enabled IIoT.
Article
Computer Science, Information Systems
Kamran Ahmad Awan et al.
Summary: Internet of Medical Things (IoMT) provides a diverse platform that improves healthcare accuracy, reliability, and efficiency, but also faces security challenges. By utilizing trust parameters and lightweight encryption mechanisms, a secure network can be maintained with enhanced security and integrity during data dissemination.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Construction & Building Technology
Muhammad Adil et al.
Summary: This paper discusses the development of safe diagnosis, evaluation, and treatment procedures using emerging technologies to combat COVID-19, with a focus on the pivotal role of IoT in emerging healthcare applications. It outlines the challenges and future research directions in terms of network architecture security, trustworthiness, authentication, and data preservation to reduce the contagious rate of COVID-19 in sustainable smart cities.
SUSTAINABLE CITIES AND SOCIETY
(2021)
Article
Biotechnology & Applied Microbiology
Amjad Rehman et al.
Summary: The study focuses on the security measures of Green Internet of Things (G-IoT) in smart cities, addressing challenges in communication and data management through self-balancing trees and key distribution. Experiments show that the proposed model has significant advantages in network parameters compared to existing work.
ENVIRONMENTAL TECHNOLOGY & INNOVATION
(2021)
Article
Telecommunications
A. Duraisamy et al.
Summary: The main objective of smart environments is to enhance the quality of human life, but security and privacy are major challenges.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Ahmed A. Abd El-Latif et al.
Summary: Blockchain plays a crucial role in cybersecurity, and a quantum-inspired quantum walks protocol is proposed for secure data transmission among IoT devices, offering advantages of effectively sharing data and full control of records.
INFORMATION PROCESSING & MANAGEMENT
(2021)
Article
Construction & Building Technology
Javed Ashraf et al.
Summary: The rapid expansion of IoT systems transforming urban areas into smart cities has improved quality of life and services. However, challenges such as limited battery capacity, data security, and botnet attacks threaten the sustainability of smart cities. A new statistical learning-based botnet detection framework called IoTBoT-IDS effectively identifies and protects against various types of botnets with high accuracy, offering a potential solution to these threats.
SUSTAINABLE CITIES AND SOCIETY
(2021)
Article
Computer Science, Information Systems
Samir Dawaliby et al.
Summary: This paper implements an adaptive dynamic network slicing mechanism in a Lora-based smart city network, maximizing performance utility in each slice through a slice-based optimization method. Simulation results show the utility of the proposition in respecting defined QoS thresholds and improving reliability while providing complete isolation between LoRa slices.
INTERNET OF THINGS
(2021)
Article
Computer Science, Information Systems
Adi Alhudhaif et al.
Summary: This research proposes a novel scheme for generating cryptographically strong nonlinear confusion components for block ciphers, referred to as S-boxes. The design is based on a novel five-dimensional chaotic system, aiming to optimize the S-box for high nonlinearity score to enhance resistance against linear attacks. Performance analysis demonstrates the proposed S-box's better strength and features compared to recently investigated S-boxes.
Article
Construction & Building Technology
Khalid Haseeb et al.
SUSTAINABLE CITIES AND SOCIETY
(2020)
Article
Construction & Building Technology
Md Arafatur Rahman et al.
SUSTAINABLE CITIES AND SOCIETY
(2020)
Article
Computer Science, Information Systems
Ammar Mohammed Ali et al.
Article
Computer Science, Artificial Intelligence
Deepak Kumar Sharma et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
(2019)
Article
Chemistry, Analytical
Jin Wang et al.
Article
Chemistry, Analytical
Zhirong Xu et al.
Article
Physics, Multidisciplinary
Alaa Kadhim Farhan et al.
Article
Computer Science, Information Systems
Shahid Hussain et al.
Article
Computer Science, Information Systems
Zhiwei Zhao et al.
IEEE INTERNET OF THINGS JOURNAL
(2018)
Article
Computer Science, Information Systems
Mohsen Marjani et al.