相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Computer Science, Artificial Intelligence
Durga Rajan et al.
Summary: Intelligent and networked vehicles contribute to the efficiency of vehicular network infrastructure, but also expose these networks to cyber-attacks. Intrusion detection systems (IDS) are used to prevent vehicle network assaults. However, current learning-based IDS face challenges in terms of processing capabilities and defense effectiveness. This study proposes a Blockchain-based Multi-Layer Federated Extreme Learning Machines (MLFEM) enabled IDS (BEF-IDS) for secure data transfers.
Article
Computer Science, Information Systems
Saddam Hussain et al.
Summary: The Internet of Things provides universal connectivity by transforming common objects into connected ones, paving the way for innovative services supporting improved efficiency and flexibility. The Industrial Internet of Things (IIoT) domain is facing increasing security threats, prompting research into efficient security solutions. This study aims to classify and compare different certificateless signature schemes in the IIoT domain to address security flaws and causes.
COMPUTER COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Maryam Ataei Nezhad et al.
Summary: The Internet of Things (IoT) allows for the connection and remote management of different devices through the internet. In this paper, a three-phase method is proposed to address privacy and information security concerns. The method includes constructing star structures, encrypting data with unique keys, and using an authentication protocol to enhance security.
JOURNAL OF GRID COMPUTING
(2022)
Article
Environmental Sciences
Icen Yoosefdoost et al.
Summary: This study examined three different policies to improve the performance of reservoirs, finding that the Hedging Rule (HR) significantly outperformed the Standard Operation Policy (SOP) in enhancing reservoir performance indexes, and the Multi-Objective Optimization method (MOO) also yielded significant improvements in reservoir performance indexes.
Article
Automation & Control Systems
Weizheng Wang et al.
Summary: The Industrial Internet of Things (IIoT) has significantly transformed personal lifestyles and society operations, sparking interest in areas such as intelligent logistics, smart grids, and smart cities. To address security concerns in IIoT, researchers have proposed a novel certificateless signature scheme using blockchain technology and smart contracts, demonstrating its advantages in security and efficiency.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Review
Engineering, Electrical & Electronic
Sarvesh Tanwar et al.
Summary: The lack of intrinsic security measures in the next generation IoT makes it vulnerable to privacy and security threats. Blockchain, with its security by design, can address these security requirements and make the entire system more decentralized.
JOURNAL OF SENSORS
(2022)
Article
Computer Science, Information Systems
Rupa Ch et al.
Summary: This paper presents an electronic voting system utilizing blockchain technology, offering a better solution compared to traditional elections, ensuring accuracy and security in the electoral process.
Article
Computer Science, Information Systems
Yulei Wu et al.
Summary: This paper focuses on the application of intelligent network slicing management in the Industrial Internet of Things (IIoT), covering key services such as smart transportation, smart energy, and smart factory. The paper provides a detailed investigation and analysis, highlighting the advantages and drawbacks of existing works and surveys in terms of important criteria. Additionally, an intelligent network slicing management architecture is proposed, along with a detailed analysis of application requirements, network slicing architecture, and enabling technologies for each service. The paper also identifies key challenges and open issues for future research.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Computer Science, Information Systems
Saddam Hussain et al.
Summary: This article focuses on protecting NDN-based IoT networks from Content Poisoning Attack by proposing a certificateless signature scheme that is formally secure and cost-efficient.
Article
Computer Science, Information Systems
Kyung-Ah Shim
IEEE SYSTEMS JOURNAL
(2019)
Article
Computer Science, Information Systems
Yumin Yuan et al.
INFORMATION PROCESSING LETTERS
(2014)
Article
Computer Science, Information Systems
Y. Yu et al.
IET INFORMATION SECURITY
(2012)
Article
Computer Science, Theory & Methods
Bessie C. Hu et al.
DESIGNS CODES AND CRYPTOGRAPHY
(2007)
Article
Computer Science, Hardware & Architecture
R Canetti et al.
JOURNAL OF THE ACM
(2004)