Search
Now showing items 11-20 of 43
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ...
Secure Vehicular Platoon Management against Sybil Attacks
(
MDPI
, 2022 , Article)
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have ...
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the ...
Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
(
Tech Science Press
, 2023 , Article)
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. ...
Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks
(
Hindawi Limited
, 2021 , Article)
Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides ...
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach
(
Elsevier Ltd
, 2022 , Article)
With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients’ health and life by stealing or altering ...
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks
(
Elsevier Ltd
, 2022 , Article)
Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage ...
Active Computing Toward 5G Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The Internet of Things (IoT) contains enormous computing resources. How to fully and efficiently use computing power is a very important research issue. This article proposes an active computing (AC) concept toward IoT. ...
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
(
Springer
, 2023 , Article)
Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ...
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Article)
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ...