Search
Now showing items 51-60 of 83
STAC: a spatio-temporal approximate method in data collection applications
(
Elsevier B.V.
, 2021 , Article)
Wireless sensor networks (WSNs) and IoT are often deployed for long-term monitoring. However, the network lifetime of these applications is limited by non-rechargeable battery-powered. To vastly reduce energy consumption, ...
IoT root union: A decentralized name resolving system for IoT based on blockchain
(
Elsevier Ltd
, 2021 , Article)
A name resolving system services as the entrance to the IoT data, thus protecting the name resolving process and making it straight and simple are critical for the widespread application of IoT services. However, due to ...
Blockchain-Enhanced High-Confidence Energy Sharing in Internet of Electric Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
To introduce the opportunities brought by plug-in hybrid electric vehicles (PHEVs) to the energy Internet, we propose a local vehicle-to-vehicle (V2V) energy trading architecture based on fog computing in social hotspots ...
FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In recent years, the Internet of vehicles (IoV) has become an indispensable part of wireless communication. To protect users' privacy and communication security, an increasing number of scholars have focused on studying ...
Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Vehicle-to-cloud is a network access model that aims to share computing resources for vehicles. In vehicle-to-cloud communication, reliable links are critical. Through multipath transmission, comprehensive utilization of ...
Intelligent Task Offloading and Energy Allocation in the UAV-Aided Mobile Edge-Cloud Continuum
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The arrival of big data and the Internet of Things (IoT) era greatly promotes innovative in-network computing techniques, where the edge-cloud continuum becomes a feasible paradigm in handling multi-dimensional resources ...
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
(
IEEE Computer Society
, 2021 , Article)
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ...
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ...