Search
Now showing items 11-20 of 44
Trust management techniques for the internet of things: A survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be ...
Location privacy preservation for mobile users in location-based services
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research ...
Resource allocation in information-centric wireless networking with D2D-enabled MEC: A deep reinforcement learning approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Recently, information-centric wireless networks (ICWNs) have become a promising Internet architecture of the next generation, which allows network nodes to have computing and caching capabilities and adapt to the growing ...
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
A promising non-orthogonal multiple access based networking architecture: Motivation, conception, and evolution
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Since it can offer higher spectral efficiency by granting the served data to share the same spectrum resource synchronously, NOMA is considered as a bright multiple access technique for future wireless networks. Accommodating ...
DVF-fog: Distributed virtual firewall in fog computing based on risk analysis
(
Inderscience Publishers
, 2019 , Article)
To eliminate network saturation during data exchanges, fog computing is deployed as the technology that benefits from both cloud computing and internet of things (IoT) paradigms. Therefore, we focus on network access control ...
Lightweight and Privacy-Preserving Medical Services Access for Healthcare Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the popularity of cloud computing technology, the healthcare cloud system is becoming increasingly perfect, which reduces the time of disease diagnosis and brings great convenience to people's lives. But meanwhile, ...
Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach
(
Elsevier B.V.
, 2019 , Article)
Nowadays, with the rapid development and wide application of Internet of Things technology, Industrial Internet of Things (IIoT) has become an essential part of industrial systems. A large number of IoT devices has enabled ...
Cooperative Secondary Encryption for Primary Privacy Preserving in Cognitive Radio Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Aiming at protecting primary privacy messages and supporting secondary quality-of-service (QoS), we propose a secondary encrypted secure strategy for cognitive radio networks. In this scheme, a primary system directly ...
An incentive mechanism design for socially aware crowdsensing services with incomplete information
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Traditional crowdsensing platforms rely on sensory information collected from a group of independent users or sensors. Recently, socially aware crowdsensing services have been introduced as the integration of social networks ...