You are currently on the new version of our website. Access the old version .

222 Results Found

  • Article
  • Open Access
5 Citations
3,762 Views
21 Pages

15 April 2020

Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and...

  • Feature Paper
  • Article
  • Open Access
6 Citations
4,727 Views
21 Pages

The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individu...

  • Article
  • Open Access
895 Views
28 Pages

19 February 2025

In this work, we study the security performance of a double intelligent reflecting surface non-orthogonal multiple access (DIRS-NOMA) wireless communication system supporting communication for a group of two NOMA users (UEs) at the edge, with the exi...

  • Article
  • Open Access
5 Citations
1,403 Views
18 Pages

30 April 2025

With the rapid digitization of healthcare information, ensuring the security and privacy of patient data has become a critical research focus. This study introduces a novel Attribute-Based Signcryption (ABSC) framework combining blockchain and edge c...

  • Article
  • Open Access
5 Citations
3,650 Views
17 Pages

Method to Increase Dependability in a Cloud-Fog-Edge Environment

  • Ovidiu Petru Stan,
  • Szilárd Enyedi,
  • Cosmina Corches,
  • Stelian Flonta,
  • Iulia Stefan,
  • Dan Gota and
  • Liviu Miclea

9 July 2021

Robots can be very different, from humanoids to intelligent self-driving cars or just IoT systems that collect and process local sensors’ information. This paper presents a way to increase dependability for information exchange and processing in syst...

  • Article
  • Open Access
13 Citations
3,059 Views
22 Pages

22 October 2020

In this paper, we aim to provide reliable user connectivity and enhanced security for computation task offloading. Physical layer security is studied in a wireless-powered non-orthogonal multiple access (NOMA) mobile edge computing (MEC) system with...

  • Review
  • Open Access
3 Citations
8,134 Views
38 Pages

SDN-Enabled IoT Security Frameworks—A Review of Existing Challenges

  • Sandipan Rakeshkumar Mishra,
  • Bharanidharan Shanmugam,
  • Kheng Cher Yeo and
  • Suresh Thennadil

This comprehensive systematic review examines the integration of software-defined networking (SDN) with IoT security frameworks, analyzing recent advancements in encryption, authentication, access control techniques, and intrusion detection systems....

  • Review
  • Open Access
1 Citations
4,707 Views
46 Pages

6 August 2025

The IoE forms the foundation of the modern digital ecosystem by enabling seamless connectivity and data exchange among smart devices, sensors, and systems. However, the inherent nature of this structure, characterized by high heterogeneity, distribut...

  • Article
  • Open Access
3 Citations
3,035 Views
31 Pages

Machine Learning-Based Blockchain Technology for Secure V2X Communication: Open Challenges and Solutions

  • Yonas Teweldemedhin Gebrezgiher,
  • Sekione Reward Jeremiah,
  • Xianjun Deng and
  • Jong Hyuk Park

4 August 2025

Vehicle-to-everything (V2X) communication is a fundamental technology in the development of intelligent transportation systems, encompassing vehicle-to-vehicle (V2V), infrastructure (V2I), and pedestrian (V2P) communications. This technology enables...

  • Article
  • Open Access
44 Citations
5,545 Views
22 Pages

An Efficient and Provably Secure Certificateless Blind Signature Scheme for Flying Ad-Hoc Network Based on Multi-Access Edge Computing

  • Muhammad Asghar Khan,
  • Ijaz Mansoor Qureshi,
  • Insaf Ullah,
  • Suleman Khan,
  • Fahimullah Khanzada and
  • Fazal Noor

Unmanned aerial vehicles (UAVs), when interconnected in a multi-hop ad-hoc fashion, or as a flying ad-hoc network (FANET), can efficiently accomplish mission-critical tasks. However, UAVs usually suffer from the issues of shorter lifespan and limited...

  • Article
  • Open Access
16 Citations
2,657 Views
18 Pages

16 December 2022

Billions of Internet of Things (IoT) devices and sensors are expected to be supported by fifth-generation (5G) wireless cellular networks. This highly connected structure is predicted to attract different and unseen types of attacks on devices, senso...

  • Review
  • Open Access
20 Citations
10,728 Views
52 Pages

15 March 2025

Blockchain-based data storage methods offer strong data integrity, decentralized security, and transparent access control but also face scalability challenges, high computational costs, and complex data management. This study provides a comprehensive...

  • Article
  • Open Access
6 Citations
3,668 Views
23 Pages

The node–edge–cloud collaborative computation paradigm has introduced new security challenges to data sharing. Existing data-sharing schemes suffer from limitations such as low efficiency and inflexibility and are not easily integrated wi...

  • Article
  • Open Access
42 Citations
12,008 Views
17 Pages

10 November 2019

Internet of Things (IoT) devices are embedded with software, electronics, and sensors, and feature connectivity with constrained resources. They require the edge computing paradigm, with modular characteristics relying on microservices, to provide an...

  • Article
  • Open Access
14 Citations
2,785 Views
16 Pages

An Internet of Things Access Control Scheme Based on Permissioned Blockchain and Edge Computing

  • Lihua Zhang,
  • Boping Li,
  • Haodong Fang,
  • Ganzhe Zhang and
  • Chunhui Liu

24 March 2023

In the IoT (Internet of Things) environment, the existing access control schemes for device resources have some problems, such as poor scalability, high latency, security, and dynamics. Combining the advantages of the permissioned blockchain and edge...

  • Article
  • Open Access
19 Citations
4,542 Views
15 Pages

Blockchain-Enabled Access Management System for Edge Computing

  • Yong Zhu,
  • Chao Huang,
  • Zhihui Hu,
  • Abdullah Al-Dhelaan and
  • Mohammed Al-Dhelaan

In the post-cloud era, edge computing is a new computing paradigm with data processed at the edge of the network, which can process the data close to the end-user in real time and offload the cloud task intelligently. Meanwhile, the decentralization,...

  • Article
  • Open Access
13 Citations
4,796 Views
17 Pages

Traditional centralized access control faces data security and privacy problems. The core server is the main target to attack. Single point of failure risk and load bottleneck are difficult to solve effectively. And the third-party data center cannot...

  • Article
  • Open Access
4 Citations
4,589 Views
30 Pages

3 April 2025

The secure and efficient storage and sharing of medical images have become increasingly important due to rising security threats and performance limitations in existing healthcare systems. Centralized systems struggle to provide adequate privacy, rap...

  • Article
  • Open Access
3 Citations
4,261 Views
28 Pages

The rapid expansion of 5G networks and edge computing has amplified security challenges in Internet of Things (IoT) environments, including unauthorized access, data tampering, and DDoS attacks. This paper introduces EdgeChainGuard, a hybrid blockcha...

  • Article
  • Open Access
19 Citations
3,351 Views
20 Pages

Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm

  • Tsu-Yang Wu,
  • Fangfang Kong,
  • Liyang Wang,
  • Yeh-Cheng Chen,
  • Saru Kumari and
  • Jeng-Shyang Pan

25 November 2022

The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate users to access smart home services anytime and anywhere. Due to the limited resources of cloud computing, it cannot meet users’ real-time needs. There...

  • Article
  • Open Access
35 Citations
6,467 Views
32 Pages

SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems

  • Haqi Khalid,
  • Shaiful Jahari Hashim,
  • Sharifah Mumtazah Syed Ahmad,
  • Fazirulhisyam Hashim and
  • Muhammad Akmal Chaudhary

18 February 2021

The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at...

  • Article
  • Open Access
7 Citations
1,819 Views
17 Pages

With the rapid popularization of current Internet of Things (IoT) technology and 5G networks, as well as the continuous updating of new service lifestyles and businesses, the era of big data processing for the IoT has arrived. However, centralizing a...

  • Feature Paper
  • Article
  • Open Access
1 Citations
4,665 Views
20 Pages

DCSS Protocol for Data Caching and Sharing Security in a 5G Network

  • Ed Kamya Kiyemba Edris,
  • Mahdi Aiash and
  • Jonathan Loo

7 July 2021

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE)....

  • Article
  • Open Access
8 Citations
4,203 Views
16 Pages

High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption

  • Vishnu Kumar Kaliappan,
  • Seungjin Yu,
  • Rajasoundaran Soundararajan,
  • Sangwoo Jeon,
  • Dugki Min and
  • Eunmi Choi

30 July 2022

In recent years, container-based virtualization technology for edge and cloud computing has advanced dramatically. Virtualization solutions based on Docker Containers provide a more lightweight and efficient virtual environment for Edge and cloud-bas...

  • Article
  • Open Access
97 Citations
7,994 Views
16 Pages

18 May 2019

Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIo...

  • Article
  • Open Access
4 Citations
4,233 Views
33 Pages

Security Context Migration in MEC: Challenges and Use Cases

  • Wojciech Niewolski,
  • Tomasz W. Nowak,
  • Mariusz Sepczuk,
  • Zbigniew Kotulski,
  • Rafal Artych,
  • Krzysztof Bocianiak and
  • Jean-Philippe Wary

28 October 2022

Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated...

  • Article
  • Open Access
21 Citations
6,838 Views
17 Pages

13 August 2021

The traditional cloud-based Internet of Things (IoT) architecture places extremely high demands on computers and storage on cloud servers. At the same time, the strong dependence on centralized servers causes major trust problems. Blockchain provides...

  • Article
  • Open Access
1,452 Views
21 Pages

CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain

  • Jiahui Jiang,
  • Tingrui Pei,
  • Jiahao Chen and
  • Zhiwen Hou

In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges. In response to the securit...

  • Article
  • Open Access
112 Citations
7,515 Views
28 Pages

Blockchain-Based Security Mechanisms for IoMT Edge Networks in IoMT-Based Healthcare Monitoring Systems

  • Filippos Pelekoudas-Oikonomou,
  • Georgios Zachos,
  • Maria Papaioannou,
  • Marcus de Ree,
  • José C. Ribeiro,
  • Georgios Mantas and
  • Jonathan Rodriguez

22 March 2022

Despite the significant benefits that the rise of Internet of Medical Things (IoMT) can bring into citizens’ quality of life by enabling IoMT-based healthcare monitoring systems, there is an urgent need for novel security mechanisms to address...

  • Article
  • Open Access
1 Citations
2,157 Views
21 Pages

30 September 2024

As industries develop and informatization accelerates, enterprise collaboration is increasing. However, current architectures face malicious attacks, data tampering, privacy issues, and security and efficiency problems in information exchange and ent...

  • Article
  • Open Access
14 Citations
4,259 Views
27 Pages

13 January 2022

Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there...

  • Article
  • Open Access
15 Citations
8,078 Views
20 Pages

The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly susceptible to piracy. These pirated edge devices pose a serious threat to security, as an adversary can get access to the private network through these non-a...

  • Article
  • Open Access
16 Citations
4,709 Views
22 Pages

2 July 2021

In this study, based on multi-access edge computing (MEC), we provided the possibility of cooperating manufacturing processes. We tried to solve the job shop scheduling problem by applying DQN (deep Q-network), a reinforcement learning model, to this...

  • Article
  • Open Access
8 Citations
2,009 Views
21 Pages

25 December 2024

The development of medical data and resources has become essential for enhancing patient outcomes and operational efficiency in an age when digital innovation in healthcare is becoming more important. The rapid growth of the Internet of Medical Thing...

  • Article
  • Open Access
2 Citations
5,461 Views
18 Pages

3 October 2024

In this paper, we introduce a security approach for on-device learning Edge AIs designed to detect abnormal conditions in factory machines. Since Edge AIs are easily accessible by an attacker physically, there are security risks due to physical attac...

  • Article
  • Open Access
1,513 Views
37 Pages

7 August 2024

Role-based access control (RBAC) is a widely adopted access control model in various domains for defining security management. Role mining is closely related to role-based access control, as the latter employs role assignments to offer a flexible and...

  • Review
  • Open Access
1,698 Views
21 Pages

Edge intelligence is an emerging paradigm generated by the deep integration of artificial intelligence (AI) and edge computing. It enables data to remain at the edge without being sent to remote cloud servers, lowering response time, saving bandwidth...

  • Article
  • Open Access
18 Citations
3,989 Views
20 Pages

A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0

  • Ayman Altameem,
  • Prabu P,
  • Senthilnathan T,
  • Ramesh Chandra Poonia and
  • Abdul Khader Jilani Saudagar

5 January 2023

The Internet of Things (IoT) is being applied in multiple domains, including smart homes and energy management. This work aims to tighten security in IoTs using fingerprint authentications and avoid unauthorized access to systems for safeguarding use...

  • Article
  • Open Access
1,578 Views
23 Pages

15 August 2024

In edge–cloud collaboration scenarios, data sharing is a critical technological tool, yet smart devices encounter significant challenges in ensuring data-sharing security. Attribute-based keyword search (ABKS) is employed in these contexts to f...

  • Article
  • Open Access
26 Citations
4,322 Views
21 Pages

Blockchain-Based Context-Aware Authorization Management as a Service in IoT

  • Tidiane Sylla,
  • Leo Mendiboure,
  • Mohamed Aymen Chalouf and
  • Francine Krief

18 November 2021

Internet of Things (IoT) applications bring evolved and intelligent services that can help improve users’ daily lives. These applications include home automation, health care, and smart agriculture. However, IoT development and adoption face various...

  • Article
  • Open Access
3 Citations
4,646 Views
26 Pages

14 January 2025

The rapid advancement of technology and increasing data utilisation have underscored the need for new models to manage and secure big data effectively. However, the constraints of isolated network environments and the limitations of existing security...

  • Review
  • Open Access
6 Citations
2,792 Views
19 Pages

Reliablity and Security for Fog Computing Systems

  • Egor Shiriaev,
  • Tatiana Ermakova,
  • Ekaterina Bezuglova,
  • Maria A. Lapina and
  • Mikhail Babenko

Fog computing (FC) is a distributed architecture in which computing resources and services are placed on edge devices closer to data sources. This enables more efficient data processing, shorter latency times, and better performance. Fog computing wa...

  • Article
  • Open Access
46 Citations
5,009 Views
21 Pages

Hierarchical Blockchain-Based Multi-Chaincode Access Control for Securing IoT Systems

  • Adam Ibrahim Abdi,
  • Fathy Elbouraey Eassa,
  • Kamal Jambi,
  • Khalid Almarhabi,
  • Maher Khemakhem,
  • Abdullah Basuhail and
  • Mohammad Yamin

25 February 2022

The rapid growth of the Internet of Things (IoT) and its attributes of constrained devices and a distributed environment make it difficult to manage such a huge and growing network of devices on a global scale. Existing traditional access-control sys...

  • Article
  • Open Access
1 Citations
644 Views
18 Pages

Edge-Driven Disability Detection and Outcome Measurement in IoMT Healthcare for Assistive Technology

  • Malak Alamri,
  • Khalid Haseeb,
  • Mamoona Humayun,
  • Menwa Alshammeri,
  • Ghadah Naif Alwakid and
  • Naeem Ramzan

The integration of edge computing (EC) and Internet of Medical Things (IoMT) technologies facilitates the development of adaptive healthcare systems that significantly improve the accessibility and monitoring of individuals with disabilities. By enab...

  • Review
  • Open Access
74 Citations
12,109 Views
34 Pages

A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues

  • A. S. M. Kayes,
  • Rudri Kalaria,
  • Iqbal H. Sarker,
  • Md. Saiful Islam,
  • Paul A. Watters,
  • Alex Ng,
  • Mohammad Hammoudeh,
  • Shahriar Badsha and
  • Indika Kumara

27 April 2020

Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an overwhelming flow of data and services, which has shifted the access control paradigm from a fixed desktop environment to dynamic cloud environments. Fog com...

  • Article
  • Open Access
7 Citations
15,232 Views
25 Pages

Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work

  • Syed Muhammad Zohaib,
  • Syed Muhammad Sajjad,
  • Zafar Iqbal,
  • Muhammad Yousaf,
  • Muhammad Haseeb and
  • Zia Muhammad

17 November 2024

Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employee...

  • Article
  • Open Access
1 Citations
3,814 Views
23 Pages

RESPOnSE—A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments

  • Christina Michailidou,
  • Vasileios Gkioulos,
  • Andrii Shalaginov,
  • Athanasios Rizos and
  • Andrea Saracino

23 May 2020

The enforcement of fine-grained access control policies in constrained dynamic networks can become a challenging task. The inherit constraints present in those networks, which result from the limitations of the edge devices in terms of power, computa...

  • Article
  • Open Access
8 Citations
3,422 Views
18 Pages

Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network

  • Mujtaba Ghous,
  • Ziaul Haq Abbas,
  • Ahmad Kamal Hassan,
  • Ghulam Abbas,
  • Thar Baker and
  • Dhiya Al-Jumeily

18 June 2021

This paper studies the cell-edge user’s performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper. We suppose a worst-case scenario that...

  • Review
  • Open Access
105 Citations
15,576 Views
33 Pages

Evolution of V2X Communication and Integration of Blockchain for Security Enhancements

  • Rakesh Shrestha,
  • Seung Yeob Nam,
  • Rojeena Bajracharya and
  • Shiho Kim

With the rapid evolution in wireless communications and autonomous vehicles, intelligent and autonomous vehicles will be launched soon. Vehicle to Everything (V2X) communications provides driving safety, traffic efficiency, and road information in re...

  • Article
  • Open Access
2 Citations
4,385 Views
26 Pages

17 June 2025

The Industrial Internet of Things (IIoT) has revolutionized smart manufacturing by enhancing automation, operational efficiency, and data-driven decision making. However, the interconnected nature of IIoT devices raises significant concerns about sec...

of 5