A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment
2018
IEEE Communications Magazine
The first article, "Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM" by Sharma et al., presents a blockchain-based distributed mobility management scheme for efficient handover ...
The last article, "Saving Energy on the Edge: In-Memory Caching for Multi-Tier Heterogeneous Network" by Xu et al., focuses on the improvement in energy efficiency for edge caching by using in-memory storage ...
doi:10.1109/mcom.2018.8360845
fatcat:5effigr72jamdbhsp6myos4afe
Table of Contents
2018
IEEE Communications Magazine
C. rodriGues, mohseN GuizaNi, Kim-KwaNG raymoNd Choo,
roNGxiNG lu, Christos VeriKouKis, aNd zhimeNG zhoNG
Guest editorial
secure and enerGy-efficient Handover in foG networks usinG
BlockcHain-Based ...
History of Communications Steve Weinsten (USA) www.comsoc.org/commag Achieving energy efficiency And SuStAinAbility in edge/fog deployment Ruyan Wang, Junjie Yan, Dapeng Wu, Honggang Wang, and Qing Yang ...
Selected editors will work closely with the Editor-in-Chief (EiC) and Associate Editors-in-Chief (AEiCs) and become part of the editorial team of the magazine. ...
doi:10.1109/mcom.2018.8360816
fatcat:ylwcuynqsbhx3aj73jgdyjm5gy
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks
[chapter]
2019
5G Enabled Secure Wireless Networks
To cover this, a detailed description of the security for the 5G networks is presented in this article along with the discussions on the evolution of osmotic and catalytic computing-based security modules ...
This article also provides a security model, "CATMOSIS", which idealizes the incorporation of security features on the basis of catalytic and osmotic computing in the 5G networks. ...
To support Distributed Mobility Management (DMM), Sharma et al. [76] developed a Blockchain-based DMM handover scheme. ...
doi:10.1007/978-3-030-03508-2_3
fatcat:vaux3rlnivhq5j2fad2hgmpbt4
Opportunities and challenges of joint edge and Fog orchestration
2018
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)
It started in Madrid, Spain, as a PhD student at the IMDEA Networks Institute. ...
Then, after a couple of years, it took a sharp turn that brought me to London, United Kingdom, at InterDigital Europe Labs in the position of senior research engineer in the field of 5G Radio Access Network ...
in fronthaul links while increasing their energy efficiency. ...
doi:10.1109/wcncw.2018.8369006
dblp:conf/wcnc/Comma-diAACGKMY18
fatcat:gknxhtmnkvh2djboynbwmvrh24
A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues
2022
Journal of Cloud Computing: Advances, Systems and Applications
A lack of standards and laws may make it difficult for blockchain and fog computing to be integrated in the future, particularly in light of newly developed technologies like quantum computing and artificial ...
The purposes of integrating blockchain and fog computing were determined using a systematic literature review approach and tailored search criteria established from the research questions. ...
[203] demonstrated a safe BC architecture and a fog-based architecture network for IoT applications in smart cities. ...
doi:10.1186/s13677-022-00353-y
pmid:36438442
pmcid:PMC9676739
fatcat:pvzjspe7bnddvndmcgjnf43fcq
Autonomous Vehicles in 5G and Beyond: A Survey
[article]
2022
arXiv
pre-print
Then, we focus on the emerging techniques required for integrating 5G technology with AVs, impact of 5G and B5G technologies on AVs along with security concerns in AVs. ...
It has the capability to provide greater coverage, better access, and best suited for high density networks. ...
[118] proposed a blockchain enabled 5G networks for secured and efficient sharing of data in flying drones. ...
arXiv:2207.10510v1
fatcat:myzpimlcazgjbkcr5n4e6zefsi
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey
[article]
2020
arXiv
pre-print
There is no direct survey available, which focuses on security, privacy, trust, secure protocols, physical layer security and handover protections in M-IoT. ...
This paper covers such requisites and presents comparisons of state-the-art solutions for IoT which are applicable to security, privacy, and trust in smart and connected M-IoT networks. ...
Such schemes are extremely useful for networks using crowdsourcing and can be used as broadcast mechanisms for blockchain-based distributed solutions for privacy preservations.
D. ...
arXiv:1903.05362v3
fatcat:wjp44eatfrgg5gevkbo7oqwatq
Blockchain for the Cybersecurity of Smart City Applications
[article]
2022
arXiv
pre-print
We believe that the present survey is a good starting point for every researcher in the fields of cybersecurity, blockchain, and smart cities. ...
This paper provides a comprehensive review of the existing blockchain-based solutions for the cybersecurity of the main smart city applications, namely smart healthcare, smart transportation, smart agriculture ...
Mainly, the blockchain technology is used to store and share, in efficient ways, data like water quality, energy used, weather conditions, etc. ...
arXiv:2206.02760v1
fatcat:yuyen5kynnfwphh7vqn4ccywk4
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey
2020
IEEE Access
There is no direct survey available, which focuses on security, privacy, trust, secure protocols, physical layer security and handover protections in M-IoT. ...
This paper covers such requisites and presents comparisons of state-the-art solutions for IoT which are applicable to security, privacy, and trust in smart and connected M-IoT networks. ...
These approaches are responsible for energy-efficient security at the physical layer.
B. ...
doi:10.1109/access.2020.3022661
fatcat:li7hno53n5fm5dn4lgd3bfjafy
Survey on Multi-Access Edge Computing Security and Privacy
2021
IEEE Communications Surveys and Tutorials
There are some research works related to blockchain based Fog systems to improve the security and privacy along with resource and energy management [207] , [208] . ...
Thus, efficiency and security are factors to be optimized in the UE operating in the access network. ...
doi:10.1109/comst.2021.3062546
fatcat:u3xxvixiw5a4fdl2wxdla24ocu
The Potential Short- and Long- Term Disruptions and Transformative Impacts of 5G and Beyond Wireless Networks: Lessons Learnt from the Development of a 5G Testbed Environment
2020
IEEE Access
In this direction, this paper proposes the development of a unified data hub with layered structured privacy and security along with blockchain and encrypted off-chain based ownership/royalty tracking. ...
The privacy and security of such data, as well as definitions of the associated revenue models and ownership, are challenging areas -and these have yet to emerge and mature fully. ...
spectrum efficiency and energy efficiency of wireless networks [68] . ...
doi:10.1109/access.2020.2964673
fatcat:msgtnoey4vfh3lmggwuhvdepcu
A Review Of 5G Technology: Architecture, Security and wide Applications
2020
Zenodo
This paper briefly discusses the architecture of 5G, following by the security associated with the 5G network, 5G as an energy efficient network, various types of efficient antennas developed for 5G and ...
The eventual goal of the forthcoming 5G wireless networking is to have relatively fast data speeds, incredibly low latency, substantial rises in base station's efficiency and major changes in expected ...
Apart from this we can also use security automation and Blockchain security perspective techniques in order to further enhance the security. ...
doi:10.5281/zenodo.3842353
fatcat:hl3e7kdp3ban7ggn2avttrqzwq
Network Management and Monitoring Solutions for Vehicular Networks: A Survey
2020
Electronics
However, designing efficient solutions for this type of network is not an easy task due to its particular characteristics. ...
This paper elaborates on a comprehensive survey focusing on promising proposals to deal with monitoring and management functionalities in vehicular networks. ...
This scheme is based on blockchain and is intended to reduce the handover latency. ...
doi:10.3390/electronics9050853
fatcat:sea2kau4b5czfpgqtd7zq4pfbm