Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








13 Hits in 4.1 sec

Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment

Neeraj Kumar, Joel J. P. C. Rodrigues, Mohsen Guizani, Kim-Kwang Raymond Choo, Rongxing Lu, Christos Verikoukis, Zhimeng Zhong
2018 IEEE Communications Magazine  
The first article, "Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM" by Sharma et al., presents a blockchain-based distributed mobility management scheme for efficient handover  ...  The last article, "Saving Energy on the Edge: In-Memory Caching for Multi-Tier Heterogeneous Network" by Xu et al., focuses on the improvement in energy efficiency for edge caching by using in-memory storage  ... 
doi:10.1109/mcom.2018.8360845 fatcat:5effigr72jamdbhsp6myos4afe

Table of Contents

2018 IEEE Communications Magazine  
C. rodriGues, mohseN GuizaNi, Kim-KwaNG raymoNd Choo, roNGxiNG lu, Christos VeriKouKis, aNd zhimeNG zhoNG Guest editorial secure and enerGy-efficient Handover in foG networks usinG BlockcHain-Based  ...  History of Communications Steve Weinsten (USA) www.comsoc.org/commag Achieving energy efficiency And SuStAinAbility in edge/fog deployment Ruyan Wang, Junjie Yan, Dapeng Wu, Honggang Wang, and Qing Yang  ...  Selected editors will work closely with the Editor-in-Chief (EiC) and Associate Editors-in-Chief (AEiCs) and become part of the editorial team of the magazine.  ... 
doi:10.1109/mcom.2018.8360816 fatcat:ylwcuynqsbhx3aj73jgdyjm5gy

A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks [chapter]

Gaurav Choudhary, Vishal Sharma
2019 5G Enabled Secure Wireless Networks  
To cover this, a detailed description of the security for the 5G networks is presented in this article along with the discussions on the evolution of osmotic and catalytic computing-based security modules  ...  This article also provides a security model, "CATMOSIS", which idealizes the incorporation of security features on the basis of catalytic and osmotic computing in the 5G networks.  ...  To support Distributed Mobility Management (DMM), Sharma et al. [76] developed a Blockchain-based DMM handover scheme.  ... 
doi:10.1007/978-3-030-03508-2_3 fatcat:vaux3rlnivhq5j2fad2hgmpbt4

Opportunities and challenges of joint edge and Fog orchestration

Luca Cominardi, Osamah Ibrahiem Abdullaziz, Kiril Antevski, Shahzoob Bilal Chundrigar, Robert Gdowski, Ping-Heng Kuo, Alain Mourad, Li-Hsing Yen, Aitor Zabala
2018 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)  
It started in Madrid, Spain, as a PhD student at the IMDEA Networks Institute.  ...  Then, after a couple of years, it took a sharp turn that brought me to London, United Kingdom, at InterDigital Europe Labs in the position of senior research engineer in the field of 5G Radio Access Network  ...  in fronthaul links while increasing their energy efficiency.  ... 
doi:10.1109/wcncw.2018.8369006 dblp:conf/wcnc/Comma-diAACGKMY18 fatcat:gknxhtmnkvh2djboynbwmvrh24

A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues

Yehia Ibrahim Alzoubi, Asif Gill, Alok Mishra
2022 Journal of Cloud Computing: Advances, Systems and Applications  
A lack of standards and laws may make it difficult for blockchain and fog computing to be integrated in the future, particularly in light of newly developed technologies like quantum computing and artificial  ...  The purposes of integrating blockchain and fog computing were determined using a systematic literature review approach and tailored search criteria established from the research questions.  ...  [203] demonstrated a safe BC architecture and a fog-based architecture network for IoT applications in smart cities.  ... 
doi:10.1186/s13677-022-00353-y pmid:36438442 pmcid:PMC9676739 fatcat:pvzjspe7bnddvndmcgjnf43fcq

Autonomous Vehicles in 5G and Beyond: A Survey [article]

Saqib Hakak, Thippa Reddy Gadekallu, Swarna Priya Ramu, Parimala M, Praveen Kumar Reddy Maddikunta, Chamitha de Alwis, Madhusanka Liyanage
2022 arXiv   pre-print
Then, we focus on the emerging techniques required for integrating 5G technology with AVs, impact of 5G and B5G technologies on AVs along with security concerns in AVs.  ...  It has the capability to provide greater coverage, better access, and best suited for high density networks.  ...  [118] proposed a blockchain enabled 5G networks for secured and efficient sharing of data in flying drones.  ... 
arXiv:2207.10510v1 fatcat:myzpimlcazgjbkcr5n4e6zefsi

Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey [article]

Vishal Sharma, Ilsun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, Jaedeok Lim
2020 arXiv   pre-print
There is no direct survey available, which focuses on security, privacy, trust, secure protocols, physical layer security and handover protections in M-IoT.  ...  This paper covers such requisites and presents comparisons of state-the-art solutions for IoT which are applicable to security, privacy, and trust in smart and connected M-IoT networks.  ...  Such schemes are extremely useful for networks using crowdsourcing and can be used as broadcast mechanisms for blockchain-based distributed solutions for privacy preservations. D.  ... 
arXiv:1903.05362v3 fatcat:wjp44eatfrgg5gevkbo7oqwatq

Blockchain for the Cybersecurity of Smart City Applications [article]

Omar Cheikhrouhou, Ichrak Amdouni, Khaleel Mershad, Maryem Ammi, Tuan Nguyen Gia
2022 arXiv   pre-print
We believe that the present survey is a good starting point for every researcher in the fields of cybersecurity, blockchain, and smart cities.  ...  This paper provides a comprehensive review of the existing blockchain-based solutions for the cybersecurity of the main smart city applications, namely smart healthcare, smart transportation, smart agriculture  ...  Mainly, the blockchain technology is used to store and share, in efficient ways, data like water quality, energy used, weather conditions, etc.  ... 
arXiv:2206.02760v1 fatcat:yuyen5kynnfwphh7vqn4ccywk4

Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey

Vishal Sharma, Ilsun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, Jaedeok Lim
2020 IEEE Access  
There is no direct survey available, which focuses on security, privacy, trust, secure protocols, physical layer security and handover protections in M-IoT.  ...  This paper covers such requisites and presents comparisons of state-the-art solutions for IoT which are applicable to security, privacy, and trust in smart and connected M-IoT networks.  ...  These approaches are responsible for energy-efficient security at the physical layer. B.  ... 
doi:10.1109/access.2020.3022661 fatcat:li7hno53n5fm5dn4lgd3bfjafy

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2021 IEEE Communications Surveys and Tutorials  
There are some research works related to blockchain based Fog systems to improve the security and privacy along with resource and energy management [207] , [208] .  ...  Thus, efficiency and security are factors to be optimized in the UE operating in the access network.  ... 
doi:10.1109/comst.2021.3062546 fatcat:u3xxvixiw5a4fdl2wxdla24ocu

The Potential Short- and Long- Term Disruptions and Transformative Impacts of 5G and Beyond Wireless Networks: Lessons Learnt from the Development of a 5G Testbed Environment

Mohmammad N. Patwary, Syed Junaid Nawaz, Md. Abdur Rahman, Shree Krishna Sharma, Md Mamunur Rashid, Stuart J. Barnes
2020 IEEE Access  
In this direction, this paper proposes the development of a unified data hub with layered structured privacy and security along with blockchain and encrypted off-chain based ownership/royalty tracking.  ...  The privacy and security of such data, as well as definitions of the associated revenue models and ownership, are challenging areas -and these have yet to emerge and mature fully.  ...  spectrum efficiency and energy efficiency of wireless networks [68] .  ... 
doi:10.1109/access.2020.2964673 fatcat:msgtnoey4vfh3lmggwuhvdepcu

A Review Of 5G Technology: Architecture, Security and wide Applications

Meer Zafarullah Noohani, Kaleem Ullah Magsi
2020 Zenodo  
This paper briefly discusses the architecture of 5G, following by the security associated with the 5G network, 5G as an energy efficient network, various types of efficient antennas developed for 5G and  ...  The eventual goal of the forthcoming 5G wireless networking is to have relatively fast data speeds, incredibly low latency, substantial rises in base station's efficiency and major changes in expected  ...  Apart from this we can also use security automation and Blockchain security perspective techniques in order to further enhance the security.  ... 
doi:10.5281/zenodo.3842353 fatcat:hl3e7kdp3ban7ggn2avttrqzwq

Network Management and Monitoring Solutions for Vehicular Networks: A Survey

João A. F. F. Dias, Joel J. P. C. Rodrigues, Vasco N. G. J. Soares, João M. L. P. Caldeira, Valery Korotaev, Mario L. Proença Jr
2020 Electronics  
However, designing efficient solutions for this type of network is not an easy task due to its particular characteristics.  ...  This paper elaborates on a comprehensive survey focusing on promising proposals to deal with monitoring and management functionalities in vehicular networks.  ...  This scheme is based on blockchain and is intended to reduce the handover latency.  ... 
doi:10.3390/electronics9050853 fatcat:sea2kau4b5czfpgqtd7zq4pfbm