A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Open RAN Security: Challenges and Opportunities
[article]
2022
arXiv
pre-print
approach towards the security of Open RAN deployment. ...
However, the benefits of Open RAN bring new security and privacy challenges. ...
The research leading to these results partly received funding from European Union's Horizon 2020 research and innovation programme under grant agreement no 101021808 (H2020 SPATIAL project). ...
arXiv:2212.01510v1
fatcat:sl2u6uakjzel7iupdlzz3tbmue
Challenges and Opportunities for Beyond-5G Wireless Security
[article]
2023
arXiv
pre-print
In this paper, we aim to identify emerging security challenges for these wireless systems and pose multiple research areas to address these challenges. ...
The demand for broadband wireless access is driving research and standardization of 5G and beyond-5G wireless systems. ...
Furthermore, the standard leaves many security challenges open, including challenges surrounding SDN, ML and AI. ...
arXiv:2303.00727v1
fatcat:xfov32wp6fg73j4upmyexa5ujy
Securing Serverless Computing: Challenges, Solutions, and Opportunities
[article]
2021
arXiv
pre-print
We summarize the primary security challenges, analyze corresponding solutions from the literature and industry, and identify potential research opportunities. ...
Considerable literature work has been committed to addressing these challenges. Commercial and open-source serverless platforms implement many security measures to enhance serverless environments. ...
We believe this scenario represents a research opportunity where artificial intelligence (AI)-based methods might be beneficial.
V. ...
arXiv:2105.12581v1
fatcat:djlx2kku5vhrnjh3emgqv3nnn4
Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities
[article]
2024
arXiv
pre-print
, and Human-Robot Interaction (HRI) security. ...
Our goal is to provide users, developers and other stakeholders with a holistic understanding of these areas to enhance the overall AI-Robotics system security. ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF. ...
arXiv:2310.08565v3
fatcat:cn3eoksdyner3i4s6uahhcxava
Authentication in a Hyperconnected World: Challenges, Opportunities and Approaches
2024
International Conference on Cyber Warfare and Security (ICIW)
Thereby, the impact of Artificial Intelligence (AI) methods, but also the relevance to Quantum Key Distribution (QKD) and Post Quantum Cryptography, as well as the use of 6G-enabling technologies like ...
Authentication and integrity are the prerequisites for trustworthy and secure communication. ...
Acknowledgement This work has been supported by the Federal Ministry of Education and Research of the Federal Republic of Germany (Förderkennzeichen 16KIS1841K ALPAKA and 16KIS1283 AI-NET PROTECT). ...
doi:10.34190/iccws.19.1.2070
fatcat:hmuoxkkmanbrhdm3kuc2epwa2y
Security and Privacy in Smart Cities: Challenges and Opportunities
2018
IEEE Access
Now that many smart systems have been implemented, security and privacy issues have become a major challenge that requires effective countermeasures. ...
Finally, we present open research challenges and identify some future research directions. INDEX TERMS Smart city, Internet of Things, security, privacy. 46134 2169-3536 ...
. • We identify future research opportunities corresponding to the current challenges and the up-to-date security requirements, which can contribute to the construction of more secure, privacy protected ...
doi:10.1109/access.2018.2853985
fatcat:rdxm76dkenfbtaygpdgiarqydy
Security and Privacy in Smart Farming: Challenges and Opportunities
2020
IEEE Access
Further more, the paper elaborates on potential cyber attack scenarios and highlights open research challenges and future directions. ...
INDEX TERMS Security, privacy, smart farming, precision agriculture, cloud computing, edge computing, cyber physical systems, IoT, artificial intelligence (AI), machine learning, layered architecture. ...
Leckie, Associate Professor in the School of Agriculture at Tennessee Technological University, for his domain expertise, insightful comments, and suggestions, to make this manuscript more comprehensible ...
doi:10.1109/access.2020.2975142
fatcat:3s7cmur2jrghzh3yxdsmklbh7m
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
2019
Information & Security An International Journal
In this work, we analyse the emerging cybersecurity challenges and how the ensuing risks could be alleviated by the advancements in AI and blockchain technologies. ...
with their customers and vice versa. ...
Acknowledgement This work was supported by the ECHO project which has received funding from the European Union's Horizon 2020 research and innovation programme under the grant agreement no 830943 ...
doi:10.11610/isij.4302
fatcat:y5uajwuz2ja4bhqvnivezphh24
Toward the 6G Network Era: Opportunities and Challenges
2020
IT Professional Magazine
) networks which will employ AI to optimize and automate their operation. 1520-9202 ß 2020 IEEE Published by the IEEE Computer Society ...
In this article, we discuss the transformation and convergence of the fifthgeneration (5G) mobile network and the internet of things technologies, toward the emergence of the smart sixth-generation (6G ...
edge computing hardware executing AI and other algorithms (like, e.g., blockchain for trustworthiness and security) over an SDN/NFV software control and management platform should be seen as its "brain ...
doi:10.1109/mitp.2019.2963491
fatcat:nphysndjnvhkpjzfsteu74cmui
Exploring Software Security Test Generation Techniques: Challenges and Opportunities
2021
International Journal of Education and Information Technologies
The findings are summarized and discussed where the opportunities and challenges are revealed narratively. ...
In this paper, we review various software security test case generation approaches and techniques. We try to explore and classify the most eminent techniques for test case generation. ...
Also, a relationship between the existing techniques and application types needs to be investigated. Automation is often enabled by AI-based techniques and algorithms. ...
doi:10.46300/9109.2021.15.11
fatcat:jfrdf2fi4zdo7mv7jbz5hot3aa
Blockchain Adoption to Secure the Food Industry: Opportunities and Challenges
2022
Sustainability
Finally, we provide insights into the open issues and research challenges with concluding remarks. ...
Further, we propose a blockchain-based secure and decentralized food industry architecture to alleviate security and privacy aspects and present a comprehensive solution taxonomy for a blockchain-based ...
issues and security challenges. ...
doi:10.3390/su14127036
doaj:acbf9b303360426696901a9a37677f9f
fatcat:jxpbpabwe5ah3jyeejlzmdprjm
Edge Computing and Its Convergence with Blockchain in 5G and Beyond: Security, Challenges, and Opportunities
2020
IEEE Access
computing, and AI. ...
Other surveys have studied basic characteristics, research challenges, and opportunities of different edge computing paradigms [19] [20] [21] [22] . Caprolu et al. ...
doi:10.1109/access.2020.3037108
fatcat:iksoyfx7nbhfrefnzgf6uxuw4q
Challenges and Opportunities of Edge AI for Next-Generation Implantable BMIs
[article]
2022
arXiv
pre-print
Finally, we will present algorithmic and IC design solutions to enable a new generation of AI-enhanced and high-channel-count BMIs. ...
Major technological challenges for the effectiveness of AI models will be discussed. ...
Developing high-performance, energy-efficient, and scalable AI techniques could enable a new generation of implantable BMIs with minimal need for data transmission, enhanced security and privacy, and higher ...
arXiv:2204.02362v2
fatcat:3wzfewlaungjlo5mizq2rru3zi
Food Logistics 4.0: Opportunities and Challenges
2020
Logistics
This paper discusses the vital technologies within Food Logistics 4.0 and the opportunities and challenges in this regard. ...
It focuses primarily on food logistics, including resource planning, warehouse management, transportation management, predictive maintenance, and data security. ...
Acknowledgments: We would like to express our sincere gratitude to the editor and anonymous referees for their insightful and constructive comments. ...
doi:10.3390/logistics5010002
fatcat:7i6xo53jrzamxm7st5nwxt2euy
Unmanned aerial vehicle for internet of everything: Opportunities and challenges
2020
Computer Communications
Thus, UAVs may potentially overcome the challenges of IoE. This article presents a comprehensive survey on opportunities and challenges of UAV-enabled IoE. ...
Thereafter, we review the enabling technologies to achieve these expectations and discuss four intrinsic constraints of IoE (i.e., coverage constraint, battery constraint, computing constraint, and security ...
Challenges of IoE Although the aforementioned enabling technologies can potentially realize IoE's scalability, intelligence, and diversity, a number of challenges are rising when implementing those enabling ...
doi:10.1016/j.comcom.2020.03.017
fatcat:jfzpmaarlbgkrmmh4edx72b6om
« Previous
Showing results 1 — 15 out of 14,930 results