Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








14,930 Hits in 4.8 sec

Open RAN Security: Challenges and Opportunities [article]

Madhusanka Liyanage, An Braeken, Shahriar Shahabuddin, Pasika Ranaweera
2022 arXiv   pre-print
approach towards the security of Open RAN deployment.  ...  However, the benefits of Open RAN bring new security and privacy challenges.  ...  The research leading to these results partly received funding from European Union's Horizon 2020 research and innovation programme under grant agreement no 101021808 (H2020 SPATIAL project).  ... 
arXiv:2212.01510v1 fatcat:sl2u6uakjzel7iupdlzz3tbmue

Challenges and Opportunities for Beyond-5G Wireless Security [article]

Eric Ruzomberka, David J. Love, Christopher G. Brinton, Arpit Gupta, Chih-Chun Wang, H. Vincent Poor
2023 arXiv   pre-print
In this paper, we aim to identify emerging security challenges for these wireless systems and pose multiple research areas to address these challenges.  ...  The demand for broadband wireless access is driving research and standardization of 5G and beyond-5G wireless systems.  ...  Furthermore, the standard leaves many security challenges open, including challenges surrounding SDN, ML and AI.  ... 
arXiv:2303.00727v1 fatcat:xfov32wp6fg73j4upmyexa5ujy

Securing Serverless Computing: Challenges, Solutions, and Opportunities [article]

Xing Li, Xue Leng, Yan Chen
2021 arXiv   pre-print
We summarize the primary security challenges, analyze corresponding solutions from the literature and industry, and identify potential research opportunities.  ...  Considerable literature work has been committed to addressing these challenges. Commercial and open-source serverless platforms implement many security measures to enhance serverless environments.  ...  We believe this scenario represents a research opportunity where artificial intelligence (AI)-based methods might be beneficial. V.  ... 
arXiv:2105.12581v1 fatcat:djlx2kku5vhrnjh3emgqv3nnn4

Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities [article]

Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi
2024 arXiv   pre-print
, and Human-Robot Interaction (HRI) security.  ...  Our goal is to provide users, developers and other stakeholders with a holistic understanding of these areas to enhance the overall AI-Robotics system security.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF.  ... 
arXiv:2310.08565v3 fatcat:cn3eoksdyner3i4s6uahhcxava

Authentication in a Hyperconnected World: Challenges, Opportunities and Approaches

Christoph Lipps, Jan Herbst, Rekha Reddy, Matthias Rüb, Hans D. Schotten
2024 International Conference on Cyber Warfare and Security (ICIW)  
Thereby, the impact of Artificial Intelligence (AI) methods, but also the relevance to Quantum Key Distribution (QKD) and Post Quantum Cryptography, as well as the use of 6G-enabling technologies like  ...  Authentication and integrity are the prerequisites for trustworthy and secure communication.  ...  Acknowledgement This work has been supported by the Federal Ministry of Education and Research of the Federal Republic of Germany (Förderkennzeichen 16KIS1841K ALPAKA and 16KIS1283 AI-NET PROTECT).  ... 
doi:10.34190/iccws.19.1.2070 fatcat:hmuoxkkmanbrhdm3kuc2epwa2y

Security and Privacy in Smart Cities: Challenges and Opportunities

Lei Cui, Gang Xie, Youyang Qu, Longxiang Gao, Yunyun Yang
2018 IEEE Access  
Now that many smart systems have been implemented, security and privacy issues have become a major challenge that requires effective countermeasures.  ...  Finally, we present open research challenges and identify some future research directions. INDEX TERMS Smart city, Internet of Things, security, privacy. 46134 2169-3536  ...  . • We identify future research opportunities corresponding to the current challenges and the up-to-date security requirements, which can contribute to the construction of more secure, privacy protected  ... 
doi:10.1109/access.2018.2853985 fatcat:rdxm76dkenfbtaygpdgiarqydy

Security and Privacy in Smart Farming: Challenges and Opportunities

Maanak Gupta, Mahmoud Abdelsalam, Sajad Khorsandroo, Sudip Mittal
2020 IEEE Access  
Further more, the paper elaborates on potential cyber attack scenarios and highlights open research challenges and future directions.  ...  INDEX TERMS Security, privacy, smart farming, precision agriculture, cloud computing, edge computing, cyber physical systems, IoT, artificial intelligence (AI), machine learning, layered architecture.  ...  Leckie, Associate Professor in the School of Agriculture at Tennessee Technological University, for his domain expertise, insightful comments, and suggestions, to make this manuscript more comprehensible  ... 
doi:10.1109/access.2020.2975142 fatcat:3s7cmur2jrghzh3yxdsmklbh7m

Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities

Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris
2019 Information & Security An International Journal  
In this work, we analyse the emerging cybersecurity challenges and how the ensuing risks could be alleviated by the advancements in AI and blockchain technologies.  ...  with their customers and vice versa.  ...  Acknowledgement This work was supported by the ECHO project which has received funding from the European Union's Horizon 2020 research and innovation programme under the grant agreement no 830943  ... 
doi:10.11610/isij.4302 fatcat:y5uajwuz2ja4bhqvnivezphh24

Toward the 6G Network Era: Opportunities and Challenges

Ioannis Tomkos, Dimitrios Klonidis, Evangelos Pikasis, Sergios Theodoridis
2020 IT Professional Magazine  
) networks which will employ AI to optimize and automate their operation. 1520-9202 ß 2020 IEEE Published by the IEEE Computer Society  ...  In this article, we discuss the transformation and convergence of the fifthgeneration (5G) mobile network and the internet of things technologies, toward the emergence of the smart sixth-generation (6G  ...  edge computing hardware executing AI and other algorithms (like, e.g., blockchain for trustworthiness and security) over an SDN/NFV software control and management platform should be seen as its "brain  ... 
doi:10.1109/mitp.2019.2963491 fatcat:nphysndjnvhkpjzfsteu74cmui

Exploring Software Security Test Generation Techniques: Challenges and Opportunities

Mamdouh Alenezi, Mohammed Akour, Hamid Abdul Basit
2021 International Journal of Education and Information Technologies  
The findings are summarized and discussed where the opportunities and challenges are revealed narratively.  ...  In this paper, we review various software security test case generation approaches and techniques. We try to explore and classify the most eminent techniques for test case generation.  ...  Also, a relationship between the existing techniques and application types needs to be investigated. Automation is often enabled by AI-based techniques and algorithms.  ... 
doi:10.46300/9109.2021.15.11 fatcat:jfrdf2fi4zdo7mv7jbz5hot3aa

Blockchain Adoption to Secure the Food Industry: Opportunities and Challenges

Sudeep Tanwar, Akshay Parmar, Aparna Kumari, Nilesh Kumar Jadav, Wei-Chiang Hong, Ravi Sharma
2022 Sustainability  
Finally, we provide insights into the open issues and research challenges with concluding remarks.  ...  Further, we propose a blockchain-based secure and decentralized food industry architecture to alleviate security and privacy aspects and present a comprehensive solution taxonomy for a blockchain-based  ...  issues and security challenges.  ... 
doi:10.3390/su14127036 doaj:acbf9b303360426696901a9a37677f9f fatcat:jxpbpabwe5ah3jyeejlzmdprjm

Edge Computing and Its Convergence with Blockchain in 5G and Beyond: Security, Challenges, and Opportunities

Showkat Ahmad Bhat, Ishfaq Bashir Sofi, Chong-Yung Chi
2020 IEEE Access  
computing, and AI.  ...  Other surveys have studied basic characteristics, research challenges, and opportunities of different edge computing paradigms [19] [20] [21] [22] . Caprolu et al.  ... 
doi:10.1109/access.2020.3037108 fatcat:iksoyfx7nbhfrefnzgf6uxuw4q

Challenges and Opportunities of Edge AI for Next-Generation Implantable BMIs [article]

MohammadAli Shaeri, Arshia Afzal, Mahsa Shoaran
2022 arXiv   pre-print
Finally, we will present algorithmic and IC design solutions to enable a new generation of AI-enhanced and high-channel-count BMIs.  ...  Major technological challenges for the effectiveness of AI models will be discussed.  ...  Developing high-performance, energy-efficient, and scalable AI techniques could enable a new generation of implantable BMIs with minimal need for data transmission, enhanced security and privacy, and higher  ... 
arXiv:2204.02362v2 fatcat:3wzfewlaungjlo5mizq2rru3zi

Food Logistics 4.0: Opportunities and Challenges

Sandeep Jagtap, Farah Bader, Guillermo Garcia-Garcia, Hana Trollman, Tobi Fadiji, Konstantinos Salonitis
2020 Logistics  
This paper discusses the vital technologies within Food Logistics 4.0 and the opportunities and challenges in this regard.  ...  It focuses primarily on food logistics, including resource planning, warehouse management, transportation management, predictive maintenance, and data security.  ...  Acknowledgments: We would like to express our sincere gratitude to the editor and anonymous referees for their insightful and constructive comments.  ... 
doi:10.3390/logistics5010002 fatcat:7i6xo53jrzamxm7st5nwxt2euy

Unmanned aerial vehicle for internet of everything: Opportunities and challenges

Yalin Liu, Hong-Ning Dai, Qubeijian Wang, Mahendra K. Shukla, Muhammad Imran
2020 Computer Communications  
Thus, UAVs may potentially overcome the challenges of IoE. This article presents a comprehensive survey on opportunities and challenges of UAV-enabled IoE.  ...  Thereafter, we review the enabling technologies to achieve these expectations and discuss four intrinsic constraints of IoE (i.e., coverage constraint, battery constraint, computing constraint, and security  ...  Challenges of IoE Although the aforementioned enabling technologies can potentially realize IoE's scalability, intelligence, and diversity, a number of challenges are rising when implementing those enabling  ... 
doi:10.1016/j.comcom.2020.03.017 fatcat:jfzpmaarlbgkrmmh4edx72b6om
« Previous Showing results 1 — 15 out of 14,930 results