|
|
|
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne...
ver más
|
|
|
|
|
|
|
Mohammed Bellaj, Najib Naja and Abdellah Jamali
Named Data Networking (NDN) has emerged as a promising architecture to overcome the limitations of the conventional Internet Protocol (IP) architecture, particularly in terms of mobility, security, and data availability. However, despite the advantages i...
ver más
|
|
|
|
|
|
|
Burhan Ul Islam Khan, Khang Wen Goh, Mohammad Shuaib Mir, Nur Fatin Liyana Mohd Rosely, Aabid Ahmad Mir and Mesith Chaimanee
As the Internet of Things (IoT) continues to revolutionize value-added services, its conventional architecture exhibits persistent scalability and security vulnerabilities, jeopardizing the trustworthiness of IoT-based services. These architectural limit...
ver más
|
|
|
|
|
|
|
Puya Li and Chunchang Zhang
Aiming at the communication network optimization problem of the Internet of Inland Vessels, this work presented a network model and deployment strategy with shore-based cooperative units as network nodes. Firstly, the system architecture and communicatio...
ver más
|
|
|
|
|
|
|
Mahmoud Elkhodr, Samiya Khan and Ergun Gide
In the modern digital landscape of the Internet of Things (IoT), data interoperability and heterogeneity present critical challenges, particularly with the increasing complexity of IoT systems and networks. Addressing these challenges, while ensuring dat...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Chen Li, Yinxu Lu, Yong Bian, Jie Tian and Mu Yuan
The quality and safety of agricultural products involve a variety of risk factors, a large amount of risk information data, and multiple circulation and disposal processes, making it difficult to accurately trace the source of risks. To achieve precise t...
ver más
|
|
|
|
|
|
|
Carlos Serôdio, Pedro Mestre, Jorge Cabral, Monica Gomes and Frederico Branco
In the context of Industry 4.0, this paper explores the vital role of advanced technologies, including Cyber?Physical Systems (CPS), Big Data, Internet of Things (IoT), digital twins, and Artificial Intelligence (AI), in enhancing data valorization and m...
ver más
|
|
|
|
|
|
|
Moon-Il Joo, Dong-Yoon Kang, Min-Soo Kang and Hee-Cheol Kim
Edge computing can provide core functions such as data collection and analysis without connecting to a centralized server. The convergence of edge computing and IoT devices has enabled medical institutions to collect patient data in real time, improving ...
ver más
|
|
|
|
|
|
|
Wenqi Gao, Ninghua Chen, Jianyu Chen, Bowen Gao, Yaochen Xu, Xuhua Weng and Xinhao Jiang
Geospatial data, especially remote sensing (RS) data, are of significant importance for public services and production activities. Expertise is critical in processing raw data, generating geospatial information, and acquiring domain knowledge and other r...
ver más
|
|
|
|