Online citations, reference lists, and bibliographies.
← Back to Search

Privacy-preserving Multi-channel Communication In Edge-of-Things

Keke Gai, M. Qiu, Zenggang Xiong, Meiqin Liu
Published 2018 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Abstract Contemporary booming growth of the Internet-based techniques has risen a revolution of network-oriented applications. A connected environment further drives the amalgamation of various techniques, such as edge computing, cloud computing and Internet-of-Things (IoT). Privacy concerns have appeared throughout the process of data transmissions, some of which are caused by the low security communication protocols. In practice, high security protection protocols generally require a higher-level computing resource due to more computation workloads and communication manipulations. The implementation of high security communications is restricted when data size becomes large. This work focuses on the issue of the conflict between privacy protection and efficiency and proposes a new approach for providing higher-level security transmission using multi-channel communications. We implement experiment evaluations to examine the performance of the proposed approach.
This paper references
10.1016/J.FUTURE.2017.10.024
Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems
Jian Shen (2020)
10.1109/TWC.2017.2777985
Adaptive Coding and Modulation for Large-Scale Antenna Array-Based Aeronautical Communications in the Presence of Co-Channel Interference
J. Zhang (2018)
10.1109/TNET.2009.2026276
Understanding the capacity region of the Greedy maximal scheduling algorithm in multihop wireless networks
C. Joo (2009)
10.1109/TSG.2014.2343611
Cost-Effective and Privacy-Preserving Energy Management for Smart Meters
L. Yang (2015)
10.1109/JIOT.2014.2311693
Machine-to-Machine Communications With In-Network Data Aggregation, Processing, and Actuation for Large-Scale Cyber-Physical Systems
I. Stojmenovic (2014)
10.1109/JIOT.2017.2684221
Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions
Q. Xu (2017)
10.1109/MWC.2015.7054715
AIWAC: affective interaction through wearable computing and cloud technology
M. Chen (2015)
10.1016/j.adhoc.2014.03.007
Optimal channel assignment with aggregation in multi-channel systems: A resilient approach to adjacent-channel interference
Gulnur Selda Uyanik (2014)
10.1109/TSUSC.2017.2723954
Resource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computing
Keke Gai (2018)
10.1109/MNET.2016.1200149NM
Securing Cognitive Radio Networks against Primary User Emulation Attacks
Rong Yu (2016)
10.1016/j.future.2015.09.026
Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture
Hyunguk Yoo (2016)
10.1109/ACCESS.2016.2549047
Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges
Anam Sajid (2016)
10.1016/j.future.2013.03.001
WSN in cyber physical systems: Enhanced energy management routing approach using software agents
Elhadi M. Shakshuki (2014)
10.1109/MCOM.2015.7081071
Safeguarding 5G wireless communication networks using physical layer security
Nan Yang (2015)
10.1109/ACCESS.2017.2773645
WARM: Workload-Aware Multi-Application Task Scheduling for Revenue Maximization in SDN-Based Cloud Data Center
H. Yuan (2018)
10.1109/TCC.2016.2594172
Cost-Aware Multimedia Data Allocation for Heterogeneous Memory Using Genetic Algorithm in Cloud Computing
Keke Gai (2016)
10.1109/JIOT.2014.2312291
Research Directions for the Internet of Things
J. Stankovic (2014)
10.1016/j.future.2016.06.017
ASA: Against statistical attacks for privacy-aware users in Location Based Service
Y. Sun (2017)
10.1109/MCOM.2014.6736761
Massive MIMO for next generation wireless systems
E. Larsson (2014)
10.1109/TWC.2014.2363357
Privacy-Preserving Collaborative Spectrum Sensing With Multiple Service Providers
W. Wang (2015)
10.1016/j.future.2014.08.007
External integrity verification for outsourced big data in cloud and IoT: A big picture
C. Liu (2015)
10.1109/JSYST.2013.2257594
Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges
Song Han (2014)
10.1016/j.jpdc.2017.08.001
Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing
Keke Gai (2018)
10.1109/SmartCloud.2016.50
Privacy-Preserving Adaptive Multi-channel Communications Under Timing Constraints
Keke Gai (2016)
10.1007/11593447_32
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Kim-Kwang Raymond Choo (2005)
10.1109/TCCN.2015.2488620
Performance Analysis of Wireless Energy Harvesting Cognitive Radio Networks Under Smart Jamming Attacks
D. Hoang (2015)
10.1109/MNET.2016.7437026
Privacy and performance trade-off in cyber-physical systems
H. Zhang (2016)
10.1109/MCOM.2014.6871677
Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions
J. Wan (2014)
10.1016/j.jnca.2017.10.011
A survey on FinTech
Keke Gai (2018)
10.1155/2013/917923
A Survey on Sensor-Cloud: Architecture, Applications, and Approaches
A. Alamri (2013)
10.1109/MWC.2016.1600039WC
Network Security and Privacy Challenges in Smart Vehicle-to-Grid
N. Saxena (2017)
10.1109/TNNLS.2015.2411673
QoS Differential Scheduling in Cognitive-Radio-Based Smart Grid Networks: An Adaptive Dynamic Programming Approach
Rong Yu (2016)
10.1109/TSG.2017.2664043
Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks
Keke Gai (2017)
10.1109/TVT.2015.2436395
Privacy-Preserving Transportation Traffic Measurement in Intelligent Cyber-physical Road Systems
Yian Zhou (2016)
10.1109/INFOCOM.2014.6848002
Achieving k-anonymity in privacy-aware location-based services
B. Niu (2014)
10.1016/j.future.2013.12.015
BodyCloud: A SaaS approach for community Body Sensor Networks
G. Fortino (2014)
10.1109/TIFS.2017.2656469
Privacy-Cost Trade-offs in Demand-Side Management With Storage
O. Tan (2017)
10.1109/TAC.2015.2461851
Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
Yuzhe Li (2015)
10.1016/j.ins.2016.09.005
Intelligent cryptography approach for secure distributed big data storage in cloud computing
Yibin Li (2017)



This paper is referenced by
10.1016/J.JNCA.2019.02.004
Collaborative joint caching and transcoding in mobile edge networks
K. Bilal (2019)
10.1109/TrustCom/BigDataSE.2018.00188
Detecting Domain Generation Algorithms with Convolutional Neural Language Models
J. Huang (2018)
10.1109/TrustCom/BigDataSE.2018.00085
Efficient Binary-Encoding Access Control Policy Combination for Large-Scale Collaborative Scenarios
Chunhua Li (2018)
10.1002/spe.2673
E2R‐F2N: Energy‐efficient retailing using a femtolet‐based fog network
A. Mukherjee (2019)
10.1109/TrustCom/BigDataSE.2018.00024
Dynamic Survivable Path Routing for Fast Changing IoT Network Topologies
Manu Elappila (2018)
10.1007/978-3-030-34083-4_8
Efficiency Issues and Solutions in Blockchain: A Survey
Atabaev Odiljon (2019)
10.1109/TrustCom/BigDataSE.2018.00117
Authentication of IoT Device and IoT Server Using Secure Vaults
Trusit Shah (2018)
A Novel Approach for Sharing the Healthcare Records of Data Privacy in Cloud Computing
(2020)
10.1109/TrustCom/BigDataSE.2018.00042
Research on Industrial Control Anomaly Detection Based on FCM and SVM
W. Shang (2018)
Algorithm Feasibility on IoT Devices with Memory and Computational Power Constraints
Anusha Medavaka (2019)
10.1109/TrustCom/BigDataSE.2018.00051
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis
P. Wang (2018)
10.1016/J.EIJ.2018.12.001
Security and privacy issues in e-health cloud-based system: A comprehensive content analysis
N. Azeez (2019)
10.1007/s11265-019-01508-y
Research on Image Retrieval Algorithm Based on Combination of Color and Shape Features
Xiong Zeng-gang (2019)
10.1016/j.ins.2020.05.053
A machine learning based golden-free detection method for command-activated hardware Trojan
Ning Shang (2020)
10.1109/TrustCom/BigDataSE.2018.00162
Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones
Jinpei Yan (2018)
10.1109/CSE/EUC.2019.00075
A Geographic Routing Strategy with DTN Support for Vehicular Named Data Networking
Bassma Aldahlan (2019)
10.1109/TrustCom/BigDataSE.2018.00138
A Flow-Level Architecture for Balancing Accountability and Privacy
Yuxiang Ma (2018)
10.1109/TrustCom/BigDataSE.2018.00099
Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks
Nisha Malik (2018)
10.1007/978-3-030-05764-0_2
A New Sustainable Interchain Design on Transport Layer for Blockchain
Jing Wu (2018)
10.1109/SmartCloud.2019.00046
An adversarial reinforcement learning based system for cyber security
S. Xia (2019)
10.1016/J.FUTURE.2019.06.020
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W. Li (2019)
10.1007/978-3-030-60248-2_11
A Simulation Study on Block Generation Algorithm Based on TPS Model
Shubin Cai (2020)
10.1007/978-3-030-24289-3_42
Privacy vs. Utility: An Enhanced K-coRated
Ze Xiang (2019)
10.1007/978-3-030-05764-0_14
An Improved Consensus Mechanism for Blockchain
H. Guo (2018)
10.1186/s13638-019-1560-8
A time-efficient data offloading method with privacy preservation for intelligent sensors in edge computing
Zhanyang Xu (2019)
10.1016/J.FUTURE.2019.04.030
An enhanced priority-based scheduling heuristic for DAG applications with temporal unpredictability in task execution and data transmission
X. Zhang (2019)
10.1109/TrustCom/BigDataSE.2018.00012
A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing
Y. Wang (2018)
10.1109/CSCloud/EdgeCom.2019.000-2
Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing
Wenting Li (2019)
Survey on Securing Data with Blockchain and AI
Ravi Kajale (2019)
10.1007/S11265-018-1404-5
Web Load Balancing Based on DNS Coordination and Reducing Energy Consumption Strategy
Zhijie Han (2019)
10.1109/TrustCom/BigDataSE.2018.00014
Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial Networks
Tianao Ma (2018)
10.1016/J.FUTURE.2019.05.058
Robust secure communication protocol for smart healthcare system with FPGA implementation
V. Sureshkumar (2019)
See more
Semantic Scholar Logo Some data provided by SemanticScholar