Joint resource configuration method for secure fog computing Internet of things
The current fog computing Internet of things (IoT) systems are prone to eavesdropping attacks in the process of physical communication transmission, and the existing research on fog computing has not effectively solved this problem.In order to realize the physical layer security (PLS) communication...
Saved in:
Main Authors: | Shibo ZHANG, Hongyuan GAO, Yumeng SU, Jianhua CHENG, Lishuai ZHAO |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2023-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023134/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
AI augmented edge and fog computing for Internet of Health Things (IoHT)
by: Deepika Rajagopal, et al.
Published: (2025-01-01) -
A Study of Moving from Cloud Computing to Fog Computing
by: Hindreen Rashid Abdulqadir, et al.
Published: (2021-04-01) -
Securing Cloud-Based Internet of Things: Challenges and Mitigations
by: Nivedita Singh, et al.
Published: (2024-12-01) -
Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things
by: Sumaiah Algarni, et al.
Published: (2025-01-01) -
Kernel of Internet of Things:Internet of Data
by: Qi ZHANG, et al.
Published: (2017-12-01)