Open Access
| Issue |
EPJ Web Conf.
Volume 341, 2025
2nd International Conference on Advent Trends in Computational Intelligence and Communication Technologies (ICATCICT 2025)
|
|
|---|---|---|
| Article Number | 01024 | |
| Number of page(s) | 9 | |
| DOI | https://doi.org/10.1051/epjconf/202534101024 | |
| Published online | 20 November 2025 | |
- E. Ismagilova, A. Hosseinzadeh, M. H. Kim, J. E. Schewe, and I. C.-C. Lo, "Security, Privacy and Risks Within Smart Cities: Literature Review and Development Framework," Sustainability, vol. 12, no. 9, p. 3731, 2020. [Google Scholar]
- A. Alwarafy, G. Salah, M. Alazab, and A. Awad, "A Survey on Security and Privacy Issues in Edge Computing-Assisted IoT," IEEE Access, vol. 8, pp. 150930-150963, 2020. [Google Scholar]
- L. U. Khan, I. Yaqoob, N. H. Tran, S. M. A. Kazmi, T. N. Dang, and C. S. Hong, "Edge-Computing-Enabled Smart Cities: A Comprehensive Survey," IEEE Access, vol. 7, pp. 167146-167183, 2019. [Google Scholar]
- A. Yao, M. Sun, and J. Zhou, "Differential Privacy in Edge Computing-Based Smart City," Future Generation Computer Systems, vol. 147, pp. 500-510, 2023. [Google Scholar]
- C. Ponnusamy, R. D., P. V., A. J. S. V., and B. Bensujin, "Data Security and Privacy Requirements in Edge Computing: A Systemic Review," in Advances in Data Security and Privacy, IGI Global, 2021, pp. 22-41. [Google Scholar]
- M. Songhorabadi, M. Rahimi, A. M. M. Farid, and M. H. Kashani, "Fog Computing Approaches in Smart Cities: A State-of-the-Art Review," IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9648-9663, 2021. [Google Scholar]
- L. U. Khan, I. Yaqoob, N. H. Tran, S. M. A. Kazmi, T. N. Dang, and C. S. Hong, "Edge-Computing-Enabled Smart Cities: A Comprehensive Survey," IEEE Access, vol. 7, pp. 167146-167183, 2019. [Google Scholar]
- M. Trigka and E. Dritsas, "Edge and Cloud Computing in Smart Cities," Future Internet, vol. 17, no. 3, p. 118, 2025. [Google Scholar]
- C. Perera, Y. Qin, J. C. Estrella, S. Reiff-Marganiec, and A. V. Vasilakos, "Fog Computing for Sustainable Smart Cities: A Survey," arXiv preprint, 2017. [Google Scholar]
- X. Xu, X. Xuetao, et al., "Privacy and Security in Edge Computing for Smart Cities," IEEE Internet Computing, vol. 25, no. 1, pp. 47-55, 2021. [Google Scholar]
- R. Ke, Y. Zhuang, Z. Pu, and Y. Wang, "A Smart, Efficient, and Reliable Parking Surveillance System with Edge Artificial Intelligence on IoT Devices," arXiv preprint, 2020. [Google Scholar]
- M. Conti, A. Dehghantanha, K. Franke, and S. Watson, "Internet of Things Security and Forensics: Challenges and Opportunities," Future Generation Computer Systems, vol. 78, pp. 544-546, 2018. [CrossRef] [Google Scholar]
- A. Diro and N. Chilamkurti, "Distributed Attack Detection Scheme Using Deep Learning Approach for Internet of Things," Future Generation Computer Systems, vol. 82, pp. 761-768, 2018. [Google Scholar]
- Q. Zhang, L. T. Yang, and Z. Chen, "Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning," IEEE Transactions on Computers, vol. 65, no. 5, pp. 1351-1362, 2016. [Google Scholar]
- C. Dwork and A. Roth, "The Algorithmic Foundations of Differential Privacy," Foundations and Trends® in Theoretical Computer Science, vol. 9, nos. 3-4, pp. 211-407, 2014. [Google Scholar]
- J. Ni, K. Zhang, X. Lin, and X. S. Shen, "Securing Fog Computing for Internet of Things Applications: Challenges and Solutions," IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601-628, 2018. [Google Scholar]
- C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," in Proc. 41st Annual ACM Symposium on Theory of Computing (STOC), 2009, pp. 169-178. [Google Scholar]
- Z. Wang, Q. Wang, and Y. Qin, "Lightweight Cryptography for Secure IoT in Smart Cities," IEEE Internet of Things Journal, vol. 7, no. 2, pp. 1371-1384, 2020. [Google Scholar]
- C. Dwork, "Differential Privacy: A Survey of Results," in Proc. 5th International Conference on Theory and Applications of Models of Computation (TAMC), 2008, pp. 1-19. [Google Scholar]
- K. Christidis and M. Devetsikiotis, "Blockchains and Smart Contracts for the Internet of Things," IEEE Access, vol. 4, pp. 2292-2303, 2016. [Google Scholar]
- Q. Yang, Y. Liu, T. Chen, and Y. Tong, "Federated Machine Learning: Concept and Applications," ACM Transactions on Intelligent Systems and Technology, vol. 10, no. 2, pp. 1-19, 2019. [CrossRef] [Google Scholar]
- A. B. Lewko and B. Waters, "Decentralizing Attribute-Based Encryption," in Proc. 30th Annual Int. Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2011, pp. 568-588. [Google Scholar]
- V. Mani, M. M. Ghonge, N. K. Chaitanya, O. Pal, M. Sharma, S. Mohan, and A. Ahmadian, "A new blockchain and fog computing model for blood pressure medical sensor data storage," Comput. Electr. Eng., vol. 102, p. 108202, 2022, doi: 10.1016/j.compeleceng.2022.108202. [Google Scholar]
- F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, "Machine Learning in IoT Security: Current Solutions and Future Challenges," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1686-1721, 2020. [CrossRef] [Google Scholar]
- M. M. Ghonge, N. Pradeep, R. V. Ravi, and R. Mangrulkar, "A comprehensive review of the security and privacy issues in blockchain technologies," in Research Anthology on Convergence of Blockchain, IoT, and Security. IGI Global, 2023, pp. 1-16, doi: 10.4018/9781668472217.ch001. [Google Scholar]
- T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, "Federated Learning: Challenges, Methods, and Future Directions," IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 50-60, 2020. [Google Scholar]
- N. Balani, P. Chavan, and M. Ghonghe, "Design of high-speed blockchain-based sidechaining peer to peer communication protocol over 5G networks," Multimed. Tools Appl., vol. 82, no. 19, pp. 29271-29291, 2022, doi: 10.1007/s11042-021-11604-6. [Google Scholar]
- G. JayaLakshmi, M. Ghonge, N. Pradeep, and R. V. Ravi, "Blockchain: inherent security features of blockchain popularity and its security architecture," in Unleashing the Potentials of Blockchain Technology for Healthcare Industries, Elsevier, 2023, pp. 143-161, doi: 10.1016/B978-0-323-99481-1.00013-4. [Google Scholar]
- S. R. Pokhrel and J. Choi, "Federated Learning with Blockchain for Autonomous Vehicles: Analysis and Design Challenges," IEEE Transactions on Communications, vol. 68, no. 8, pp. 4734-4746, 2020. [Google Scholar]
- P. Voigt and A. von dem Bussche, The EU General Data Protection Regulation (GDPR): A Practical Guide, Springer, 2017. [Google Scholar]
- Y. Sun, Z. Zhang, and Y. Xie, "Adversarial Attacks and Defenses in the Internet of Things: A Survey," IEEE Internet of Things Journal, vol. 9, no. 11, pp. 8086-8105, 2022. [Google Scholar]
- N. Moustafa, S. Camtepe, and J. Hu, "Anomaly Detection for IoT Systems: Machine Learning Approaches, Challenges, and Future Directions," IEEE Internet of Things Journal, vol. 6, no. 4, pp. 7476-7491, 2019. [Google Scholar]
- D. J. Bernstein, J. Buchmann, and E. Dahmen (eds.), Post-Quantum Cryptography, Springer, 2009. [Google Scholar]
- M. Chen, H. V. Poor, W. Saad, and S. Cui, "Convergence Time Optimization for Federated Learning Over Wireless Networks," IEEE Transactions on Wireless Communications, vol. 20, no. 4, pp. 2457-2471, 2021. [Google Scholar]
- A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, "Internet of Things for Smart Cities," IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22-32, 2014. [CrossRef] [Google Scholar]
- Y. Zhang, R. H. Deng, and D. Zheng, "Blockchain-Based Efficient and Robust Fair Payment for Outsourcing Services in Cloud Computing," IEEE Transactions on Cloud Computing, vol. 9, no. 1, pp. 22-36, 2021. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

