Advances in Secure and Efficient IoT and 6G Systems

The field of IoT and 6G systems is moving towards a more secure and efficient direction, with a focus on developing innovative solutions to address the challenges of privacy, latency, and scalability. Researchers are exploring new approaches to secure neighbor discovery, privacy-preserving edge computing, and efficient location-based service discovery. The use of artificial intelligence and machine learning is also becoming increasingly prevalent in IoT and 6G systems, with applications in intrusion detection, traffic safety, and search and rescue missions.

Noteworthy papers in this area include: Enhancing Mobile Crowdsensing Efficiency, which proposes a coverage-aware resource allocation approach to minimize task completion latency while ensuring coverage performance. Towards Privacy-Preserving Revocation of Verifiable Credentials with Time-Flexibility, which introduces a novel method for customizing anonymous hierarchical identity-based encryption to restrict verifier access to temporal authorizations granted by the holder. Privacy-Preserving Secure Neighbor Discovery for Wireless Networks, which presents a novel protocol enabling devices to perform secure neighbor discovery without revealing their actual identities and locations. Accelerating IoV Intrusion Detection, which investigates the performance advantages of GPU-accelerated libraries compared to traditional CPU-based implementations for machine learning models used in IoV threat detection environments.

Sources

Enhancing Mobile Crowdsensing Efficiency: A Coverage-aware Resource Allocation Approach

Towards Privacy-Preserving Revocation of Verifiable Credentials with Time-Flexibility

Privacy-Preserving Secure Neighbor Discovery for Wireless Networks

Binary and Multi-Class Intrusion Detection in IoT Using Standalone and Hybrid Machine and Deep Learning Models

Enhancing Traffic Safety with AI and 6G: Latency Requirements and Real-Time Threat Detection

Efficient Location-Based Service Discovery for IoT and Edge Computing in the 6G Era

Strengthening Multi-Robot Systems for SAR: Co-Designing Robotics and Communication Towards 6G

Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries

Privacy-Preserving Edge Computing from Pairing-Based Inner Product Functional Encryption

Built with on top of