A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing

[1]  Ying Liu,et al.  Agent and Cyber-Physical System Based Self-Organizing and Self-Adaptive Intelligent Shopfloor , 2017, IEEE Transactions on Industrial Informatics.

[2]  Dervis Karaboga,et al.  AN IDEA BASED ON HONEY BEE SWARM FOR NUMERICAL OPTIMIZATION , 2005 .

[3]  Hao Luo,et al.  MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things , 2020, IEEE Transactions on Industrial Informatics.

[4]  Wei Ni,et al.  Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[5]  Zhen Liu,et al.  An Adaptive Ensemble Machine Learning Model for Intrusion Detection , 2019, IEEE Access.

[6]  Sam Kwong,et al.  Genetic algorithms and their applications , 1996, IEEE Signal Process. Mag..

[7]  E. Bijolin Edwin,et al.  An improved efficient: Artificial Bee Colony algorithm for security and QoS aware scheduling in cloud computing environment , 2017, Cluster Computing.

[8]  Zhibo Pang,et al.  Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks , 2021, IEEE Transactions on Industrial Informatics.

[9]  M. Shamim Hossain,et al.  Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics , 2019, IEEE Transactions on Industrial Informatics.

[10]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[11]  Zhiyuan Tan,et al.  SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application , 2019, J. Netw. Comput. Appl..

[12]  Victor Chang,et al.  Latency-Aware Path Planning for Disconnected Sensor Networks With Mobile Sinks , 2020, IEEE Transactions on Industrial Informatics.

[13]  Fangchun Yang,et al.  Edgence: A blockchain-enabled edge-computing platform for intelligent IoT-based dApps , 2020, China Communications.

[14]  Wei Dong,et al.  Robust and Secure Time-Synchronization Against Sybil Attacks for Sensor Networks , 2015, IEEE Transactions on Industrial Informatics.

[15]  MengChu Zhou,et al.  Modeling and Planning for Dual-Objective Selective Disassembly Using and/or Graph and Discrete Artificial Bee Colony , 2019, IEEE Transactions on Industrial Informatics.

[16]  Sam Kwong,et al.  An Improved Artificial Bee Colony Algorithm With its Application , 2019, IEEE Transactions on Industrial Informatics.

[17]  Haibin Zhang,et al.  Double Auction-Based Resource Allocation for Mobile Edge Computing in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[18]  Philip S. Yu,et al.  Distributed Deep Learning Model for Intelligent Video Surveillance Systems with Edge Computing , 2019, IEEE Transactions on Industrial Informatics.

[19]  Wei Yao,et al.  Artificial intelligence-based load optimization in cognitive Internet of Things , 2020, Neural Computing and Applications.

[20]  Albert Y. Zomaya,et al.  En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment , 2020, J. Parallel Distributed Comput..

[21]  Deniz Ustun,et al.  A Triple-Objective Optimization Scheme Using Butterfly-Integrated ABC Algorithm for Design of Multilayer RAM , 2020, IEEE Transactions on Antennas and Propagation.

[22]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[23]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[24]  Jong-Hyouk Lee,et al.  Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network , 2019, IEEE Transactions on Industrial Informatics.