2023
DOI: 10.1016/j.future.2022.08.004
|View full text |Cite
|
Sign up to set email alerts
|

On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 59 publications
(16 citation statements)
references
References 139 publications
0
6
0
Order By: Relevance
“…These terms are connected due to recent research focused on the use of deep learning reinforcement algorithms to improve the allocation of resources in the network and thus guarantee a better special distribution of users; this study is supported by one of the techniques used to modulate the signal and thus appropriately assign the characteristics to the signal according to the needs [77]. Additionally, as revealed in the quadrants of the previous figure, the use of artificial intelligence technology in the latest-generation networks is aimed mainly at guaranteeing the adequate availability of resources due to the massive number of IoT devices that demand considerable resources [78]. Finally, the terms "anomalies", "computer architecture" and The above network of keywords is concerned with improving the quality of service provision of mobile networks from segmentation through network slicing by using deep reinforcement learning (DRL) algorithms for space allocation and division in the network, according to the consumption of resources or the needs of the users in the network [69].…”
Section: Resultsmentioning
confidence: 94%
“…These terms are connected due to recent research focused on the use of deep learning reinforcement algorithms to improve the allocation of resources in the network and thus guarantee a better special distribution of users; this study is supported by one of the techniques used to modulate the signal and thus appropriately assign the characteristics to the signal according to the needs [77]. Additionally, as revealed in the quadrants of the previous figure, the use of artificial intelligence technology in the latest-generation networks is aimed mainly at guaranteeing the adequate availability of resources due to the massive number of IoT devices that demand considerable resources [78]. Finally, the terms "anomalies", "computer architecture" and The above network of keywords is concerned with improving the quality of service provision of mobile networks from segmentation through network slicing by using deep reinforcement learning (DRL) algorithms for space allocation and division in the network, according to the consumption of resources or the needs of the users in the network [69].…”
Section: Resultsmentioning
confidence: 94%
“…As a result, there is less interest in data sharing from both patients and hospital staff. The introduction of federated learning [220] , [221] , which eliminates the need for data transfers from the source, or the use of Blockchain-based security measures for secure and transparent data transfers from source to destination are two privacy measures that need to be focused on in order to deal with this issue [222] , [223] .…”
Section: And DL In Smart Healthcare: Challenges and Opportunitiesmentioning
confidence: 99%
“…Regulation efforts aim to safeguard user privacy, yet there are still gaps due to the decentralized nature of network management and the lack of standardized privacy protocols. Challenges include balancing privacy with network functionality, addressing jurisdictional laws in regulation, and mitigating vulnerabilities exploited by malicious actors [165]- [169]. Effective privacy measures demand collaboration among stakeholders to develop robust frameworks that uphold user rights while preserving network integrity.…”
Section: Privacy Concerns In the Network Interface Layermentioning
confidence: 99%