[1] Kaur, “A Survey on Internet of Things – Architecture, Applications, and Future Trends,” In Computing and Communication (ICSCCC), 2018, First International Conference on Secure Cyber, 2017, pp 581-583.
[2] Kaur, “A Survey on Internet of Things – Architecture, Applications, and Future Trends,” In Computing and Communication (ICSCCC), 2018, First International Conference on Secure Cyber, 2017, pp 581-583.
[3] Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu and W. Nie,” Anatomy of Threats to the Internet of Things,” IEEE Communications Surveys & Tutorials, Second quarter 2019.
[4] Mosenia and N. K. Jha, “A comprehensive study of security of internet-of-things,” IEEE Trans. Emerging Topics in Computing, vol. 5, no. 4, pp. 586–602, Oct. 2017.
[5] A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, “Internet of things security: A survey,” Journal of Network and Computer Applications, vol. 88, pp. 10-28, June 2017.
[6] Chettri and R. Bera, “A Comprehensive Survey on Internet of Things (IoT) Towards 5GWireless Systems,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 16-32, Jan. 2020.
[7] Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, H. V. Poor, “6G Internet of Things: A Comprehensive Survey,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 359-383, Jan. 2022.
[8] A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz, “A Survey on 5G networks for the internet of things: communication technologies and challenges”, IEEE access, doi 10.1109/access 2017.2778844, 2017.
[9] N. C. Yilmaz, Y.-P. E Wang, N. A. Johansson, N. Brahmi, Sh. A. Ashraf , J. Sachs, “ Analysis of ultra-reliable and low-latency 5G communication for a factory automation use case,” IEEE International Conference on Communication Workshop (ICCW), June 2015, pp. 1190-1195.
[10] -M. Wang, Q. Yang, Z. Ding, and H. V. Poor, “Secure short-packet communications for mission-critical IoT applications,” IEEE Trans. Wireless Communications., vol. 18, no. 5, pp. 2565-2578, May 2019.
[11] Cao et al., “Secure transmission via beamforming optimization for NOMA networks,” IEEE Wireless Communications., vol. 27, no. 1, pp. 193–199, Feb. 2020.
[12] Han, K. Xiao, R. Liu, X. Liu, G. C. Alexandropoulos, and Sh. Jin, “ Dynamic resource allocation schemes for eMBB and URLLC services in 5G wireless networks,” IEEE Intelligent and Converged Networks., vol. 3, no. 2, pp. 145-160, June 2022.
[13] Durisi, T. Koch, and P. Popovski, “Toward massive, Ultrareliable, and low-latency wireless communication with short packets,” in Proceedings of the IEEE, vol. 104, no. 9, pp. 1711–1726, Sept. 2016.
[14] Popovski, Č. Stefanović, J. J. Nielsen, E. Carvalho, M. Angjelichinoski, K. F. Trillingsgaard, and A.-S Bana, “Wireless Access in Ultra-Reliable Low-Latency Communication (URLLC),” IEEE Trans. Commun., vol. 67, no. 8, pp. 5783-5801, Aug. 2019.
[15] Bennis, M. Debbah, H. V. Poor, “Ultra reliable and Low-Latency Wireless Communication: Tail, Risk, and Scale,” Proceedings of the IEEE, vol. 106, no. 10, pp. 1834-1853, sept 2018.
[16] Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “Resource allocation for URLLC in 5G mission-critical IoT networks,” in Proc. IEEE Int. Conf. Communications. (ICC), pp. 1–6, May 2019.
[17] Ali, Y. B. Zikria, A.K Bashir, S. Garg and H. S. Kim, “URLLC for 5G and Beyond: Requirements, Enabling Incumbent Technologies and Network Intelligence,” IEEE Access, vol. 9, pp. 67064-67095, April 2021.
[18] Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “ Resource Allocation for Secure URLLC in Mission-Critical IoT Scenarios,” IEEE Trans. Communications., vol. 68, no. 9, pp. 5793-5807, Sept. 2020.
[19] Sun, Ch. She, Ch. Yang, T. Q. S. Quek, Y. Li, and B. Vucetic, “ Optimizing Resource Allocation in the Short Blocklength Regime for Ultra-Reliable and Low-Latency Communications,” IEEE Trans. Wireless Communications., vol. 18, no. 1, pp. 402-415, Jan. 2019.
[20] Khan and S. Coleri, “Resource Allocation for Ultra-Reliable Low-Latency Vehicular Networks in Finite Blocklength Regime,” IEEE International Mediterranean Conference on Communications and Networking (MeditCom), Athens, Greece, pp. 322-327, 2022.
[21] Pan, H. Ren, Y. Deng, M. Elkashlan, and A. Nallanathan, “Joint block length and location optimization for URLLC-enabled UAV relay systems,” IEEE Communications. Lett. vol. 23, no. 3, pp. 498–501, Mar. 2019.
[22] Zhou et al., “Secure communications for UAV-enabled mobile edge computing systems,” IEEE Trans. Commun., vol. 68, no. 1, pp. 376–388, Jan. 2020.
[23] Yang, R. F. Schaefer, and H. V. Poor, “Wiretap channels: Non asymptotic fundamental limits,” IEEE Trans. Inf. Theory, vol. 65, no. 7, pp. 4069–4093, July 2019.
[24] Librino, P. Santi, “ Resource Allocation and Sharing in URLLC for IoT Applications using Shareability Graphs,” IEEE Internet of Things., vol. 7, no. 10, pp. 10511-10526, Oct. 2020.
[25] Bubeck, “ Convex Optimization: Algorithms and Complexity,” Foundations and Trends in Machine Learning, vol. 8, no. 3-4, pp. 231-357, 2015.
[26] Further Advancements for E-UTRA Physical Layer Aspects, E. U. T. R. Access, 3GPP document TR 36.814, 2010.
[27] Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu and W. Nie,” Anatomy of Threats to the Internet of Things,” IEEE Communications Surveys & Tutorials, Second quarter 2019.
[28] Mosenia and N. K. Jha, “A comprehensive study of security of internet-of-things,” IEEE Trans. Emerging Topics in Computing, vol. 5, no. 4, pp. 586–602, Oct. 2017.
[29] A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, “Internet of things security: A survey,” Journal of Network and Computer Applications, vol. 88, pp. 10-28, June 2017.
[30] Chettri and R. Bera, “A Comprehensive Survey on Internet of Things (IoT) Towards 5GWireless Systems,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 16-32, Jan. 2020.
[31] Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, H. V. Poor, “6G Internet of Things: A Comprehensive Survey,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 359-383, Jan. 2022.
[32] A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz, “A Survey on 5G networks for the internet of things: communication technologies and challenges”, IEEE access, doi 10.1109/access 2017.2778844, 2017.
[33] N. C. Yilmaz, Y.-P. E Wang, N. A. Johansson, N. Brahmi, Sh. A. Ashraf , J. Sachs, “ Analysis of ultra-reliable and low-latency 5G communication for a factory automation use case,” IEEE International Conference on Communication Workshop (ICCW), June 2015, pp. 1190-1195.
[34] -M. Wang, Q. Yang, Z. Ding, and H. V. Poor, “Secure short-packet communications for mission-critical IoT applications,” IEEE Trans. Wireless Communications., vol. 18, no. 5, pp. 2565-2578, May 2019.
[35] Cao et al., “Secure transmission via beamforming optimization for NOMA networks,” IEEE Wireless Communications., vol. 27, no. 1, pp. 193–199, Feb. 2020.
[36] Han, K. Xiao, R. Liu, X. Liu, G. C. Alexandropoulos, and Sh. Jin, “ Dynamic resource allocation schemes for eMBB and URLLC services in 5G wireless networks,” IEEE Intelligent and Converged Networks., vol. 3, no. 2, pp. 145-160, June 2022.
[37] Durisi, T. Koch, and P. Popovski, “Toward massive, Ultrareliable, and low-latency wireless communication with short packets,” in Proceedings of the IEEE, vol. 104, no. 9, pp. 1711–1726, Sept. 2016.
[38] Popovski, Č. Stefanović, J. J. Nielsen, E. Carvalho, M. Angjelichinoski, K. F. Trillingsgaard, and A.-S Bana, “Wireless Access in Ultra-Reliable Low-Latency Communication (URLLC),” IEEE Trans. Commun., vol. 67, no. 8, pp. 5783-5801, Aug. 2019.
[39] Bennis, M. Debbah, H. V. Poor, “Ultra reliable and Low-Latency Wireless Communication: Tail, Risk, and Scale,” Proceedings of the IEEE, vol. 106, no. 10, pp. 1834-1853, sept 2018.
[40] Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “Resource allocation for URLLC in 5G mission-critical IoT networks,” in Proc. IEEE Int. Conf. Communications. (ICC), pp. 1–6, May 2019.
[41] Ali, Y. B. Zikria, A.K Bashir, S. Garg and H. S. Kim, “URLLC for 5G and Beyond: Requirements, Enabling Incumbent Technologies and Network Intelligence,” IEEE Access, vol. 9, pp. 67064-67095, April 2021.
[42] Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “ Resource Allocation for Secure URLLC in Mission-Critical IoT Scenarios,” IEEE Trans. Communications., vol. 68, no. 9, pp. 5793-5807, Sept. 2020.
[43] Sun, Ch. She, Ch. Yang, T. Q. S. Quek, Y. Li, and B. Vucetic, “ Optimizing Resource Allocation in the Short Blocklength Regime for Ultra-Reliable and Low-Latency Communications,” IEEE Trans. Wireless Communications., vol. 18, no. 1, pp. 402-415, Jan. 2019.
[44] Khan and S. Coleri, “Resource Allocation for Ultra-Reliable Low-Latency Vehicular Networks in Finite Blocklength Regime,” IEEE International Mediterranean Conference on Communications and Networking (MeditCom), Athens, Greece, pp. 322-327, 2022.
[45] Pan, H. Ren, Y. Deng, M. Elkashlan, and A. Nallanathan, “Joint block length and location optimization for URLLC-enabled UAV relay systems,” IEEE Communications. Lett. vol. 23, no. 3, pp. 498–501, Mar. 2019.
[46] Zhou et al., “Secure communications for UAV-enabled mobile edge computing systems,” IEEE Trans. Commun., vol. 68, no. 1, pp. 376–388, Jan. 2020.
[47] Yang, R. F. Schaefer, and H. V. Poor, “Wiretap channels: Non asymptotic fundamental limits,” IEEE Trans. Inf. Theory, vol. 65, no. 7, pp. 4069–4093, July 2019.
[48] Librino, P. Santi, “ Resource Allocation and Sharing in URLLC for IoT Applications using Shareability Graphs,” IEEE Internet of Things., vol. 7, no. 10, pp. 10511-10526, Oct. 2020.
[49] Bubeck, “ Convex Optimization: Algorithms and Complexity,” Foundations and Trends in Machine Learning, vol. 8, no. 3-4, pp. 231-357, 2015.
[50] Further Advancements for E-UTRA Physical Layer Aspects, E. U. T. R. Access, 3GPP document TR 36.814, 2010.