2023
DOI: 10.1109/jiot.2023.3264694
|View full text |Cite
|
Sign up to set email alerts
|

Double-Edge Computation Offloading for Secure Integrated Space–Air–Aqua Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…This research underscores the necessity of balancing robust cybersecurity measures with ethical considerations in the pursuit of secure maritime operations. Wang et al [84] presented a secure offloading scheme to optimize power allocation within the Space-Air-Aqua Integrated Network (SAAIN), yielding minimal offloading delay and improved data security. Ilcev et al's [85] research delineated software-enhanced control within the Global Maritime Distress and Safety System (GMDSS), upscaling information processing security in maritime communication systems.…”
Section: Data Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…This research underscores the necessity of balancing robust cybersecurity measures with ethical considerations in the pursuit of secure maritime operations. Wang et al [84] presented a secure offloading scheme to optimize power allocation within the Space-Air-Aqua Integrated Network (SAAIN), yielding minimal offloading delay and improved data security. Ilcev et al's [85] research delineated software-enhanced control within the Global Maritime Distress and Safety System (GMDSS), upscaling information processing security in maritime communication systems.…”
Section: Data Securitymentioning
confidence: 99%
“…There is a consensus on the need for comprehensive education and training programs to build sufficient cybersecurity knowledge across all levels of the industry. • Data Security: Data security has been identified as a critical area of advancement, with the research proposing various strategies to protect data within the maritime sector[60,[81][82][83][84][85][86][87][88][89][90][91][92][93][94][95]. This includes the development of technologies and processes to ensure the integrity and confidentiality of maritime data.…”
mentioning
confidence: 99%
“…Its architecture is a system architecture for realizing marine environment perception and DT [89]. It connects sensor devices in the air and on the ground, data centers, communication networks, and MIoT devices, and enables data acquisition, processing, and distribution through IoT platforms [62]. Below, we analyze the main architectural parts shown in the diagram, as well as the success stories of A2S integrated networks in the MIoT.…”
Section: A2s Integrated Miot Architecturementioning
confidence: 99%
“…This includes cleaning, validating, converting, and correcting the original data. The cleansing process helps remove noise and outliers from the data, ensuring the data's accuracy and reliability [62]. The checksum remediation process is used to handle erroneous data caused by sensor failure or other problems.…”
mentioning
confidence: 99%
“…Sea fog is a common meteorological disaster in offshore and coastal areas, often with a large concentration, a low contrast of images containing fog [1,2], and serious loss of details, which hinders the normal operation of maritime target monitoring and visual navigation assisted by unmanned aerial vehicle (UAV) stations [3][4][5]. Therefore, effective sea fog removal methods have important research significance for transportation, fishery, military, and other activities [6][7][8]. The formation of sea fog consists of two steps: condensation of water vapor and low-level accumulation of fog droplets.…”
Section: Introductionmentioning
confidence: 99%