TY - JOUR A1 - Chithaluru, Premkumar A1 - Singh, Aman A1 - Dhatterwal, Jagjit Singh A1 - Sodhro, Ali Hassan A1 - Albahar, Marwan Ali A1 - Jurcut, Anca A1 - Alkhayyat, Ahmed UR - http://doi.org/10.1016/j.future.2023.06.003 TI - An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks JF - Future Generation Computer Systems VL - 148 EP - 239 N2 - The Internet of Things (IoT) has recently surpassed wired communication. WiMAX is a wireless transmission technology that allows for faster internet access. Wireless network innovations, like some other communication networks, are not safe and secure. Security and authorization models are intended to prevent unauthorized use of network services. Numerous authorization and encrypted communication mechanisms have been introduced for WiMAX privacy, but the communication systems are still insecure and vulnerable to attacks such as zero-day attacks, rouge base station attacks, Man in the Middle (MITM) attacks, and Denial of Service (DoS) attacks. Wireless technologies have come a long way in the last few decades. Because most wireless transmission systems rely on radio signals, the system channel is essentially vulnerable to interception. As a result, data security is always critical in the presentation of a system. Because WiMAX is a wireless communication technology, it is particularly vulnerable to interception, so security is a top priority. Individuals must be protected from security breaches that occur across network interfaces, networking devices, and everything in between. Robust security management is required to protect WiMAX from attacks and vulnerabilities, despite the fact that emerging Artificial Intelligence (AI) technologies necessitate different security governance than existing technologies. We proposed an Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT that addresses vulnerabilities and threats during the identification and authorization phases to improve the functionality and performance characteristics of the traditional system. The Scyther tool was used to validate the proposed privacy scheme, which is safer and more secure than existing systems. SN - 0167739X ID - uneatlantico8065 AV - none Y1 - 2023/11// SP - 225 ER -