Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (53)
  • Open Access

    ARTICLE

    An Interoperability Cross-Block Chain Framework for Secure Transactions in IoT

    N. Anand Kumar1,*, A. Grace Selvarani2, P. Vivekanandan3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1077-1090, 2023, DOI:10.32604/csse.2023.034115

    Abstract The purpose of this research is to deal with effective block chain framework for secure transactions. The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue, Cross-Chain based Transaction (CCT) is introduced. Traditional industries have been restructured by the introduction of Internet of Things (IoT) to become smart industries through the feature of data-driven decision-making. Still, there are a few limitations, like decentralization, security vulnerabilities, poor interoperability, as well as privacy concerns in IoTs. To overcome this limitation, Blockchain has been employed to assure a… More >

  • Open Access

    ARTICLE

    Enhanced Water Quality Control Based on Predictive Optimization for Smart Fish Farming

    Azimbek Khudoyberdiev1, Mohammed Abdul Jaleel1, Israr Ullah2, DoHyeun Kim3,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5471-5499, 2023, DOI:10.32604/cmc.2023.036898

    Abstract The requirement for high-quality seafood is a global challenge in today’s world due to climate change and natural resource limitations. Internet of Things (IoT) based Modern fish farming systems can significantly optimize seafood production by minimizing resource utilization and improving healthy fish production. This objective requires intensive monitoring, prediction, and control by optimizing leading factors that impact fish growth, including temperature, the potential of hydrogen (pH), water level, and feeding rate. This paper proposes the IoT based predictive optimization approach for efficient control and energy utilization in smart fish farming. The proposed fish farm control mechanism has a predictive optimization… More >

  • Open Access

    ARTICLE

    Edge of Things Inspired Robust Intrusion Detection Framework for Scalable and Decentralized Applications

    Abdulaziz Aldribi1,2,*, Aman Singh2,3, Jose Breñosa3,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3865-3881, 2023, DOI:10.32604/csse.2023.037748

    Abstract Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications. Internet of Things (IoT), fog computing, edge computing, cloud computing, and the edge of things are the spine of all real-time and scalable applications. Conspicuously, this study proposed a novel framework for a real-time and scalable application that changes dynamically with time. In this study, IoT deployment is recommended for data acquisition. The Pre-Processing of data with local edge and fog nodes is implemented in this study. The threshold-oriented data classification method is deployed to improve the intrusion detection mechanism’s performance.… More >

  • Open Access

    REVIEW

    Wireless Sensor Security Issues on Data Link Layer: A Survey

    Muhammad Zulkifl Hasan*, Zurina Mohd Hanapi, Muhammad Zunnurain Hussain

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4065-4084, 2023, DOI:10.32604/cmc.2023.036444

    Abstract A computer network can be defined as many computing devices connected via a communication medium like the internet. Computer network development has proposed how humans and devices communicate today. These networks have improved, facilitated, and made conventional forms of communication easier. However, it has also led to uptick in-network threats and assaults. In 2022, the global market for information technology is expected to reach $170.4 billion. However, in contrast, 95% of cyber security threats globally are caused by human action. These networks may be utilized in several control systems, such as home-automation, chemical and physical assault detection, intrusion detection, and… More >

  • Open Access

    ARTICLE

    Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments

    Osama A. Khashan1,*, Sultan Alamri2, Waleed Alomoush3, Mutasem K. Alsmadi4, Samer Atawneh2, Usama Mir5

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3133-3158, 2023, DOI:10.32604/cmc.2023.036217

    Abstract In recent times, technology has advanced significantly and is currently being integrated into educational environments to facilitate distance learning and interaction between learners. Integrating the Internet of Things (IoT) into education can facilitate the teaching and learning process and expand the context in which students learn. Nevertheless, learning data is very sensitive and must be protected when transmitted over the network or stored in data centers. Moreover, the identity and the authenticity of interacting students, instructors, and staff need to be verified to mitigate the impact of attacks. However, most of the current security and authentication schemes are centralized, relying… More >

  • Open Access

    ARTICLE

    Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing

    Jihyeon Yu1, Juhwan Kim1, Youngwoo Lee1, Fayozbek Rustamov2, Joobeom Yun1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3291-3315, 2023, DOI:10.32604/cmc.2023.035835

    Abstract Internet of things (IoT) devices are being increasingly used in numerous areas. However, the low priority on security and various IoT types have made these devices vulnerable to attacks. To prevent this, recent studies have analyzed firmware in an emulation environment that does not require actual devices and is efficient for repeated experiments. However, these studies focused only on major firmware architectures and rarely considered exotic firmware. In addition, because of the diversity of firmware, the emulation success rate is not high in terms of large-scale analyses. In this study, we propose the adaptive emulation framework for multi-architecture (AEMA). In… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Transmission Scheme Based on Physical Mechanism

    Ping Zhang1, Haoran Zhu1, Wenjun Li2, Osama Alfarraj3, Amr Tolba3, Gwang-jun Kim4,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3589-3605, 2023, DOI:10.32604/cmc.2023.032097

    Abstract Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply, which are not suitable for traditional security technology. The security technology based on the physical mechanism has attracted extensive attention. How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism. In this paper, superlattice technology is introduced to the security field of Internet of things, and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed. In order to ensure the… More >

  • Open Access

    ARTICLE

    Improved Hybrid Swarm Intelligence for Optimizing the Energy in WSN

    Ahmed Najat Ahmed1, JinHyung Kim2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2527-2542, 2023, DOI:10.32604/csse.2023.036106

    Abstract In this current century, most industries are moving towards automation, where human intervention is dramatically reduced. This revolution leads to industrial revolution 4.0, which uses the Internet of Things (IoT) and wireless sensor networks (WSN). With its associated applications, this IoT device is used to compute the received WSN data from devices and transfer it to remote locations for assistance. In general, WSNs, the gateways are a long distance from the base station (BS) and are communicated through the gateways nearer to the BS. At the gateway, which is closer to the BS, energy drains faster because of the heavy… More >

  • Open Access

    ARTICLE

    Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly

    Seog Chung Seo1, HeeSeok Kim2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2091-2107, 2023, DOI:10.32604/csse.2023.035064

    Abstract With the rapid development of quantum computers capable of realizing Shor’s algorithm, existing public key-based algorithms face a significant security risk. Crystals-Kyber has been selected as the only key encapsulation mechanism (KEM) algorithm in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition. In this study, we present a portable and efficient implementation of a Crystals-Kyber post-quantum KEM based on WebAssembly (Wasm), a recently released portable execution framework for high-performance web applications. Until now, most Kyber implementations have been developed with native programming languages such as C and Assembly. Although there are a few previous Kyber implementations… More >

  • Open Access

    ARTICLE

    Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach

    Sarah Alzahrani1, Joud Alderaan1, Dalya Alatawi1, Bandar Alotaibi1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 651-667, 2023, DOI:10.32604/cmc.2023.035173

    Abstract Internet of Things (IoT) devices incorporate a large amount of data in several fields, including those of medicine, business, and engineering. User authentication is paramount in the IoT era to assure connected devices’ security. However, traditional authentication methods and conventional biometrics-based authentication approaches such as face recognition, fingerprints, and password are vulnerable to various attacks, including smudge attacks, heat attacks, and shoulder surfing attacks. Behavioral biometrics is introduced by the powerful sensing capabilities of IoT devices such as smart wearables and smartphones, enabling continuous authentication. Artificial Intelligence (AI)-based approaches introduce a bright future in refining large amounts of homogeneous biometric… More >

Displaying 11-20 on page 2 of 53. Per Page