Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (432)
  • Open Access

    REVIEW

    Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions

    Ahmad Rahdari1,6, Ahmad Jalili2, Mehdi Esnaashari3, Mehdi Gheisari1,4,7,8,*, Alisa A. Vorobeva5, Zhaoxi Fang1, Panjun Sun1,*, Viktoriia M. Korzhuk5, Ilya Popov5, Zongda Wu1, Hamid Tahaei1

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2511-2533, 2024, DOI:10.32604/cmc.2024.052994

    Abstract Software-Defined Networking (SDN) represents a significant paradigm shift in network architecture, separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment. Concurrently, the Internet of Things (IoT) connects numerous devices to the Internet, enabling autonomous interactions with minimal human intervention. However, implementing and managing an SDN-IoT system is inherently complex, particularly for those with limited resources, as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN integration. The findings of this study underscore the primary security and privacy challenges across application, control, and data planes.… More >

  • Open Access

    ARTICLE

    A Traffic-Aware and Cluster-Based Energy Efficient Routing Protocol for IoT-Assisted WSNs

    Hina Gul1, Sana Ullah1, Ki-Il Kim2,*, Farman Ali3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1831-1850, 2024, DOI:10.32604/cmc.2024.052841

    Abstract The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications, such as remote health monitoring, industrial monitoring, transportation, and smart agriculture. Efficient and reliable data routing is one of the major challenges in the Internet of Things network due to the heterogeneity of nodes. This paper presents a traffic-aware, cluster-based, and energy-efficient routing protocol that employs traffic-aware and cluster-based techniques to improve the data delivery in such networks. The proposed protocol divides the network into clusters where optimal cluster heads are selected among super… More >

  • Open Access

    ARTICLE

    An Optimized Approach to Deep Learning for Botnet Detection and Classification for Cybersecurity in Internet of Things Environment

    Abdulrahman Alzahrani*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2331-2349, 2024, DOI:10.32604/cmc.2024.052804

    Abstract The recent development of the Internet of Things (IoTs) resulted in the growth of IoT-based DDoS attacks. The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected devices. Anomaly detection models evaluate transmission patterns, network traffic, and device behaviour to detect deviations from usual activities. Machine learning (ML) techniques detect patterns signalling botnet activity, namely sudden traffic increase, unusual command and control patterns, or irregular device behaviour. In addition, intrusion detection systems (IDSs) and signature-based techniques are applied to recognize known malware signatures related to botnets.… More >

  • Open Access

    ARTICLE

    Two-Stage IoT Computational Task Offloading Decision-Making in MEC with Request Holding and Dynamic Eviction

    Dayong Wang1,*, Kamalrulnizam Bin Abu Bakar1, Babangida Isyaku2

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2065-2080, 2024, DOI:10.32604/cmc.2024.051944

    Abstract The rapid development of Internet of Things (IoT) technology has led to a significant increase in the computational task load of Terminal Devices (TDs). TDs reduce response latency and energy consumption with the support of task-offloading in Multi-access Edge Computing (MEC). However, existing task-offloading optimization methods typically assume that MEC’s computing resources are unlimited, and there is a lack of research on the optimization of task-offloading when MEC resources are exhausted. In addition, existing solutions only decide whether to accept the offloaded task request based on the single decision result of the current time slot,… More >

  • Open Access

    ARTICLE

    Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme

    Nisreen Innab*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2237-2258, 2024, DOI:10.32604/cmc.2024.049608

    Abstract Internet of Health Things (IoHT) is a subset of Internet of Things (IoT) technology that includes interconnected medical devices and sensors used in medical and healthcare information systems. However, IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication. In this article, we intend to address this shortcoming, and as a result, we propose a new scheme called, the certificateless anonymous authentication (CAA) scheme. The proposed scheme is based on hyperelliptic curve cryptography (HECC), an enhanced variant of elliptic curve cryptography (ECC)… More >

  • Open Access

    REVIEW

    AI-Driven Learning Management Systems: Modern Developments, Challenges and Future Trends during the Age of ChatGPT

    Sameer Qazi1,*, Muhammad Bilal Kadri2, Muhammad Naveed1,*, Bilal A. Khawaja3, Sohaib Zia Khan4, Muhammad Mansoor Alam5,6,7, Mazliham Mohd Su’ud6

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3289-3314, 2024, DOI:10.32604/cmc.2024.048893

    Abstract COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus. The foremost and most prime sector among those affected were schools, colleges, and universities. The education system of entire nations had shifted to online education during this time. Many shortcomings of Learning Management Systems (LMSs) were detected to support education in an online mode that spawned the research in Artificial Intelligence (AI) based tools that are being developed by the research community to improve the effectiveness of LMSs. This paper presents a detailed survey of the different enhancements to LMSs, which… More >

  • Open Access

    REVIEW

    Caching Strategies in NDN Based Wireless Ad Hoc Network: A Survey

    Ahmed Khalid1, Rana Asif Rehman1, Byung-Seo Kim2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 61-103, 2024, DOI:10.32604/cmc.2024.049981

    Abstract Wireless Ad Hoc Networks consist of devices that are wirelessly connected. Mobile Ad Hoc Networks (MANETs), Internet of Things (IoT), and Vehicular Ad Hoc Networks (VANETs) are the main domains of wireless ad hoc network. Internet is used in wireless ad hoc network. Internet is based on Transmission Control Protocol (TCP)/Internet Protocol (IP) network where clients and servers interact with each other with the help of IP in a pre-defined environment. Internet fetches data from a fixed location. Data redundancy, mobility, and location dependency are the main issues of the IP network paradigm. All these… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things: A Hybrid Approach

    Amal Al-Rasheed1, Rahim Khan2,3,*, Tahani Alsaed4, Mahwish Kundi2,5, Mohamad Hanif Md. Saad6, Mahidur R. Sarker7,8

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1305-1323, 2024, DOI:10.32604/cmc.2024.049215

    Abstract Due to the overwhelming characteristics of the Internet of Things (IoT) and its adoption in approximately every aspect of our lives, the concept of individual devices’ privacy has gained prominent attention from both customers, i.e., people, and industries as wearable devices collect sensitive information about patients (both admitted and outdoor) in smart healthcare infrastructures. In addition to privacy, outliers or noise are among the crucial issues, which are directly correlated with IoT infrastructures, as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing, i.e.,… More >

  • Open Access

    REVIEW

    IoMT-Based Healthcare Systems: A Review

    Tahir Abbas1,*, Ali Haider Khan2, Khadija Kanwal3, Ali Daud4,*, Muhammad Irfan5, Amal Bukhari6, Riad Alharbey6

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 871-895, 2024, DOI:10.32604/csse.2024.049026

    Abstract The integration of the Internet of Medical Things (IoMT) and the Internet of Things (IoT), which has revolutionized patient care through features like remote critical care and real-time therapy, is examined in this study in response to the changing healthcare landscape. Even with these improvements, security threats are associated with the increased connectivity of medical equipment, which calls for a thorough assessment. With a primary focus on addressing security and performance enhancement challenges, the research classifies current IoT communication devices, examines their applications in IoMT, and investigates important aspects of IoMT devices in healthcare. The More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks

    Asad Raza1,*, Shahzad Memon1, Muhammad Ali Nizamani1, Mahmood Hussain Shah2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 545-566, 2024, DOI:10.32604/iasc.2024.051779

    Abstract Smart Industrial environments use the Industrial Internet of Things (IIoT) for their routine operations and transform their industrial operations with intelligent and driven approaches. However, IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet. Traditional signature-based IDS are effective in detecting known attacks, but they are unable to detect unknown emerging attacks. Therefore, there is the need for an IDS which can learn from data and detect new threats. Ensemble Machine Learning (ML) and individual Deep Learning (DL) based IDS have been developed, and these individual models achieved… More >

Displaying 11-20 on page 2 of 432. Per Page