Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks

    Brij B. Gupta1,2,3,4,*, Akshat Gaurav5, Varsha Arya6,7, Razaz Waheeb Attar8, Shavi Bansal9, Ahmed Alhomoud10, Kwok Tai Chui11

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4109-4124, 2024, DOI:10.32604/cmc.2024.056476 - 19 December 2024

    Abstract Phishing attacks seriously threaten information privacy and security within the Internet of Things (IoT) ecosystem. Numerous phishing attack detection solutions have been developed for IoT; however, many of these are either not optimally efficient or lack the lightweight characteristics needed for practical application. This paper proposes and optimizes a lightweight deep-learning model for phishing attack detection. Our model employs a two-fold optimization approach: first, it utilizes the analysis of the variance (ANOVA) F-test to select the optimal features for phishing detection, and second, it applies the Cuckoo Search algorithm to tune the hyperparameters (learning rate… More >

  • Open Access

    ARTICLE

    Mean Field-Based Dynamic Backoff Optimization for MIMO-Enabled Grant-Free NOMA in Massive IoT Networks

    Haibo Wang1, Hongwei Gao1,*, Pai Jiang1, Matthieu De Mari2, Panzer Gu3, Yinsheng Liu1

    Journal on Internet of Things, Vol.6, pp. 17-41, 2024, DOI:10.32604/jiot.2024.054791 - 26 August 2024

    Abstract In the 6G Internet of Things (IoT) paradigm, unprecedented challenges will be raised to provide massive connectivity, ultra-low latency, and energy efficiency for ultra-dense IoT devices. To address these challenges, we explore the non-orthogonal multiple access (NOMA) based grant-free random access (GFRA) schemes in the cellular uplink to support massive IoT devices with high spectrum efficiency and low access latency. In particular, we focus on optimizing the backoff strategy of each device when transmitting time-sensitive data samples to a multiple-input multiple-output (MIMO)-enabled base station subject to energy constraints. To cope with the dynamic varied channel… More >

  • Open Access

    ARTICLE

    Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks

    Muaadh A. Alsoufi1,*, Maheyzah Md Siraj1, Fuad A. Ghaleb2, Muna Al-Razgan3, Mahfoudh Saeed Al-Asaly3, Taha Alfakih3, Faisal Saeed2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 823-845, 2024, DOI:10.32604/cmes.2024.052112 - 20 August 2024

    Abstract The rapid growth of Internet of Things (IoT) devices has brought numerous benefits to the interconnected world. However, the ubiquitous nature of IoT networks exposes them to various security threats, including anomaly intrusion attacks. In addition, IoT devices generate a high volume of unstructured data. Traditional intrusion detection systems often struggle to cope with the unique characteristics of IoT networks, such as resource constraints and heterogeneous data sources. Given the unpredictable nature of network technologies and diverse intrusion methods, conventional machine-learning approaches seem to lack efficiency. Across numerous research domains, deep learning techniques have demonstrated… More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security and Privacy Architecture for IoT Networks with the Integration of Blockchain

    Sohaib Latif1,*, M. Saad Bin Ilyas1, Azhar Imran2, Hamad Ali Abosaq3, Abdulaziz Alzubaidi4, Vincent Karovič Jr.5

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 353-379, 2024, DOI:10.32604/iasc.2024.047080 - 21 May 2024

    Abstract The Internet of Things (IoT) is growing rapidly and impacting almost every aspect of our lives, from wearables and healthcare to security, traffic management, and fleet management systems. This has generated massive volumes of data and security, and data privacy risks are increasing with the advancement of technology and network connections. Traditional access control solutions are inadequate for establishing access control in IoT systems to provide data protection owing to their vulnerability to single-point OF failure. Additionally, conventional privacy preservation methods have high latency costs and overhead for resource-constrained devices. Previous machine learning approaches were… More >

  • Open Access

    ARTICLE

    SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks

    Jiehao Ye, Wen Cheng, Xiaolong Liu, Wenyi Zhu, Xuan’ang Wu, Shigen Shen*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2743-2769, 2024, DOI:10.32604/cmc.2024.049985 - 15 May 2024

    Abstract The Internet of Things (IoT) has characteristics such as node mobility, node heterogeneity, link heterogeneity, and topology heterogeneity. In the face of the IoT characteristics and the explosive growth of IoT nodes, which brings about large-scale data processing requirements, edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions. However, the defense mechanism of Edge Computing-enabled IoT Nodes (ECIoTNs) is still weak due to their limited resources, so that they are susceptible to malicious software spread, which can compromise… More >

  • Open Access

    ARTICLE

    RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments

    Amal Hkiri1,*, Mouna Karmani1, Omar Ben Bahri2, Ahmed Mohammed Murayr2, Fawaz Hassan Alasmari2, Mohsen Machhout1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 227-247, 2024, DOI:10.32604/cmc.2023.047087 - 30 January 2024

    Abstract The RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem. Despite its significance, RPL’s susceptibility to attacks remains a concern. This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the decreased rank attack in both static and mobile network environments. We employ the Random Direction Mobility Model (RDM) for mobile scenarios within the Cooja simulator. Our systematic evaluation focuses on critical performance metrics, including Packet Delivery Ratio (PDR), Average End to End Delay (AE2ED), throughput, Expected Transmission Count More >

  • Open Access

    ARTICLE

    Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks

    Abdur Rashid Sangi1,*, Satish Anamalamudi2, Mohammed S. Alkatheiri3, Murali Krishna Enduri2, Anil Carie2, Mohammed A. Alqarni4

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2217-2234, 2023, DOI:10.32604/cmc.2023.038305 - 30 August 2023

    Abstract Vehicular Adhoc Networks (VANETs) enable vehicles to act as mobile nodes that can fetch, share, and disseminate information about vehicle safety, emergency events, warning messages, and passenger infotainment. However, the continuous dissemination of information from vehicles and their one-hop neighbor nodes, Road Side Units (RSUs), and VANET infrastructures can lead to performance degradation of VANETs in the existing host-centric IP-based network. Therefore, Information Centric Networks (ICN) are being explored as an alternative architecture for vehicular communication to achieve robust content distribution in highly mobile, dynamic, and error-prone domains. In ICN-based Vehicular-IoT networks, consumer mobility is… More >

  • Open Access

    ARTICLE

    Adaptive Time Slot Resource Allocation in SWIPT IoT Networks

    Yunong Yang1, Yuexia Zhang2,3,*, Zhihai Zhuo2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2787-2813, 2023, DOI:10.32604/cmes.2023.027351 - 09 March 2023

    Abstract The rapid advancement of Internet of Things (IoT) technology has brought convenience to people’s lives; however further development of IoT faces serious challenges, such as limited energy and shortage of network spectrum resources. To address the above challenges, this study proposes a simultaneous wireless information and power transfer IoT adaptive time slot resource allocation (SIATS) algorithm. First, an adaptive time slot consisting of periods for sensing, information transmission, and energy harvesting is designed to ensure that the minimum energy harvesting requirement is met while the maximum uplink and downlink throughputs are obtained. Second, the optimal… More >

  • Open Access

    ARTICLE

    Hopping-Aware Cluster Header Capability for Sensor Relocation in Mobile IoT Networks

    Moonseong Kim1, Jaeyoung Park2, Young-Joon Kim3, Woochan Lee4,*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1613-1625, 2023, DOI:10.32604/iasc.2023.033081 - 05 January 2023

    Abstract Mobile sensor nodes such as hopping sensors are of critical importance in data collection. However, the occurrence of sensing holes is unavoidable due to the energy limitation of the nodes. Thus, it is evident that the relocation of mobile sensors is the most desirable method to recover the sensing holes. The previous research conducted by the authors so far demonstrated the most realistic hopping sensor relocation scheme, which is suitable for the distributed environment. In previous studies, the cluster header plays an essential role in detecting the sensing hole and requesting the neighboring cluster to… More >

  • Open Access

    ARTICLE

    Digital Object Architecture for IoT Networks

    Mahmood Al-Bahri1, Abdelhamied Ateya2,3, Ammar Muthanna3, Abeer D. Algarni4, Naglaa F. Soliman4,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 97-110, 2023, DOI:10.32604/iasc.2023.026115 - 06 June 2022

    Abstract The Internet of Things (IoT) is a recent technology, which implies the union of objects, “things”, into a single worldwide network. This promising paradigm faces many design challenges associated with the dramatic increase in the number of end-devices. Device identification is one of these challenges that becomes complicated with the increase of network devices. Despite this, there is still no universally accepted method of identifying things that would satisfy all requirements of the existing IoT devices and applications. In this regard, one of the most important problems is choosing an identification system for all IoT… More >

Displaying 1-10 on page 1 of 22. Per Page