Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography

    Zainatul Yushaniza Mohamed Yusoff1, Mohamad Khairi Ishak2,*, Lukman A. B. Rahim3, Mohd Shahrimie Mohd Asaari1

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1669-1697, 2024, DOI:10.32604/csse.2024.056741 - 22 November 2024

    Abstract The rapid adoption of Internet of Things (IoT) technologies has introduced significant security challenges across the physical, network, and application layers, particularly with the widespread use of the Message Queue Telemetry Transport (MQTT) protocol, which, while efficient in bandwidth consumption, lacks inherent security features, making it vulnerable to various cyber threats. This research addresses these challenges by presenting a secure, lightweight communication proxy that enhances the scalability and security of MQTT-based Internet of Things (IoT) networks. The proposed solution builds upon the Dang-Scheme, a mutual authentication protocol designed explicitly for resource-constrained environments and enhances it… More >

  • Open Access

    ARTICLE

    Security Test Case Prioritization through Ant Colony Optimization Algorithm

    Abdulaziz Attaallah1, Khalil al-Sulbi2, Areej Alasiry3, Mehrez Marzougui3, Mohd Waris Khan4,*, Mohd Faizan4, Alka Agrawal5, Dhirendra Pandey5

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3165-3195, 2023, DOI:10.32604/csse.2023.040259 - 09 November 2023

    Abstract Security testing is a critical concern for organizations worldwide due to the potential financial setbacks and damage to reputation caused by insecure software systems. One of the challenges in software security testing is test case prioritization, which aims to reduce redundancy in fault occurrences when executing test suites. By effectively applying test case prioritization, both the time and cost required for developing secure software can be reduced. This paper proposes a test case prioritization technique based on the Ant Colony Optimization (ACO) algorithm, a metaheuristic approach. The performance of the ACO-based technique is evaluated using More >

  • Open Access

    ARTICLE

    A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model

    Jawad Ahmad1,*, Mimonah Al Qathrady2, Mohammed S. Alshehri3, Yazeed Yasin Ghadi4, Mujeeb Ur Rehman5, Syed Aziz Shah6

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1325-1341, 2023, DOI:10.32604/cmc.2023.040858 - 30 August 2023

    Abstract Due to the inherent insecure nature of the Internet, it is crucial to ensure the secure transmission of image data over this network. Additionally, given the limitations of computers, it becomes even more important to employ efficient and fast image encryption techniques. While 1D chaotic maps offer a practical approach to real-time image encryption, their limited flexibility and increased vulnerability restrict their practical application. In this research, we have utilized a 3D Hindmarsh-Rose model to construct a secure cryptosystem. The randomness of the chaotic map is assessed through standard analysis. The proposed system enhances security… More >

  • Open Access

    ARTICLE

    Intrusion Detection in 5G Cellular Network Using Machine Learning

    Ishtiaque Mahmood1, Tahir Alyas2, Sagheer Abbas3, Tariq Shahzad4, Qaiser Abbas5,6, Khmaies Ouahada7,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2439-2453, 2023, DOI:10.32604/csse.2023.033842 - 28 July 2023

    Abstract Attacks on fully integrated servers, apps, and communication networks via the Internet of Things (IoT) are growing exponentially. Sensitive devices’ effectiveness harms end users, increases cyber threats and identity theft, raises costs, and negatively impacts income as problems brought on by the Internet of Things network go unnoticed for extended periods. Attacks on Internet of Things interfaces must be closely monitored in real time for effective safety and security. Following the 1, 2, 3, and 4G cellular networks, the 5th generation wireless 5G network is indeed the great invasion of mankind and is known as… More >

  • Open Access

    ARTICLE

    Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality

    Ali Arshad1,*, Muhammad Nadeem2, Saman Riaz1, Syeda Wajiha Zahra2, Ashit Kumar Dutta3, Zaid Alzaid4, Rana Alabdan5, Badr Almutairi6, Sultan Almotairi4,7

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3065-3089, 2023, DOI:10.32604/cmc.2023.035695 - 31 March 2023

    Abstract There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker… More >

  • Open Access

    ARTICLE

    Proof-of-Improved-Participation: A New Consensus Protocol for Blockchain Technology

    N. Anita*, M. Vijayalakshmi, S. Mercy Shalinie

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2007-2018, 2023, DOI:10.32604/csse.2023.025516 - 01 August 2022

    Abstract The Internet of Things (IoT) is converting today’s physical world into a complex and sophisticated network of connected devices on an enormous scale. The existing malicious node detection mechanism in traditional approaches lacks in transparency, availability, or traceability of the detection phase. To overcome these concerns, we provide a decentralized technique using blockchain technology. Despite the fact that blockchain technology is applicable to create that type of models, existing harmony set of instructions are susceptible to do violence to such as DoS and Sybil, making blockchain systems unfeasible. Here, a new Proof-of-Improved-Participation (PoIP) harmony instruction… More >

  • Open Access

    ARTICLE

    A Mutual Authentication and Cross Verification Protocol for Securing Internet-of-Drones (IoD)

    Saeed Ullah Jan1, Irshad Ahmed Abbasi2,*, Fahad Algarni3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5845-5869, 2022, DOI:10.32604/cmc.2022.026179 - 21 April 2022

    Abstract With the rapid miniaturization in sensor technology, Internet-of-Drones (IoD) has delighted researchers towards information transmission security among drones with the control station server (CSS). In IoD, the drone is different in shapes, sizes, characteristics, and configurations. It can be classified on the purpose of its deployment, either in the civilian or military domain. Drone’s manufacturing, equipment installation, power supply, multi-rotor system, and embedded sensors are not issues for researchers. The main thing is to utilize a drone for a complex and sensitive task using an infrastructure-less/self-organization/resource-less network type called Flying Ad Hoc Network (FANET). Monitoring… More >

  • Open Access

    ARTICLE

    Preserving Data Confidentiality in Association Rule Mining Using Data Share Allocator Algorithm

    D. Dhinakaran1,*, P. M. Joe Prathap2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1877-1892, 2022, DOI:10.32604/iasc.2022.024509 - 24 March 2022

    Abstract These days, investigations of information are becoming essential for various associations all over the globe. By and large, different associations need to perform information examinations on their joined data sets. Privacy and security have become a relentless concern wherein business experts do not desire to contribute their classified transaction data. Therefore, there is a requirement to build a proficient methodology that can process the broad mixture of data and convert those data into meaningful knowledge to the user without forfeiting the security and privacy of individuals’ crude information. We devised two unique protocols for frequent… More >

  • Open Access

    ARTICLE

    Atmospheric Convection Model Based Digital Confidentiality Scheme

    Noor Munir1, Majid Khan1,*, Mohammad Mazyad Hazzazi2, Amer Aljaedi3, Sajjad Shaukat Jamal2, Iqtadar Hussain4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4503-4522, 2022, DOI:10.32604/cmc.2022.021077 - 14 January 2022

    Abstract Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology globally. The combination of different innovative topics of information security and high-speed computing has added new visions into the behavior of complex nonlinear dynamical systems which uncovered amazing results even in the least difficult nonlinear models. The generation of complex actions from a very simple dynamical method has a strong relation with information security. The protection of digital content is one of the inescapable concerns of the digitally advanced world. Today, information plays an important… More >

  • Open Access

    ARTICLE

    Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

    Mamoona Humayun1, NZ Jhanjhi2,*, Maram Fahhad Almufareh1, Muhammad Ibrahim Khalil3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5039-5059, 2022, DOI:10.32604/cmc.2022.019289 - 14 January 2022

    Abstract Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capability maturity model integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive… More >

Displaying 1-10 on page 1 of 15. Per Page