Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    EARAS: An Efficient, Anonymous, and Robust Authentication Scheme for Smart Homes

    Muntaham Inaam Hashmi1, Muhammad Ayaz Khan2, Khwaja Mansoor ul Hassan1, Suliman A. Alsuhibany3,*, Ainur Abduvalova4, Asfandyar Khan5

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.071452 - 12 January 2026

    Abstract Cyber-criminals target smart connected devices for spyware distribution and security breaches, but existing Internet of Things (IoT) security standards are insufficient. Major IoT industry players prioritize market share over security, leading to insecure smart products. Traditional host-based protection solutions are less effective due to limited resources. Overcoming these challenges and enhancing the security of IoT Devices requires a security design at the network level that uses lightweight cryptographic parameters. In order to handle control, administration, and security concerns in traditional networking, the Gateway Node offers a contemporary networking architecture. By managing all network-level computations and… More >

  • Open Access

    ARTICLE

    Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks

    R. Sabitha1,*, C. Gokul Prasad2, S. Karthik1

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2795-2810, 2023, DOI:10.32604/csse.2023.026465 - 21 December 2022

    Abstract In recent scenario of Wireless Sensor Networks (WSNs), there are many application developed for handling sensitive and private data such as military information, surveillance data, tracking, etc. Hence, the sensor nodes of WSNs are distributed in an intimidating region, which is non-rigid to attacks. The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats. In traditional models, the solution has been made for defending the networks, only to specific attacks. However, in real-time applications, the kind of attack that is launched by the adversary is not… More >

Displaying 1-10 on page 1 of 2. Per Page