Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (226)
  • Open Access

    ARTICLE

    A Secure Blockchain-Based Vehicular Collision Avoidance Protocol: Detecting and Preventing Blackhole Attacks

    Mosab Manaseer1, Maram Bani Younes2,*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1699-1721, 2024, DOI:10.32604/csse.2024.055128 - 22 November 2024

    Abstract This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems, especially collision avoidance protocols. It focuses on achieving the availability of network communication among traveling vehicles. Finally, it aims to find a secure solution to prevent blackhole attacks on vehicular network communications. The proposed solution relies on authenticating vehicles by joining a blockchain network. This technology provides identification information and receives cryptography keys. Moreover, the ad hoc on-demand distance vector (AODV) protocol is used for route discovery and ensuring reliable node communication. The system activates an adaptive mode for monitoring More >

  • Open Access

    ARTICLE

    Privacy-Preserving and Lightweight V2I and V2V Authentication Protocol Using Blockchain Technology

    Muhammad Imran Ghafoor1, Awad Bin Naeem2,*, Biswaranjan Senapati3, Md. Sakiul Islam Sudman4, Satyabrata Pradhan5, Debabrata Das6, Friban Almeida6, Hesham A. Sakr7

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 783-803, 2024, DOI:10.32604/iasc.2024.050819 - 31 October 2024

    Abstract The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles. The Internet of Vehicles has meaningful applications, enabling connected and autonomous vehicles to interact with infrastructure, sensors, computing nodes, humans, and fellow vehicles. Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards. This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication, utilizing encryption and the Moore curve. The proposed approach enables a vehicle to deduce the planned itinerary of Roadside More >

  • Open Access

    ARTICLE

    Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks

    Vincent Omollo Nyangaresi1,2, Arkan A. Ghaib3, Hend Muslim Jasim4, Zaid Ameen Abduljabbar4,5,6,*, Junchao Ma5,*, Mustafa A. Al Sibahee7,8, Abdulla J. Y. Aldarwish4, Ali Hasan Ali9,10, Husam A. Neamah11

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1029-1057, 2024, DOI:10.32604/cmc.2024.053854 - 15 October 2024

    Abstract Vehicular ad hoc networks (VANETs) provide intelligent navigation and efficient route management, resulting in time savings and cost reductions in the transportation sector. However, the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations. To address these challenges, several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently. However, most of these schemes are limited by a long execution time and massive communication costs, which make them inefficient for on-board units (OBUs). Additionally, some… More >

  • Open Access

    ARTICLE

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

    Khawaja Tahir Mehmood1,2,*, Shahid Atiq1, Intisar Ali Sajjad3, Muhammad Majid Hussain4, Malik M. Abdul Basit2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1673-1708, 2024, DOI:10.32604/cmes.2024.053903 - 27 September 2024

    Abstract Software-Defined Networking (SDN), with segregated data and control planes, provides faster data routing, stability, and enhanced quality metrics, such as throughput (Th), maximum available bandwidth (Bd(max)), data transfer (DTransfer), and reduction in end-to-end delay (D(E-E)). This paper explores the critical work of deploying SDN in large­scale Data Center Networks (DCNs) to enhance its Quality of Service (QoS) parameters, using logically distributed control configurations. There is a noticeable increase in Delay(E-E) when adopting SDN with a unified (single) control structure in big DCNs to handle Hypertext Transfer Protocol (HTTP) requests causing a reduction in network quality parameters (Bd(max), Th, DTransfer, D(E-E),… More > Graphic Abstract

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

  • Open Access

    ARTICLE

    FPGA Accelerators for Computing Interatomic Potential-Based Molecular Dynamics Simulation for Gold Nanoparticles: Exploring Different Communication Protocols

    Ankitkumar Patel1, Srivathsan Vasudevan1,*, Satya Bulusu2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3803-3818, 2024, DOI:10.32604/cmc.2024.052851 - 12 September 2024

    Abstract Molecular Dynamics (MD) simulation for computing Interatomic Potential (IAP) is a very important High-Performance Computing (HPC) application. MD simulation on particles of experimental relevance takes huge computation time, despite using an expensive high-end server. Heterogeneous computing, a combination of the Field Programmable Gate Array (FPGA) and a computer, is proposed as a solution to compute MD simulation efficiently. In such heterogeneous computation, communication between FPGA and Computer is necessary. One such MD simulation, explained in the paper, is the (Artificial Neural Network) ANN-based IAP computation of gold (Au147 & Au309) nanoparticles. MD simulation calculates the forces… More >

  • Open Access

    REVIEW

    The Impact of Domain Name Server (DNS) over Hypertext Transfer Protocol Secure (HTTPS) on Cyber Security: Limitations, Challenges, and Detection Techniques

    Muhammad Dawood1, Shanshan Tu1, Chuangbai Xiao1, Muhammad Haris2, Hisham Alasmary3, Muhammad Waqas4,5,*, Sadaqat Ur Rehman6

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4513-4542, 2024, DOI:10.32604/cmc.2024.050049 - 12 September 2024

    Abstract The DNS over HTTPS (Hypertext Transfer Protocol Secure) (DoH) is a new technology that encrypts DNS traffic, enhancing the privacy and security of end-users. However, the adoption of DoH is still facing several research challenges, such as ensuring security, compatibility, standardization, performance, privacy, and increasing user awareness. DoH significantly impacts network security, including better end-user privacy and security, challenges for network security professionals, increasing usage of encrypted malware communication, and difficulty adapting DNS-based security measures. Therefore, it is important to understand the impact of DoH on network security and develop new privacy-preserving techniques to allow More >

  • Open Access

    ARTICLE

    A Traffic-Aware and Cluster-Based Energy Efficient Routing Protocol for IoT-Assisted WSNs

    Hina Gul1, Sana Ullah1, Ki-Il Kim2,*, Farman Ali3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1831-1850, 2024, DOI:10.32604/cmc.2024.052841 - 15 August 2024

    Abstract The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications, such as remote health monitoring, industrial monitoring, transportation, and smart agriculture. Efficient and reliable data routing is one of the major challenges in the Internet of Things network due to the heterogeneity of nodes. This paper presents a traffic-aware, cluster-based, and energy-efficient routing protocol that employs traffic-aware and cluster-based techniques to improve the data delivery in such networks. The proposed protocol divides the network into clusters where optimal cluster heads are selected among super… More >

  • Open Access

    ARTICLE

    EECLP: A Wireless Sensor Networks Energy Efficient Cross-Layer Protocol

    Mohammed Kaddi1,*, Mohammed Omari2, Moamen Alnatoor1

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2611-2631, 2024, DOI:10.32604/cmc.2024.052048 - 15 August 2024

    Abstract Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks (WSN). A sensor network comprises several micro-sensors deployed randomly in an area of interest. A micro-sensor is provided with an energy resource to supply electricity to all of its components. However, the disposed energy resource is limited and battery replacement is generally infeasible. With this restriction, the sensors must conserve energy to prolong their lifetime. Various energy conservation strategies for WSNs have been presented in the literature, from the application to the physical layer. Most of these solutions focus only on… More >

  • Open Access

    ARTICLE

    A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance

    Qussai M. Yaseen1,2,*, Monther Aldwairi2,3, Ahmad Manasrah4,5

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1867-1888, 2024, DOI:10.32604/cmc.2024.051179 - 15 August 2024

    Abstract Enhancing the security of Wireless Sensor Networks (WSNs) improves the usability of their applications. Therefore, finding solutions to various attacks, such as the blackhole attack, is crucial for the success of WSN applications. This paper proposes an enhanced version of the AODV (Ad Hoc On-Demand Distance Vector) protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs, thereby avoiding them when delivering packets. The proposed version employs a network-based reputation system to select the best and most secure path to a destination. To achieve this goal, the proposed version utilizes the Watchdogs/Pathrater mechanisms in… More >

  • Open Access

    ARTICLE

    Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols

    Ibrahim Alameri1,*, Tawfik Al-Hadhrami2, Anjum Nazir3, Abdulsamad Ebrahim Yahya4, Atef Gharbi5

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 319-339, 2024, DOI:10.32604/cmc.2024.052999 - 18 July 2024

    Abstract This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network (MANET) routing protocols: Destination Sequenced Distance Vector (DSDV), Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Zone Routing Protocol (ZRP). In this paper, the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis, Mann-Whitney, and Friedman. It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns. The study is premised upon the Quality of More >

Displaying 1-10 on page 1 of 226. Per Page