Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    IoT-Enabled Plant Monitoring System with Power Optimization and Secure Authentication

    Samsul Huda1,*, Yasuyuki Nogami2, Maya Rahayu2, Takuma Akada2, Md. Biplob Hossain2, Muhammad Bisri Musthafa2, Yang Jie2, Le Hoang Anh2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3165-3187, 2024, DOI:10.32604/cmc.2024.058144 - 18 November 2024

    Abstract Global food security is a pressing issue that affects the stability and well-being of communities worldwide. While existing Internet of Things (IoT) enabled plant monitoring systems have made significant strides in agricultural monitoring, they often face limitations such as high power consumption, restricted mobility, complex deployment requirements, and inadequate security measures for data access. This paper introduces an enhanced IoT application for agricultural monitoring systems that address these critical shortcomings. Our system strategically combines power efficiency, portability, and secure access capabilities, assisting farmers in monitoring and tracking crop environmental conditions. The proposed system includes a… More >

  • Open Access

    ARTICLE

    PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks

    Xuanang Li1, Shuangshuang Liu1, Saru Kumari2, Chien-Ming Chen1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 711-732, 2023, DOI:10.32604/cmes.2022.022667 - 29 September 2022

    Abstract Nowadays, the widespread application of 5G has promoted rapid development in different areas, particularly in the Internet of Things (IoT), where 5G provides the advantages of higher data transfer rate, lower latency, and widespread connections. Wireless sensor networks (WSNs), which comprise various sensors, are crucial components of IoT. The main functions of WSN include providing users with real-time monitoring information, deploying regional information collection, and synchronizing with the Internet. Security in WSNs is becoming increasingly essential because of the across-the-board nature of wireless technology in many fields. Recently, Yu et al. proposed a user authentication protocol for WSN. More >

  • Open Access

    ARTICLE

    Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET

    S. Neelavathy Pari1,*, K. Sudharson2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2775-2789, 2023, DOI:10.32604/csse.2023.029345 - 01 August 2022

    Abstract A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network (MANET). A MANET’s nodes could engage actively and dynamically with one another. However, MANETs, from the other side, are exposed to severe potential threats that are difficult to counter with present security methods. As a result, several safe communication protocols designed to enhance the secure interaction among MANET nodes. In this research, we offer a reputed optimal routing value among network nodes, secure computations, and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation… More >

  • Open Access

    ARTICLE

    An Efficient Sound and Data Steganography Based Secure Authentication System

    Debajit Datta1, Lalit Garg2,*, Kathiravan Srinivasan3, Atsushi Inoue4, G. Thippa Reddy3, M. Praveen Kumar Reddy3, K. Ramesh5, Nidal Nasser6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 723-751, 2021, DOI:10.32604/cmc.2021.014802 - 12 January 2021

    Abstract The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches. Firstly, a random signal is encrypted, and… More >

Displaying 1-10 on page 1 of 4. Per Page