Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (664)
  • Open Access

    ARTICLE

    Security and Privacy in 5G Internet of Vehicles (IoV) Environment

    Benjamin Kwapong Osibo1, Chengbo Zhang1, Changsen Xia1, Guanzhe Zhao2, Zilong Jin1,3,*

    Journal on Internet of Things, Vol.3, No.2, pp. 77-86, 2021, DOI:10.32604/jiot.2021.017943

    Abstract Modern vehicles are equipped with sensors, communication, and computation units that make them capable of providing monitoring services and analysis of real-time traffic information to improve road safety. The main aim of communication in vehicular networks is to achieve an autonomous driving environment that is accident-free alongside increasing road use quality. However, the demanding specifications such as high data rate, low latency, and high reliability in vehicular networks make 5G an emerging solution for addressing the current vehicular network challenges. In the 5G IoV environment, various technologies and models are deployed, making the environment open to attacks such as Sybil,… More >

  • Open Access

    ARTICLE

    Machine Learning Based Framework for Maintaining Privacy of Healthcare Data

    Adil Hussain Seh1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Alka Agrawal1, Rajeev Kumar4,*, Raees Ahmad Khan1

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 697-712, 2021, DOI:10.32604/iasc.2021.018048

    Abstract The Adoption of Artificial Intelligence (AI), Machine Learning (ML), Internet of Things (IoT), cloud services, web-based software systems, and other wireless sensor devices in the healthcare infrastructure have led to phenomenal improvements and benefits in the healthcare sector. Digital healthcare has ensured early diagnosis of the diseases, greater accessibility, and mass outreach in terms of treatment. Despite this unprecedented success, the privacy and confidentiality of the healthcare data have become a major concern for all the stakeholders. Data breach reports reveal that the healthcare data industry is one of the key targets of cyber invaders. In fact the last few… More >

  • Open Access

    ARTICLE

    New Quantum Private Comparison Using Hyperentangled GHZ State

    Jerrel Gianni1, Zhiguo Qu2,*

    Journal of Quantum Computing, Vol.3, No.2, pp. 45-54, 2021, DOI:10.32604/jqc.2021.019675

    Abstract In this paper, we propose a new protocol designed for quantum private comparison (QPC). This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party (TP) to achieve the objective. This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom (DOF), which could have 64 combinations. The TP can decide which combination to use based on the shared key information provided from a quantum key distribution (QKD) protocol. By doing so, the security of the protocol can be improved further. Decoy photon technology is also used as another means of… More >

  • Open Access

    ARTICLE

    A Hybrid Scheme for Secure Wireless Communications in IoT

    Muhammad Irshad Nazeer1,2,*, Ghulam Ali Mallah1, Raheel Ahmed Memon2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 633-648, 2021, DOI:10.32604/iasc.2021.017771

    Abstract Network Coding is a potential technology for the future wireless communications and Internet of Things (IoT) as it reduces the number of transmissions and offers energy efficiency. It is vulnerable to threat and attack that can harm intermediate nodes. Indeed, it exhibits an ability to incorporate security of transmitted data, yet a lot of work needs to be done to provide a safeguard from threats. The purpose of this study is to strengthen the existing Network Coding scheme with a set of generic requirements for Network Coding Protocols by adopting system models and a Genetic Algorithm based cryptosystem. A hybrid… More >

  • Open Access

    ARTICLE

    Smartphone Security Using Swipe Behavior-based Authentication

    Adnan Bin Amanat Ali1, Vasaki Ponnusamy1, Anbuselvan Sangodiah1, Roobaea Alroobaea2, N. Z. Jhanjhi3,*, Uttam Ghosh4, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 571-585, 2021, DOI:10.32604/iasc.2021.015913

    Abstract Most smartphone users prefer easy and convenient authentication without remembering complicated passwords or drawing intricate patterns. Preferably, after one-time authentication, there is no verification of the user’s authenticity. Therefore, security and privacy against unauthorized users is a crucial research area. Behavioral authentication is an emerging security technique that is gaining attention for its uniqueness and transparency. In this paper, a behavior-based authentication system is built using swipe movements to continuously authenticate the user after one-time traditional authentication. The key feature is the selection of an optimal feature set for the swipe movement. Five machine learning classifiers are used, of which… More >

  • Open Access

    ARTICLE

    Ecological Security Evaluation Algorithm for Resource-Exhausted Cities Based on the PSR Model

    Xiaozhou Li1,2, Zhenggang Xu1, Yuanyuan Fu3, Qi Jin1, Yunlin Zhao1,*, Neal N. Xiong4

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 985-1001, 2021, DOI:10.32604/cmc.2021.017357

    Abstract Today, resource depletion threatens a number of resource-based cities in China. The ecological security problem caused by the long-term exploitation of natural resources is a key issue to be solved in the development of resource-exhausted cities. Using 23 indicators, this study evaluated the ecological security status and development trends of 21 resource-exhausted cities in China from 2011 to 2017. The results showed that from 2011 to 2015, the overall ecological security of this type of city was low, with over 60% of the cities at an unsafe level. However, ecological security improved rapidly after 2016, and by 2017, all of… More >

  • Open Access

    ARTICLE

    Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

    Farouq Aliyu1,*, Tarek Sheltami1, Ashraf Mahmoud1, Louai Al-Awami1, Ansar Yasar2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1159-1181, 2021, DOI:10.32604/cmc.2021.016938

    Abstract Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network (close to the Internet of Things (IoT) devices). Fog nodes provide services in lieu of the cloud. Thus, improving the performance of the network and making it attractive to social media-based systems. Security issues are one of the most challenges encountered in FC. In this paper, we propose an anomaly-based Intrusion Detection and Prevention System (IDPS) against Man-in-the-Middle (MITM) attack in the fog layer. The system uses special nodes known as Intrusion Detection System (IDS) nodes to detect… More >

  • Open Access

    ARTICLE

    An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment

    K. Raju*, M. Chinnadurai

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1057-1072, 2021, DOI:10.32604/cmc.2021.016068

    Abstract Security is a critical issue in cloud computing (CC) because attackers can fabricate data by creating, copying, or deleting data with no user authorization. Most of the existing techniques make use of password-based authentication for encrypting data. Password-based schemes suffer from several issues and can be easily compromised. This paper presents a new concept of hybrid metaheuristic optimization as an identity-based secure and optimal authentication (HMO-ISOA) scheme for CC environments. The HMO-ISOA technique makes use of iris and fingerprint biometrics. Initially, the HMO-ISOA technique involves a directional local ternary quantized extrema pattern–based feature extraction process to extract features from the… More >

  • Open Access

    ARTICLE

    Mining Bytecode Features of Smart Contracts to Detect Ponzi Scheme on Blockchain

    Xiajiong Shen1,3, Shuaimin Jiang2,3, Lei Zhang1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.3, pp. 1069-1085, 2021, DOI:10.32604/cmes.2021.015736

    Abstract The emergence of smart contracts has increased the attention of industry and academia to blockchain technology, which is tamper-proofing, decentralized, autonomous, and enables decentralized applications to operate in untrustworthy environments. However, these features of this technology are also easily exploited by unscrupulous individuals, a typical example of which is the Ponzi scheme in Ethereum. The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant. To solve this problem, we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode. In… More >

  • Open Access

    ARTICLE

    NVM Storage in IoT Devices: Opportunities and Challenges

    Yang Liu1, Shan Zhao1,*, Wenhan Chen1, Xuran Ge1, Fang Liu2, Shuo Li3, Nong Xiao1

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 393-409, 2021, DOI:10.32604/csse.2021.017224

    Abstract Edge storage stores the data directly at the data collection point, and does not need to transmit the collected data to the storage central server through the network. It is a critical technology that supports applications such as edge computing and 5G network applications, with lower network communication overhead, lower interaction delay and lower bandwidth cost. However, with the explosion of data and higher real-time requirements, the traditional Internet of Things (IoT) storage architecture cannot meet the requirements of low latency and large capacity. Non-volatile memory (NVM) presents new possibilities regarding this aspect. This paper classifies the different storage architectures… More >

Displaying 491-500 on page 50 of 664. Per Page