Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (27)
  • Open Access

    ARTICLE

    Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

    Vasaki Ponnusamy1,*, Mamoona Humayun2, N. Z. Jhanjhi3, Aun Yichiet1, Maram Fahhad Almufareh2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1199-1215, 2022, DOI:10.32604/csse.2022.018518

    Abstract Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection. Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks. This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods, IDS techniques, IDS placement strategies, and traffic data analysis techniques. This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions. Specifically, the Knowledge… More >

  • Open Access

    ARTICLE

    A Hybrid Scheme for Secure Wireless Communications in IoT

    Muhammad Irshad Nazeer1,2,*, Ghulam Ali Mallah1, Raheel Ahmed Memon2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 633-648, 2021, DOI:10.32604/iasc.2021.017771

    Abstract Network Coding is a potential technology for the future wireless communications and Internet of Things (IoT) as it reduces the number of transmissions and offers energy efficiency. It is vulnerable to threat and attack that can harm intermediate nodes. Indeed, it exhibits an ability to incorporate security of transmitted data, yet a lot of work needs to be done to provide a safeguard from threats. The purpose of this study is to strengthen the existing Network Coding scheme with a set of generic requirements for Network Coding Protocols by adopting system models and a Genetic Algorithm based cryptosystem. A hybrid… More >

  • Open Access

    ARTICLE

    An Efficient Medium Access Control Mechanism for Flying Ad-hoc Networks

    Muhammad Asghar Khan1,*, Fazal Noor2, Insaf Ullah3, Sajjad ur Rehman4, Shibli Nisar5, Mohaira Ahmad5

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 47-63, 2021, DOI:10.32604/csse.2021.016430

    Abstract The Flying Ad-hoc Networks (FANETs) is characterized by the transition from a single large Unmanned Aerial Vehicle (UAV) to multiple small UAVs connected in an ad-hoc fashion. Since high mobility is the core feature of such networks, they are prone to route breaks within the links. The issue of connectivity loss can be coped with, to some extent, by making use of omnidirectional antennas. Such modification, however, curtails Quality-of-Service (QoS) requirements of networks in terms of bandwidth, media access delay, coverage and others. Alternately, directional antennas have advantages over omnidirectional antennas such as improved transmission range, spatial reuse and high… More >

  • Open Access

    ARTICLE

    An Intelligent Cluster Optimization Algorithm for Smart Body Area Networks

    Adil Mushtaq1, Muhammad Nadeem Majeed1, Farhan Aadil2, Muhammad Fahad Khan2, Sangsoon Lim3,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3795-3814, 2021, DOI:10.32604/cmc.2021.015369

    Abstract Body Area Networks (BODYNETs) or Wireless Body Area Networks (WBAN), being an important type of ad-hoc network, plays a vital role in multimedia, safety, and traffic management applications. In BODYNETs, rapid topology changes occur due to high node mobility, which affects the scalability of the network. Node clustering is one mechanism among many others, which is used to overcome this issue in BODYNETs. There are many clustering algorithms used in this domain to overcome this issue. However, these algorithms generate a large number of Cluster Heads (CHs), which results in scarce resource utilization and degraded performance. In this research, an… More >

  • Open Access

    ARTICLE

    A Novel Method for Node Connectivity with Adaptive Dragonfly Algorithm and Graph-Based m-Connection Establishment in MANET

    S. B. Manoojkumaar1, *, C. Poongodi2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1649-1670, 2020, DOI:10.32604/cmc.2020.010781

    Abstract Maximizing network lifetime is measured as the primary issue in Mobile Adhoc Networks (MANETs). In geographically routing based models, packet transmission seems to be more appropriate in dense circumstances. The involvement of the Heuristic model directly is not appropriate to offer an effectual solution as it becomes NP-hard issues; therefore investigators concentrate on using Meta-heuristic approaches. Dragonfly Optimization (DFO) is an effective meta-heuristic approach to resolve these problems by providing optimal solutions. Moreover, Meta-heuristic approaches (DFO) turn to be slower in convergence problems and need proper computational time while expanding network size. Thus, DFO is adaptively improved as Adaptive Dragonfly… More >

  • Open Access

    ARTICLE

    An Efficient Certificateless Aggregate Signature Scheme Designed for VANET

    Cui Li1, *, Gang Wu1, Lipeng Xing1, Feng Zhu1, Liang Zhao2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 725-742, 2020, DOI:10.32604/cmc.2020.07188

    Abstract The Vehicular Ad-hoc Network (VANET) is the fundamental of smart transportation system in the future, but the security of the communication between vehicles and vehicles, between vehicles and roadside infrastructures have become increasingly prominent. Certificateless aggregate signature protocol is used to address this security issue, but the existing schemes still have many drawbacks in terms of security and efficiency: First, many schemes are not secure, and signatures can be forged by the attacker; Second, even if some scheme are secure, many schemes use a large number of bilinear pairing operation, and the computation overhead is large. At the same time,… More >

  • Open Access

    ARTICLE

    Adaptive Handover Decision Inspired By Biological Mechanism in Vehicle Ad-hoc Networks

    Xuting Duan1,2,3, Jingyi Wei1,2,3, Daxin Tian1,2,3,*, Jianshan Zhou1,2,3,4, Haiying Xia5, Xin Li6, Kunxian Zheng1,2,3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1117-1128, 2019, DOI:10.32604/cmc.2019.05578

    Abstract In vehicle ad-hoc networks (VANETs), the proliferation of wireless communication will give rise to the heterogeneous access environment where network selection becomes significant. Motivated by the self-adaptive paradigm of cellular attractors, this paper regards an individual communication as a cell, so that we can apply the revised attractor selection model to induce each connected vehicle. Aiming at improving the Quality of Service (QoS), we presented the bio-inspired handover decision-making mechanism. In addition, we employ the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) for any vehicle to choose an access network. This paper proposes a novel framework… More >

Displaying 21-30 on page 3 of 27. Per Page