Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (298)
  • Open Access

    ARTICLE

    Cooperative Detection Method for DDoS Attacks Based on Blockchain

    Jieren Cheng1,2, Xinzhi Yao1,2,*, Hui Li3, Hao Lu4, Naixue Xiong5, Ping Luo1,2, Le Liu1,2, Hao Guo1,2, Wen Feng1,2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 103-117, 2022, DOI:10.32604/csse.2022.025668

    Abstract Distributed Denial of Service (DDoS) attacks is always one of the major problems for service providers. Using blockchain to detect DDoS attacks is one of the current popular methods. However, the problems of high time overhead and cost exist in the most of the blockchain methods for detecting DDoS attacks. This paper proposes a blockchain-based collaborative detection method for DDoS attacks. First, the trained DDoS attack detection model is encrypted by the Intel Software Guard Extensions (SGX), which provides high security for uploading the DDoS attack detection model to the blockchain. Secondly, the service provider uploads the encrypted model to… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Architecture for Enabling Cybersecurity in the Internet-of-Critical Infrastructures

    Mahmoud Ragab1,2,3,*, Ali Altalbe1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1579-1592, 2022, DOI:10.32604/cmc.2022.025828

    Abstract Due to the drastic increase in the number of critical infrastructures like nuclear plants, industrial control systems (ICS), transportation, it becomes highly vulnerable to several attacks. They become the major targets of cyberattacks due to the increase in number of interconnections with other networks. Several research works have focused on the design of intrusion detection systems (IDS) using machine learning (ML) and deep learning (DL) models. At the same time, Blockchain (BC) technology can be applied to improve the security level. In order to resolve the security issues that exist in the critical infrastructures and ICS, this study designs a… More >

  • Open Access

    ARTICLE

    Federated Learning with Blockchain Assisted Image Classification for Clustered UAV Networks

    Ibrahim Abunadi1, Maha M. Althobaiti2, Fahd N. Al-Wesabi3,4, Anwer Mustafa Hilal5, Mohammad Medani6, Manar Ahmed Hamza5,*, Mohammed Rizwanullah5, Abu Serwar Zamani5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1195-1212, 2022, DOI:10.32604/cmc.2022.025473

    Abstract The evolving “Industry 4.0” domain encompasses a collection of future industrial developments with cyber-physical systems (CPS), Internet of things (IoT), big data, cloud computing, etc. Besides, the industrial Internet of things (IIoT) directs data from systems for monitoring and controlling the physical world to the data processing system. A major novelty of the IIoT is the unmanned aerial vehicles (UAVs), which are treated as an efficient remote sensing technique to gather data from large regions. UAVs are commonly employed in the industrial sector to solve several issues and help decision making. But the strict regulations leading to data privacy possibly… More >

  • Open Access

    ARTICLE

    IoT and Blockchain-Based Mask Surveillance System for COVID-19 Prevention Using Deep Learning

    Wahidur Rahman1, Naif Al Mudawi2,*, Abdulwahab Alazeb2, Muhammad Minoar Hossain1, Saima Siddique Tashfia1, Md. Tarequl Islam1, Shisir Mia1, Mohammad Motiur Rahman1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2033-2053, 2022, DOI:10.32604/cmc.2022.025025

    Abstract On the edge of the worldwide public health crisis, the COVID-19 disease has become a serious headache for its destructive nature on humanity worldwide. Wearing a facial mask can be an effective possible solution to mitigate the spreading of the virus and reduce the death rate. Thus, wearing a face mask in public places such as shopping malls, hotels, restaurants, homes, and offices needs to be enforced. This research work comes up with a solution of mask surveillance system utilizing the mechanism of modern computations like Deep Learning (DL), Internet of things (IoT), and Blockchain. The absence or displacement of… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Model for Privacy Preserving IIoT on 6G Environment

    Anwer Mustafa Hilal1,*, Jaber S. Alzahrani2, Ibrahim Abunadi3, Nadhem Nemri4, Fahd N. Al-Wesabi5,6, Abdelwahed Motwakel1, Ishfaq Yaseen1, Abu Sarwar Zamani1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 333-348, 2022, DOI:10.32604/cmc.2022.024794

    Abstract In recent times, Industrial Internet of Things (IIoT) experiences a high risk of cyber attacks which needs to be resolved. Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Industry 4.0 by overcoming such cyber attacks. Although blockchain-based IIoT network renders a significant support and meet the service requirements of next generation network, the performance arrived at, in existing studies still needs improvement. In this scenario, the current research paper develops a new Privacy-Preserving Blockchain with Deep Learning model for Industrial IoT (PPBDL-IIoT) on 6G environment. The proposed PPBDL-IIoT technique aims at identifying the existence of… More >

  • Open Access

    ARTICLE

    Malware Detection Using Decision Tree Based SVM Classifier for IoT

    Anwer Mustafa Hilal1,*, Siwar Ben Haj Hassine2, Souad Larabi-Marie-Sainte3, Nadhem Nemri2, Mohamed K. Nour4, Abdelwahed Motwakel1, Abu Sarwar Zamani1, Mesfer Al Duhayyim5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 713-726, 2022, DOI:10.32604/cmc.2022.024501

    Abstract The development in Information and Communication Technology has led to the evolution of new computing and communication environment. Technological revolution with Internet of Things (IoTs) has developed various applications in almost all domains from health care, education to entertainment with sensors and smart devices. One of the subsets of IoT is Internet of Medical things (IoMT) which connects medical devices, hardware and software applications through internet. IoMT enables secure wireless communication over the Internet to allow efficient analysis of medical data. With these smart advancements and exploitation of smart IoT devices in health care technology there increases threat and malware… More >

  • Open Access

    ARTICLE

    A Framework for e-Voting System Based on Blockchain and Distributed Ledger Technologies

    Shahid Hussain Danwar, Javed Ahmed Mahar*, Aneela Kiran

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 417-440, 2022, DOI:10.32604/cmc.2022.023846

    Abstract Election allows the voter of a country to select the most suitable group of candidates to run the government. Election in Pakistan is simply paper-based method but some certain political and socio-economic issues turn that simple process in complicated and disputes once. Solutions of such problems are consisting of many methods including the e-voting system. The e-voting system facilitates the voters to cast their votes by electronic means with very easy and convenient way. This also allows maintaining the security and secrecy of the voter along with election process. Electronic voting reduces the human-involvement throughout the process from start to… More >

  • Open Access

    ARTICLE

    Data Anonymous Authentication for BIoMT with Proxy Group Signature

    Chaoyang Li1,*, Yalan Wang2, Gang Xu3, Xiubo Chen4, Xiangjun Xin1, Jian Li4

    Journal of Cyber Security, Vol.3, No.4, pp. 207-216, 2021, DOI:10.32604/jcs.2021.026926

    Abstract Along with the increase of wearable medical device, the privacy leakage problem in the process of transmission between these edge medical devices. The blockchain-enabled Internet of Medical Things (BIoMT) has been developed to reform traditional centralized medical system in recent years. This paper first introduces a data anonymous authentication model to protect user privacy and medical data in BIoMT. Then, a proxy group signature (PGS) scheme has been proposed based on lattice assumption. This scheme can well satisfy the anonymous authentication demand for the proposed model, and provide anti-quantum attack security for BIoMT in the future general quantum computer age.… More >

  • Open Access

    ARTICLE

    Cost Efficient Scheduling Using Smart Contract Cognizant Ethereum for IoMT

    G. Ravikumar1, K. Venkatachalam2, Mehedi Masud3, Mohamed Abouhawwash4,5,*

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 865-877, 2022, DOI:10.32604/iasc.2022.024278

    Abstract Recently internet of medical things (IoMT) act as a smart doctor using sensor wearable’s device in human body. This smart doctor device senses necessary medical data from human and transfer via network immediately to physician. It is important to transfer sensitive data very securely. Blockchain becomes trending technology to provide high security to both end users in the network. Traditionally security structure is relying on cryptographic techniques which is very expensive and takes more time in securely transmitting data. To overcome this issue, this paper builds a cost effective, blockchain with IoMT using fog-cloud computing. The aim of research is… More >

  • Open Access

    ARTICLE

    An Effective Blockchain Based Secure Searchable Encryption System

    Aitizaz Ali1, Mehedi Masud2, Ateeq ur Rehman3, Can Chen1, Mehmood4, Mohammad A. AlZain5, Jehad Ali6,*

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1183-1195, 2022, DOI:10.32604/iasc.2022.023930

    Abstract Security of Patient health records (PHR) is the most important aspect of cryptography over the Internet due to its value and importance preferably in the medical Internet of Things (IoT). Search keywords access mechanism is one of the common approaches which is used to access PHR from database, but it is susceptible to various security vulnerabilities. Although Blockchain-enabled healthcare systems provide security, but it may lead to some loopholes in the existing schemes. However, these methods primarily focused on data storage, and blockchain is used as a database. In this paper, Blockchain as a distributed database is proposed with homomorphic… More >

Displaying 191-200 on page 20 of 298. Per Page