Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (395)
  • Open Access

    REVIEW

    A Detailed Review of Current AI Solutions for Enhancing Security in Internet of Things Applications

    Arshiya Sajid Ansari1,*, Ghadir Altuwaijri2, Fahad Alodhyani1, Moulay Ibrahim El-Khalil Ghembaza3, Shahabas Manakunnath Devasam Paramb3, Mohammad Sajid Mohammadi3

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 3713-3752, 2025, DOI:10.32604/cmc.2025.064027 - 19 May 2025

    Abstract IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication, processing, and real-time monitoring across diverse applications. Due to their heterogeneous nature and constrained resources, as well as the growing trend of using smart gadgets, there are privacy and security issues that are not adequately managed by conventional security measures. This review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT ecosystems. The intersection of AI technologies, including ML, and blockchain, with IoT privacy and security is systematically examined, focusing on their efficacy in addressing… More >

  • Open Access

    ARTICLE

    Blockchain-Based Electronic Health Passport for Secure Storage and Sharing of Healthcare Data

    Yogendra P. S. Maravi*, Nishchol Mishra

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5517-5537, 2025, DOI:10.32604/cmc.2025.063964 - 19 May 2025

    Abstract The growing demand for international travel has highlighted the critical need for reliable tools to verify travelers’ healthcare status and meet entry requirements. Personal health passports, while essential, face significant challenges related to data silos, privacy protection, and forgery risks in global sharing. To address these issues, this study proposes a blockchain-based solution designed for the secure storage, sharing, and verification of personal health passports. This innovative approach combines on-chain and off-chain storage, leveraging searchable encryption to enhance data security and optimize blockchain storage efficiency. By reducing the storage burden on the blockchain, the system… More >

  • Open Access

    ARTICLE

    A Secure Storage and Verification Framework Based on Consortium Blockchain for Engineering Education Accreditation Data

    Yuling Luo1,2, Xiaoguang Lin1,2, Junxiu Liu1,2,*, Qiang Fu1,2, Sheng Qin1,2, Zhen Min1,2, Tinghua Hu1,2

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5323-5343, 2025, DOI:10.32604/cmc.2025.063860 - 19 May 2025

    Abstract The majors accredited by the Engineering Education Accreditation (EEA) reflect the accreditation agency’s recognition of the school’s engineering programs. Excellent accreditation management holds significant importance for the advancement of engineering education programs. However, the traditional engineering education system framework suffers from the opacity of raw education data and the difficulty for accreditation bodies to forensically examine the self-assessment reports. To solve these issues, an EEA framework based on Hyperledger Fabric blockchain technology is proposed in this work. Firstly, all relevant stakeholders and information interactions occur within the blockchain network, ensuring the authenticity of educational data More >

  • Open Access

    ARTICLE

    Asynchronous Tiered Federated Learning Storage Scheme Based on Blockchain and IPFS

    Tianyu Li1, Dezhi Han1, Jiatao Li1, Kuan-Ching Li2,*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4117-4140, 2025, DOI:10.32604/cmc.2025.063630 - 19 May 2025

    Abstract As is known, centralized federated learning faces risks of a single point of failure and privacy breaches, and blockchain-based federated learning frameworks can address these challenges to a certain extent in recent works. However, malicious clients may still illegally access the blockchain to upload malicious data or steal on-chain data. In addition, blockchain-based federated training suffers from a heavy storage burden and excessive network communication overhead. To address these issues, we propose an asynchronous, tiered federated learning storage scheme based on blockchain and IPFS. It manages the execution of federated learning tasks through smart contracts… More >

  • Open Access

    ARTICLE

    Efficient Searchable Encryption Scheme Supporting Fuzzy Multi-Keyword Ranking Search on Blockchain

    Hongliang Tian, Zhong Fan*, Zhiyang Ruan, Aomen Zhao

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5199-5217, 2025, DOI:10.32604/cmc.2025.063274 - 19 May 2025

    Abstract With the continuous growth of exponential data in IoT, it is usually chosen to outsource data to the cloud server. However, cloud servers are usually provided by third parties, and there is a risk of privacy leakage. Encrypting data can ensure its security, but at the same time, it loses the retrieval function of IoT data. Searchable Encryption (SE) can achieve direct retrieval based on ciphertext data. The traditional searchable encryption scheme has the problems of imperfect function, low retrieval efficiency, inaccurate retrieval results, and centralized cloud servers being vulnerable and untrustworthy. This paper proposes… More >

  • Open Access

    REVIEW

    MediGuard: A Survey on Security Attacks in Blockchain-IoT Ecosystems for e-Healthcare Applications

    Shrabani Sutradhar1,2, Rajesh Bose3, Sudipta Majumder1, Arfat Ahmad Khan4,*, Sandip Roy3, Fasee Ullah5, Deepak Prashar6,7

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 3975-4029, 2025, DOI:10.32604/cmc.2025.061965 - 19 May 2025

    Abstract Cloud-based setups are intertwined with the Internet of Things and advanced, and technologies such as blockchain revolutionize conventional healthcare infrastructure. This digitization has major advantages, mainly enhancing the security barriers of the green tree infrastructure. In this study, we conducted a systematic review of over 150 articles that focused exclusively on blockchain-based healthcare systems, security vulnerabilities, cyberattacks, and system limitations. In addition, we considered several solutions proposed by thousands of researchers worldwide. Our results mostly delineate sustained threats and security concerns in blockchain-based medical health infrastructures for data management, transmission, and processing. Here, we describe… More >

  • Open Access

    ARTICLE

    HNND: Hybrid Neural Network Detection for Blockchain Abnormal Transaction Behaviors

    Jiling Wan, Lifeng Cao*, Jinlong Bai, Jinhui Li, Xuehui Du

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4775-4794, 2025, DOI:10.32604/cmc.2025.061964 - 19 May 2025

    Abstract Blockchain platforms with the unique characteristics of anonymity, decentralization, and transparency of their transactions, which are faced with abnormal activities such as money laundering, phishing scams, and fraudulent behavior, posing a serious threat to account asset security. For these potential security risks, this paper proposes a hybrid neural network detection method (HNND) that learns multiple types of account features and enhances fusion information among them to effectively detect abnormal transaction behaviors in the blockchain. In HNND, the Temporal Transaction Graph Attention Network (T2GAT) is first designed to learn biased aggregation representation of multi-attribute transactions among More >

  • Open Access

    ARTICLE

    A Holistic Anti-Counterfeiting Platform Using NFC and Blockchain Technologies

    Rajendren Subramaniam1, Saaidal Razalli Azzuhri2,*, Teh Ying Wah1, Atif Mahmood3, Vimala Balakrishnan1

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4257-4280, 2025, DOI:10.32604/cmc.2025.061560 - 19 May 2025

    Abstract Counterfeiting is still a pervasive global issue, affecting multiple industries and hindering industrial innovation, while causing substantial financial losses, reputational damage, and risks to consumer safety. From luxury goods and pharmaceuticals to electronics and automotive parts, counterfeit products infiltrate supply chains, leading to a loss of revenue for legitimate businesses and undermining consumer trust. Traditional anti-counterfeiting measures, such as holograms, serial numbers, and barcodes, have proven to be insufficient as counterfeiters continuously develop more sophisticated replication techniques. As a result, there is a growing need for more advanced, secure, and reliable methods to prevent counterfeiting.… More >

  • Open Access

    ARTICLE

    Enhancing Medical Data Sharing: A Cooperative Game Incentive Approach Based on Blockchain

    Xiaohui Yang, Shuo Huang*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5071-5089, 2025, DOI:10.32604/cmc.2025.061507 - 19 May 2025

    Abstract With the rapid development of medical data sharing, issues of privacy and ownership have become prominent, which have limited the scale of data sharing. To address the above challenges, we propose a blockchain-based data-sharing framework to ensure data security and encourage data owners to actively participate in sharing. We introduce a reliable attribute-based searchable encryption scheme that enables fine-grained access control of encrypted data and ensures secure and efficient data sharing. The revenue distribution model is constructed based on Shapley value to motivate participants. Additionally, by integrating the smart contract technology of blockchain, the search More >

  • Open Access

    ARTICLE

    A Lightweight IoT Data Security Sharing Scheme Based on Attribute-Based Encryption and Blockchain

    Hongliang Tian, Meiruo Li*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5539-5559, 2025, DOI:10.32604/cmc.2025.060297 - 19 May 2025

    Abstract The accelerated advancement of the Internet of Things (IoT) has generated substantial data, including sensitive and private information. Consequently, it is imperative to guarantee the security of data sharing. While facilitating fine-grained access control, Ciphertext Policy Attribute-Based Encryption (CP-ABE) can effectively ensure the confidentiality of shared data. Nevertheless, the conventional centralized CP-ABE scheme is plagued by the issues of key misuse, key escrow, and large computation, which will result in security risks. This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues. The integrity… More >

Displaying 31-40 on page 4 of 395. Per Page