Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (279)
  • Open Access

    ARTICLE

    Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis

    Borja Bordel1,*, Ramón Alcarria1, Joaquin Chung2, Rajkumar Kettimuthu2, Tomás Robles1, Iván Armuelles3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 855-880, 2023, DOI:10.32604/cmc.2023.026787 - 22 September 2022

    Abstract Future components to enhance the basic, native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered, or lightweight solutions adapted to ultra-reliable low-latency communications (URLLC) but whose security properties remain under discussion. Although different 5G network slices may have different requirements, in general, both visions seem to fall short at provisioning secure URLLC in the future. In this work we address this challenge, by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in… More >

  • Open Access

    ARTICLE

    Generative Adversarial Networks for Secure Data Transmission in Wireless Network

    E. Jayabalan*, R. Pugazendi

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3757-3784, 2023, DOI:10.32604/iasc.2023.031200 - 17 August 2022

    Abstract In this paper, a communication model in cognitive radios is developed and uses machine learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to make their transmission decision that automatically adapts to the transmission dynamics to mitigate the launched jamming attacks. The generative adversarial learning neural network (GALNN) or generative dynamic neural network (GDNN) automatically learns with the synthesized training data (training) with a generator and discriminator type neural networks that encompass minimax game theory. The elimination of the jamming attack is carried out with the assistance of the… More >

  • Open Access

    ARTICLE

    An Optimal Algorithm for Secure Transactions in Bitcoin Based on Blockchain

    Jazem Mutared Alanazi, Ahmad Ali AlZubi*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3693-3712, 2023, DOI:10.32604/iasc.2023.030287 - 17 August 2022

    Abstract Technological advancement has made a significant contribution to the change of the economy and the advancement of humanity. Because it is changing how economic transactions are carried out, the blockchain is one of the technical developments that has a lot of promise for this progress. The public record of the Bitcoin blockchain provides dispersed users with evidence of transaction ownership by publishing all transaction data from block reward transactions to unspent transaction outputs. Attacks on the public ledger, on the other hand, are a result of the fact that all transaction information are exposed. De-anonymization… More >

  • Open Access

    ARTICLE

    A Graph Theory Based Self-Learning Honeypot to Detect Persistent Threats

    R. T. Pavendan1,*, K. Sankar1, K. A. Varun Kumar2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3331-3348, 2023, DOI:10.32604/iasc.2023.028029 - 17 August 2022

    Abstract Attacks on the cyber space is getting exponential in recent times. Illegal penetrations and breaches are real threats to the individuals and organizations. Conventional security systems are good enough to detect the known threats but when it comes to Advanced Persistent Threats (APTs) they fails. These APTs are targeted, more sophisticated and very persistent and incorporates lot of evasive techniques to bypass the existing defenses. Hence, there is a need for an effective defense system that can achieve a complete reliance of security. To address the above-mentioned issues, this paper proposes a novel honeypot system More >

  • Open Access

    ARTICLE

    Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation

    Yining Qi1,2,*, Yubo Luo3, Yongfeng Huang1,2, Xing Li1,2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 183-199, 2023, DOI:10.32604/csse.2023.031030 - 16 August 2022

    Abstract Progress in cloud computing makes group data sharing in outsourced storage a reality. People join in group and share data with each other, making team work more convenient. This new application scenario also faces data security threats, even more complex. When a user quit its group, remaining data block signatures must be re-signed to ensure security. Some researchers noticed this problem and proposed a few works to relieve computing overhead on user side. However, considering the privacy and security need of group auditing, there still lacks a comprehensive solution to implement secure group user revocation,… More >

  • Open Access

    ARTICLE

    Metaheuristic Secure Clustering Scheme for Energy Harvesting Wireless Sensor Networks

    S. Nithya Roopa1, P. Anandababu2,*, Sibi Amaran3, Rajesh Verma4

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 497-512, 2023, DOI:10.32604/csse.2023.029133 - 16 August 2022

    Abstract Recently, energy harvesting wireless sensor networks (EHWSN) have increased significant attention among research communities. By harvesting energy from the neighboring environment, the sensors in EHWSN resolve the energy constraint problem and offers lengthened network lifetime. Clustering is one of the proficient ways for accomplishing even improved lifetime in EHWSN. The clustering process intends to appropriately elect the cluster heads (CHs) and construct clusters. Though several models are available in the literature, it is still needed to accomplish energy efficiency and security in EHWSN. In this view, this study develops a novel Chaotic Rider Optimization Based… More >

  • Open Access

    ARTICLE

    A Multi-Stage Secure IoT Authentication Protocol

    Khalid Alhusayni1, Raniyah Wazirali1, Mousa AlAkhras1,2, Marwah Almasri1,*, Samah Alhazmi1

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 459-481, 2023, DOI:10.32604/csse.2023.028536 - 16 August 2022

    Abstract The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated… More >

  • Open Access

    ARTICLE

    Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency

    G. Uganya*, Radhika Baskar

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 641-658, 2023, DOI:10.32604/csse.2023.028341 - 16 August 2022

    Abstract Internet of Things (IoT) is an emerging technology that moves the world in the direction of smart things. But, IoT security is the complex problem due to its centralized architecture, and limited capacity. So, blockchain technology has great attention due to its features of decentralized architecture, transparency, immutable records and cryptography hash functions when combining with IoT. Cryptography hash algorithms are very important in blockchain technology for secure transmission. It converts the variable size inputs to a fixed size hash output which is unchangeable. Existing cryptography hash algorithms with digital signature have issues of single… More >

  • Open Access

    ARTICLE

    Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT

    M. Suresh Kumar1,*, T. Purosothaman2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 925-938, 2023, DOI:10.32604/csse.2023.027315 - 16 August 2022

    Abstract The expanding and ubiquitous availability of the Internet of Things (IoT) have changed everyone’s life easier and more convenient. Same time it also offers a number of issues, such as effectiveness, security, and excessive power consumption, which constitute a danger to intelligent IoT-based apps. Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member. A centralized trustworthy system, which is in charge of key distribution and upgrades, is used to maintain group keys. To provide longitudinal… More >

  • Open Access

    ARTICLE

    A Methodology to Reduce Thermal Gradients Due to the Exothermic Reactions in Resin Transfer Molding Applications

    Aouatif Saad1,*, Mohammed EL Ganaoui2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.1, pp. 95-103, 2023, DOI:10.32604/fdmp.2023.022014 - 02 August 2022

    Abstract Resin transfer molding (RTM) is among the most used manufacturing processes for composite parts. Initially, the resin cure is initiated by heat supply to the mold. The supplementary heat generated during the reaction can cause thermal gradients in the composite, potentially leading to undesired residual stresses which can cause shrinkage and warpage. In the present numerical study of these processes, a one-dimensional finite difference method is used to predict the temperature evolution and the degree of cure in the course of the resin polymerization; the effect of some parameters on the thermal gradient is then More >

Displaying 91-100 on page 10 of 279. Per Page