Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (346)
  • Open Access

    ARTICLE

    Aggregated PSO for Secure Data Transmission in WSN Using Fog Server

    M. Manicka Raja1,*, S. Manoj Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1017-1032, 2022, DOI:10.32604/iasc.2022.025665 - 03 May 2022

    Abstract Privacy of data in Internet of Things (IoT) over fog networks is the biggest challenge in security of Wireless communication networks. In Wireless Sensor Network (WSN), current research on fog computing with IoT is gaining popularity among IoT devices over network. Moreover, the data aggregation will reduce the energy consumption in WSN. Due to the open and hostile nature of WSN, secure data aggregation is the major issue. The existing data aggregation methods in IoT and its associated approaches are lack of limited aggregation functions, heavyweight, issues related to the performance overhead. Besides, the overload… More >

  • Open Access

    ARTICLE

    Secured Medical Data Transfer Using Reverse Data Hiding System Through Steganography

    S. Aiswarya*, R. Gomathi

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 969-982, 2022, DOI:10.32604/iasc.2022.025475 - 03 May 2022

    Abstract Reversible Data Hiding (RDH) is the process of transferring secret data hidden inside cover media to the recipient so the recipient can securely retrieve both the secret data and cover media. The RDH approach is applied in this study in the field of telemedicine, and medical-secret data is conveyed privately via medical cover video. Morse code-based data encryption technique tends to encrypt the medical-secret data by compression using the Arithmetic coding technique. Discrete Shearlet transform (DST) compresses the selected frame from the medical cover video and the compressed secret data is embedded into the compressed… More >

  • Open Access

    ARTICLE

    Deep Reinforcement Extreme Learning Machines for Secured Routing in Internet of Things (IoT) Applications

    K. Lavanya1,*, K. Vimala Devi2, B. R. Tapas Bapu3

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 837-848, 2022, DOI:10.32604/iasc.2022.023055 - 03 May 2022

    Abstract Multipath TCP (SMPTCP) has gained more attention as a valuable approach for IoT systems. SMPTCP is introduced as an evolution of Transmission Control Protocol (TCP) to pass packets simultaneously across several routes to completely exploit virtual networks on multi-homed consoles and other network services. The current multipath networking algorithms and simulation software strategies are confronted with sub-flow irregularity issues due to network heterogeneity, and routing configuration issues can be fixed adequately. To overcome the issues, this paper proposes a novel deep reinforcement-based extreme learning machines (DRLELM) approach to examine the complexities between routes, pathways, sub-flows, More >

  • Open Access

    ARTICLE

    A Blockchain-Based Framework for Secure Storage and Sharing of Resumes

    Huanrong Tang1, Changlin Hu1, Tianming Liu2, Jianquan Ouyang1,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5395-5413, 2022, DOI:10.32604/cmc.2022.028284 - 21 April 2022

    Abstract In response to problems in the centralized storage of personal resumes on third-party recruitment platforms, such as inadequate privacy protection, inability of individuals to accurately authorize downloads, and inability to determine who downloaded the resume and when, this study proposes a blockchain-based framework for secure storage and sharing of resumes. Users can employ an authorized access mechanism to protect their privacy rights. The proposed framework uses smart contracts, interplanetary file system, symmetric encryption, and digital signatures to protect, verify, and share resumes. Encryption keys are split and stored in multiple depositories through secret-sharing technology to… More >

  • Open Access

    ARTICLE

    Secure Irrigation System for Olive Orchards Using Internet of Things

    Ayman Massaoudi*, Abdelwahed Berguiga, Ahlem Harchay

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4663-4673, 2022, DOI:10.32604/cmc.2022.026972 - 21 April 2022

    Abstract Smart irrigation system, also referred as precision irrigation system, is an attractive solution to save the limited water resources as well as to improve crop productivity and quality. In this work, by using Internet of things (IoT), we aim to design a smart irrigation system for olive groves. In such IoT system, a huge number of low-power and low-complexity devices (sensors, actuators) are interconnected. Thus, a great challenge is to satisfy the increasing demands in terms of spectral efficiency. Moreover, securing the IoT system is also a critical challenge, since several types of cybersecurity threats More >

  • Open Access

    ARTICLE

    Energy Aware Secure Cyber-Physical Systems with Clustered Wireless Sensor Networks

    Masoud Alajmi1, Mohamed K. Nour2, Siwar Ben Haj Hassine3, Mimouna Abdullah Alkhonaini4, Manar Ahmed Hamza5,*, Ishfaq Yaseen5, Abu Sarwar Zamani5, Mohammed Rizwanullah5

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5499-5513, 2022, DOI:10.32604/cmc.2022.026187 - 21 April 2022

    Abstract Recently, cyber physical system (CPS) has gained significant attention which mainly depends upon an effective collaboration with computation and physical components. The greatly interrelated and united characteristics of CPS resulting in the development of cyber physical energy systems (CPES). At the same time, the rising ubiquity of wireless sensor networks (WSN) in several application areas makes it a vital part of the design of CPES. Since security and energy efficiency are the major challenging issues in CPES, this study offers an energy aware secure cyber physical systems with clustered wireless sensor networks using metaheuristic algorithms… More >

  • Open Access

    ARTICLE

    Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments

    Saraswathi Shunmuganathan1,*, Sridharan Kannan2, T. V. Madhusudhana Rao3, K. Ambika4, T. Jayasankar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 785-801, 2022, DOI:10.32604/csse.2022.022424 - 20 April 2022

    Abstract The Cloud Computing Environment (CCE) developed for using the dynamic cloud is the ability of software and services likely to grow with any business. It has transformed the methodology for storing the enterprise data, accessing the data, and Data Sharing (DS). Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data. With the requirement of vast volumes of storage area in the CCEs, capturing a secured data access framework is an important issue. This paper proposes an Improved… More >

  • Open Access

    ARTICLE

    Secure Multi-Party Quantum Summation Based on Quantum Homomorphic Encryption

    Gang Xu1,2, Fan Yun1, Xiu-Bo Chen3,*, Shiyuan Xu1, Jingzhong Wang1, Tao Shang4, Yan Chang5, Mianxiong Dong6

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 531-541, 2022, DOI:10.32604/iasc.2022.028264 - 15 April 2022

    Abstract Secure multi-party computation has been playing a fundamental role in terms of classical cryptography. Quantum homomorphic encryption (QHE) could compute the encrypted data without decryption. At present, most protocols use a semi-honest third party (TP) to protect participants’ secrets. We use a quantum homomorphic encryption scheme instead of TP to protect the privacy of parties. Based on quantum homomorphic encryption, a secure multi-party quantum summation scheme is proposed in which N participants can delegate a server with strong quantum computing power to assist computation. By delegating the computation and key update processes to a server and… More >

  • Open Access

    ARTICLE

    A Secure E-commerce Environment Using Multi-agent System

    Farah Tawfiq Abdul Hussien*, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 499-514, 2022, DOI:10.32604/iasc.2022.025091 - 15 April 2022

    Abstract Providing security for the customers in the e-commerce system is an essential issue. Providing security for each single online customer at the same time is considered a time consuming process. For a huge websites such task may cause several problems including response delay, losing the customer orders and system deadlock or crash, in which reduce system performance. This paper aims to provide a new prototype structure of multi agent system that solve the problem of providing security and avoid the problems that may reduce system performance. This is done by creating a software agent which More >

  • Open Access

    ARTICLE

    Resistance to Malicious Packet Droppers Through Enhanced AODV in a MANET

    Shirina Samreen*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4087-4106, 2022, DOI:10.32604/cmc.2022.026141 - 29 March 2022

    Abstract Packet dropping in a mobile ad hoc network can manifest itself as the data plane attacks as well as control plane attacks. The former deal with malicious nodes performing packet drop on the data packets following the route formation and the latter deal with those malicious nodes which either drop or manipulate the control packets to degrade the network performance. The idea of the proposed approach is that during the route establishment, each of the on-path nodes is provided with pre-computed hash values which have to be used to provide a unique acknowledgement value to… More >

Displaying 201-210 on page 21 of 346. Per Page