Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (261)
  • Open Access

    ARTICLE

    A Secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism

    Jian Shang1,2,*, Runmin Guan2, Wei Wang2

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2609-2626, 2023, DOI:10.32604/iasc.2023.037694

    Abstract The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years. In real-world scenarios, microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks. To meet the high hardware resource requirements, address the vulnerability to network attacks and poor reliability in the traditional centralized data storage schemes, this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph (DAG) consensus mechanism. Firstly, the microgrid data storage model is designed based on the edge computing technology. The blockchain, deployed on… More >

  • Open Access

    ARTICLE

    Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization

    Youngho Park1, Mi Hyeon Jeon2, Sang Uk Shin3,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1871-1890, 2023, DOI:10.32604/cmc.2023.039462

    Abstract These days, data is regarded as a valuable asset in the era of the data economy, which demands a trading platform for buying and selling data. However, online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other. Therefore, in this paper, a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption. The proposed system enables bilateral authorization, where data trading between a seller and a buyer is accomplished only if their policies, required by each other, are… More >

  • Open Access

    ARTICLE

    An Enhanced Intelligent Intrusion Detection System to Secure E-Commerce Communication Systems

    Adil Hussain1, Kashif Naseer Qureshi2,*, Khalid Javeed3, Musaed Alhussein4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2513-2528, 2023, DOI:10.32604/csse.2023.040305

    Abstract Information and communication technologies are spreading rapidly due to their fast proliferation in many fields. The number of Internet users has led to a spike in cyber-attack incidents. E-commerce applications, such as online banking, marketing, trading, and other online businesses, play an integral role in our lives. Network Intrusion Detection System (NIDS) is essential to protect the network from unauthorized access and against other cyber-attacks. The existing NIDS systems are based on the Backward Oracle Matching (BOM) algorithm, which minimizes the false alarm rate and causes of high packet drop ratio. This paper discussed the existing NIDS systems and different… More >

  • Open Access

    ARTICLE

    Toward Secure Software-Defined Networks Using Machine Learning: A Review, Research Challenges, and Future Directions

    Muhammad Waqas Nadeem1,*, Hock Guan Goh1, Yichiet Aun1, Vasaki Ponnusamy2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2201-2217, 2023, DOI:10.32604/csse.2023.039893

    Abstract Over the past few years, rapid advancements in the internet and communication technologies have led to increasingly intricate and diverse networking systems. As a result, greater intelligence is necessary to effectively manage, optimize, and maintain these systems. Due to their distributed nature, machine learning models are challenging to deploy in traditional networks. However, Software-Defined Networking (SDN) presents an opportunity to integrate intelligence into networks by offering a programmable architecture that separates data and control planes. SDN provides a centralized network view and allows for dynamic updates of flow rules and software-based traffic analysis. While the programmable nature of SDN makes… More >

  • Open Access

    ARTICLE

    Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

    Musheer Ahmad1, Reem Ibrahim Alkanhel2,*, Naglaa F. Soliman2, Abeer D. Algarni2, Fathi E. Abd El-Samie3, Walid El-Shafai3,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2361-2380, 2023, DOI:10.32604/csse.2023.038439

    Abstract Patient privacy and data protection have been crucial concerns in E-healthcare systems for many years. In modern-day applications, patient data usually holds clinical imagery, records, and other medical details. Lately, the Internet of Medical Things (IoMT), equipped with cloud computing, has come out to be a beneficial paradigm in the healthcare field. However, the openness of networks and systems leads to security threats and illegal access. Therefore, reliable, fast, and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network. This paper… More >

  • Open Access

    ARTICLE

    Effect of CSH Crystal Nucleus on Steam-Free Cured Fly Ash Precast Concrete Components

    Ruyi Luo, Yanyan Hu*, Tingshu He*, Xiaodong Ma, Yongdong Xu

    Journal of Renewable Materials, Vol.11, No.9, pp. 3485-3500, 2023, DOI:10.32604/jrm.2023.027592

    Abstract The measures of steam curing and early-strengthening agents to promote the precast components to reach the target strength quickly can bring different degrees of damage to the concrete. Based on this, the new nanomaterial CSH-the hydration product of cement effectively solves these measures’ disadvantages, such as excessive energy consumption, thermal stress damage, and the introduction of external ions. In this paper, the effect of CSH on the early strength of precast fly ash concrete components was investigated in terms of setting time, workability, and mechanical properties and analyzed at the microscopic level using hydration temperature, XRD, and SEM. The results… More >

  • Open Access

    ARTICLE

    SFSDA: Secure and Flexible Subset Data Aggregation with Fault Tolerance for Smart Grid

    Dong Chen1, Tanping Zhou1,2,3,*, Xu An Wang1,2, Zichao Song1, Yujie Ding1, Xiaoyuan Yang1,2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2477-2497, 2023, DOI:10.32604/iasc.2023.039238

    Abstract Smart grid (SG) brings convenience to users while facing great challenges in protecting personal private data. Data aggregation plays a key role in protecting personal privacy by aggregating all personal data into a single value, preventing the leakage of personal data while ensuring its availability. Recently, a flexible subset data aggregation (FSDA) scheme based on the Paillier homomorphic encryption was first proposed by Zhang et al. Their scheme can dynamically adjust the size of each subset and obtain the aggregated data in the corresponding subset. In this paper, firstly, an efficient attack with both theorems proving and experimentative verification is… More >

  • Open Access

    ARTICLE

    Quantum-Enhanced Blockchain: A Secure and Practical Blockchain Scheme

    Ang Liu1,2, Xiu-Bo Chen1,*, Gang Xu3, Zhuo Wang4, Xuefen Feng5, Huamin Feng6

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 259-277, 2023, DOI:10.32604/cmc.2023.039397

    Abstract The rapid advancement of quantum technology poses significant security risks to blockchain systems. However, quantum technology can also provide solutions for enhancing blockchain security. In this paper, we propose a quantum-enhanced blockchain scheme to achieve a high level of security against quantum computing attacks. We first discuss quantum computing attacks on classic blockchains, including attacks on hash functions, digital signatures, and consensus mechanisms. We then introduce quantum technologies, such as a quantum hash function (QHF), a quantum digital signature (QDS), and proof of authority (PoA) consensus mechanism, into our scheme to improve the security of the blockchain system. Our security… More >

  • Open Access

    ARTICLE

    Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles

    Halah Hasan Mahmoud1, Marwan Kadhim Mohammed Al-Shammari1, Gehad Abdullah Amran2,3,*, Elsayed Tag eldin4,*, Ala R. Alareqi5, Nivin A. Ghamry6, Ehaa ALnajjar7, Esmail Almosharea8

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 573-589, 2023, DOI:10.32604/cmc.2023.039363

    Abstract Utilizing artificial intelligence (AI) to protect smart coastal cities has become a novel vision for scientific and industrial institutions. One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles (UVs) for anti-submarine attacks. This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy. The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach, and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol… More >

  • Open Access

    ARTICLE

    A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments

    Zakariae Dlimi*, Abdellah Ezzati, Said Ben Alla

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 79-103, 2023, DOI:10.32604/csse.2023.037099

    Abstract The growing advent of the Internet of Things (IoT) users is driving the adoption of cloud computing technologies. The integration of IoT in the cloud enables storage and computational capabilities for IoT users. However, security has been one of the main concerns of cloud-integrated IoT. Existing work attempts to address the security concerns of cloud-integrated IoT through authentication, access control, and blockchain-based methods. However, existing frameworks are somewhat limited by scalability, privacy, and centralized structures. To mitigate the existing problems, we propose a blockchain-based distributed access control method for secure storage in the IoT cloud (BL-DAC). Initially, the BL-DAC performs… More >

Displaying 21-30 on page 3 of 261. Per Page