Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (279)
  • Open Access

    ARTICLE

    DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN

    A. Venkatesh1, S. Asha2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1375-1392, 2023, DOI:10.32604/csse.2023.030944 - 03 November 2022

    Abstract A Wireless Sensor Network (WSN) is constructed with numerous sensors over geographical regions. The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy. As sensor nodes are resource constrained in nature, novel techniques are essential to improve lifetime of nodes in WSN. Nodes energy is considered as an important resource for sensor node which are battery powered based. In WSN, energy is consumed mainly while data is being transferred among nodes in the network. Several research works are carried out focusing on preserving energy of nodes in… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430 - 31 October 2022

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature… More >

  • Open Access

    ARTICLE

    A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN

    Sugandhi Midha1, Sahil Verma1,*, Kavita1, Mohit Mittal2, Nz Jhanjhi3,4, Mehedi Masud5, Mohammed A. AlZain6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3711-3726, 2023, DOI:10.32604/cmc.2023.027992 - 31 October 2022

    Abstract Cloud-based SDN (Software Defined Network) integration offers new kinds of agility, flexibility, automation, and speed in the network. Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement. The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services. It has improved the real-time monitoring of patients by medical practitioners. Patients’ data get stored at the central server on the cloud from where it is available to medical practitioners in no time. The centralisation of data on the… More >

  • Open Access

    ARTICLE

    Finite Element Simulation of Radial Tire Building and Shaping Processes Using an Elasto-Viscoplastic Model

    Yinlong Wang1, Zhao Li2, Ziran Li1,*, Yang Wang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1187-1208, 2023, DOI:10.32604/cmes.2022.022596 - 27 October 2022

    Abstract The comprehensive tire building and shaping processes are investigated through the finite element method (FEM) in this article. The mechanical properties of the uncured rubber from different tire components are investigated through cyclic loading-unloading experiments under different strain rates. Based on the experiments, an elasto-viscoplastic constitutive model is adopted to describe the mechanical behaviors of the uncured rubber. The distinct mechanical properties, including the stress level, hysteresis and residual strain, of the uncured rubber can all be well characterized. The whole tire building process (including component winding, rubber bladder inflation, component stitching and carcass band… More >

  • Open Access

    ARTICLE

    PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks

    Xuanang Li1, Shuangshuang Liu1, Saru Kumari2, Chien-Ming Chen1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 711-732, 2023, DOI:10.32604/cmes.2022.022667 - 29 September 2022

    Abstract Nowadays, the widespread application of 5G has promoted rapid development in different areas, particularly in the Internet of Things (IoT), where 5G provides the advantages of higher data transfer rate, lower latency, and widespread connections. Wireless sensor networks (WSNs), which comprise various sensors, are crucial components of IoT. The main functions of WSN include providing users with real-time monitoring information, deploying regional information collection, and synchronizing with the Internet. Security in WSNs is becoming increasingly essential because of the across-the-board nature of wireless technology in many fields. Recently, Yu et al. proposed a user authentication protocol for WSN. More >

  • Open Access

    ARTICLE

    Region Centric GL Feature Approximation Based Secure Routing for Improved QoS in MANET

    S. Soundararajan1, R. Prabha2, M. Baskar3,*, T. J. Nagalakshmi4

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 267-280, 2023, DOI:10.32604/iasc.2023.032239 - 29 September 2022

    Abstract Secure routing in Mobile Adhoc Network (Manet) is the key issue now a day in providing secure access to different network services. As mobile devices are used in accessing different services, performing secure routing becomes a challenging task. Towards this, different approaches exist which find the trusted route based on their previous transmission details and behavior of different nodes. Also, the methods focused on trust measurement based on tiny information obtained from local nodes or with global information which are incomplete. However, the adversary nodes are more capable and participate in each transmission not just… More >

  • Open Access

    ARTICLE

    Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem

    Lamiaa A. Abou Elazm1,2, Walid El-Shafai3,4, Sameh Ibrahim2, Mohamed G. Egila1, H. Shawkey1, Mohamed K. H. Elsaid2, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie3

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 929-955, 2023, DOI:10.32604/iasc.2023.031386 - 29 September 2022

    Abstract Biometric security is a growing trend, as it supports the authentication of persons using confidential biometric data. Most of the transmitted data in multimedia systems are susceptible to attacks, which affect the security of these systems. Biometric systems provide sufficient protection and privacy for users. The recently-introduced cancellable biometric recognition systems have not been investigated in the presence of different types of attacks. In addition, they have not been studied on different and large biometric datasets. Another point that deserves consideration is the hardware implementation of cancellable biometric recognition systems. This paper presents a suggested… More >

  • Open Access

    ARTICLE

    Blockchain Driven Metaheuristic Route Planning in Secure Wireless Sensor Networks

    M. V. Rajesh1, T. Archana Acharya2, Hafis Hajiyev3, E. Laxmi Lydia4, Haya Mesfer Alshahrani5, Mohamed K Nour6, Abdullah Mohamed7, Mesfer Al Duhayyim8,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 933-949, 2023, DOI:10.32604/cmc.2023.032549 - 22 September 2022

    Abstract Recently, Internet of Things (IoT) has been developed into a field of research and it purposes at linking many sensors enabling devices mostly to data collection and track applications. Wireless sensor network (WSN) is a vital element of IoT paradigm since its inception and has developed into one of the chosen platforms for deploying many smart city application regions such as disaster management, intelligent transportation, home automation, smart buildings, and other such IoT-based application. The routing approaches were extremely-utilized energy efficient approaches with an initial drive that is, for balancing the energy amongst sensor nodes.… More >

  • Open Access

    ARTICLE

    Secure and Optimal LOADng Routing for IoT with Composite Routing Metric

    Divya Sharma1,*, Sanjay Jain2, Vivek Maik3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 655-669, 2023, DOI:10.32604/cmc.2023.032207 - 22 September 2022

    Abstract Security is the one of the major challenges for routing the data between the source and destination in an Internet of Things (IoT) network. To overcome this challenge, a secure Lightweight On-demand Ad hoc Distance-vector—Next Generation (LOADng) Routing Protocol is proposed in this paper. As the LOADng protocol is the second version of Ad Hoc On-Demand Distance Vector (AODV) protocol, it retains most of the basic functionality and characteristics of AODV. During the route discovery process, the cyclic shift transposition algorithm (CSTA) is used to encrypt the control packets of the LOADng protocol to improve its security. More >

  • Open Access

    ARTICLE

    Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security

    V. Sridhar1, K.V. Ranga Rao2, Saddam Hussain3,*, Syed Sajid Ullah4, Roobaea Alroobaea5, Maha Abdelhaq6, Raed Alsaqour7

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1693-1708, 2023, DOI:10.32604/cmc.2023.028129 - 22 September 2022

    Abstract Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Multivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access (MRRWPBA-NOMA) technique is introduced for network communication. In the downlink transmission, each mobile device's resources and their characteristics like energy, bandwidth, and trust are measured. Followed by, the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data More >

Displaying 81-90 on page 9 of 279. Per Page