Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (404)
  • Open Access

    ARTICLE

    Cost Optimized Switching of Routing Protocol Scheme for IoT Applications

    Karunanithi Praveen kumar, Perumal Sivanesan*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 67-82, 2022, DOI:10.32604/csse.2022.018867

    Abstract In this work, we propose a context-aware switching of routing protocol scheme for specific application requirements of IoT in real-time using a software-defined networking controller in wireless sensor networks. The work planned has two stages i) Selection of suitable routing protocol (RP) for given IoT applications using higher cognitive process and ii) Deployment of the corresponding routing protocol. We use the supervised learning-regression method for classification of the routing protocol while considering the network parameters like stability, path delay, energy utilization, and throughput. The chosen routing protocol will be set in the sensor network using a software-defined networking controller in… More >

  • Open Access

    ARTICLE

    Energy and Bandwidth Based Link Stability Routing Algorithm for IoT

    D. Kothandaraman1, A. Balasundaram2,*, R. Dhanalakshmi3, Arun Kumar Sivaraman4, S. Ashokkumar5, Rajiv Vincent4, M. Rajesh4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3875-3890, 2022, DOI:10.32604/cmc.2022.020744

    Abstract Internet of Things (IoT) is becoming popular nowadays for collecting and sharing the data from the nodes and among the nodes using internet links. Particularly, some of the nodes in IoT are mobile and dynamic in nature. Hence maintaining the link among the nodes, efficient bandwidth of the links among the mobile nodes with increased life time is a big challenge in IoT as it integrates mobile nodes with static nodes for data processing. In such networks, many routing-problems arise due to difficulties in energy and bandwidth based quality of service. Due to the mobility and finite nature of the… More >

  • Open Access

    ARTICLE

    An IoT Based Secure Patient Health Monitoring System

    Kusum Yadav1, Ali Alharbi1, Anurag Jain2,*, Rabie A. Ramadan1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3637-3652, 2022, DOI:10.32604/cmc.2022.020614

    Abstract Internet of things (IoT) field has emerged due to the rapid growth of artificial intelligence and communication technologies. The use of IoT technology in modern healthcare environments is convenient for doctors and patients as it can be used in real-time monitoring of patients, proper administration of patient information, and healthcare management. However, the usage of IoT in the healthcare domain will become a nightmare if patient information is not securely maintained while transferring over an insecure network or storing at the administrator end. In this manuscript, the authors have developed a secure IoT healthcare monitoring system using the Blockchain-based XOR… More >

  • Open Access

    ARTICLE

    Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

    Vasaki Ponnusamy1,*, Mamoona Humayun2, N. Z. Jhanjhi3, Aun Yichiet1, Maram Fahhad Almufareh2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1199-1215, 2022, DOI:10.32604/csse.2022.018518

    Abstract Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection. Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks. This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods, IDS techniques, IDS placement strategies, and traffic data analysis techniques. This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions. Specifically, the Knowledge… More >

  • Open Access

    ARTICLE

    A CPK-Based Identity Authentication Scheme for IoT

    Mingming Zhang1, Jiaming Mao1,*, Yuanyuan Ma2, Liangjie Xu3, Chuanjun Wang1, Ran Zhao1, Zhihao Li3, Lu Chen4, Wenbing Zhao5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1217-1231, 2022, DOI:10.32604/csse.2022.017657

    Abstract As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of Things. In this paper, we… More >

  • Open Access

    ARTICLE

    Using Mobile Technology to Construct a Network Medical Health Care System

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 729-748, 2022, DOI:10.32604/iasc.2022.020332

    Abstract In this study, a multisensory physiological measurement system was built with wireless transmission technology, using a DSPIC30F4011 as the master control center and equipped with physiological signal acquisition modules such as an electrocardiogram module, blood pressure module, blood oxygen concentration module, and respiratory rate module. The physiological data were transmitted wirelessly to Android-based mobile applications via the TCP/IP or Bluetooth serial ports of Wi-Fi. The Android applications displayed the acquired physiological signals in real time and performed a preliminary abnormity diagnosis based on the measured physiological data and built-in index diagnostic data provided by doctors, such as blood oxygen concentration,… More >

  • Open Access

    REVIEW

    A Review on Privacy Preservation of Location-Based Services in Internet of Things

    Raniyah Wazirali*

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 767-779, 2022, DOI:10.32604/iasc.2022.019243

    Abstract Internet of Things (IoT) has become popular with the rapid development of sensing devices, and it offers a large number of services. Location data is one of the most important information required for IoT systems. With the widespread of Location Based Services (LBS) applications, the privacy and security threats are also emerging. Recently, a large number of studies focused on localization and positioning functionalities, however, the risk associated with user privacy has not been sufficiently addressed so far. Therefore, privacy and security of device location in IoT systems is an active area of research. Since LBS is often exposed to… More >

  • Open Access

    ARTICLE

    Data Traffic Reduction with Compressed Sensing in an AIoT System

    Hye-Min Kwon1, Seng-Phil Hong2, Mingoo Kang1, Jeongwook Seo1,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1769-1780, 2022, DOI:10.32604/cmc.2022.020027

    Abstract To provide Artificial Intelligence (AI) services such as object detection, Internet of Things (IoT) sensor devices should be able to send a large amount of data such as images and videos. However, this inevitably causes IoT networks to be severely overloaded. In this paper, therefore, we propose a novel oneM2M-compliant Artificial Intelligence of Things (AIoT) system for reducing overall data traffic and offering object detection. It consists of some IoT sensor devices with random sampling functions controlled by a compressed sensing (CS) rate, an IoT edge gateway with CS recovery and domain transform functions related to compressed sensing, and a… More >

  • Open Access

    ARTICLE

    A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things (IoTs)

    Kanwal Imran1,*, Nasreen Anjum2, Abdullah Alghamdi3, Asadullah Shaikh3, Mohammed Hamdi3, Saeed Mahfooz1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1033-1052, 2022, DOI:10.32604/cmc.2022.018589

    Abstract IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in the Internet of Things (IoTs). 6LoWPAN allows nodes with limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard, thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network. The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES (Advanced Encryption Standard), but the 6LoWPAN standard lacks and has omitted the security and privacy requirements at higher layers. The sensor nodes in… More >

  • Open Access

    ARTICLE

    Measuring End-to-End Delay in Low Energy SDN IoT Platform

    Mykola Beshley1, Natalia Kryvinska2,*, Halyna Beshley1, Orest Kochan1, Leonard Barolli3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 19-41, 2022, DOI:10.32604/cmc.2022.018579

    Abstract In this paper, we developed a new customizable low energy Software Defined Networking (SDN) based Internet of Things (IoT) platform that can be reconfigured according to the requirements of the target IoT applications. Technically, the platform consists of a set of low cost and energy efficient single-board computers, which are interconnected within a network with the software defined configuration. The proposed SDN switch is deployed on Raspberry Pi 3 board using Open vSwitch (OvS) software, while the Floodlight controller is deployed on the Orange Pi Prime board. We firstly presented and implemented the method for measuring a delay introduced by… More >

Displaying 291-300 on page 30 of 404. Per Page