Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (398)
  • Open Access

    ARTICLE

    Design, Implementation and Verification of Topology Network Architecture of Smart Home Tree

    Youbang Guan1,2, Bong Jun Choi3,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2399-2411, 2021, DOI:10.32604/cmc.2021.012365

    Abstract Smart home technology provides consumers with network connectivity, automation or enhanced services for home devices. With the Internet of Things era, a vast data flow makes business platforms have to own the same computing power to match their business services. It achieves computing power through implementing big data algorithms deployed in the cloud data center. However, because of the far long geographical distance between the client and the data center or the massive data capacity gap, potentially high latency and high packet loss will reduce the usability of smart home systems if service providers deploy all services in the cloud… More >

  • Open Access

    ARTICLE

    Internet of Things: Protection of Medical Data through Decentralized Ledgers

    Abdalla Alameen*

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 593-602, 2021, DOI:10.32604/iasc.2021.016950

    Abstract It is forecasted that billions of Internet of Things (IoT) and sensor devices will be installed worldwide by 2020. These devices can provide infrastructure-based services for various applications such as in smart hospitals, smart industry, smart grids, and smart industrial towns. Among them, the hospital service system needs to authenticate devices, and medical data are recorded for diagnostic purposes. In general, digital signatures are employed, but the computational power and their huge numbers pose many challenges to the digital signature system. To solve such problems, we developed a ledger system for authenticating IoT medical devices. It is a centralized ledger… More >

  • Open Access

    ARTICLE

    An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks

    Muhammad Adil1, Jehad Ali2, Muhammad Sajjad Khan3, Junsu Kim3, Ryan Alturki4, Mohammad Zakarya4, Mukhtaj Khan4, Rahim Khan4, Su Min Kim3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 447-470, 2021, DOI:10.32604/cmc.2021.014967

    Abstract Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and round-trip time (RTT) information to… More >

  • Open Access

    ARTICLE

    Blockchain-as-a-Utility for Next-Generation Healthcare Internet of Things

    Alaa Omran Almagrabi1, Rashid Ali2, Daniyal Alghazzawi1, Abdullah AlBarakati1, Tahir Khurshaid3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 359-376, 2021, DOI:10.32604/cmc.2021.014753

    Abstract The scope of the Internet of Things (IoT) applications varies from strategic applications, such as smart grids, smart transportation, smart security, and smart healthcare, to industrial applications such as smart manufacturing, smart logistics, smart banking, and smart insurance. In the advancement of the IoT, connected devices become smart and intelligent with the help of sensors and actuators. However, issues and challenges need to be addressed regarding the data reliability and protection for significant next-generation IoT applications like smart healthcare. For these next-generation applications, there is a requirement for far-reaching privacy and security in the IoT. Recently, blockchain systems have emerged… More >

  • Open Access

    REVIEW

    Review of Internet of Things in Different Sectors: Recent Advances, Technologies, and Challenges

    Samreen Mahmood*

    Journal on Internet of Things, Vol.3, No.1, pp. 19-26, 2021, DOI:10.32604/jiot.2021.013071

    Abstract Human beings and their activities are now connected through Internet of Things (IoT) with the evolution of wireless communication technologies. IoT is becoming popular and its usage is immensely increasing among various sectors. In this research paper, a comprehensive review has been conducted by considering recent and important literature review on IoT applications being operated in three major sectors. The three sectors studied are health, sports and transportation and logistics. Paper explored that with the help of IoT techniques, different miniature sized devices are invented which can record various parameters of human body, wearables devices have been invented which are… More >

  • Open Access

    ARTICLE

    Cyber Security and Privacy Issues in Industrial Internet of Things

    NZ Jhanjhi1, Mamoona Humayun2,*, Saleh N. Almuayqil2

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 361-380, 2021, DOI:10.32604/csse.2021.015206

    Abstract The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades. Consequently, there has been a huge paradigm shift in the manufacturing and production sectors. However, this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting (various pillars of) industry 4.0. However, before providing a concrete solution certain aspect need to be researched, for instance, cybersecurity threats and privacy issues in the industry. To fill this gap, this paper discusses potential solutions to cybersecurity targeting this industry and highlights the consequences of possible attacks… More >

  • Open Access

    ARTICLE

    A Reliable and Scalable Internet of Military Things Architecture

    Omar Said1,3, Amr Tolba2,3,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3887-3906, 2021, DOI:10.32604/cmc.2021.016076

    Abstract Recently, Internet of Things (IoT) technology has provided logistics services to many disciplines such as agriculture, industry, and medicine. Thus, it has become one of the most important scientific research fields. Applying IoT to military domain has many challenges such as fault tolerance and QoS. In this paper, IoT technology is applied on the military field to create an Internet of Military Things (IoMT) system. Here, the architecture of the aforementioned IoMT system is proposed. This architecture consists of four main layers: Communication, information, application, and decision support. These layers provided a fault tolerant coverage communication system for IoMT things.… More >

  • Open Access

    ARTICLE

    Social Distancing and Isolation Management Using Machine-to-Machine Technologies to Prevent Pandemics

    Muhammad Saad1, Maaz Bin Ahmad1, Muhammad Asif2,*, Khalid Masood2, Mohammad A. Al Ghamdi3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3545-3562, 2021, DOI:10.32604/cmc.2021.015720

    Abstract Social distancing and self-isolation management are crucial preventive measures that can save millions of lives during challenging pandemics of diseases such as the Spanish flu, swine flu, and coronavirus disease 2019 (COVID-19). This study describes the comprehensive and effective implementation of the Industrial Internet of Things and machine-to-machine technologies for social distancing and smart self-isolation management. These technologies can help prevent outbreaks of any disease that can disperse widely and develop into a pandemic. Initially, a smart wristband is proposed that incorporates Bluetooth beacon technology to facilitate the tracing and tracking of Bluetooth Low Energy beacon packets for smart contact… More >

  • Open Access

    ARTICLE

    LBC-IoT: Lightweight Block Cipher for IoT Constraint Devices

    Rabie A. Ramadan1,2,*, Bassam W. Aboshosha3, Kusum Yadav1, Ibrahim M. Alseadoon1, Munawar J. Kashout1, Mohamed Elhoseny4,5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3563-3579, 2021, DOI:10.32604/cmc.2021.015519

    Abstract With the new era of the Internet of Things (IoT) technology, many devices with limited resources are utilized. Those devices are susceptible to a significant number of new malware and other risks emerging rapidly. One of the most appropriate methods for securing those IoT applications is cryptographic algorithms, as cryptography masks information by eliminating the risk of collecting any meaningful information patterns. This ensures that all data communications are private, accurate, authenticated, authorized, or non-repudiated. Since conventional cryptographic algorithms have been developed specifically for devices with limited resources; however, it turns out that such algorithms are not ideal for IoT… More >

  • Open Access

    ARTICLE

    Intelligent Real-Time IoT Traffic Steering in 5G Edge Networks

    Sa Math1, Prohim Tam1, Seokhoon Kim2,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3433-3450, 2021, DOI:10.32604/cmc.2021.015490

    Abstract In the Next Generation Radio Networks (NGRN), there will be extreme massive connectivity with the Heterogeneous Internet of Things (HetIoT) devices. The millimeter-Wave (mmWave) communications will become a potential core technology to increase the capacity of Radio Networks (RN) and enable Multiple-Input and Multiple-Output (MIMO) of Radio Remote Head (RRH) technology. However, the challenging key issues in unfair radio resource handling remain unsolved when massive requests are occurring concurrently. The imbalance of resource utilization is one of the main issues occurs when there is overloaded connectivity to the closest RRH receiving exceeding requests. To handle this issue effectively, Machine Learning… More >

Displaying 331-340 on page 34 of 398. Per Page