Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (509)
  • Open Access

    ARTICLE

    A Novel Malware Detection Framework for Internet of Things Applications

    Muhammad Adil1,*, Mona M. Jamjoom2, Zahid Ullah3

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4363-4380, 2025, DOI:10.32604/cmc.2025.066551 - 30 July 2025

    Abstract In today’s digital world, the Internet of Things (IoT) plays an important role in both local and global economies due to its widespread adoption in different applications. This technology has the potential to offer several advantages over conventional technologies in the near future. However, the potential growth of this technology also attracts attention from hackers, which introduces new challenges for the research community that range from hardware and software security to user privacy and authentication. Therefore, we focus on a particular security concern that is associated with malware detection. The literature presents many countermeasures, but… More >

  • Open Access

    ARTICLE

    An Efficient Clustering Algorithm for Enhancing the Lifetime and Energy Efficiency of Wireless Sensor Networks

    Peng Zhou1,2, Wei Chen1, Bingyu Cao1,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5337-5360, 2025, DOI:10.32604/cmc.2025.065561 - 30 July 2025

    Abstract Wireless Sensor Networks (WSNs), as a crucial component of the Internet of Things (IoT), are widely used in environmental monitoring, industrial control, and security surveillance. However, WSNs still face challenges such as inaccurate node clustering, low energy efficiency, and shortened network lifespan in practical deployments, which significantly limit their large-scale application. To address these issues, this paper proposes an Adaptive Chaotic Ant Colony Optimization algorithm (AC-ACO), aiming to optimize the energy utilization and system lifespan of WSNs. AC-ACO combines the path-planning capability of Ant Colony Optimization (ACO) with the dynamic characteristics of chaotic mapping and… More >

  • Open Access

    ARTICLE

    NADSA: A Novel Approach for Detection of Sinkhole Attacks Based on RPL Protocol in 6LowPAN Network

    Atena Shiranzaei1,*, Emad Alizadeh2, Mahdi Rabbani3, Sajjad Bagheri Baba Ahmadi4,*, Mohsen Tajgardan5

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5381-5402, 2025, DOI:10.32604/cmc.2025.064414 - 30 July 2025

    Abstract The sinkhole attack is one of the most damaging threats in the Internet of Things (IoT). It deceptively attracts neighboring nodes and initiates malicious activity, often disrupting the network when combined with other attacks. This study proposes a novel approach, named NADSA, to detect and isolate sinkhole attacks. NADSA is based on the RPL protocol and consists of two detection phases. In the first phase, the minimum possible hop count between the sender and receiver is calculated and compared with the sender’s reported hop count. The second phase utilizes the number of DIO messages to More >

  • Open Access

    ARTICLE

    C-BIVM: A Cognitive-Based Integrity Verification Model for IoT-Driven Smart Cities

    Radhika Kumari1, Kiranbir Kaur1, Ahmad Almogren2, Ayman Altameem3, Salil Bharany4,*, Yazeed Yasin Ghadi5, Ateeq Ur Rehman6,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5509-5525, 2025, DOI:10.32604/cmc.2025.064247 - 30 July 2025

    Abstract The exponential growth of the Internet of Things (IoT) has revolutionized various domains such as healthcare, smart cities, and agriculture, generating vast volumes of data that require secure processing and storage in cloud environments. However, reliance on cloud infrastructure raises critical security challenges, particularly regarding data integrity. While existing cryptographic methods provide robust integrity verification, they impose significant computational and energy overheads on resource-constrained IoT devices, limiting their applicability in large-scale, real-time scenarios. To address these challenges, we propose the Cognitive-Based Integrity Verification Model (C-BIVM), which leverages Belief-Desire-Intention (BDI) cognitive intelligence and algebraic signatures to… More >

  • Open Access

    ARTICLE

    Comprehensive Black-Box Fuzzing of Electric Vehicle Charging Firmware via a Vehicle to Grid Network Protocol Based on State Machine Path

    Yu-Bin Kim, Dong-Hyuk Shin, Ieck-Chae Euom*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2217-2243, 2025, DOI:10.32604/cmc.2025.063289 - 03 July 2025

    Abstract The global surge in electric vehicle (EV) adoption is proportionally expanding the EV charging station (EVCS) infrastructure, thereby increasing the attack surface and potential impact of security breaches within this critical ecosystem. While ISO 15118 standardizes EV-EVCS communication, its underspecified security guidelines and the variability in manufacturers’ implementations frequently result in vulnerabilities that can disrupt charging services, compromise user data, or affect power grid stability. This research introduces a systematic black-box fuzzing methodology, accompanied by an open-source tool, to proactively identify and mitigate such security flaws in EVCS firmware operating under ISO 15118. The proposed… More >

  • Open Access

    ARTICLE

    A Novel Clustered Distributed Federated Learning Architecture for Tactile Internet of Things Applications in 6G Environment

    Omar Alnajar*, Ahmed Barnawi

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3861-3897, 2025, DOI:10.32604/cmes.2025.065833 - 30 June 2025

    Abstract The Tactile Internet of Things (TIoT) promises transformative applications—ranging from remote surgery to industrial robotics—by incorporating haptic feedback into traditional IoT systems. Yet TIoT’s stringent requirements for ultra-low latency, high reliability, and robust privacy present significant challenges. Conventional centralized Federated Learning (FL) architectures struggle with latency and privacy constraints, while fully distributed FL (DFL) faces scalability and non-IID data issues as client populations expand and datasets become increasingly heterogeneous. To address these limitations, we propose a Clustered Distributed Federated Learning (CDFL) architecture tailored for a 6G-enabled TIoT environment. Clients are grouped into clusters based on… More >

  • Open Access

    ARTICLE

    A Hybrid Wasserstein GAN and Autoencoder Model for Robust Intrusion Detection in IoT

    Mohammed S. Alshehri1,*, Oumaima Saidani2, Wajdan Al Malwi3, Fatima Asiri3, Shahid Latif 4, Aizaz Ahmad Khattak5, Jawad Ahmad6

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3899-3920, 2025, DOI:10.32604/cmes.2025.064874 - 30 June 2025

    Abstract The emergence of Generative Adversarial Network (GAN) techniques has garnered significant attention from the research community for the development of Intrusion Detection Systems (IDS). However, conventional GAN-based IDS models face several challenges, including training instability, high computational costs, and system failures. To address these limitations, we propose a Hybrid Wasserstein GAN and Autoencoder Model (WGAN-AE) for intrusion detection. The proposed framework leverages the stability of WGAN and the feature extraction capabilities of the Autoencoder Model. The model was trained and evaluated using two recent benchmark datasets, 5GNIDD and IDSIoT2024. When trained on the 5GNIDD dataset,… More >

  • Open Access

    ARTICLE

    Optimization of Machine Learning Methods for Intrusion Detection in IoT

    Alireza Bahmani*

    Journal on Internet of Things, Vol.7, pp. 1-17, 2025, DOI:10.32604/jiot.2025.060786 - 24 June 2025

    Abstract With the development of the Internet of Things (IoT) technology and its widespread integration in various aspects of life, the risks associated with cyberattacks on these systems have increased significantly. Vulnerabilities in IoT devices, stemming from insecure designs and software weaknesses, have made attacks on them more complex and dangerous compared to traditional networks. Conventional intrusion detection systems are not fully capable of identifying and managing these risks in the IoT environment, making research and evaluation of suitable intrusion detection systems for IoT crucial. In this study, deep learning, multi-layer perceptron (MLP), Random Forest (RF),… More >

  • Open Access

    ARTICLE

    AI-Driven Sentiment-Enhanced Secure IoT Communication Model Using Resilience Behavior Analysis

    Menwa Alshammeri1, Mamoona Humayun2,*, Khalid Haseeb3, Ghadah Naif Alwakid1

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 433-446, 2025, DOI:10.32604/cmc.2025.065660 - 09 June 2025

    Abstract Wireless technologies and the Internet of Things (IoT) are being extensively utilized for advanced development in traditional communication systems. This evolution lowers the cost of the extensive use of sensors, changing the way devices interact and communicate in dynamic and uncertain situations. Such a constantly evolving environment presents enormous challenges to preserving a secure and lightweight IoT system. Therefore, it leads to the design of effective and trusted routing to support sustainable smart cities. This research study proposed a Genetic Algorithm sentiment-enhanced secured optimization model, which combines big data analytics and analysis rules to evaluate… More >

  • Open Access

    ARTICLE

    FSMMTD: A Feature Subset-Based Malicious Traffic Detection Method

    Xuan Wu1, Yafei Song1, Xiaodan Wang1,*, Peng Wang1, Qian Xiang2

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1279-1305, 2025, DOI:10.32604/cmc.2025.064471 - 09 June 2025

    Abstract With the growth of the Internet of Things (IoT) comes a flood of malicious traffic in the IoT, intensifying the challenges of network security. Traditional models operate with independent layers, limiting their effectiveness in addressing these challenges. To address this issue, we propose a cross-layer cooperative Feature Subset-Based Malicious Traffic Detection (FSMMTD) model for detecting malicious traffic. Our approach begins by applying an enhanced random forest method to adaptively filter and retain highly discriminative first-layer features. These processed features are then input into an improved state-space model that integrates the strengths of recurrent neural networks… More >

Displaying 31-40 on page 4 of 509. Per Page