Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (680)
  • Open Access

    ARTICLE

    Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks

    Hafsa Shahid1, Humaira Ashraf1, Hafsa Javed1, Mamoona Humayun2, Nz Jhanjhi3,*, Mohammed A. AlZain4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1967-1981, 2021, DOI:10.32604/cmc.2021.015259

    Abstract An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation… More >

  • Open Access

    ARTICLE

    Cogent and Energy Efficient Authentication Protocol for WSN in IoT

    Tariq Mahmood Butt1, Rabia Riaz1, Chinmay Chakraborty2, Sanam Shahla Rizvi3, Anand Paul4,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1877-1898, 2021, DOI:10.32604/cmc.2021.014966

    Abstract Given the accelerating development of Internet of things (IoT), a secure and robust authentication mechanism is urgently required as a critical architectural component. The IoT has improved the quality of everyday life for numerous people in many ways. Owing to the predominantly wireless nature of the IoT, connected devices are more vulnerable to security threats compared to wired networks. User authentication is thus of utmost importance in terms of security on the IoT. Several authentication protocols have been proposed in recent years, but most prior schemes do not provide sufficient security for these wireless networks. To overcome the limitations of… More >

  • Open Access

    ARTICLE

    A Genetic Based Leader Election Algorithm for IoT Cloud Data Processing

    Samira Kanwal1, Zeshan Iqbal1, Aun Irtaza1, Rashid Ali2, Kamran Siddique3,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2469-2486, 2021, DOI:10.32604/cmc.2021.014709

    Abstract In IoT networks, nodes communicate with each other for computational services, data processing, and resource sharing. Most of the time huge data is generated at the network edge due to extensive communication between IoT devices. So, this tidal data is transferred to the cloud data center (CDC) for efficient processing and effective data storage. In CDC, leader nodes are responsible for higher performance, reliability, deadlock handling, reduced latency, and to provide cost-effective computational services to the users. However, the optimal leader selection is a computationally hard problem as several factors like memory, CPU MIPS, and bandwidth, etc., are needed to… More >

  • Open Access

    ARTICLE

    Remote Health Monitoring Using IoT-Based Smart Wireless Body Area Network

    Farhan Aadil1, Bilal Mehmood1, Najam Ul Hasan2, Sangsoon Lim3,*, Sadia Ejaz1, Noor Zaman4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2499-2513, 2021, DOI:10.32604/cmc.2021.014647

    Abstract A wireless body area network (WBAN) consists of tiny health-monitoring sensors implanted in or placed on the human body. These sensors are used to collect and communicate human medical and physiological data and represent a subset of the Internet of Things (IoT) systems. WBANs are connected to medical servers that monitor patients’ health. This type of network can protect critical patients’ lives due to the ability to monitor patients’ health continuously and remotely. The inter-WBAN communication provides a dynamic environment for patients allowing them to move freely. However, during patient movement, the WBAN patient nodes may become out of range… More >

  • Open Access

    ARTICLE

    HPMC: A Multi-target Tracking Algorithm for the IoT

    Xinyue Lv1, Xiaofeng Lian2,*, Li Tan1, Yanyan Song1, Chenyu Wang3

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 513-526, 2021, DOI:10.32604/iasc.2021.016450

    Abstract With the rapid development of the Internet of Things and advanced sensors, vision-based monitoring and forecasting applications have been widely used. In the context of the Internet of Things, visual devices can be regarded as network perception nodes that perform complex tasks, such as real-time monitoring of road traffic flow, target detection, and multi-target tracking. We propose the High-Performance detection and Multi-Correlation measurement algorithm (HPMC) to address the problem of target occlusion and perform trajectory correlation matching for multi-target tracking. The algorithm consists of three modules: 1) For the detection module, we proposed the You Only Look Once(YOLO)v3_plus model, which… More >

  • Open Access

    ARTICLE

    ECG Encryption Enhancement Technique with Multiple Layers of AES and DNA Computing

    Jamal Kh-Madhloom1,2,*, Mohd Khanapi Abd Ghani1, Mohd Rizuan Baharon1

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 493-512, 2021, DOI:10.32604/iasc.2021.015129

    Abstract Over the decades, protecting the privacy of a health cloud using the design of a fog computing network is a very important field and will be more important in the near future. Current Internet of Things (IoT) research includes security and privacy due to their extreme importance in any growing technology that involves the implementation of cryptographic Internet communications (ICs) for protected IC applications such as fog computing and cloud computing devices. In addition, the implementation of public-key cryptography for IoT-based DNA sequence testing devices requires considerable expertise. Any key can be broken by using a brute-force attack with ample… More >

  • Open Access

    ARTICLE

    Genome-wide Analysis of a Plant AT-rich Sequence and Zinc-binding Protein (PLATZ) in Triticum Aestivum

    Xiaohang He1, Minjie Liu2, Zhengwu Fang1, Dongfang Ma1,2,3,*, Yilin Zhou1,3,*, Junliang Yin1

    Phyton-International Journal of Experimental Botany, Vol.90, No.3, pp. 971-986, 2021, DOI:10.32604/phyton.2021.012726

    Abstract Plant AT-rich sequence and zinc-binding protein (PLATZ) is a plant transcription factor that has been studied in corn. PLATZ can non-specifically bind to sequences rich in A/T bases to induce transcriptional repression. It is involved in the regulation of dehydration tolerance in seeds. In this study, we performed bioinformatics analysis to identify and characterize wheat PLATZ(TaPLATZ)genes. We identified 49 wheat PLATZ genes by searching the wheat genome by using known PLATZ gene sequences from rice, Arabidopsis, and maize. Phylogenetic analysis on PLATZ gene sequences from different species was performed. We found that PLATZs could be divided into three groups. The… More >

  • Open Access

    ARTICLE

    Blockchain-Based Flexible Double-Chain Architecture and Performance Optimization for Better Sustainability in Agriculture

    Luona Song1, Xiaojuan Wang1,*, Peng Wei1, Zikui Lu1, Xiaojun Wang2, Nicolas Merveille3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1429-1446, 2021, DOI:10.32604/cmc.2021.016954

    Abstract Blockchain is an emerging decentralized distributed technology that can cross the boundaries and guarantee safe and trustworthy value transfers between participants. Combining the blockchain technology with the Internet of Things (IoT) technology to enhance the transparency and sustainability of agricultural supply chains, has attracted researchers from both academia and industry. This paper reviews the latest applications of the blockchain and IoT technologies in the sustainable agricultural supply chain management and explores the design and implementation of a blockchain-based sustainable solution. By placing the sustainable agricultural supply chain management at its core, a blockchain-based framework is designed. Considering the heterogeneity of… More >

  • Open Access

    ARTICLE

    A Fault-Handling Method for the Hamiltonian Cycle in the Hypercube Topology

    Adnan A. Hnaif*, Abdelfatah A. Tamimi, Ayman M. Abdalla, Iqbal Jebril

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 505-519, 2021, DOI:10.32604/cmc.2021.016123

    Abstract Many routing protocols, such as distance vector and link-state protocols are used for finding the best paths in a network. To find the path between the source and destination nodes where every node is visited once with no repeats, Hamiltonian and Hypercube routing protocols are often used. Nonetheless, these algorithms are not designed to solve the problem of a node failure, where one or more nodes become faulty. This paper proposes an efficient modified Fault-free Hamiltonian Cycle based on the Hypercube Topology (FHCHT) to perform a connection between nodes when one or more nodes become faulty. FHCHT can be applied… More >

  • Open Access

    ARTICLE

    Interference Mitigation in D2D Communication Underlying Cellular Networks: Towards Green Energy

    Rana Zeeshan Ahamad1, Abdul Rehman Javed2,*, Shakir Mehmood3, Mohammad Zubair Khan4, Abdulfattah Noorwali5, Muhammad Rizwan6

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 45-58, 2021, DOI:10.32604/cmc.2021.016082

    Abstract Device to Device (D2D) communication is emerging as a new participant promising technology in 5G cellular networks to promote green energy networks. D2D communication can improve communication delays, spectral efficiency, system capacity, data off-loading, and many other fruitful scenarios where D2D can be implemented. Nevertheless, induction of D2D communication in reuse mode with the conventional cellular network can cause severe interference issues, which can significantly degrade network performance. To reap all the benefits of induction of D2D communication with conventional cellular communication, it is imperative to minimize interference’s detrimental effects. Efficient power control can minimize the negative effects of interference… More >

Displaying 551-560 on page 56 of 680. Per Page