Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Multi-Layer Fog-Cloud Architecture for Optimizing the Placement of IoT Applications in Smart Cities

    Mohammad Aldossary*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 633-649, 2023, DOI:10.32604/cmc.2023.035414

    Abstract In the smart city paradigm, the deployment of Internet of Things (IoT) services and solutions requires extensive communication and computing resources to place and process IoT applications in real time, which consumes a lot of energy and increases operational costs. Usually, IoT applications are placed in the cloud to provide high-quality services and scalable resources. However, the existing cloud-based approach should consider the above constraints to efficiently place and process IoT applications. In this paper, an efficient optimization approach for placing IoT applications in a multi-layer fog-cloud environment is proposed using a mathematical model (Mixed-Integer Linear Programming (MILP)). This approach… More >

  • Open Access

    ARTICLE

    Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications

    Samah Alshathri1, Ezz El-Din Hemdan2, Walid El-Shafai3,4,*, Amged Sayed5,6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 183-196, 2023, DOI:10.32604/cmc.2023.034048

    Abstract In recent years, Digital Twin (DT) has gained significant interest from academia and industry due to the advanced in information technology, communication systems, Artificial Intelligence (AI), Cloud Computing (CC), and Industrial Internet of Things (IIoT). The main concept of the DT is to provide a comprehensive tangible, and operational explanation of any element, asset, or system. However, it is an extremely dynamic taxonomy developing in complexity during the life cycle that produces a massive amount of engendered data and information. Likewise, with the development of AI, digital twins can be redefined and could be a crucial approach to aid the… More >

  • Open Access

    ARTICLE

    An Anti-Physical Attack Scheme of ARX Lightweight Algorithms for IoT Applications

    Qiang Zhi1, Xiang Jiang1, Hangying Zhang2, Zhengshu Zhou3, Jianguo Ren1, Tong Huang4,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 389-402, 2023, DOI:10.32604/csse.2023.035576

    Abstract The lightweight encryption algorithm based on Add-Rotation-XOR (ARX) operation has attracted much attention due to its high software affinity and fast operation speed. However, lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm. The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost. This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes. Firstly, we specify a hierarchical security framework by quantitatively… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid

    Samir M. Umran1,2, Songfeng Lu1,3, Zaid Ameen Abduljabbar1,4, Xueming Tang1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5389-5416, 2023, DOI:10.32604/cmc.2023.034331

    Abstract There are numerous internet-connected devices attached to the industrial process through recent communication technologies, which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things (IIoTs). Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services, external trusted authorities, and centralized architectures; they have high computation and communication costs, low performance, and are exposed to a single authority of failure and bottleneck. Blockchain technology (BC) is widely adopted in the industrial sector for its valuable features in terms of decentralization, security, and… More >

  • Open Access

    ARTICLE

    LSTM Based Spectrum Prediction for Real-Time Spectrum Access for IoT Applications

    R. Nandakumar1, Vijayakumar Ponnusamy2,*, Aman Kumar Mishra2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2805-2819, 2023, DOI:10.32604/iasc.2023.028645

    Abstract In the Internet of Things (IoT) scenario, many devices will communicate in the presence of the cellular network; the chances of availability of spectrum will be very scary given the presence of large numbers of mobile users and large amounts of applications. Spectrum prediction is very encouraging for high traffic next-generation wireless networks, where devices/machines which are part of the Cognitive Radio Network (CRN) can predict the spectrum state prior to transmission to save their limited energy by avoiding unnecessarily sensing radio spectrum. Long short-term memory (LSTM) is employed to simultaneously predict the Radio Spectrum State (RSS) for two-time slots,… More >

  • Open Access

    ARTICLE

    Ontology Driven Testing Strategies for IoT Applications

    Muhammad Raza Naqvi1, Muhammad Waseem Iqbal2, Muhammad Usman Ashraf3, Shafiq Ahmad4, Ahmed T. Soliman4, Shahzada Khurram5, Muhammad Shafiq6,*, Jin-Ghoo Choi6

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5855-5869, 2022, DOI:10.32604/cmc.2022.019188

    Abstract Internet-of-Things (IoT) has attained a major share in embedded software development. The new era of specialized intelligent systems requires adaptation of customized software engineering approaches. Currently, software engineering has merged the development phases with the technologies provided by industrial automation. The improvements are still required in testing phase for the software developed to IoT solutions. This research aims to assist in developing the testing strategies for IoT applications, therein ontology has been adopted as a knowledge representation technique to different software engineering processes. The proposed ontological model renders 101 methodology by using Protégé. After completion, the ontology was evaluated in… More >

  • Open Access

    ARTICLE

    Cost Optimized Switching of Routing Protocol Scheme for IoT Applications

    Karunanithi Praveen kumar, Perumal Sivanesan*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 67-82, 2022, DOI:10.32604/csse.2022.018867

    Abstract In this work, we propose a context-aware switching of routing protocol scheme for specific application requirements of IoT in real-time using a software-defined networking controller in wireless sensor networks. The work planned has two stages i) Selection of suitable routing protocol (RP) for given IoT applications using higher cognitive process and ii) Deployment of the corresponding routing protocol. We use the supervised learning-regression method for classification of the routing protocol while considering the network parameters like stability, path delay, energy utilization, and throughput. The chosen routing protocol will be set in the sensor network using a software-defined networking controller in… More >

  • Open Access

    ARTICLE

    SAPEM: Secure Attestation of Program Execution and Program Memory for IoT Applications

    Nafisa Ahmed1, Manar Abu Talib2,*, Qassim Nasir3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 23-49, 2021, DOI:10.32604/cmc.2021.014523

    Abstract Security is one of the major challenges that devices connected to the Internet of Things (IoT) face today. Remote attestation is used to measure these devices’ trustworthiness on the network by measuring the device platform’s integrity. Several software-based attestation mechanisms have been proposed, but none of them can detect runtime attacks. Although some researchers have attempted to tackle these attacks, the proposed techniques require additional secured hardware parts to be integrated with the attested devices to achieve their aim. These solutions are expensive and not suitable in many cases. This paper proposes a dual attestation process, SAPEM, with two phases:… More >

Displaying 1-10 on page 1 of 8. Per Page