Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    IOTA-Based Authentication for IoT Devices in Satellite Networks

    D. Bernal*, O. Ledesma, P. Lamo, J. Bermejo

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-39, 2026, DOI:10.32604/cmc.2025.069746 - 10 November 2025

    Abstract This work evaluates an architecture for decentralized authentication of Internet of Things (IoT) devices in Low Earth Orbit (LEO) satellite networks using IOTA Identity technology. To the best of our knowledge, it is the first proposal to integrate IOTA’s Directed Acyclic Graph (DAG)-based identity framework into satellite IoT environments, enabling lightweight and distributed authentication under intermittent connectivity. The system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) over the Tangle, eliminating the need for mining and sequential blocks. An identity management workflow is implemented that supports the creation, validation, deactivation, and reactivation of IoT devices,… More >

  • Open Access

    REVIEW

    A Survey on Token Transmission Attacks, Effects, and Mitigation Strategies in IoT Devices

    Michael Juma Ayuma1, Shem Mbandu Angolo1,*, Philemon Nthenge Kasyoka2,*

    Journal on Artificial Intelligence, Vol.7, pp. 205-254, 2025, DOI:10.32604/jai.2025.067361 - 19 August 2025

    Abstract The exponential growth of Internet of Things (IoT) devices has introduced significant security challenges, particularly in securing token-based communication protocols used for authentication and authorization. This survey systematically reviews the vulnerabilities in token transmission within IoT environments, focusing on various sophisticated attack vectors such as replay attacks, token hijacking, man-in-the-middle (MITM) attacks, token injection, and eavesdropping among others. These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth, JSON Web Tokens (JWT), and bearer tokens, which are widely used in IoT ecosystems for managing device interactions and access control. The impact of such attacks… More >

  • Open Access

    ARTICLE

    Privacy-Aware Federated Learning Framework for IoT Security Using Chameleon Swarm Optimization and Self-Attentive Variational Autoencoder

    Saad Alahmari1,*, Abdulwhab Alkharashi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 849-873, 2025, DOI:10.32604/cmes.2025.062549 - 11 April 2025

    Abstract The Internet of Things (IoT) is emerging as an innovative phenomenon concerned with the development of numerous vital applications. With the development of IoT devices, huge amounts of information, including users’ private data, are generated. IoT systems face major security and data privacy challenges owing to their integral features such as scalability, resource constraints, and heterogeneity. These challenges are intensified by the fact that IoT technology frequently gathers and conveys complex data, creating an attractive opportunity for cyberattacks. To address these challenges, artificial intelligence (AI) techniques, such as machine learning (ML) and deep learning (DL),… More >

  • Open Access

    ARTICLE

    Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network

    Deema Alsekait1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2395-2436, 2024, DOI:10.32604/cmc.2024.055469 - 18 November 2024

    Abstract The widespread adoption of Internet of Things (IoT) devices has resulted in notable progress in different fields, improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks. Further, the study suggests using an advanced approach that utilizes machine learning, specifically the Wide Residual Network (WRN), to identify hidden malware in IoT systems. The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices, using the MalMemAnalysis dataset. Moreover, thorough experimentation provides evidence for the effectiveness of the WRN-based strategy, resulting in… More >

  • Open Access

    ARTICLE

    A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devices

    Muhammad Saad1, Muhammad Raheel Bhutta2, Jongik Kim3,*, Tae-Sun Chung1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4263-4282, 2024, DOI:10.32604/cmc.2024.047132 - 26 March 2024

    Abstract With the increase in IoT (Internet of Things) devices comes an inherent challenge of security. In the world today, privacy is the prime concern of every individual. Preserving one’s privacy and keeping anonymity throughout the system is a desired functionality that does not come without inevitable trade-offs like scalability and increased complexity and is always exceedingly difficult to manage. The challenge is keeping confidentiality and continuing to make the person innominate throughout the system. To address this, we present our proposed architecture where we manage IoT devices using blockchain technology. Our proposed architecture works on… More >

  • Open Access

    REVIEW

    A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices

    Sunil Kumar1, Dilip Kumar1, Ramraj Dangi2, Gaurav Choudhary3, Nicola Dragoni4, Ilsun You5,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 31-63, 2024, DOI:10.32604/cmc.2023.047084 - 30 January 2024

    Abstract The widespread and growing interest in the Internet of Things (IoT) may be attributed to its usefulness in many different fields. Physical settings are probed for data, which is then transferred via linked networks. There are several hurdles to overcome when putting IoT into practice, from managing server infrastructure to coordinating the use of tiny sensors. When it comes to deploying IoT, everyone agrees that security is the biggest issue. This is due to the fact that a large number of IoT devices exist in the physical world and that many of them have constrained More >

  • Open Access

    ARTICLE

    Relative-Position Estimation Based on Loosely Coupled UWB–IMU Fusion for Wearable IoT Devices

    A. S. M. Sharifuzzaman Sagar1, Taein Kim1, Soyoung Park1, Hee Seh Lee2, Hyung Seok Kim1,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1941-1961, 2023, DOI:10.32604/cmc.2023.035360 - 06 February 2023

    Abstract Relative positioning is one of the important techniques in collaborative robotics, autonomous vehicles, and virtual/augmented reality (VR/AR) applications. Recently, ultra-wideband (UWB) has been utilized to calculate relative position as it does not require a line of sight compared to a camera to calculate the range between two objects with centimeter-level accuracy. However, the single UWB range measurement cannot provide the relative position and attitude of any device in three dimensions (3D) because of lacking bearing information. In this paper, we have proposed a UWB-IMU fusion-based relative position system to provide accurate relative position and attitude… More >

  • Open Access

    ARTICLE

    Classification of Request-Based Mobility Load Balancing in Fog Computing

    D. Deepa, K. R. Jothi*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 137-151, 2023, DOI:10.32604/csse.2023.032485 - 20 January 2023

    Abstract Every day, more and more data is being produced by the Internet of Things (IoT) applications. IoT data differ in amount, diversity, veracity, and velocity. Because of latency, various types of data handling in cloud computing are not suitable for many time-sensitive applications. When users move from one site to another, mobility also adds to the latency. By placing computing close to IoT devices with mobility support, fog computing addresses these problems. An efficient Load Balancing Algorithm (LBA) improves user experience and Quality of Service (QoS). Classification of Request (CoR) based Resource Adaptive LBA is… More >

  • Open Access

    ARTICLE

    Super Compact UWB Monopole Antenna for Small IoT Devices

    Ahmed Jamal Abdullah Al-Gburi1, Zahriladha Zakaria1,*, Merih Palandoken2, Imran Mohd Ibrahim1, A. A. Althuwayb3, Sarosh Ahmad4, Samir Salem Al-Bawri5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2785-2799, 2022, DOI:10.32604/cmc.2022.028074 - 16 June 2022

    Abstract This article introduces a novel, ultrawideband (UWB) planar monopole antenna printed on Roger RT/5880 substrate in a compact size for small Internet of Things (IoT) applications. The total electrical dimensions of the proposed compact UWB antenna are 0.19 λo × 0.215 λo × 0.0196 λo with the overall physical sizes of 15 mm × 17 mm × 1.548 mm at the lower resonance frequency of 3.8 GHz. The planar monopole antenna is fed through the linearly tapered microstrip line on a partially structured ground plane to achieve optimum impedance matching for UWB operation. The proposed compact UWB… More >

  • Open Access

    ARTICLE

    Research on Known Vulnerability Detection Method Based on Firmware Analysis

    Wenjing Wang1, Tengteng Zhao1, Xiaolong Li1,*, Lei Huang1, Wei Zhang1, Hui Guo2

    Journal of Cyber Security, Vol.4, No.1, pp. 1-15, 2022, DOI:10.32604/jcs.2022.026816 - 05 May 2022

    Abstract At present, the network security situation is becoming more and more serious. Malicious network attacks such as computer viruses, Trojans and hacker attacks are becoming more and more rampant. National and group network attacks such as network information war and network terrorism have a serious damage to the production and life of the whole society. At the same time, with the rapid development of Internet of Things and the arrival of 5G era, IoT devices as an important part of industrial Internet system, have become an important target of infiltration attacks by hostile forces. This More >

Displaying 1-10 on page 1 of 17. Per Page