Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29)
  • Open Access

    ARTICLE

    A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments

    Zakariae Dlimi*, Abdellah Ezzati, Said Ben Alla

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 79-103, 2023, DOI:10.32604/csse.2023.037099

    Abstract The growing advent of the Internet of Things (IoT) users is driving the adoption of cloud computing technologies. The integration of IoT in the cloud enables storage and computational capabilities for IoT users. However, security has been one of the main concerns of cloud-integrated IoT. Existing work attempts to address the security concerns of cloud-integrated IoT through authentication, access control, and blockchain-based methods. However, existing frameworks are somewhat limited by scalability, privacy, and centralized structures. To mitigate the existing problems, we propose a blockchain-based distributed access control method for secure storage in the IoT cloud (BL-DAC). Initially, the BL-DAC performs… More >

  • Open Access

    ARTICLE

    Deep Learning Based Energy Consumption Prediction on Internet of Things Environment

    S. Balaji*, S. Karthik

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 727-743, 2023, DOI:10.32604/iasc.2023.037409

    Abstract The creation of national energy strategy cannot proceed without accurate projections of future electricity consumption; this is because EC is intimately tied to other forms of energy, such as oil and natural gas. For the purpose of determining and bettering overall energy consumption, there is an urgent requirement for accurate monitoring and calculation of EC at the building level using cutting-edge technology such as data analytics and the internet of things (IoT). Soft computing is a subset of AI that tries to design procedures that are more accurate and reliable, and it has proven to be an effective tool for… More >

  • Open Access

    ARTICLE

    An IoT Environment Based Framework for Intelligent Intrusion Detection

    Hamza Safwan1, Zeshan Iqbal1, Rashid Amin1, Muhammad Attique Khan2, Majed Alhaisoni3, Abdullah Alqahtani4, Ye Jin Kim5, Byoungchol Chang6,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2365-2381, 2023, DOI:10.32604/cmc.2023.033896

    Abstract Software-defined networking (SDN) represents a paradigm shift in network traffic management. It distinguishes between the data and control planes. APIs are then used to communicate between these planes. The controller is central to the management of an SDN network and is subject to security concerns. This research shows how a deep learning algorithm can detect intrusions in SDN-based IoT networks. Overfitting, low accuracy, and efficient feature selection is all discussed. We propose a hybrid machine learning-based approach based on Random Forest and Long Short-Term Memory (LSTM). In this study, a new dataset based specifically on Software Defined Networks is used… More >

  • Open Access

    ARTICLE

    Performance Analysis of Intrusion Detection System in the IoT Environment Using Feature Selection Technique

    Moody Alhanaya, Khalil Hamdi Ateyeh Al-Shqeerat*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3709-3724, 2023, DOI:10.32604/iasc.2023.036856

    Abstract The increasing number of security holes in the Internet of Things (IoT) networks creates a question about the reliability of existing network intrusion detection systems. This problem has led to the developing of a research area focused on improving network-based intrusion detection system (NIDS) technologies. According to the analysis of different businesses, most researchers focus on improving the classification results of NIDS datasets by combining machine learning and feature reduction techniques. However, these techniques are not suitable for every type of network. In light of this, whether the optimal algorithm and feature reduction techniques can be generalized across various datasets… More >

  • Open Access

    ARTICLE

    Enhanced Crow Search with Deep Learning-Based Cyberattack Detection in SDN-IoT Environment

    Abdelwahed Motwakel1,*, Fadwa Alrowais2, Khaled Tarmissi3, Radwa Marzouk4, Abdullah Mohamed5, Abu Sarwar Zamani1, Ishfaq Yaseen1, Mohamed I. Eldesouki6

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3157-3173, 2023, DOI:10.32604/iasc.2023.034908

    Abstract The paradigm shift towards the Internet of Things (IoT) phenomenon and the rise of edge-computing models provide massive potential for several upcoming IoT applications like smart grid, smart energy, smart home, smart health and smart transportation services. However, it also provides a sequence of novel cyber-security issues. Although IoT networks provide several advantages, the heterogeneous nature of the network and the wide connectivity of the devices make the network easy for cyber-attackers. Cyberattacks result in financial loss and data breaches for organizations and individuals. So, it becomes crucial to secure the IoT environment from such cyberattacks. With this motivation, the… More >

  • Open Access

    ARTICLE

    Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment

    Mesfer Al Duhayyim1,*, Heba G. Mohamed2, Fadwa Alrowais3, Fahd N. Al-Wesabi4, Anwer Mustafa Hilal5, Abdelwahed Motwakel5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1293-1310, 2023, DOI:10.32604/csse.2023.035589

    Abstract The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations.… More >

  • Open Access

    ARTICLE

    Optimal Hybrid Deep Learning Enabled Attack Detection and Classification in IoT Environment

    Fahad F. Alruwaili*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 99-115, 2023, DOI:10.32604/cmc.2023.034752

    Abstract The Internet of Things (IoT) paradigm enables end users to access networking services amongst diverse kinds of electronic devices. IoT security mechanism is a technology that concentrates on safeguarding the devices and networks connected in the IoT environment. In recent years, False Data Injection Attacks (FDIAs) have gained considerable interest in the IoT environment. Cybercriminals compromise the devices connected to the network and inject the data. Such attacks on the IoT environment can result in a considerable loss and interrupt normal activities among the IoT network devices. The FDI attacks have been effectively overcome so far by conventional threat detection… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment

    Mohammed Maray1, Haya Mesfer Alshahrani2, Khalid A. Alissa3, Najm Alotaibi4, Abdulbaset Gaddah5, Ali Meree1,6, Mahmoud Othman7, Manar Ahmed Hamza8,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6587-6604, 2023, DOI:10.32604/cmc.2023.034176

    Abstract In recent years, wireless networks are widely used in different domains. This phenomenon has increased the number of Internet of Things (IoT) devices and their applications. Though IoT has numerous advantages, the commonly-used IoT devices are exposed to cyber-attacks periodically. This scenario necessitates real-time automated detection and the mitigation of different types of attacks in high-traffic networks. The Software-Defined Networking (SDN) technique and the Machine Learning (ML)-based intrusion detection technique are effective tools that can quickly respond to different types of attacks in the IoT networks. The Intrusion Detection System (IDS) models can be employed to secure the SDN-enabled IoT… More >

  • Open Access

    ARTICLE

    Improved Multileader Optimization with Shadow Encryption for Medical Images in IoT Environment

    Mesfer Al Duhayyim1,*, Mohammed Maray2, Ayman Qahmash2, Fatma S. Alrayes3, Nuha Alshuqayran4, Jaber S. Alzahrani5, Mohammed Alghamdi2,6, Abdullah Mohamed7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3133-3149, 2023, DOI:10.32604/cmc.2023.032740

    Abstract Nowadays, security plays an important role in Internet of Things (IoT) environment especially in medical services’ domains like disease prediction and medical data storage. In healthcare sector, huge volumes of data are generated on a daily basis, owing to the involvement of advanced health care devices. In general terms, health care images are highly sensitive to alterations due to which any modifications in its content can result in faulty diagnosis. At the same time, it is also significant to maintain the delicate contents of health care images during reconstruction stage. Therefore, an encryption system is required in order to raise… More >

  • Open Access

    ARTICLE

    Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment

    Salaheddine Kably1,2,*, Tajeddine Benbarrad1, Nabih Alaoui2, Mounir Arioua1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 253-278, 2023, DOI:10.32604/cmc.2023.032220

    Abstract Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion… More >

Displaying 1-10 on page 1 of 29. Per Page