Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (37)
  • Open Access

    ARTICLE

    AI-Driven SDN and Blockchain-Based Routing Framework for Scalable and Trustworthy AIoT Networks

    Mekhled Alharbi1,*, Khalid Haseeb2, Mamoona Humayun3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2601-2616, 2025, DOI:10.32604/cmes.2025.073039 - 26 November 2025

    Abstract Emerging technologies and the Internet of Things (IoT) are integrating for the growth and development of heterogeneous networks. These systems are providing real-time devices to end users to deliver dynamic services and improve human lives. Most existing approaches have been proposed to improve energy efficiency and ensure reliable routing; however, trustworthiness and network scalability remain significant research challenges. In this research work, we introduce an AI-enabled Software-Defined Network (SDN)- driven framework to provide secure communication, trusted behavior, and effective route maintenance. By considering multiple parameters in the forwarder selection process, the proposed framework enhances network More >

  • Open Access

    ARTICLE

    MBID: A Scalable Multi-Tier Blockchain Architecture with Physics-Informed Neural Networks for Intrusion Detection in Large-Scale IoT Networks

    Saeed Ullah1, Junsheng Wu1,*, Mian Muhammad Kamal2, Heba G. Mohamed3, Muhammad Sheraz4, Teong Chee Chuah4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2647-2681, 2025, DOI:10.32604/cmes.2025.068849 - 31 August 2025

    Abstract The Internet of Things (IoT) ecosystem faces growing security challenges because it is projected to have 76.88 billion devices by 2025 and $1.4 trillion market value by 2027, operating in distributed networks with resource limitations and diverse system architectures. The current conventional intrusion detection systems (IDS) face scalability problems and trust-related issues, but blockchain-based solutions face limitations because of their low transaction throughput (Bitcoin: 7 TPS (Transactions Per Second), Ethereum: 15–30 TPS) and high latency. The research introduces MBID (Multi-Tier Blockchain Intrusion Detection) as a groundbreaking Multi-Tier Blockchain Intrusion Detection System with AI-Enhanced Detection, which… More >

  • Open Access

    ARTICLE

    IECC-SAIN: Innovative ECC-Based Approach for Secure Authentication in IoT Networks

    Younes Lahraoui1, Jihane Jebrane2, Youssef Amal1, Saiida Lazaar1, Cheng-Chi Lee3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.1, pp. 615-641, 2025, DOI:10.32604/cmes.2025.067778 - 31 July 2025

    Abstract Due to their resource constraints, Internet of Things (IoT) devices require authentication mechanisms that are both secure and efficient. Elliptic curve cryptography (ECC) meets these needs by providing strong security with shorter key lengths, which significantly reduces the computational overhead required for authentication algorithms. This paper introduces a novel ECC-based IoT authentication system utilizing our previously proposed efficient mapping and reverse mapping operations on elliptic curves over prime fields. By reducing reliance on costly point multiplication, the proposed algorithm significantly improves execution time, storage requirements, and communication cost across varying security levels. The proposed authentication… More >

  • Open Access

    ARTICLE

    Enhancing Healthcare Data Privacy in Cloud IoT Networks Using Anomaly Detection and Optimization with Explainable AI (ExAI)

    Jitendra Kumar Samriya1, Virendra Singh2, Gourav Bathla3, Meena Malik4, Varsha Arya5,6, Wadee Alhalabi7, Brij B. Gupta8,9,10,11,*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3893-3910, 2025, DOI:10.32604/cmc.2025.063242 - 03 July 2025

    Abstract The integration of the Internet of Things (IoT) into healthcare systems improves patient care, boosts operational efficiency, and contributes to cost-effective healthcare delivery. However, overcoming several associated challenges, such as data security, interoperability, and ethical concerns, is crucial to realizing the full potential of IoT in healthcare. Real-time anomaly detection plays a key role in protecting patient data and maintaining device integrity amidst the additional security risks posed by interconnected systems. In this context, this paper presents a novel method for healthcare data privacy analysis. The technique is based on the identification of anomalies in… More >

  • Open Access

    ARTICLE

    Efficient Resource Management in IoT Network through ACOGA Algorithm

    Pravinkumar Bhujangrao Landge1, Yashpal Singh1, Hitesh Mohapatra2, Seyyed Ahmad Edalatpanah3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 1661-1688, 2025, DOI:10.32604/cmes.2025.065599 - 30 May 2025

    Abstract Internet of things networks often suffer from early node failures and short lifespan due to energy limits. Traditional routing methods are not enough. This work proposes a new hybrid algorithm called ACOGA. It combines Ant Colony Optimization (ACO) and the Greedy Algorithm (GA). ACO finds smart paths while Greedy makes quick decisions. This improves energy use and performance. ACOGA outperforms Hybrid Energy-Efficient (HEE) and Adaptive Lossless Data Compression (ALDC) algorithms. After 500 rounds, only 5% of ACOGA’s nodes are dead, compared to 15% for HEE and 20% for ALDC. The network using ACOGA runs for More >

  • Open Access

    ARTICLE

    End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network

    Shafi Ullah1,*, Haidawati Muhammad Nasir2, Kushsairy Kadir3,*, Akbar Khan1, Ahsanullah Memon4, Shanila Azhar1, Ilyas Khan5, Muhammad Ashraf1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3223-3249, 2025, DOI:10.32604/cmc.2024.054676 - 17 February 2025

    Abstract Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519; and (ii): elliptic curve More >

  • Open Access

    ARTICLE

    A Robust Security Detection Strategy for Next Generation IoT Networks

    Hafida Assmi1, Azidine Guezzaz1, Said Benkirane1, Mourade Azrour2,*, Said Jabbour3, Nisreen Innab4, Abdulatif Alabdulatif5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 443-466, 2025, DOI:10.32604/cmc.2024.059047 - 03 January 2025

    Abstract Internet of Things (IoT) refers to the infrastructures that connect smart devices to the Internet, operating autonomously. This connectivity makes it possible to harvest vast quantities of data, creating new opportunities for the emergence of unprecedented knowledge. To ensure IoT securit, various approaches have been implemented, such as authentication, encoding, as well as devices to guarantee data integrity and availability. Among these approaches, Intrusion Detection Systems (IDS) is an actual security solution, whose performance can be enhanced by integrating various algorithms, including Machine Learning (ML) and Deep Learning (DL), enabling proactive and accurate detection of… More >

  • Open Access

    ARTICLE

    Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks

    Brij B. Gupta1,2,3,4,*, Akshat Gaurav5, Varsha Arya6,7, Razaz Waheeb Attar8, Shavi Bansal9, Ahmed Alhomoud10, Kwok Tai Chui11

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4109-4124, 2024, DOI:10.32604/cmc.2024.056476 - 19 December 2024

    Abstract Phishing attacks seriously threaten information privacy and security within the Internet of Things (IoT) ecosystem. Numerous phishing attack detection solutions have been developed for IoT; however, many of these are either not optimally efficient or lack the lightweight characteristics needed for practical application. This paper proposes and optimizes a lightweight deep-learning model for phishing attack detection. Our model employs a two-fold optimization approach: first, it utilizes the analysis of the variance (ANOVA) F-test to select the optimal features for phishing detection, and second, it applies the Cuckoo Search algorithm to tune the hyperparameters (learning rate… More >

  • Open Access

    ARTICLE

    Mean Field-Based Dynamic Backoff Optimization for MIMO-Enabled Grant-Free NOMA in Massive IoT Networks

    Haibo Wang1, Hongwei Gao1,*, Pai Jiang1, Matthieu De Mari2, Panzer Gu3, Yinsheng Liu1

    Journal on Internet of Things, Vol.6, pp. 17-41, 2024, DOI:10.32604/jiot.2024.054791 - 26 August 2024

    Abstract In the 6G Internet of Things (IoT) paradigm, unprecedented challenges will be raised to provide massive connectivity, ultra-low latency, and energy efficiency for ultra-dense IoT devices. To address these challenges, we explore the non-orthogonal multiple access (NOMA) based grant-free random access (GFRA) schemes in the cellular uplink to support massive IoT devices with high spectrum efficiency and low access latency. In particular, we focus on optimizing the backoff strategy of each device when transmitting time-sensitive data samples to a multiple-input multiple-output (MIMO)-enabled base station subject to energy constraints. To cope with the dynamic varied channel… More >

  • Open Access

    ARTICLE

    Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks

    Muaadh A. Alsoufi1,*, Maheyzah Md Siraj1, Fuad A. Ghaleb2, Muna Al-Razgan3, Mahfoudh Saeed Al-Asaly3, Taha Alfakih3, Faisal Saeed2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 823-845, 2024, DOI:10.32604/cmes.2024.052112 - 20 August 2024

    Abstract The rapid growth of Internet of Things (IoT) devices has brought numerous benefits to the interconnected world. However, the ubiquitous nature of IoT networks exposes them to various security threats, including anomaly intrusion attacks. In addition, IoT devices generate a high volume of unstructured data. Traditional intrusion detection systems often struggle to cope with the unique characteristics of IoT networks, such as resource constraints and heterogeneous data sources. Given the unpredictable nature of network technologies and diverse intrusion methods, conventional machine-learning approaches seem to lack efficiency. Across numerous research domains, deep learning techniques have demonstrated… More >

Displaying 1-10 on page 1 of 37. Per Page