Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access

    ARTICLE

    A Locality-Sensitive Hashing-Based Jamming Detection System for IoT Networks

    P. Ganeshkumar*, Talal Albalawi

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5943-5959, 2022, DOI:10.32604/cmc.2022.030388 - 28 July 2022

    Abstract

    Internet of things (IoT) comprises many heterogeneous nodes that operate together to accomplish a human friendly or a business task to ease the life. Generally, IoT nodes are connected in wireless media and thus they are prone to jamming attacks. In the present scenario jamming detection (JD) by using machine learning (ML) algorithms grasp the attention of the researchers due to its virtuous outcome. In this research, jamming detection is modelled as a classification problem which uses several features. Using one/two or minimum number of features produces vague results that cannot be explained. Also the

    More >

  • Open Access

    ARTICLE

    Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM

    S. Hariprasad1,*, T. Deepa1, N. Bharathiraja2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1425-1440, 2022, DOI:10.32604/iasc.2022.022856 - 25 May 2022

    Abstract The Internet of Things (IoT) is a global information and communication technology which aims to connect any type of device to the internet at any time and in any location. Nowadays billions of IoT devices are connected to the world, this leads to easily cause vulnerability to IoT devices. The increasing of users in different IoT-related applications leads to more data attacks is happening in the IoT networks after the fog layer. To detect and reduce the attacks the deep learning model is used. In this article, a hybrid sample selected recurrent neural network-extreme learning… More >

  • Open Access

    ARTICLE

    Fast and Efficient Security Scheme for Blockchain-Based IoT Networks

    K. A. Fasila*, Sheena Mathew

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2097-2114, 2022, DOI:10.32604/cmc.2022.029637 - 18 May 2022

    Abstract

    Internet of Things (IoT) has become widely used nowadays and tremendous increase in the number of users raises its security requirements as well. The constraints on resources such as low computational capabilities and power requirements demand lightweight cryptosystems. Conventional algorithms are not applicable in IoT network communications because of the constraints mentioned above. In this work, a novel and efficient scheme for providing security in IoT applications is introduced. The scheme proposes how security can be enhanced in a distributed IoT application by providing multilevel protection and dynamic key generation in the data uploading and

    More >

  • Open Access

    ARTICLE

    Optimized Cognitive Learning Model for Energy Efficient Fog-BAN-IoT Networks

    S. Kalpana1,*, C. Annadurai2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1027-1040, 2022, DOI:10.32604/csse.2022.024685 - 09 May 2022

    Abstract In Internet of Things (IoT), large amount of data are processed and communicated through different network technologies. Wireless Body Area Networks (WBAN) plays pivotal role in the health care domain with an integration of IoT and Artificial Intelligence (AI). The amalgamation of above mentioned tools has taken the new peak in terms of diagnosis and treatment process especially in the pandemic period. But the real challenges such as low latency, energy consumption high throughput still remains in the dark side of the research. This paper proposes a novel optimized cognitive learning based BAN model based… More >

  • Open Access

    ARTICLE

    Power Allocation in NOMA-CR for 5G Enabled IoT Networks

    Mohammed Basheri1, Mohammad Haseeb Zafar1,2,3,*, Imran Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5515-5530, 2022, DOI:10.32604/cmc.2022.027532 - 21 April 2022

    Abstract In the power domain, non-orthogonal multiple access (NOMA) supports multiple users on the same time-frequency resources, assigns different transmission powers to different users, and differentiates users by user channel gains. Multi-user signals are superimposed and transmitted in the power domain at the transmitting end by actively implementing controllable interference information, and multi-user detection algorithms, such as successive interference cancellation (SIC) is performed at the receiving end to demodulate the necessary user signals. In contrast to the orthogonal transmission method, the non-orthogonal method can achieve higher spectrum utilization. However, it will increase the receiver complexity. With… More >

  • Open Access

    ARTICLE

    An Efficient Scheme for Data Pattern Matching in IoT Networks

    Ashraf Ali*, Omar A. Saraereh

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2203-2219, 2022, DOI:10.32604/cmc.2022.025994 - 29 March 2022

    Abstract The Internet has become an unavoidable trend of all things due to the rapid growth of networking technology, smart home technology encompasses a variety of sectors, including intelligent transportation, allowing users to communicate with anybody or any device at any time and from anywhere. However, most things are different now. Background: Structured data is a form of separated storage that slows down the rate at which everything is connected. Data pattern matching is commonly used in data connectivity and can help with the issues mentioned above. Aim: The present pattern matching system is ineffective due… More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Big Data Analytics in IoT Environment

    M. Anuradha1,*, G. Mani2, T. Shanthi3, N. R. Nagarajan4, P. Suresh5, C. Bharatiraja6

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 381-396, 2022, DOI:10.32604/csse.2022.023321 - 23 March 2022

    Abstract In the digital area, Internet of Things (IoT) and connected objects generate a huge quantity of data traffic which feeds big data analytic models to discover hidden patterns and detect abnormal traffic. Though IoT networks are popular and widely employed in real world applications, security in IoT networks remains a challenging problem. Conventional intrusion detection systems (IDS) cannot be employed in IoT networks owing to the limitations in resources and complexity. Therefore, this paper concentrates on the design of intelligent metaheuristic optimization based feature selection with deep learning (IMFSDL) based classification model, called IMFSDL-IDS for… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Deep Learning Framework for Intrusion Detection Systems in WSN-IoT Networks

    M. Maheswari1,2,*, R. A. Karthika1

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 365-382, 2022, DOI:10.32604/iasc.2022.022259 - 05 January 2022

    Abstract With the advent of wireless communication and digital technology, low power, Internet-enabled, and reconfigurable wireless devices have been developed, which revolutionized day-to-day human life and the economy across the globe. These devices are realized by leveraging the features of sensing, processing the data and nodes communications. The scale of Internet-enabled wireless devices has increased daily, and these devices are exposed to various cyber-attacks. Since the complexity and dynamics of the attacks on the devices are computationally high, intelligent, scalable and high-speed intrusion detection systems (IDS) are required. Moreover, the wireless devices are battery-driven; implementing them… More >

  • Open Access

    ARTICLE

    HELP-WSN-A Novel Adaptive Multi-Tier Hybrid Intelligent Framework for QoS Aware WSN-IoT Networks

    J. Sampathkumar*, N. Malmurugan

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2107-2123, 2022, DOI:10.32604/cmc.2022.019983 - 07 December 2021

    Abstract Wireless Sensor Network is considered as the intermediate layer in the paradigm of Internet of things (IoT) and its effectiveness depends on the mode of deployment without sacrificing the performance and energy efficiency. WSN provides ubiquitous access to location, the status of different entities of the environment and data acquisition for long term IoT monitoring. Achieving the high performance of the WSN-IoT network remains to be a real challenge since the deployment of these networks in the large area consumes more power which in turn degrades the performance of the networks. So, developing the robust… More >

  • Open Access

    ARTICLE

    Performance Analysis of Multi-Channel CR Enabled IoT Network with Better Energy Harvesting

    Afiya Kiran1, Ahmad Karim2,*, Yasser Obaid Alharbi3, Diaa Mohammed Uliyan3

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 183-197, 2022, DOI:10.32604/cmc.2022.021860 - 03 November 2021

    Abstract Wireless Sensor Networks (WSNs) can be termed as an auto-configured and infrastructure-less wireless networks to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure and motion etc. WSNs may comprise thousands of Internet of Things (IoT) devices to sense and collect data from its surrounding, process the data and take an automated and mechanized decision. On the other side the proliferation of these devices will soon cause radio spectrum shortage. So, to facilitate these networks, we integrate Cognitive Radio (CR) functionality in these networks. CR can sense the unutilized spectrum of licensed users… More >

Displaying 21-30 on page 3 of 38. Per Page