Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    ARTICLE

    Fast and Efficient Security Scheme for Blockchain-Based IoT Networks

    K. A. Fasila*, Sheena Mathew

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2097-2114, 2022, DOI:10.32604/cmc.2022.029637

    Abstract

    Internet of Things (IoT) has become widely used nowadays and tremendous increase in the number of users raises its security requirements as well. The constraints on resources such as low computational capabilities and power requirements demand lightweight cryptosystems. Conventional algorithms are not applicable in IoT network communications because of the constraints mentioned above. In this work, a novel and efficient scheme for providing security in IoT applications is introduced. The scheme proposes how security can be enhanced in a distributed IoT application by providing multilevel protection and dynamic key generation in the data uploading and transfer phases. Existing works rely… More >

  • Open Access

    ARTICLE

    Optimized Cognitive Learning Model for Energy Efficient Fog-BAN-IoT Networks

    S. Kalpana1,*, C. Annadurai2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1027-1040, 2022, DOI:10.32604/csse.2022.024685

    Abstract In Internet of Things (IoT), large amount of data are processed and communicated through different network technologies. Wireless Body Area Networks (WBAN) plays pivotal role in the health care domain with an integration of IoT and Artificial Intelligence (AI). The amalgamation of above mentioned tools has taken the new peak in terms of diagnosis and treatment process especially in the pandemic period. But the real challenges such as low latency, energy consumption high throughput still remains in the dark side of the research. This paper proposes a novel optimized cognitive learning based BAN model based on Fog-IoT technology as a… More >

  • Open Access

    ARTICLE

    Power Allocation in NOMA-CR for 5G Enabled IoT Networks

    Mohammed Basheri1, Mohammad Haseeb Zafar1,2,3,*, Imran Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5515-5530, 2022, DOI:10.32604/cmc.2022.027532

    Abstract In the power domain, non-orthogonal multiple access (NOMA) supports multiple users on the same time-frequency resources, assigns different transmission powers to different users, and differentiates users by user channel gains. Multi-user signals are superimposed and transmitted in the power domain at the transmitting end by actively implementing controllable interference information, and multi-user detection algorithms, such as successive interference cancellation (SIC) is performed at the receiving end to demodulate the necessary user signals. In contrast to the orthogonal transmission method, the non-orthogonal method can achieve higher spectrum utilization. However, it will increase the receiver complexity. With the development of microelectronics technology,… More >

  • Open Access

    ARTICLE

    An Efficient Scheme for Data Pattern Matching in IoT Networks

    Ashraf Ali*, Omar A. Saraereh

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2203-2219, 2022, DOI:10.32604/cmc.2022.025994

    Abstract The Internet has become an unavoidable trend of all things due to the rapid growth of networking technology, smart home technology encompasses a variety of sectors, including intelligent transportation, allowing users to communicate with anybody or any device at any time and from anywhere. However, most things are different now. Background: Structured data is a form of separated storage that slows down the rate at which everything is connected. Data pattern matching is commonly used in data connectivity and can help with the issues mentioned above. Aim: The present pattern matching system is ineffective due to the heterogeneity and rapid… More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Big Data Analytics in IoT Environment

    M. Anuradha1,*, G. Mani2, T. Shanthi3, N. R. Nagarajan4, P. Suresh5, C. Bharatiraja6

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 381-396, 2022, DOI:10.32604/csse.2022.023321

    Abstract In the digital area, Internet of Things (IoT) and connected objects generate a huge quantity of data traffic which feeds big data analytic models to discover hidden patterns and detect abnormal traffic. Though IoT networks are popular and widely employed in real world applications, security in IoT networks remains a challenging problem. Conventional intrusion detection systems (IDS) cannot be employed in IoT networks owing to the limitations in resources and complexity. Therefore, this paper concentrates on the design of intelligent metaheuristic optimization based feature selection with deep learning (IMFSDL) based classification model, called IMFSDL-IDS for IoT networks. The proposed IMFSDL-IDS… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Deep Learning Framework for Intrusion Detection Systems in WSN-IoT Networks

    M. Maheswari1,2,*, R. A. Karthika1

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 365-382, 2022, DOI:10.32604/iasc.2022.022259

    Abstract With the advent of wireless communication and digital technology, low power, Internet-enabled, and reconfigurable wireless devices have been developed, which revolutionized day-to-day human life and the economy across the globe. These devices are realized by leveraging the features of sensing, processing the data and nodes communications. The scale of Internet-enabled wireless devices has increased daily, and these devices are exposed to various cyber-attacks. Since the complexity and dynamics of the attacks on the devices are computationally high, intelligent, scalable and high-speed intrusion detection systems (IDS) are required. Moreover, the wireless devices are battery-driven; implementing them would consume more energy, weakening… More >

  • Open Access

    ARTICLE

    HELP-WSN-A Novel Adaptive Multi-Tier Hybrid Intelligent Framework for QoS Aware WSN-IoT Networks

    J. Sampathkumar*, N. Malmurugan

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2107-2123, 2022, DOI:10.32604/cmc.2022.019983

    Abstract Wireless Sensor Network is considered as the intermediate layer in the paradigm of Internet of things (IoT) and its effectiveness depends on the mode of deployment without sacrificing the performance and energy efficiency. WSN provides ubiquitous access to location, the status of different entities of the environment and data acquisition for long term IoT monitoring. Achieving the high performance of the WSN-IoT network remains to be a real challenge since the deployment of these networks in the large area consumes more power which in turn degrades the performance of the networks. So, developing the robust and QoS (quality of services)… More >

  • Open Access

    ARTICLE

    Towards Machine Learning Based Intrusion Detection in IoT Networks

    Nahida Islam1, Fahiba Farhin1, Ishrat Sultana1, M. Shamim Kaiser1, Md. Sazzadur Rahman1, Mufti Mahmud2, A. S. M. Sanwar Hosen3, Gi Hwan Cho3,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1801-1821, 2021, DOI:10.32604/cmc.2021.018466

    Abstract The Internet of Things (IoT) integrates billions of self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience in many applications including healthcare, agriculture, supply chain, education, transportation and traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one of the most complicated issues on the IoT. Implementing security measures, including encryption, access control, and authentication for the IoT devices are ineffective in achieving security. In this paper, we identified various types of IoT threats and shallow (such as decision… More >

  • Open Access

    ARTICLE

    Secure Multifactor Remote Access User Authentication Framework for IoT Networks

    Mohammed Mujib Alshahrani*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3235-3254, 2021, DOI:10.32604/cmc.2021.015310

    Abstract The term IoT refers to the interconnection and exchange of data among devices/sensors. IoT devices are often small, low cost, and have limited resources. The IoT issues and challenges are growing increasingly. Security and privacy issues are among the most important concerns in IoT applications, such as smart buildings. Remote cybersecurity attacks are the attacks which do not require physical access to the IoT networks, where the attacker can remotely access and communicate with the IoT devices through a wireless communication channel. Thus, remote cybersecurity attacks are a significant threat. Emerging applications in smart environments such as smart buildings require… More >

Displaying 11-20 on page 2 of 19. Per Page