Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (688)
  • Open Access

    ARTICLE

    Security Empowered System-on-Chip Selection for Internet of Things

    Ramesh Krishnamoorthy*, Kalimuthu Krishnan

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 403-418, 2021, DOI:10.32604/iasc.2021.018560

    Abstract Due to the rapid growth of embedded devices, the selection of System-on-Chip (SoC) has a stronger influence to enable hardware security in embedded system design. System-on-chip (SoC) devices consist of one or more CPUs through wide-ranging inbuilt peripherals for designing a system with less cost. The selection of SoC is more significant to determine the suitability for secured application development. The design space analysis of symmetric key approaches including rivest cipher (RC5), advanced encryption standard (AES), data encryption standard (DES), international data encryption algorithm (IDEA), elliptic curve cryptography (ECC), MX algorithm, and the secure hash algorithm (SHA-256) are compared to… More >

  • Open Access

    ARTICLE

    A Shadowed Rough-fuzzy Clustering Algorithm Based on Mahalanobis Distance for Intrusion Detection

    Lina Wang1,2,*, Jie Wang3, Yongjun Ren4, Zimeng Xing1, Tao Li1, Jinyue Xia5

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 31-47, 2021, DOI:10.32604/iasc.2021.018577

    Abstract Intrusion detection has been widely used in many application domains; thus, it has caught significant attention in academic fields these years. Assembled with more and more sub-systems, the network is more vulnerable to multiple attacks aiming at the network security. Compared with the other issues such as complex environment and resources-constrained devices, network security has been the biggest challenge for Internet construction. To deal with this problem, a fundamental measure for safeguarding network security is to select an intrusion detection algorithm. As is known, it is less effective to determine the abnormal behavior as an intrusion and learn the entire… More >

  • Open Access

    ARTICLE

    A Lightweight Anonymous Device Authentication Scheme for Information-Centric Distribution Feeder Microgrid

    Anhao Xiang, Jun Zheng*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2141-2158, 2021, DOI:10.32604/cmc.2021.018808

    Abstract Distribution feeder microgrid (DFM) built based on existing distributed feeder (DF), is a promising solution for modern microgrid. DFM contains a large number of heterogeneous devices that generate heavy network traffice and require a low data delivery latency. The information-centric networking (ICN) paradigm has shown a great potential to address the communication requirements of smart grid. However, the integration of advanced information and communication technologies with DFM make it vulnerable to cyber attacks. Adequate authentication of grid devices is essential for preventing unauthorized accesses to the grid network and defending against cyber attacks. In this paper, we propose a new… More >

  • Open Access

    ARTICLE

    An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics

    Naglaa F. Soliman1,2, Abeer D. Algarni1,*, Walid El-Shafai3, Fathi E. Abd El-Samie1,3, Ghada M. El Banby4

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1571-1595, 2021, DOI:10.32604/cmc.2021.016980

    Abstract Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things (IoT) networks. The objective of using cancelable biometrics is to save the original ones from hacking attempts. A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications. The original biometric is blurred with two co-prime operators. Hence, it can be recovered as the Greatest Common Divisor (GCD) between its two blurred versions. Minimal changes if induced in the biometric… More >

  • Open Access

    ARTICLE

    Security and Privacy in 5G Internet of Vehicles (IoV) Environment

    Benjamin Kwapong Osibo1, Chengbo Zhang1, Changsen Xia1, Guanzhe Zhao2, Zilong Jin1,3,*

    Journal on Internet of Things, Vol.3, No.2, pp. 77-86, 2021, DOI:10.32604/jiot.2021.017943

    Abstract Modern vehicles are equipped with sensors, communication, and computation units that make them capable of providing monitoring services and analysis of real-time traffic information to improve road safety. The main aim of communication in vehicular networks is to achieve an autonomous driving environment that is accident-free alongside increasing road use quality. However, the demanding specifications such as high data rate, low latency, and high reliability in vehicular networks make 5G an emerging solution for addressing the current vehicular network challenges. In the 5G IoV environment, various technologies and models are deployed, making the environment open to attacks such as Sybil,… More >

  • Open Access

    ARTICLE

    Machine Learning Based Framework for Maintaining Privacy of Healthcare Data

    Adil Hussain Seh1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Alka Agrawal1, Rajeev Kumar4,*, Raees Ahmad Khan1

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 697-712, 2021, DOI:10.32604/iasc.2021.018048

    Abstract The Adoption of Artificial Intelligence (AI), Machine Learning (ML), Internet of Things (IoT), cloud services, web-based software systems, and other wireless sensor devices in the healthcare infrastructure have led to phenomenal improvements and benefits in the healthcare sector. Digital healthcare has ensured early diagnosis of the diseases, greater accessibility, and mass outreach in terms of treatment. Despite this unprecedented success, the privacy and confidentiality of the healthcare data have become a major concern for all the stakeholders. Data breach reports reveal that the healthcare data industry is one of the key targets of cyber invaders. In fact the last few… More >

  • Open Access

    ARTICLE

    New Quantum Private Comparison Using Hyperentangled GHZ State

    Jerrel Gianni1, Zhiguo Qu2,*

    Journal of Quantum Computing, Vol.3, No.2, pp. 45-54, 2021, DOI:10.32604/jqc.2021.019675

    Abstract In this paper, we propose a new protocol designed for quantum private comparison (QPC). This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party (TP) to achieve the objective. This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom (DOF), which could have 64 combinations. The TP can decide which combination to use based on the shared key information provided from a quantum key distribution (QKD) protocol. By doing so, the security of the protocol can be improved further. Decoy photon technology is also used as another means of… More >

  • Open Access

    ARTICLE

    A Hybrid Scheme for Secure Wireless Communications in IoT

    Muhammad Irshad Nazeer1,2,*, Ghulam Ali Mallah1, Raheel Ahmed Memon2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 633-648, 2021, DOI:10.32604/iasc.2021.017771

    Abstract Network Coding is a potential technology for the future wireless communications and Internet of Things (IoT) as it reduces the number of transmissions and offers energy efficiency. It is vulnerable to threat and attack that can harm intermediate nodes. Indeed, it exhibits an ability to incorporate security of transmitted data, yet a lot of work needs to be done to provide a safeguard from threats. The purpose of this study is to strengthen the existing Network Coding scheme with a set of generic requirements for Network Coding Protocols by adopting system models and a Genetic Algorithm based cryptosystem. A hybrid… More >

  • Open Access

    ARTICLE

    Smartphone Security Using Swipe Behavior-based Authentication

    Adnan Bin Amanat Ali1, Vasaki Ponnusamy1, Anbuselvan Sangodiah1, Roobaea Alroobaea2, N. Z. Jhanjhi3,*, Uttam Ghosh4, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 571-585, 2021, DOI:10.32604/iasc.2021.015913

    Abstract Most smartphone users prefer easy and convenient authentication without remembering complicated passwords or drawing intricate patterns. Preferably, after one-time authentication, there is no verification of the user’s authenticity. Therefore, security and privacy against unauthorized users is a crucial research area. Behavioral authentication is an emerging security technique that is gaining attention for its uniqueness and transparency. In this paper, a behavior-based authentication system is built using swipe movements to continuously authenticate the user after one-time traditional authentication. The key feature is the selection of an optimal feature set for the swipe movement. Five machine learning classifiers are used, of which… More >

  • Open Access

    ARTICLE

    Ecological Security Evaluation Algorithm for Resource-Exhausted Cities Based on the PSR Model

    Xiaozhou Li1,2, Zhenggang Xu1, Yuanyuan Fu3, Qi Jin1, Yunlin Zhao1,*, Neal N. Xiong4

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 985-1001, 2021, DOI:10.32604/cmc.2021.017357

    Abstract Today, resource depletion threatens a number of resource-based cities in China. The ecological security problem caused by the long-term exploitation of natural resources is a key issue to be solved in the development of resource-exhausted cities. Using 23 indicators, this study evaluated the ecological security status and development trends of 21 resource-exhausted cities in China from 2011 to 2017. The results showed that from 2011 to 2015, the overall ecological security of this type of city was low, with over 60% of the cities at an unsafe level. However, ecological security improved rapidly after 2016, and by 2017, all of… More >

Displaying 511-520 on page 52 of 688. Per Page