Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things

    Shaha Al-Otaibi1, Rahim Khan2,*, Hashim Ali2, Aftab Ahmed Khan2, Amir Saeed3, Jehad Ali4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3805-3823, 2024, DOI:10.32604/cmc.2024.049017

    Abstract The Internet of Things (IoT) is a smart networking infrastructure of physical devices, i.e., things, that are embedded with sensors, actuators, software, and other technologies, to connect and share data with the respective server module. Although IoTs are cornerstones in different application domains, the device’s authenticity, i.e., of server(s) and ordinary devices, is the most crucial issue and must be resolved on a priority basis. Therefore, various field-proven methodologies were presented to streamline the verification process of the communicating devices; however, location-aware authentication has not been reported as per our knowledge, which is a crucial metric, especially in scenarios where… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things

    Hongliang Tian, Junyuan Tian*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1297-1310, 2024, DOI:10.32604/cmc.2024.047058

    Abstract The Internet of Things (IoT) access control mechanism may encounter security issues such as single point of failure and data tampering. To address these issues, a blockchain-based IoT reputation value attribute access control scheme is proposed. Firstly, writing the reputation value as an attribute into the access control policy, and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control; Secondly, storing a large amount of resources from the Internet of Things in Inter Planetary File System (IPFS) to improve system throughput; Finally, map resource access… More >

  • Open Access

    ARTICLE

    Adaptive Momentum-Backpropagation Algorithm for Flood Prediction and Management in the Internet of Things

    Jayaraj Thankappan1, Delphin Raj Kesari Mary2, Dong Jin Yoon3, Soo-Hyun Park4,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1053-1079, 2023, DOI:10.32604/cmc.2023.038437

    Abstract Flooding is a hazardous natural calamity that causes significant damage to lives and infrastructure in the real world. Therefore, timely and accurate decision-making is essential for mitigating flood-related damages. The traditional flood prediction techniques often encounter challenges in accuracy, timeliness, complexity in handling dynamic flood patterns and leading to substandard flood management strategies. To address these challenges, there is a need for advanced machine learning models that can effectively analyze Internet of Things (IoT)-generated flood data and provide timely and accurate flood predictions. This paper proposes a novel approach-the Adaptive Momentum and Backpropagation (AM-BP) algorithm-for flood prediction and management in… More >

  • Open Access

    ARTICLE

    Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model

    Mohammad S. Al-kahtani1, Zahid Mehmood2,3,*, Tariq Sadad4, Islam Zada5, Gauhar Ali6, Mohammed ElAffendi6

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2279-2290, 2023, DOI:10.32604/iasc.2023.037673

    Abstract Cybersecurity threats are increasing rapidly as hackers use advanced techniques. As a result, cybersecurity has now a significant factor in protecting organizational limits. Intrusion detection systems (IDSs) are used in networks to flag serious issues during network management, including identifying malicious traffic, which is a challenge. It remains an open contest over how to learn features in IDS since current approaches use deep learning methods. Hybrid learning, which combines swarm intelligence and evolution, is gaining attention for further improvement against cyber threats. In this study, we employed a PSO-GA (fusion of particle swarm optimization (PSO) and genetic algorithm (GA)) for… More >

  • Open Access

    ARTICLE

    Mobile Communication Voice Enhancement Under Convolutional Neural Networks and the Internet of Things

    Jiajia Yu*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 777-797, 2023, DOI:10.32604/iasc.2023.037354

    Abstract This study aims to reduce the interference of ambient noise in mobile communication, improve the accuracy and authenticity of information transmitted by sound, and guarantee the accuracy of voice information delivered by mobile communication. First, the principles and techniques of speech enhancement are analyzed, and a fast lateral recursive least square method (FLRLS method) is adopted to process sound data. Then, the convolutional neural networks (CNNs)-based noise recognition CNN (NR-CNN) algorithm and speech enhancement model are proposed. Finally, related experiments are designed to verify the performance of the proposed algorithm and model. The experimental results show that the noise classification… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment

    Manal Abdullah Alohali1, Muna Elsadig1, Fahd N. Al-Wesabi2, Mesfer Al Duhayyim3, Anwer Mustafa Hilal4,*, Abdelwahed Motwakel4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3087-3102, 2023, DOI:10.32604/csse.2023.036802

    Abstract With the advent of the Internet of Things (IoT), several devices like sensors nowadays can interact and easily share information. But the IoT model is prone to security concerns as several attackers try to hit the network and make it vulnerable. In such scenarios, security concern is the most prominent. Different models were intended to address these security problems; still, several emergent variants of botnet attacks like Bashlite, Mirai, and Persirai use security breaches. The malware classification and detection in the IoT model is still a problem, as the adversary reliably generates a new variant of IoT malware and actively… More >

  • Open Access

    REVIEW

    A Review about Wireless Sensor Networks and the Internet of Things

    Amarjit Singh*

    Journal on Internet of Things, Vol.4, No.2, pp. 69-73, 2022, DOI:10.32604/jiot.2022.026170

    Abstract Wireless sensor networks (WSNs) are created and affect our daily lives. You can find applications in various fields such as health, accident, life, manufacturing, production management, network management and many other fields. WSN now connects to the Internet of Things, connects the sensor to the Internet, and then uses it for collaboration and collaboration. However, when WSN is part of the internet we need to be able to study and analyze related terms. In this article, we’re going to look at different ways to get WSN online and identify the challenges that address in future as well. More >

  • Open Access

    ARTICLE

    A Lightweight Deep Autoencoder Scheme for Cyberattack Detection in the Internet of Things

    Maha Sabir1, Jawad Ahmad2,*, Daniyal Alghazzawi1

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 57-72, 2023, DOI:10.32604/csse.2023.034277

    Abstract The Internet of things (IoT) is an emerging paradigm that integrates devices and services to collect real-time data from surroundings and process the information at a very high speed to make a decision. Despite several advantages, the resource-constrained and heterogeneous nature of IoT networks makes them a favorite target for cybercriminals. A single successful attempt of network intrusion can compromise the complete IoT network which can lead to unauthorized access to the valuable information of consumers and industries. To overcome the security challenges of IoT networks, this article proposes a lightweight deep autoencoder (DAE) based cyberattack detection framework. The proposed… More >

  • Open Access

    ARTICLE

    COVID-19 Imaging Detection in the Context of Artificial Intelligence and the Internet of Things

    Xiaowei Gu1,#, Shuwen Chen1,2,#,*, Huisheng Zhu1, Mackenzie Brown3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.2, pp. 507-530, 2022, DOI:10.32604/cmes.2022.018948

    Abstract Coronavirus disease 2019 brings a huge burden on the medical industry all over the world. In the background of artificial intelligence (AI) and Internet of Things (IoT) technologies, chest computed tomography (CT) and chest X-ray (CXR) scans are becoming more intelligent, and playing an increasingly vital role in the diagnosis and treatment of diseases. This paper will introduce the segmentation of methods and applications. CXR and CT diagnosis of COVID-19 based on deep learning, which can be widely used to fight against COVID-19. More >

  • Open Access

    ARTICLE

    ETM-IoT: Energy-Aware Threshold Model for Heterogeneous Communication in the Internet of Things

    A. Vijaya Krishna1, A. Anny Leema2,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1815-1827, 2022, DOI:10.32604/cmc.2022.018455

    Abstract The internet of things (IoT) has a wide variety of applications, which in turn raises many challenging issues. IoT technology enables devices to closely monitor their environment, providing context-aware intelligence based on the real-time data collected by their sensor nodes. The IoT not only controls these devices but also monitors their user's behaviour. One of the major issues related to IoT is the need for an energy-efficient communication protocol which uses the heterogeneity and diversity of the objects connected through the internet. Minimizing energy consumption is a requirement for energy-constrained nodes and outsourced nodes. The IoT nodes deployed in different… More >

Displaying 1-10 on page 1 of 15. Per Page