Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (166)
  • Open Access

    ARTICLE

    Paillier Cryptography Based Message Authentication Code for IoMT Security

    S. Siamala Devi1, Chandrakala Kuruba2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2209-2223, 2023, DOI:10.32604/csse.2023.025514

    Abstract Health care visualization through Internet of Things (IoT) over wireless sensor network (WSN) becomes a current research attention due to medical sensor evolution of devices. The digital technology-based communication system is widely used in all application. Internet of medical thing (IoMT) assisted healthcare application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation. These smart medical devices may consume with limited resources and also the data generated by these devices are large in size. These IoMT based applications suffer from the issues such as security, anonymity, privacy,… More >

  • Open Access

    ARTICLE

    Active Authentication Protocol for IoV Environment with Distributed Servers

    Saravanan Manikandan1, Mosiur Rahaman1, Yu-Lin Song1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5789-5808, 2022, DOI:10.32604/cmc.2022.031490

    Abstract The Internet of Vehicles (IoV) has evolved as an advancement over the conventional Vehicular Ad-hoc Networks (VANETs) in pursuing a more optimal intelligent transportation system that can provide various intelligent solutions and enable a variety of applications for vehicular traffic. Massive volumes of data are produced and communicated wirelessly among the different relayed entities in these vehicular networks, which might entice adversaries and endanger the system with a wide range of security attacks. To ensure the security of such a sensitive network, we proposed a distributed authentication mechanism for IoV based on blockchain technology as a distributed ledger with an… More >

  • Open Access

    ARTICLE

    Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications

    Muhammad Waqas1,3,*, Shehr Bano2, Fatima Hassan2, Shanshan Tu1, Ghulam Abbas2, Ziaul Haq Abbas4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4489-4499, 2022, DOI:10.32604/cmc.2022.029539

    Abstract Cyber-physical wireless systems have surfaced as an important data communication and networking research area. It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies. Due to their high reliability, sensitivity and connectivity, their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping, spoofing, botnets, man-in-the-middle attack, denial of service (DoS) and distributed denial of service (DDoS) and impersonation. Existing methods use physical layer authentication (PLA), the most promising solution to detect… More >

  • Open Access

    ARTICLE

    Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning

    Christy James Jose1,*, M. S. Rajasree2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1357-1372, 2023, DOI:10.32604/csse.2023.025672

    Abstract The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like, fingerprint or face. Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’ identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session. However, divergent issues remain unaddressed. This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called, Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s (GWCK-CC). First, a Gaussian Weighted… More >

  • Open Access

    ARTICLE

    Encryption with User Authentication Model for Internet of Medical Things Environment

    K. S. Riya1, R. Surendran2,*, Carlos Andrés Tavera Romero3, M. Sadish Sendil4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 507-520, 2023, DOI:10.32604/iasc.2023.027779

    Abstract Internet of Medical Things (IoMT) enabled e-healthcare has the potential to greately improve conventional healthcare services significantly. However, security and privacy become major issues of IoMT because of the restricted processing abilities, storage, and energy constraints of the sensors. Therefore, it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors. In order to ensure security on sensitive medical data, effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers. In this view, this study designs an effective metaheuristic optimization based encryption with user authentication (EMOE-UA) technique for IoMT… More >

  • Open Access

    ARTICLE

    Voice Response Questionnaire System for Speaker Recognition Using Biometric Authentication Interface

    Chang-Yi Kao1, Hao-En Chueh2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 913-924, 2023, DOI:10.32604/iasc.2023.024734

    Abstract

    The use of voice to perform biometric authentication is an important technological development, because it is a non-invasive identification method and does not require special hardware, so it is less likely to arouse user disgust. This study tries to apply the voice recognition technology to the speech-driven interactive voice response questionnaire system aiming to upgrade the traditional speech system to an intelligent voice response questionnaire network so that the new device may offer enterprises more precise data for customer relationship management (CRM). The intelligence-type voice response gadget is becoming a new mobile channel at the current time, with functions of… More >

  • Open Access

    ARTICLE

    Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage

    B. Venkatesan1,*, S. Chitra2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1603-1615, 2022, DOI:10.32604/iasc.2022.026049

    Abstract The cloud storage is essential environment for users to access high confidential data. Every single data is most valued by users. If we count, day by day information as well as, memory storage are increasing gradually. Cost of memory will increase when data increases with demand for storage. At present data duplication or redundant data storing in the cloud became hard for storage provider. Also, it makes security issue if repeated data from various users stored in the server. It makes data duplication, which is very efficient for intruders. Also, when same data stored in cloud, there will be a… More >

  • Open Access

    ARTICLE

    Novel DoS Attack Detection Based on Trust Mode Authentication for IoT

    D. Yuvaraj1, S. Shanmuga Priya2,*, M. Braveen3, S. Navaneetha Krishnan4, S. Nachiyappan5, Abolfazl Mehbodniya6, A. Mohamed Uvaze Ahamed7, M. Sivaram8

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1505-1522, 2022, DOI:10.32604/iasc.2022.022151

    Abstract Wireless sensor networks are extensively utilized as a communication mechanism in the field of the Internet of Things (IoT). Along with these services, numerous IoT based applications need stabilized transmission or delivery over unbalanced wireless connections. To ensure the stability of data packets delivery, prevailing works exploit diverse geographical routing with multi-hop forwarders in WSNs. Furthermore, critical Denial of Service (DoS) attacks frequently has an impact on these techniques, where an enormous amount of invalid data starts replicating and transmitted to receivers to prevent Wireless Sensor Networks (WSN) communication. In this investigation, a novel adaptive endorsement method is designed by… More >

  • Open Access

    ARTICLE

    Fast and Efficient Security Scheme for Blockchain-Based IoT Networks

    K. A. Fasila*, Sheena Mathew

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2097-2114, 2022, DOI:10.32604/cmc.2022.029637

    Abstract

    Internet of Things (IoT) has become widely used nowadays and tremendous increase in the number of users raises its security requirements as well. The constraints on resources such as low computational capabilities and power requirements demand lightweight cryptosystems. Conventional algorithms are not applicable in IoT network communications because of the constraints mentioned above. In this work, a novel and efficient scheme for providing security in IoT applications is introduced. The scheme proposes how security can be enhanced in a distributed IoT application by providing multilevel protection and dynamic key generation in the data uploading and transfer phases. Existing works rely… More >

  • Open Access

    ARTICLE

    Voice to Face Recognition Using Spectral ERB-DMLP Algorithms

    Fauzi A. Bala1,2,*, Osman N. Ucan1, Oguz Bayat1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2187-2204, 2022, DOI:10.32604/cmc.2022.024205

    Abstract Designing an authentication system for securing the power plants are important to allow only specific staffs of the power plant to access the certain blocks so that they can be restricted from using high risk-oriented equipment. This authentication is also vital to prevent any security threats or risks like compromises of business server, release of confidential data etc. Though conventional works attempted to accomplish better authentication, they lacked with respect to accuracy. Hence, the study aims to enhance the recognition rate by introducing a voice recognition system as a personal authentication based on Deep Learning (DL) due to its ability… More >

Displaying 61-70 on page 7 of 166. Per Page