Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (298)
  • Open Access

    ARTICLE

    Domain Name Service Mechanism Based on Master-Slave Chain

    Siyuan Liu1, Shaoyong Guo1,*, Ziwei Hu2, Xin Xu3, Wei Bai2, Ningzhe Xing4, Xuesong Qiu1, Siwen Xu5

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 951-962, 2022, DOI:10.32604/iasc.2022.021202

    Abstract Although the current Domain Name System (DNS) has been able to satisfy the use of network services, there are still many challenges in the future development of the Internet. The centralized management of traditional domain name management systems has many risks, and cannot defend against Distributed Denial of Service (DDoS) attacks and single points of failure. As a decentralized tool, blockchain provides innovative ideas for the improvement of domain name management systems. Starting from the existing network resolution system and combining the application of cross-chain communication in DNS, this paper proposes a domain name resolution service architecture model based on… More >

  • Open Access

    ARTICLE

    Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain

    Hao Yan1,2, Yanan Liu1, Shuo Qiu1, Shengzhou Hu3, Weijian Zhang4,*, Jinyue Xia5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1129-1142, 2022, DOI:10.32604/csse.2022.022317

    Abstract With the rapidly developing of Internet of Things (IoT), the volume of data generated by IoT systems is increasing quickly. To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be outsourced to cloud server. Since cloud service provider (CSP) is not fully trusted, a variety of methods have been proposed to deal with the problem of data integrity checking. In traditional data integrity audition schemes, the task of data auditing is usually performed by Third Party Auditor (TPA) which is… More >

  • Open Access

    ARTICLE

    A Novel Post-Quantum Blind Signature for Log System in Blockchain

    Gang Xu1,2, Yibo Cao1, Shiyuan Xu1, Ke Xiao1, Xin Liu3, Xiubo Chen4,*, Mianxiong Dong5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 945-958, 2022, DOI:10.32604/csse.2022.022100

    Abstract In recent decades, log system management has been widely studied for data security management. System abnormalities or illegal operations can be found in time by analyzing the log and provide evidence for intrusions. In order to ensure the integrity of the log in the current system, many researchers have designed it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attacker equipped with a quantum computer can extract the user's private key from the public key to generate a forged signature, destroy the structure of the blockchain, and threaten the… More >

  • Open Access

    ARTICLE

    Blockchain-Based Decentralized Reputation Management System for Internet of Everything in 6G-Enabled Cybertwin Architecture

    Meimin Wang, Zhili Zhou*, Chun Ding

    Journal of New Media, Vol.3, No.4, pp. 137-150, 2021, DOI:10.32604/jnm.2021.024543

    Abstract Internet of Everything (IoE) has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet, and it can be widely applied in the fields of industry, transportation, commerce, and education. Recently, the emergence of 6G-enabled cybertwin network architecture provides the technical and theoretical foundation for the realization of IoE paradigm. However, the IoE has three open issues in the 6G-enabled cybertwin architecture, i.e., data authenticity, data storage and node reliability. To address these issues, we propose a blockchain-based decentralized reputation management system (BC-DRMS) for IoE in 6G-enabled Cybertwin architecture.… More >

  • Open Access

    ARTICLE

    A Design Framework for Smart Ration Shop Using Blockchain and IoT Technologies

    D. Malathi1, Vijayakumar Ponnusamy2,*, S. Saravanan3, D. Deepa4, Tariq Ahamed Ahanger5

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 605-619, 2022, DOI:10.32604/iasc.2022.022083

    Abstract The Public Distribution System (PDS) distributes the subsidized food and non-food items to poor populations through fair price shops (FPS). The PDS has been criticized for its urban bias and its failure to serve the underprivileged sections of the community effectively. The Current system manual-based data management and ledger management gives rise to much corruption in the process of extricating the poor from those who are less needy. There are chances for the block market because of the current methodology of data management. This article proposes a blockchain technology-based smart ration shop system that uses immutable smart contract-based transactions to… More >

  • Open Access

    ARTICLE

    Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network

    Mohamed Ali1, Ibrahim A. Abd El-Moghith2, Mohamed N. El-Derini3, Saad M. Darwish2,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6127-6140, 2022, DOI:10.32604/cmc.2022.021305

    Abstract Routing is a key function in Wireless Sensor Networks (WSNs) since it facilitates data transfer to base stations. Routing attacks have the potential to destroy and degrade the functionality of WSNs. A trustworthy routing system is essential for routing security and WSN efficiency. Numerous methods have been implemented to build trust between routing nodes, including the use of cryptographic methods and centralized routing. Nonetheless, the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities. At the moment, there is no effective way to avoid malicious node attacks. As a consequence… More >

  • Open Access

    ARTICLE

    Distributed Secure Storage Scheme Based on Sharding Blockchain

    Jin Wang1,2, Chenchen Han1, Xiaofeng Yu3,*, Yongjun Ren4, R. Simon Sherratt5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4485-4502, 2022, DOI:10.32604/cmc.2022.020648

    Abstract Distributed storage can store data in multiple devices or servers to improve data security. However, in today's explosive growth of network data, traditional distributed storage scheme is faced with some severe challenges such as insufficient performance, data tampering, and data lose. A distributed storage scheme based on blockchain has been proposed to improve security and efficiency of traditional distributed storage. Under this scheme, the following improvements have been made in this paper. This paper first analyzes the problems faced by distributed storage. Then proposed to build a new distributed storage blockchain scheme with sharding blockchain. The proposed scheme realizes the… More >

  • Open Access

    ARTICLE

    Blockchain and Machine Learning for Intelligent Multiple Factor-Based Ride-Hailing Services

    Zeinab Shahbazi, Yung-Cheol Byun*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4429-4446, 2022, DOI:10.32604/cmc.2022.019755

    Abstract One of the common transportation systems in Korea is calling taxis through online applications, which is more convenient for passengers and drivers in the modern area. However, the driver's passenger taxi request can be rejected based on the driver's location and distance. Therefore, there is a need to specify driver's acceptance and rejection of the received request. The security of this system is another main core to save the transaction information and safety of passengers and drivers. In this study, the origin and destination of the Jeju island South Korea were captured from T-map and processed based on machine learning… More >

  • Open Access

    ARTICLE

    Bcvop2p: Decentralized Blockchain-Based Authentication Scheme for Secure Voice Communication

    Mustafa Kara1,*, Muhammed Ali Aydın1,2, Hasan Hüseyin Balık1

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1901-1918, 2022, DOI:10.32604/iasc.2022.021309

    Abstract Peer-to-peer VoIP applications are exposed to threats in the Internet environment as they carry out conversations over the Internet, which is an electronic communication line, and its security has always been largely a matter of concern. Authentication of the caller is the first line of defense among the security principles and is an important principle to provide security in VoIP application. Authentication methods in VoIP applications are usually based on trusted third parties or through centralized architecture. This situation creates problems in terms of single point of failure and privacy in call security over IP based communications. However, blockchain technology… More >

  • Open Access

    ARTICLE

    Efficient Key Management System Based Lightweight Devices in IoT

    T. Chindrella Priyadharshini1,*, D. Mohana Geetha2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1793-1808, 2022, DOI:10.32604/iasc.2022.020422

    Abstract The Internet of Things (IoT) has changed our lives significantly. Although IoT provides new opportunities, security remains a key concern while providing various services. Existing research methodologies try to solve the security and time-consuming problem also exists. To solve those problems, this paper proposed a Hashed Advanced Encryption Standard (HAES) algorithm based efficient key management system for internet-based lightweight devices in IoT networks. The proposed method is mainly divided into two phases namely Data Owner (DO) and Data User (DU) phase. The DO phase consists of two processes namely authentication and secure data uploading. In authentication, the registration process consists… More >

Displaying 211-220 on page 22 of 298. Per Page