Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (60)
  • Open Access

    ARTICLE

    ESSD: Energy Saving and Securing Data Algorithm for WSNs Security

    Manar M. Aldaseen1, Khaled M. Matrouk1, Laiali H. Almazaydeh2,*, Khaled M. Elleithy3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3969-3981, 2022, DOI:10.32604/cmc.2022.028520

    Abstract The Wireless Sensor Networks (WSNs) are characterized by their widespread deployment due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against the attacks, an effective security solution is required. However, the limits of these networks’ battery-based energy to the sensor are the most critical impediments to selecting cryptographic techniques. Consequently, finding a suitable algorithm that achieves the least energy consumption in data encryption and decryption and providing a highly protected system for data remains the fundamental problem. In this research, the main objective is to obtain data security during transmission by proposing a… More >

  • Open Access

    ARTICLE

    Securing Consumer Internet of Things for Botnet Attacks: Deep Learning Approach

    Tariq Ahamed Ahanger1,*, Abdulaziz Aldaej1, Mohammed Atiquzzaman2, Imdad Ullah1, Mohammed Yousuf Uddin1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3199-3217, 2022, DOI:10.32604/cmc.2022.027212

    Abstract DDoS attacks in the Internet of Things (IoT) technology have increased significantly due to its spread adoption in different industrial domains. The purpose of the current research is to propose a novel technique for detecting botnet attacks in user-oriented IoT environments. Conspicuously, an attack identification technique inspired by Recurrent Neural networks and Bidirectional Long Short Term Memory (BLRNN) is presented using a unique Deep Learning (DL) technique. For text identification and translation of attack data segments into tokenized form, word embedding is employed. The performance analysis of the presented technique is performed in comparison to the state-of-the-art DL techniques. Specifically,… More >

  • Open Access

    ARTICLE

    Hybrid Smart Contracts for Securing IoMT Data

    D. Palanikkumar1, Adel Fahad Alrasheedi2, P. Parthasarathi3, S. S. Askar2, Mohamed Abouhawwash4,5,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 457-469, 2023, DOI:10.32604/csse.2023.024884

    Abstract Data management becomes essential component of patient healthcare. Internet of Medical Things (IoMT) performs a wireless communication between E-medical applications and human being. Instead of consulting a doctor in the hospital, patients get health related information remotely from the physician. The main issues in the E-Medical application are lack of safety, security and privacy preservation of patient’s health care data. To overcome these issues, this work proposes block chain based IoMT Processed with Hybrid consensus protocol for secured storage. Patients health data is collected from physician, smart devices etc. The main goal is to store this highly valuable health related… More >

  • Open Access

    ARTICLE

    Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data

    A. Jameer Basha1, N. Rajkumar2, Mohammed A. AlZain3, Mehedi Masud4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1693-1706, 2022, DOI:10.32604/iasc.2022.024714

    Abstract In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication processes between the medical devices and the humans via wireless network. Moreover, this communication helps both the physicians and the patients to contact remotely for the diagnosis of the disease’s wearable devices sensor signals. However, IoMT system violates the privacy preserving of Patient’s Health Record (PHR) as well as self-sovereign identity of patient. In this regard, security action should be taken. Previous techniques used in IoMT are in lack of data consistency, confidentiality, and inaccessible of data. To overcome these issues, the fog computing-based technology is used in… More >

  • Open Access

    ARTICLE

    Curing Kinetics of Tannin and Lignin Biobased Adhesives Determined by DSC and ABES

    Jaša Saražin1, Ida Poljanšek1, Antonio Pizzi2, Milan Šernek1,*

    Journal of Renewable Materials, Vol.10, No.8, pp. 2117-2131, 2022, DOI:10.32604/jrm.2022.019602

    Abstract The curing process of two biobased adhesives: pine tanninhexamine (TH) and organosolv lignin non-isocyanate polyurethane (NIPU), suitable for interior nonstructural use, were compared with commercial urea-formaldehyde (UF) adhesive. Changes in chemical structure before and after the curing process were observed with Fouriertransform infrared spectroscopy (FTIR). The process of adhesive curing was monitored with differential scanning calorimetry (DSC) and the automated bonding evaluation system (ABES). Both DSC and ABES measurements confirmed UF as the fastest and NIPU as the slowest curing adhesive observed. Taking into account the ABES results, the optimal pressing parameters for the TH adhesive would be 4 min… More >

  • Open Access

    ARTICLE

    Securing Copyright Using 3D Objects Blind Watermarking Scheme

    Hussein Abulkasim1,*, Mona Jamjoom2, Safia Abbas2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5969-5983, 2022, DOI:10.32604/cmc.2022.027999

    Abstract Recently, securing Copyright has become a hot research topic due to rapidly advancing information technology. As a host cover, watermarking methods are used to conceal or embed sensitive information messages in such a manner that it was undetectable to a human observer in contemporary times. Digital media covers may often take any form, including audio, video, photos, even DNA data sequences. In this work, we present a new methodology for watermarking to hide secret data into 3-D objects. The technique of blind extraction based on reversing the steps of the data embedding process is used. The implemented technique uses the… More >

  • Open Access

    ARTICLE

    A Mutual Authentication and Cross Verification Protocol for Securing Internet-of-Drones (IoD)

    Saeed Ullah Jan1, Irshad Ahmed Abbasi2,*, Fahad Algarni3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5845-5869, 2022, DOI:10.32604/cmc.2022.026179

    Abstract With the rapid miniaturization in sensor technology, Internet-of-Drones (IoD) has delighted researchers towards information transmission security among drones with the control station server (CSS). In IoD, the drone is different in shapes, sizes, characteristics, and configurations. It can be classified on the purpose of its deployment, either in the civilian or military domain. Drone’s manufacturing, equipment installation, power supply, multi-rotor system, and embedded sensors are not issues for researchers. The main thing is to utilize a drone for a complex and sensitive task using an infrastructure-less/self-organization/resource-less network type called Flying Ad Hoc Network (FANET). Monitoring data transmission traffic, emergency and… More >

  • Open Access

    ARTICLE

    A Usability Management Framework for Securing Healthcare Information System

    Hosam Alhakami1, Abdullah Baz2, Wajdi Alhakami3, Abhishek Kumar Pandey4, Alka Agrawal4, Raees Ahmad Khan4,*

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1015-1030, 2022, DOI:10.32604/csse.2022.021564

    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses and compromising software usability as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber… More >

  • Open Access

    ARTICLE

    Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

    Khalid A. El Drandaly1, Walid Khedr1, Islam S. Mohamed1, Ayman Mohamed Mostafa2,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5253-5270, 2022, DOI:10.32604/cmc.2022.023684

    Abstract Information security is one of the most important methods of protecting the confidentiality and privacy of internet users. The greater the volume of data, the more the need to increase the security methods for protecting data from intruders. This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness. Protection of digital content is a major issue in maintaining the privacy and secrecy of data. Toward this end, digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner. Recent… More >

  • Open Access

    ARTICLE

    Securing Privacy Using Optimization and Statistical Models in Cognitive Radio Networks

    R. Neelaveni1,*, B. Sridevi2, J. Sivasankari3

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 523-533, 2022, DOI:10.32604/csse.2022.021433

    Abstract Cognitive Radio Networks (CRN) are the possible and ideal solution for meeting the spectrum needs of next-generation communication systems. CRN is a promising alternative approach that allows spectrum sharing in many applications. The licensed users considered Primary Users (PU) and unlicensed users as Secondary Users (SU). Time and power consumption on security issues are considered degrading factors in performance for improving the Quality of Service (QoS). Irrespective of using different optimization techniques, the same methodology is to be updated for the task. So that, learning and optimization go hand in hand. It ensures the security in CRN, risk factors in… More >

Displaying 31-40 on page 4 of 60. Per Page