Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (32)
  • Open Access

    ARTICLE

    Privacy Preserving Reliable Data Transmission in Cluster Based Vehicular Adhoc Networks

    T. Tamilvizhi1, R. Surendran2,*, Carlos Andres Tavera Romero3, M. Sadish Sendil4

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1265-1279, 2022, DOI:10.32604/iasc.2022.026331

    Abstract VANETs are a subclass of mobile ad hoc networks (MANETs) that enable efficient data transmission between vehicles and other vehicles, road side units (RSUs), and infrastructure. The purpose of VANET is to enhance security, road traffic management, and traveler services. Due to the nature of real-time issues such as reliability and privacy, messages transmitted via the VANET must be secret and confidential. As a result, this study provides a method for privacy-preserving reliable data transmission in a cluster-based VANET employing Fog Computing (PPRDA-FC). The PPRDA-FC technique suggested here seeks to ensure reliable message transmission by utilising FC and an optimal… More >

  • Open Access

    ARTICLE

    Aggregated PSO for Secure Data Transmission in WSN Using Fog Server

    M. Manicka Raja1,*, S. Manoj Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1017-1032, 2022, DOI:10.32604/iasc.2022.025665

    Abstract Privacy of data in Internet of Things (IoT) over fog networks is the biggest challenge in security of Wireless communication networks. In Wireless Sensor Network (WSN), current research on fog computing with IoT is gaining popularity among IoT devices over network. Moreover, the data aggregation will reduce the energy consumption in WSN. Due to the open and hostile nature of WSN, secure data aggregation is the major issue. The existing data aggregation methods in IoT and its associated approaches are lack of limited aggregation functions, heavyweight, issues related to the performance overhead. Besides, the overload on fog node will result… More >

  • Open Access

    ARTICLE

    QoS Constrained Network Coding Technique to Data Transmission Using IoT

    A. Sathishkumar1,*, T. Rammohan2, S. Sathish Kumar3, J. Uma3, K. Srujan Raju4, Aarti Sangwan5, M. Sivachitra6, M. Prabu7

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 531-544, 2022, DOI:10.32604/csse.2022.021694

    Abstract The research work presents, constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties. The charge fragmentation and charge splitting are two components of the filtered switch domino (FSD) technique. Further behavior of selected switching is achieved using generator called conditional pulse generator which is employed in Multi Dynamic Node Domino (MDND) technique. Both FSD and MDND technique need wide area compared to existing single node-keeper domino technique. The aim of this research is to minimize dissipation of power and to achieve less consumption of power. The proposed research, works by introducing… More >

  • Open Access

    ARTICLE

    Incremental Linear Discriminant Analysis Dimensionality Reduction and 3D Dynamic Hierarchical Clustering WSNs

    G. Divya Mohana Priya1,*, M. Karthikeyan1, K. Murugan2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 471-486, 2022, DOI:10.32604/csse.2022.021023

    Abstract Optimizing the sensor energy is one of the most important concern in Three-Dimensional (3D) Wireless Sensor Networks (WSNs). An improved dynamic hierarchical clustering has been used in previous works that computes optimum clusters count and thus, the total consumption of energy is optimal. However, the computational complexity will be increased due to data dimension, and this leads to increase in delay in network data transmission and reception. For solving the above-mentioned issues, an efficient dimensionality reduction model based on Incremental Linear Discriminant Analysis (ILDA) is proposed for 3D hierarchical clustering WSNs. The major objective of the proposed work is to… More >

  • Open Access

    ARTICLE

    QoS Aware Multicast Routing Protocol for Video Transmission in Smart Cities

    Khaled Mohamad Almustafa1, Taiseer Abdalla Elfadil Eisa2, Amani Abdulrahman Albraikan3, Mesfer Al Duhayyim4,*, Manar Ahmed Hamza5, Abdelwahed Motwakel5, Ishfaq Yaseen5, Muhammad Imran Babar6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2483-2499, 2022, DOI:10.32604/cmc.2022.024688

    Abstract In recent years, Software Defined Networking (SDN) has become an important candidate for communication infrastructure in smart cities. It produces a drastic increase in the need for delivery of video services that are of high resolution, multiview, and large-scale in nature. However, this entity gets easily influenced by heterogeneous behaviour of the user's wireless link features that might reduce the quality of video stream for few or all clients. The development of SDN allows the emergence of new possibilities for complicated controlling of video conferences. Besides, multicast routing protocol with multiple constraints in terms of Quality of Service (QoS) is… More >

  • Open Access

    ARTICLE

    FACT: An Air-Ground Communication Framework for Seeding Quality Control of Aircraft

    Dequan Li1,2, Jiming Li1,2, Xu Zhou1,2, JinRong Hu3, Xin Wang4, Jing Duan1,2,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 539-555, 2022, DOI:10.32604/csse.2022.019551

    Abstract A new type of air-ground communication application framework named FACT (framework for air-ground communication technology with weather-modification aircraft) is presented to track and command weather-modification aircraft to perform ideal cloud seeding. FACT provides a set of solutions from three perspectives, namely, onboard, onground and air-to-ground, with the core purpose of solving the problems of the rapid exchange of information, contract analysis and identifying potential seeding areas when flight plans and meteorological conditions change. On board, the observed data are processed centrally and transmitted downward through air-to-ground communication. The real-time application and sharing of aircraft detection data are strengthened on the… More >

  • Open Access

    ARTICLE

    Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications

    Romany F. Mansour1,*, Moheb R. Girgis2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4069-4085, 2021, DOI:10.32604/cmc.2021.017064

    Abstract Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography techniques, for secure transmission of data without leakage and unauthorized access. In this paper, a technique, which combines various steganography-based techniques,… More >

  • Open Access

    ARTICLE

    Utilizing Blockchain Technology to Improve WSN Security for Sensor Data Transmission

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1899-1918, 2021, DOI:10.32604/cmc.2021.015762

    Abstract This paper proposes a method for improving the data security of wireless sensor networks based on blockchain technology. Blockchain technology is applied to data transfer to build a highly secure wireless sensor network. In this network, the relay stations use microcontrollers and embedded devices, and the microcontrollers, such as Raspberry Pi and Arduino Yun, represents mobile databases. The proposed system uses microcontrollers to facilitate the connection of various sensor devices. By adopting blockchain encryption, the security of sensing data can be effectively improved. A blockchain is a concatenated transaction record that is protected by cryptography. Each section contains the encrypted… More >

  • Open Access

    ARTICLE

    Secure and Energy Efficient Data Transmission Model for WSN

    Anuj Kumar Singh1, Mohammed Alshehri2,*, Shashi Bhushan3, Manoj Kumar3, Osama Alfarraj4, Kamal Raj Pardarshani5

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 761-769, 2021, DOI:10.32604/iasc.2021.012806

    Abstract Wireless sensor networks (WSNs) have been used in numerous delicate checking, observation, and surveillance systems that use sensitive data. When a WSN utilizes various data clustering techniques, data is moved to the cluster head (CH) of the corresponding cluster area. Cluster Head further communicates the information to the sink node. In a WSN, a network owner (NO) does not validate a sensor before connecting to the network, so faulty nodes may likely attach to the network to sense the data and attempt to release the information to unauthorized persons. Further, a malicious node may become a mobile node (MN) equipped… More >

  • Open Access

    ARTICLE

    Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems

    Srinath Doss1, Jothi Paranthaman2, Suseendran Gopalakrishnan3, Akila Duraisamy3, Souvik Pal4, Balaganesh Duraisamy5, Chung Le Van6,*, Dac-Nhuong Le7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1577-1594, 2021, DOI:10.32604/cmc.2020.012379

    Abstract In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests. This datum is sensitive, and hence security is a must in transforming the sensational contents. In this paper, an Evolutionary Algorithm, namely the Memetic Algorithm is used for encrypting the text messages. The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels. The reverse method of the Memetic Algorithm is implemented when extracting a hidden message from the… More >

Displaying 21-30 on page 3 of 32. Per Page