Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access

    ARTICLE

    IOTA-Based Authentication for IoT Devices in Satellite Networks

    D. Bernal*, O. Ledesma, P. Lamo, J. Bermejo

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-39, 2026, DOI:10.32604/cmc.2025.069746 - 10 November 2025

    Abstract This work evaluates an architecture for decentralized authentication of Internet of Things (IoT) devices in Low Earth Orbit (LEO) satellite networks using IOTA Identity technology. To the best of our knowledge, it is the first proposal to integrate IOTA’s Directed Acyclic Graph (DAG)-based identity framework into satellite IoT environments, enabling lightweight and distributed authentication under intermittent connectivity. The system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) over the Tangle, eliminating the need for mining and sequential blocks. An identity management workflow is implemented that supports the creation, validation, deactivation, and reactivation of IoT devices,… More >

  • Open Access

    ARTICLE

    Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning

    Misbah Anwer1,*, Ghufran Ahmed1, Maha Abdelhaq2, Raed Alsaqour3, Shahid Hussain4, Adnan Akhunzada5,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.068673 - 10 November 2025

    Abstract The exponential growth of the Internet of Things (IoT) has introduced significant security challenges, with zero-day attacks emerging as one of the most critical and challenging threats. Traditional Machine Learning (ML) and Deep Learning (DL) techniques have demonstrated promising early detection capabilities. However, their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints, high computational costs, and the costly time-intensive process of data labeling. To address these challenges, this study proposes a Federated Learning (FL) framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in… More >

  • Open Access

    ARTICLE

    Secure Malicious Node Detection in Decentralized Healthcare Networks Using Cloud and Edge Computing with Blockchain-Enabled Federated Learning

    Raj Sonani1, Reham Alhejaili2,*, Pushpalika Chatterjee3, Khalid Hamad Alnafisah4, Jehad Ali5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3169-3189, 2025, DOI:10.32604/cmes.2025.070225 - 30 September 2025

    Abstract Healthcare networks are transitioning from manual records to electronic health records, but this shift introduces vulnerabilities such as secure communication issues, privacy concerns, and the presence of malicious nodes. Existing machine and deep learning-based anomalies detection methods often rely on centralized training, leading to reduced accuracy and potential privacy breaches. Therefore, this study proposes a Blockchain-based-Federated Learning architecture for Malicious Node Detection (BFL-MND) model. It trains models locally within healthcare clusters, sharing only model updates instead of patient data, preserving privacy and improving accuracy. Cloud and edge computing enhance the model’s scalability, while blockchain ensures More >

  • Open Access

    ARTICLE

    Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi

    Ahmed I. Alutaibi*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 875-903, 2025, DOI:10.32604/cmc.2025.067078 - 29 August 2025

    Abstract The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes, particularly in Decentralized Finance (DeFi) systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification. This paper proposes a quantum-resilient, blockchain-based identity verification framework designed to address critical challenges in privacy preservation, scalability, and post-quantum security. The proposed model integrates Post-quantum Cryptography (PQC), specifically lattice-based cryptographic primitives, with Decentralized Identifiers (DIDs) and Zero-knowledge Proofs (ZKPs) to ensure verifiability, anonymity, and resistance to quantum attacks. A dual-layer architecture is introduced, comprising an identity layer for credential generation and validation,… More >

  • Open Access

    ARTICLE

    Decentralized Authentication and Secure Distributed File Storage for Healthcare Systems Using Blockchain and IPFS

    Maazen Alsabaan1, Jasmin Praful Bharadiya2, Vishwanath Eswarakrishnan3, Adnan Mustafa Cheema4, Zaid Bin Faheem5, Jehad Ali6,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1135-1160, 2025, DOI:10.32604/cmc.2025.066969 - 29 August 2025

    Abstract The healthcare sector involves many steps to ensure efficient care for patients, such as appointment scheduling, consultation plans, online follow-up, and more. However, existing healthcare mechanisms are unable to facilitate a large number of patients, as these systems are centralized and hence vulnerable to various issues, including single points of failure, performance bottlenecks, and substantial monetary costs. Furthermore, these mechanisms are unable to provide an efficient mechanism for saving data against unauthorized access. To address these issues, this study proposes a blockchain-based authentication mechanism that authenticates all healthcare stakeholders based on their credentials. Furthermore, also… More >

  • Open Access

    ARTICLE

    Federated Learning and Blockchain Framework for Scalable and Secure IoT Access Control

    Ammar Odeh*, Anas Abu Taleb

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 447-461, 2025, DOI:10.32604/cmc.2025.065426 - 09 June 2025

    Abstract The increasing deployment of Internet of Things (IoT) devices has introduced significant security challenges, including identity spoofing, unauthorized access, and data integrity breaches. Traditional security mechanisms rely on centralized frameworks that suffer from single points of failure, scalability issues, and inefficiencies in real-time security enforcement. To address these limitations, this study proposes the Blockchain-Enhanced Trust and Access Control for IoT Security (BETAC-IoT) model, which integrates blockchain technology, smart contracts, federated learning, and Merkle tree-based integrity verification to enhance IoT security. The proposed model eliminates reliance on centralized authentication by employing decentralized identity management, ensuring tamper-proof… More >

  • Open Access

    REVIEW

    Collision-Free Satellite Constellations: A Comprehensive Review on Autonomous and Collaborative Algorithms

    Ghulam E Mustafa Abro1,*, Altaf Mugheri2,#, Zain Anwar Ali3,#

    Revue Internationale de Géomatique, Vol.34, pp. 301-331, 2025, DOI:10.32604/rig.2025.065595 - 05 June 2025

    Abstract Swarm intelligence, derived from the collective behaviour of biological entities, is a novel methodology for overseeing satellite constellations within decentralized control systems. Conventional centralized control systems in satellite constellations encounter constraints in scalability, resilience, and fault tolerance, particularly in extensive constellations. This research examines the use of swarm-based multi-agent systems and distributed algorithms for efficient communication, collision avoidance, and collaborative task execution in satellite constellations. We provide a comprehensive study of current swarm control algorithms, their relevance to satellite systems, and identify areas requiring further research. Principal subjects encompass decentralized decision-making, self-organization, adaptive communication protocols, More >

  • Open Access

    ARTICLE

    Renewable Energy-Based Solutions for Decentralized Electrification: Demand Assessment and Multi-Tier Framework Approach

    Jacob Manyuon Deng1,*, Cyrus Wabuge Wekesa2, Khan Jean De Dieu Hakizimana1, Joseph Nzabahimana3

    Energy Engineering, Vol.122, No.5, pp. 1839-1862, 2025, DOI:10.32604/ee.2025.063398 - 25 April 2025

    Abstract Energy access remains a critical challenge in rural South Sudan, with communities heavily relying on expensive and unfriendly environmental energy sources such as diesel generators and biomass. This study addresses the predicament by evaluating the feasibility of renewable energy-based decentralized electrification in the selected village of Doleib Hill, Upper Nile, South Sudan. Using a demand assessment and the Multi-Tier Framework (MTF) approach, it categorizes households, public facilities, private sector, Non-Governmental Organizations (NGOs) and business energy needs and designs an optimized hybrid energy system incorporating solar Photovoltaic (PV), wind turbines, batteries, and a generator. The proposed… More > Graphic Abstract

    Renewable Energy-Based Solutions for Decentralized Electrification: Demand Assessment and Multi-Tier Framework Approach

  • Open Access

    ARTICLE

    Wood Gasification in Catastrophes: Electricity Production from Light-Duty Vehicles

    Baxter L. M. Williams1,*, Henri Croft1, James Hunt1, Josh Viloria1, Nathan Sherman1, James Oliver1, Brody Green1, Alexey Turchin2, Juan B. García Martínez2, Joshua M. Pearce3,4, David Denkenberger1,2,*

    Energy Engineering, Vol.122, No.4, pp. 1265-1285, 2025, DOI:10.32604/ee.2025.063276 - 31 March 2025

    Abstract Following global catastrophic infrastructure loss (GCIL), traditional electricity networks would be damaged and unavailable for energy supply, necessitating alternative solutions to sustain critical services. These alternative solutions would need to run without damaged infrastructure and would likely need to be located at the point of use, such as decentralized electricity generation from wood gas. This study explores the feasibility of using modified light duty vehicles to self-sustain electricity generation by producing wood chips for wood gasification. A 2004 Ford Falcon Fairmont was modified to power a woodchipper and an electrical generator. The vehicle successfully produced… More >

  • Open Access

    ARTICLE

    MARCS: A Mobile Crowdsensing Framework Based on Data Shapley Value Enabled Multi-Agent Deep Reinforcement Learning

    Yiqin Wang1, Yufeng Wang1,*, Jianhua Ma2, Qun Jin3

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4431-4449, 2025, DOI:10.32604/cmc.2025.059880 - 06 March 2025

    Abstract Opportunistic mobile crowdsensing (MCS) non-intrusively exploits human mobility trajectories, and the participants’ smart devices as sensors have become promising paradigms for various urban data acquisition tasks. However, in practice, opportunistic MCS has several challenges from both the perspectives of MCS participants and the data platform. On the one hand, participants face uncertainties in conducting MCS tasks, including their mobility and implicit interactions among participants, and participants’ economic returns given by the MCS data platform are determined by not only their own actions but also other participants’ strategic actions. On the other hand, the platform can… More >

Displaying 1-10 on page 1 of 38. Per Page