Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    3RVAV: A Three-Round Voting and Proof-of-Stake Consensus Protocol with Provable Byzantine Fault Tolerance

    Abeer S. Al-Humaimeedy*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5207-5236, 2025, DOI:10.32604/cmc.2025.068273 - 23 October 2025

    Abstract This paper presents 3RVAV (Three-Round Voting with Advanced Validation), a novel Byzantine Fault Tolerant consensus protocol combining Proof-of-Stake with a multi-phase voting mechanism. The protocol introduces three layers of randomized committee voting with distinct participant roles (Validators, Delegators, and Users), achieving -threshold approval per round through a verifiable random function (VRF)-based selection process. Our security analysis demonstrates 3RVAV provides resistance to Sybil attacks with participants and stake , while maintaining communication complexity. Experimental simulations show 3247 TPS throughput with 4-s finality, representing a 5.8× improvement over Algorand’s committee-based approach. The proposed protocol achieves approximately 4.2-s More >

  • Open Access

    ARTICLE

    An Efficient and Verifiable Data Aggregation Protocol with Enhanced Privacy Protection

    Yiming Zhang1, Wei Zhang1,2,*, Cong Shen3

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3185-3211, 2025, DOI:10.32604/cmc.2025.067563 - 23 September 2025

    Abstract Distributed data fusion is essential for numerous applications, yet faces significant privacy security challenges. Federated learning (FL), as a distributed machine learning paradigm, offers enhanced data privacy protection and has attracted widespread attention. Consequently, research increasingly focuses on developing more secure FL techniques. However, in real-world scenarios involving malicious entities, the accuracy of FL results is often compromised, particularly due to the threat of collusion between two servers. To address this challenge, this paper proposes an efficient and verifiable data aggregation protocol with enhanced privacy protection. After analyzing attack methods against prior schemes, we implement… More >

  • Open Access

    ARTICLE

    Enhanced Practical Byzantine Fault Tolerance for Service Function Chain Deployment: Advancing Big Data Intelligence in Control Systems

    Peiying Zhang1,2,*, Yihong Yu1,2, Jing Liu3, Chong Lv1,2, Lizhuang Tan4,5, Yulin Zhang6,7,8

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4393-4409, 2025, DOI:10.32604/cmc.2025.064654 - 19 May 2025

    Abstract As Internet of Things (IoT) technologies continue to evolve at an unprecedented pace, intelligent big data control and information systems have become critical enablers for organizational digital transformation, facilitating data-driven decision making, fostering innovation ecosystems, and maintaining operational stability. In this study, we propose an advanced deployment algorithm for Service Function Chaining (SFC) that leverages an enhanced Practical Byzantine Fault Tolerance (PBFT) mechanism. The main goal is to tackle the issues of security and resource efficiency in SFC implementation across diverse network settings. By integrating blockchain technology and Deep Reinforcement Learning (DRL), our algorithm not… More >

  • Open Access

    ARTICLE

    A Latency-Aware and Fault-Tolerant Framework for Resource Scheduling and Data Management in Fog-Enabled Smart City Transportation Systems

    Ibrar Afzal1, Noor ul Amin1,*, Zulfiqar Ahmad1,*, Abdulmohsen Algarni2

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1377-1399, 2025, DOI:10.32604/cmc.2024.057755 - 03 January 2025

    Abstract The deployment of the Internet of Things (IoT) with smart sensors has facilitated the emergence of fog computing as an important technology for delivering services to smart environments such as campuses, smart cities, and smart transportation systems. Fog computing tackles a range of challenges, including processing, storage, bandwidth, latency, and reliability, by locally distributing secure information through end nodes. Consisting of endpoints, fog nodes, and back-end cloud infrastructure, it provides advanced capabilities beyond traditional cloud computing. In smart environments, particularly within smart city transportation systems, the abundance of devices and nodes poses significant challenges related… More >

  • Open Access

    REVIEW

    Navigating the Complexities of Controller Placement in SD-WANs: A Multi-Objective Perspective on Current Trends and Future Challenges

    Abdulrahman M. Abdulghani1,*, Azizol Abdullah1, A. R. Rahiman1, Nor Asilah Wati Abdul Hamid1,2, Bilal Omar Akram3,4, Hafsa Raissouli1

    Computer Systems Science and Engineering, Vol.49, pp. 123-157, 2025, DOI:10.32604/csse.2024.058314 - 03 January 2025

    Abstract This review article provides a comprehensive analysis of the latest advancements and persistent challenges in Software-Defined Wide Area Networks (SD-WANs), with a particular emphasis on the multi-objective Controller Placement Problem (CPP). As SD-WAN technology continues to gain prominence for its capacity to offer flexible and efficient network management, the task of 36optimally placing controllers—responsible for orchestrating and managing network traffic—remains a critical yet complex challenge. This review delves into recent innovations in multi-objective controller placement strategies, including clustering techniques, heuristic-based approaches, and the integration of machine learning and deep learning models. Each methodology is critically More >

  • Open Access

    REVIEW

    A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges

    Muhammad Muntasir Yakubu1,2,*, Mohd Fadzil B Hassan1,3, Kamaluddeen Usman Danyaro1, Aisha Zahid Junejo4, Muhammed Siraj5, Saidu Yahaya1, Shamsuddeen Adamu1, Kamal Abdulsalam6

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1437-1481, 2024, DOI:10.32604/csse.2024.054556 - 22 November 2024

    Abstract This study conducts a systematic literature review (SLR) of blockchain consensus mechanisms, an essential protocols that maintain the integrity, reliability, and decentralization of distributed ledger networks. The aim is to comprehensively investigate prominent mechanisms’ security features and vulnerabilities, emphasizing their security considerations, applications, challenges, and future directions. The existing literature offers valuable insights into various consensus mechanisms’ strengths, limitations, and security vulnerabilities and their real-world applications. However, there remains a gap in synthesizing and analyzing this knowledge systematically. Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’ security and vulnerabilities comprehensively. The… More >

  • Open Access

    ARTICLE

    Advancing Quantum Technology: Insights Form Mach-Zehnder Interferometer in Quantum State Behaviour and Error Correction

    Priyanka1, Damodarakurup Sajeev2, Shaik Ahmed3, Shankar Pidishety3, Ram Soorat3,*

    Journal of Quantum Computing, Vol.6, pp. 53-66, 2024, DOI:10.32604/jqc.2024.054000 - 14 November 2024

    Abstract The present study delves into the application of investigating quantum state behaviour, particularly focusing on coherent and superposition states. These states, characterized by their remarkable stability and precision, have found extensive utility in various domains of quantum mechanics and quantum information processing. Coherent states are valuable for manipulating quantum systems with accuracy. Superposition states allow quantum systems to exist in numerous configurations at the same time, which paves the way for quantum computing’s capacity for parallel processing. The research accentuates the crucial role of quantum error correction (QEC) in ensuring the stability and reliability of… More >

  • Open Access

    ARTICLE

    Graph Attention Residual Network Based Routing and Fault-Tolerant Scheduling Mechanism for Data Flow in Power Communication Network

    Zhihong Lin1, Zeng Zeng2, Yituan Yu2, Yinlin Ren1, Xuesong Qiu1,*, Jinqian Chen1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1641-1665, 2024, DOI:10.32604/cmc.2024.055802 - 15 October 2024

    Abstract For permanent faults (PF) in the power communication network (PCN), such as link interruptions, the time-sensitive networking (TSN) relied on by PCN, typically employs spatial redundancy fault-tolerance methods to keep service stability and reliability, which often limits TSN scheduling performance in fault-free ideal states. So this paper proposes a graph attention residual network-based routing and fault-tolerant scheduling mechanism (GRFS) for data flow in PCN, which specifically includes a communication system architecture for integrated terminals based on a cyclic queuing and forwarding (CQF) model and fault recovery method, which reduces the impact of faults by simplified… More >

  • Open Access

    ARTICLE

    A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing

    Yong Ma1, Han Zhao2, Kunyin Guo3,*, Yunni Xia3,*, Xu Wang4, Xianhua Niu5, Dongge Zhu6, Yumin Dong7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 907-927, 2024, DOI:10.32604/cmes.2024.048759 - 16 April 2024

    Abstract Mobile Edge Computing (MEC) is a technology designed for the on-demand provisioning of computing and storage services, strategically positioned close to users. In the MEC environment, frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery, ultimately enhancing the quality of the user experience. However, due to the typical placement of edge devices and nodes at the network’s periphery, these components may face various potential fault tolerance challenges, including network instability, device failures, and resource constraints. Considering the dynamic nature of MEC, making high-quality content caching decisions… More >

  • Open Access

    ARTICLE

    CF-BFT: A Dual-Mode Byzantine Fault-Tolerant Protocol Based on Node Authentication

    Zhiruo Zhang, Feng Wang*, Yang Liu, Yang Lu, Xinlei Liu

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3113-3129, 2023, DOI:10.32604/cmc.2023.040600 - 08 October 2023

    Abstract The consensus protocol is one of the core technologies in blockchain, which plays a crucial role in ensuring the block generation rate, consistency, and safety of the blockchain system. Blockchain systems mainly adopt the Byzantine Fault Tolerance (BFT) protocol, which often suffers from slow consensus speed and high communication consumption to prevent Byzantine nodes from disrupting the consensus. In this paper, this paper proposes a new dual-mode consensus protocol based on node identity authentication. It divides the consensus process into two subprotocols: Check_BFT and Fast_BFT. In Check_BFT, the replicas authenticate the primary’s identity by monitoring… More >

Displaying 1-10 on page 1 of 28. Per Page