Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing

    V. Balaji, P. Selvaraj*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2015-2027, 2023, DOI:10.32604/iasc.2023.029260

    Abstract Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers. It facilitates the benefits of the network edge with the maximized probability of offering interaction with the cloud. However, the fog computing characteristics are susceptible to counteract the challenges of security. The issues present with the Physical Layer Security (PLS) aspect in fog computing which included authentication, integrity, and confidentiality has been considered as a reason for the potential issues leading to the security breaches. In this work, the Octonion Algebra-inspired Non- Commutative Ring-based Fully Homomorphic Encryption Scheme… More >

  • Open Access

    ARTICLE

    Two-Dimensional Projection-Based Wireless Intrusion Classification Using Lightweight EfficientNet

    Muhamad Erza Aminanto1,2,*, Ibnu Rifqi Purbomukti3, Harry Chandra2, Kwangjo Kim4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5301-5314, 2022, DOI:10.32604/cmc.2022.026749

    Abstract Internet of Things (IoT) networks leverage wireless communication protocols, which adversaries can exploit. Impersonation attacks, injection attacks, and flooding are several examples of different attacks existing in Wi-Fi networks. Intrusion Detection System (IDS) became one solution to distinguish those attacks from benign traffic. Deep learning techniques have been intensively utilized to classify the attacks. However, the main issue of utilizing deep learning models is projecting the data, notably tabular data, into an image. This study proposes a novel projection from wireless network attacks data into a grid-based image for feeding one of the Convolutional Neural Network (CNN) models, EfficientNet. We… More >

  • Open Access

    ARTICLE

    An Efficient Impersonation Attack Detection Method in Fog Computing

    Jialin Wan1, Muhammad Waqas1,2, Shanshan Tu1,*, Syed Mudassir Hussain3, Ahsan Shah2, Sadaqat Ur Rehman4, Muhammad Hanif2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 267-281, 2021, DOI:10.32604/cmc.2021.016260

    Abstract Fog computing paradigm extends computing, communication, storage, and network resources to the network’s edge. As the fog layer is located between cloud and end-users, it can provide more convenience and timely services to end-users. However, in fog computing (FC), attackers can behave as real fog nodes or end-users to provide malicious services in the network. The attacker acts as an impersonator to impersonate other legitimate users. Therefore, in this work, we present a detection technique to secure the FC environment. First, we model a physical layer key generation based on wireless channel characteristics. To generate the secret keys between the… More >

Displaying 1-10 on page 1 of 3. Per Page