Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (604)
  • Open Access

    ARTICLE

    ChainApparel: A Trustworthy Blockchain and IoT-Based Traceability Framework for Apparel Industry 4.0

    Muhammad Shakeel Faridi1, Saqib Ali1,2,*, Guojun Wang2,*, Salman Afsar Awan1, Muhammad Zafar Iqbal3

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1837-1854, 2023, DOI:10.32604/cmc.2023.041929 - 29 November 2023

    Abstract Trustworthiness and product traceability are essential factors in the apparel industry 4.0 for establishing successful business relationships among stakeholders such as customers, manufacturers, suppliers, and consumers. Each stakeholder has implemented different technology-based systems to record and track product transactions. However, these systems work in silos, and there is no intra-system communication, leading to a lack of complete supply chain traceability for all apparel stakeholders. Moreover, apparel stakeholders are reluctant to share their business information with business competitors; thus, they involve third-party auditors to ensure the quality of the final product. Furthermore, the apparel manufacturing industry… More >

  • Open Access

    ARTICLE

    A Trusted Edge Resource Allocation Framework for Internet of Vehicles

    Yuxuan Zhong1, Siya Xu1, Boxian Liao1, Jizhao Lu2, Huiping Meng2, Zhili Wang1, Xingyu Chen1,*, Qinghan Li3

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2629-2644, 2023, DOI:10.32604/cmc.2023.035526 - 29 November 2023

    Abstract With the continuous progress of information technique, assisted driving technology has become an effective technique to avoid traffic accidents. Due to the complex road conditions and the threat of vehicle information being attacked and tampered with, it is difficult to ensure information security. This paper uses blockchain to ensure the safety of driving information and introduces mobile edge computing technology to monitor vehicle information and road condition information in real time, calculate the appropriate speed, and plan a reasonable driving route for the driver. To solve these problems, this paper proposes a trusted edge resource… More >

  • Open Access

    ARTICLE

    Adaptive Deep Learning Model to Enhance Smart Greenhouse Agriculture

    Medhat A. Tawfeek1,2, Nacim Yanes3,4, Leila Jamel5,*, Ghadah Aldehim5, Mahmood A. Mahmood1,6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2545-2564, 2023, DOI:10.32604/cmc.2023.042179 - 29 November 2023

    Abstract The trend towards smart greenhouses stems from various factors, including a lack of agricultural land area owing to population concentration and housing construction on agricultural land, as well as water shortages. This study proposes building a full farming adaptation model that depends on current sensor readings and available datasets from different agricultural research centers. The proposed model uses a one-dimensional convolutional neural network (CNN) deep learning model to control the growth of strategic crops, including cucumber, pepper, tomato, and bean. The proposed model uses the Internet of Things (IoT) to collect data on agricultural operations… More >

  • Open Access

    ARTICLE

    Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT

    Muhammad Tahir1,2,*, Mingchu Li1,2, Irfan Khan1,2, Salman A. Al Qahtani3, Rubia Fatima4, Javed Ali Khan5, Muhammad Shahid Anwar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2529-2544, 2023, DOI:10.32604/cmc.2023.042403 - 29 November 2023

    Abstract Real-time health data monitoring is pivotal for bolstering road services’ safety, intelligence, and efficiency within the Internet of Health Things (IoHT) framework. Yet, delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems. We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this. This strategy is devised to streamline the data retrieval path, subsequently diminishing network strain. Crafting an adept cache processing scheme poses its own set of challenges, especially given the transient nature of monitoring data and the imperative for swift data transmission,… More >

  • Open Access

    ARTICLE

    Consortium Chain Consensus Vulnerability and Chain Generation Mechanism

    Rui Qiao, Shi Dong*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2505-2527, 2023, DOI:10.32604/cmc.2023.043476 - 29 November 2023

    Abstract Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains. Therefore, this paper proposes a new consortium chain generation model, deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes, and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security. Furthermore, the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is… More >

  • Open Access

    ARTICLE

    BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks

    Fengting Luo, Ruwei Huang*, Yuyue Chen

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1815-1835, 2023, DOI:10.32604/cmc.2023.041676 - 29 November 2023

    Abstract Smart parks serve as integral components of smart cities, where they play a pivotal role in the process of urban modernization. The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase. To ensure secure communication, device identities must undergo authentication. The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices, making it impractical for resource-constrained devices. This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks, which simplifies the authentication interaction and requires every device to More >

  • Open Access

    ARTICLE

    GMLP-IDS: A Novel Deep Learning-Based Intrusion Detection System for Smart Agriculture

    Abdelwahed Berguiga1,2,*, Ahlem Harchay1,2, Ayman Massaoudi1,2, Mossaad Ben Ayed3, Hafedh Belmabrouk4

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 379-402, 2023, DOI:10.32604/cmc.2023.041667 - 31 October 2023

    Abstract Smart Agriculture, also known as Agricultural 5.0, is expected to be an integral part of our human lives to reduce the cost of agricultural inputs, increasing productivity and improving the quality of the final product. Indeed, the safety and ongoing maintenance of Smart Agriculture from cyber-attacks are vitally important. To provide more comprehensive protection against potential cyber-attacks, this paper proposes a new deep learning-based intrusion detection system for securing Smart Agriculture. The proposed Intrusion Detection System IDS, namely GMLP-IDS, combines the feedforward neural network Multilayer Perceptron (MLP) and the Gaussian Mixture Model (GMM) that can… More >

  • Open Access

    ARTICLE

    Internet of Things (IoT) Security Enhancement Using XGboost Machine Learning Techniques

    Dana F. Doghramachi1,*, Siddeeq Y. Ameen2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 717-732, 2023, DOI:10.32604/cmc.2023.041186 - 31 October 2023

    Abstract The rapid adoption of the Internet of Things (IoT) across industries has revolutionized daily life by providing essential services and leisure activities. However, the inadequate software protection in IoT devices exposes them to cyberattacks with severe consequences. Intrusion Detection Systems (IDS) are vital in mitigating these risks by detecting abnormal network behavior and monitoring safe network traffic. The security research community has shown particular interest in leveraging Machine Learning (ML) approaches to develop practical IDS applications for general cyber networks and IoT environments. However, most available datasets related to Industrial IoT suffer from imbalanced class… More >

  • Open Access

    ARTICLE

    Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

    Shadi Al-Sarawi1, Mohammed Anbar1,*, Basim Ahmad Alabsi2, Mohammad Adnan Aladaileh3, Shaza Dawood Ahmed Rihan2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 491-515, 2023, DOI:10.32604/cmc.2023.041108 - 31 October 2023

    Abstract The Internet of Things (IoT) consists of interconnected smart devices communicating and collecting data. The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard protocol for Internet Protocol Version 6 (IPv6) in the IoT. However, RPL is vulnerable to various attacks, including the sinkhole attack, which disrupts the network by manipulating routing information. This paper proposes the Unweighted Voting Method (UVM) for sinkhole node identification, utilizing three key behavioral indicators: DODAG Information Object (DIO) Transaction Frequency, Rank Harmony, and Power Consumption. These indicators have been carefully selected based on their contribution to sinkhole… More >

  • Open Access

    ARTICLE

    Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things

    Muhammad Ali Khan1, Rao Naveed Bin Rais2,*, Osman Khalid1

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 827-843, 2023, DOI:10.32604/cmc.2023.040756 - 31 October 2023

    Abstract The Internet of Things (IoT) comprises numerous resource-constrained devices that generate large volumes of data. The inherent vulnerabilities in IoT infrastructure, such as easily spoofed IP and MAC addresses, pose significant security challenges. Traditional routing protocols designed for wired or wireless networks may not be suitable for IoT networks due to their limitations. Therefore, the Routing Protocol for Low-Power and Lossy Networks (RPL) is widely used in IoT systems. However, the built-in security mechanism of RPL is inadequate in defending against sophisticated routing attacks, including Sybil attacks. To address these issues, this paper proposes a… More >

Displaying 111-120 on page 12 of 604. Per Page