Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (536)
  • Open Access

    ARTICLE

    A Secure NDN Framework for Internet of Things Enabled Healthcare

    Syed Sajid Ullah1, Saddam Hussain1,*, Abdu Gumaei2,3, Hussain AlSalman2,4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 223-240, 2021, DOI:10.32604/cmc.2021.014413

    Abstract Healthcare is a binding domain for the Internet of Things (IoT) to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet. The current IP-based Internet architecture suffers from latency, mobility, location dependency, and security. The Named Data Networking (NDN) has been projected as a future internet architecture to cope with the limitations of IP-based Internet. However, the NDN infrastructure does not have a secure framework for IoT healthcare information. In this paper, we proposed a secure NDN framework for IoT-enabled Healthcare (IoTEH). In the proposed work, we adopt the services of Identity-Based Signcryption… More >

  • Open Access

    ARTICLE

    Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City

    Muhammad Usman Tariq1, Muhammad Babar2, Mian Ahmad Jan3,4,5,*, Akmal Saeed Khattak6, Mohammad Dahman Alshehri7, Abid Yahya8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 625-639, 2021, DOI:10.32604/cmc.2021.014165

    Abstract The world is rapidly changing with the advance of information technology. The expansion of the Internet of Things (IoT) is a huge step in the development of the smart city. The IoT consists of connected devices that transfer information. The IoT architecture permits on-demand services to a public pool of resources. Cloud computing plays a vital role in developing IoT-enabled smart applications. The integration of cloud computing enhances the offering of distributed resources in the smart city. Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability, security, performance, confidentiality, and privacy. The key reason… More >

  • Open Access

    ARTICLE

    A Bio-Inspired Routing Optimization in UAV-enabled Internet of Everything

    Masood Ahmad1, Fasee Ullah2,*, Ishtiaq Wahid1, Atif Khan3, M. Irfan Uddin4, Abdullah Alharbi5, Wael Alosaimi5

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 321-336, 2021, DOI:10.32604/cmc.2021.014102

    Abstract Internet of Everything (IoE) indicates a fantastic vision of the future, where everything is connected to the internet, providing intelligent services and facilitating decision making. IoE is the collection of static and moving objects able to coordinate and communicate with each other. The moving objects may consist of ground segments and flying segments. The speed of flying segment e.g., Unmanned Ariel Vehicles (UAVs) may high as compared to ground segment objects. The topology changes occur very frequently due to high speed nature of objects in UAV-enabled IoE (Ue-IoE). The routing maintenance overhead may increase when scaling the Ue-IoE (number of… More >

  • Open Access

    ARTICLE

    Authenblue: A New Authentication Protocol for the Industrial Internet of Things

    Rachid Zagrouba1,*, Asayel AlAbdullatif1, Kholood AlAjaji1, Norah Al-Serhani1, Fahd Alhaidari1, Abdullah Almuhaideb2, Atta-ur-Rahman2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1103-1119, 2021, DOI:10.32604/cmc.2021.014035

    Abstract The Internet of Things (IoT) is where almost anything can be controlled and managed remotely by means of sensors. Although the IoT evolution led to quality of life enhancement, many of its devices are insecure. The lack of robust key management systems, efficient identity authentication, low fault tolerance, and many other issues lead to IoT devices being easily targeted by attackers. In this paper we propose a new authentication protocol called Authenblue that improve the authentication process of IoT devices and Coordinators of Personal Area Network (CPANs) in an Industrial IoT (IIoT) environment. This study proposed Authenblue protocol as a… More >

  • Open Access

    ARTICLE

    Blockchain-Enabled EHR Framework for Internet of Medical Things

    Lewis Nkenyereye1,*, S. M. Riazul Islam2, Mahmud Hossain3, M. Abdullah-Al-Wadud4, Atif Alamri4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 211-221, 2021, DOI:10.32604/cmc.2021.013796

    Abstract The Internet of Medical Things (IoMT) offers an infrastructure made of smart medical equipment and software applications for healthcare services. Through the internet, the IoMT is capable of providing remote medical diagnosis and timely health services. The patients can use their smart devices to create, store and share their electronic health records (EHR) with a variety of medical personnel including medical doctors and nurses. However, unless the underlying commination within IoMT is secured, malicious users can intercept, modify and even delete the sensitive EHR data of patients. Patients also lose full control of their EHR since most healthcare services within… More >

  • Open Access

    ARTICLE

    Big Data of Home Energy Management in Cloud Computing

    Rizwan Munir1,*, Yifei Wei1, Rahim Ullah2, Iftikhar Hussain3, Kaleem Arshid4, Umair Tariq1

    Journal of Quantum Computing, Vol.2, No.4, pp. 193-202, 2020, DOI:10.32604/jqc.2020.016151

    Abstract A smart grid is the evolved form of the power grid with the integration of sensing, communication, computing, monitoring, and control technologies. These technologies make the power grid reliable, efficient, and economical. However, the smartness boosts the volume of data in the smart grid. To obligate full benefits, big data has attractive techniques to process and analyze smart grid data. This paper presents and simulates a framework to make sure the use of big data computing technique in the smart grid. The offered framework comprises of the following four layers: (i) Data source layer, (ii) Data transmission layer, (iii) Data… More >

  • Open Access

    ARTICLE

    Energy-Efficient and Blockchain-Enabled Model for Internet of Things (IoT) in Smart Cities

    Norah Saleh Alghamdi1,*, Mohammad Ayoub Khan2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2509-2524, 2021, DOI:10.32604/cmc.2021.014180

    Abstract Wireless sensor networks (WSNs) and Internet of Things (IoT) have gained more popularity in recent years as an underlying infrastructure for connected devices and sensors in smart cities. The data generated from these sensors are used by smart cities to strengthen their infrastructure, utilities, and public services. WSNs are suitable for long periods of data acquisition in smart cities. To make the networks of smart cities more reliable for sensitive information, the blockchain mechanism has been proposed. The key issues and challenges of WSNs in smart cities is efficiently scheduling the resources; leading to extending the network lifetime of sensors.… More >

  • Open Access

    ARTICLE

    A Formal Testing Model for Operating Room Control System Using Internet of Things

    Moez Krichen1, Seifeddine Mechti2, Roobaea Alroobaea3, Elyes Said4, Parminder Singh5, Osamah Ibrahim Khalaf6, Mehedi Masud3,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2997-3011, 2021, DOI:10.32604/cmc.2021.014090

    Abstract Technological advances in recent years have significantly changed the way an operating room works. This work aims to create a platform to solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations. Using this system, a doctor can control all operation rooms, especially before an operation, and monitor their temperature and humidity to prepare for the operation. Also, in the event of a problem, an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved. The platform is tested using… More >

  • Open Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852

    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition, outlier analysis, and speech recognition.… More >

  • Open Access

    ARTICLE

    Proposing a High-Robust Approach for Detecting the Tampering Attacks on English Text Transmitted via Internet

    Fahd N. Al-Wesabi1,*, Huda G. Iskandar2, Mohammad Alamgeer3, Mokhtar M. Ghilan2

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1267-1283, 2020, DOI:10.32604/iasc.2020.013782

    Abstract In this paper, a robust approach INLPETWA (an Intelligent Natural Language Processing and English Text Watermarking Approach) is proposed to tampering detection of English text by integrating zero text watermarking and hidden Markov model as a soft computing and natural language processing techniques. In the INLPETWA approach, embedding and detecting the watermark key logically conducted without altering the plain text. Second-gram and word mechanism of hidden Markov model is used as a natural text analysis technique to extracts English text features and use them as a watermark key and embed them logically and validates them during detection process to detect… More >

Displaying 471-480 on page 48 of 536. Per Page