Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (525)
  • Open Access

    ARTICLE

    A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things

    Chaoyang Li1,2,3, Gang Xu2, Yuling Chen1,*, Haseeb Ahmad4, Jian Li3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 711-726, 2019, DOI:10.32604/cmc.2019.06279

    Abstract Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public, distributed and decentration. And blockchain-enabled internet of things (BIoT) has a tendency to make a revolutionary change for the internet of things (IoT) which requires distributed trustless consensus. However, the scalability and security issues become particularly important with the dramatically increasing number of IoT devices. Especially, with the development of quantum computing, many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks. In this paper, an anti-quantum proxy blind signature scheme based on the lattice cryptography has been… More >

  • Open Access

    ARTICLE

    IoT Based Approach in a Power System Network for Optimizing Distributed Generation Parameters

    P. Shanmugapriya1, J. Baskaran2, C. Nayanatara1,*, D. P. Kothari3

    CMES-Computer Modeling in Engineering & Sciences, Vol.119, No.3, pp. 541-558, 2019, DOI:10.32604/cmes.2019.04074

    Abstract The objective of this paper is to provide a robust Virtual Power Plant (VPP) network collaborated with Internet of Things (IoT) which uses a conceptual model to integrate each device in the grid. Based on the functionality all the devices which are purely distributed within the grid are networked initially from residential units to substations and up to service data and demand centres. To ensure the trapping of the available power and the efficient transfer of Distributed Generation (DG) power to the grid Distribution Active Control (DAC) strategy is used. Synchronized optimization of DG parameter which includes DG size, location… More >

  • Open Access

    ARTICLE

    A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

    Liang Bai1, Yuzhen Liu1, Xiaoliang Wang1,*, Nick Patterson2, F. Jiang2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jihpp.2019.06043

    Abstract Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to… More >

  • Open Access

    ARTICLE

    Design of Intelligent Drunk Driving Detection System Based on Internet of Things

    Xiaorong Zhao1, Hongjin Zhu1, Xiufang Qian1,*, Chunpeng Ge2

    Journal on Internet of Things, Vol.1, No.2, pp. 55-62, 2019, DOI:10.32604/jiot.2019.06315

    Abstract In recent years, with the rapid development of China’s economy and the continuous improvement of people’s living standards, the number of motor vehicles and the number of drivers in the country have grown rapidly. Due to the increase in the number of vehicles and the number of motorists, the traffic accident rate is increasing, causing serious economic losses to society. According to the traffic accident statistics of the Ministry of Communications of China in 2009, more than 300,000 car accidents occurred in the year, most of which were caused by drunk driving. Therefore, this paper proposes a design scheme based… More >

  • Open Access

    ARTICLE

    Analyzing the Structure and Connectivity of Continent-Level Internet Topology

    Xionglve Li1, Junhua Xi1, Zhiping Cai1,*, Tao Yang1, Chak Fong Cheang2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 955-964, 2019, DOI:10.32604/cmc.2019.05769

    Abstract The research and analysis of Internet topology is hot in the field of network measurement, which have important applications in network security, traffic scheduling and many other fields. Most of the existing works are focused on the AS-level and router-level topology, but few works are about the IP-level topology. In fact, obtaining the topology of each continent and knowing how the topologies of the continents are connected to each other can help us understanding the Internet around the world more thoroughly. In this paper, we obtained data sets from RIPE, constructed and analyzed network topologies of all the continents. By… More >

  • Open Access

    ARTICLE

    A Distributed ADMM Approach for Collaborative Regression Learning in Edge Computing

    Yangyang Li1, Xue Wang2, Weiwei Fang2,*, Feng Xue2, Hao Jin1, Yi Zhang1, Xianwei Li3

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 493-508, 2019, DOI:10.32604/cmc.2019.05178

    Abstract With the recent proliferation of Internet-of-Things (IoT), enormous amount of data are produced by wireless sensors and connected devices at the edge of network. Conventional cloud computing raises serious concerns on communication latency, bandwidth cost, and data privacy. To address these issues, edge computing has been introduced as a new paradigm that allows computation and analysis to be performed in close proximity with data sources. In this paper, we study how to conduct regression analysis when the training samples are kept private at source devices. Specifically, we consider the lasso regression model that has been widely adopted for prediction and… More >

  • Open Access

    ARTICLE

    Developing a New Security Framework for Bluetooth Low Energy Devices

    Qiaoyang Zhang1, Zhiyao Liang1,*, Zhiping Cai2

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 457-471, 2019, DOI:10.32604/cmc.2019.03758

    Abstract Wearable devices are becoming more popular in our daily life. They are usually used to monitor health status, track fitness data, or even do medical tests, etc. Since the wearable devices can obtain a lot of personal data, their security issues are very important. Motivated by the consideration that the current pairing mechanisms of Bluetooth Low Energy (BLE) are commonly impractical or insecure for many BLE based wearable devices nowadays, we design and implement a security framework in order to protect the communication between these devices. The security framework is a supplement to the Bluetooth pairing mechanisms and is compatible… More >

  • Open Access

    ARTICLE

    Context-Based Intelligent Scheduling and Knowledge Push Algorithms for AR-Assist Communication Network Maintenance

    Lanlan Rui1, Yabin Qin1,*, Biyao Li1, Zhipeng Gao1

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.2, pp. 291-315, 2019, DOI:10.31614/cmes.2018.04240

    Abstract Maintenance is an important aspect in the lifecycle of communication network devices. Prevalent problems in the maintenance of communication networks include inconvenient data carrying and sub-optimal scheduling of work orders, which significantly restrict the efficiency of maintenance work. Moreover, most maintenance systems are still based on cloud architectures that slow down data transfer. With a focus on the completion time, quality, and load balancing of maintenance work, we propose in this paper a learning-based virus evolutionary genetic algorithm with multiple quality-of-service (QoS) constraints to implement intelligent scheduling in an edge network. The algorithm maintains the diversity of the population and… More >

  • Open Access

    ARTICLE

    Smart Security Framework for Educational Institutions Using Internet of Things (IoT)

    Afzal Badshah1, Anwar Ghani1, Muhammad Ahsan Qureshi2, Shahaboddin Shamshirband,3,4,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 81-101, 2019, DOI:10.32604/cmc.2019.06288

    Abstract Educational institutions are soft targets for the terrorist with massive and defenseless people. In the recent past, numbers of such attacks have been executed around the world. Conducting research, in order to provide a secure environment to the educational institutions is a challenging task. This effort is motivated by recent assaults, made at Army Public School Peshawar, following another attack at Charsada University, Khyber Pukhtun Khwa, Pakistan and also the Santa Fe High School Texas, USA massacre. This study uses the basic technologies of edge computing, cloud computing and IoT to design a smart emergency alarm system framework. IoT is… More >

  • Open Access

    ARTICLE

    An Efficient Greedy Traffic Aware Routing Scheme for Internet of Vehicles

    Belghachi Mohammed1,*, Debab Naouel1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 959-972, 2019, DOI:10.32604/cmc.2019.07580

    Abstract A new paradigm of VANET has emerged in recent years: Internet of Vehicles (IoV). These networks are formed on the roads and streets between travellers who have relationships, interactions and common social interests. Users of these networks exchange information of common interest, for example, traffic jams and dangers on the way. They can also exchange files such as multimedia files. IoV is considered as part of the Internet of Things (IoT) where objects are vehicles, which can create a multitude of services dedicated to the intelligent transportation system. The interest is to permit to all connected vehicles to communicate with… More >

Displaying 511-520 on page 52 of 525. Per Page