Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (365)
  • Open Access

    ARTICLE

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    Senshan Ouyang1,2, Xiang Liu2, Lei Liu2, Shangchao Wang2, Baichuan Shao3, Yang Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 903-915, 2024, DOI:10.32604/cmes.2023.028895

    Abstract With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This scheme boasts strong key insulation… More >

  • Open Access

    ARTICLE

    A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions

    Oliva Debnath1, Saptarshi Debnath1, Sreyashi Karmakar2, MD Tausif Mallick3, Himadri Nath Saha4,*

    Journal on Internet of Things, Vol.5, pp. 13-43, 2023, DOI:10.32604/jiot.2023.039391

    Abstract The Internet of Things (IoT) will significantly impact our social and economic lives in the near future. Many Internet of Things (IoT) applications aim to automate multiple tasks so inactive physical objects can behave independently of others. IoT devices, however, are also vulnerable, mostly because they lack the essential built-in security to thwart attackers. It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment. As a result, the IoT designs that are now in use do not completely support all of the advancements that have been… More >

  • Open Access

    ARTICLE

    Wake-Up Security: Effective Security Improvement Mechanism for Low Power Internet of Things

    Sun-Woo Yun1, Na-Eun Park1, Il-Gu Lee1,2,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2897-2917, 2023, DOI:10.32604/iasc.2023.039940

    Abstract As time and space constraints decrease due to the development of wireless communication network technology, the scale and scope of cyberattacks targeting the Internet of Things (IoT) are increasing. However, it is difficult to apply high-performance security modules to the IoT owing to the limited battery, memory capacity, and data transmission performance depending on the size of the device. Conventional research has mainly reduced power consumption by lightening encryption algorithms. However, it is difficult to defend large-scale information systems and networks against advanced and intelligent attacks because of the problem of deteriorating security performance. In this study, we propose wake-up… More >

  • Open Access

    ARTICLE

    An IoT-Based Aquaculture Monitoring System Using Firebase

    Wen-Tsai Sung1, Indra Griha Tofik Isa1,2, Sung-Jung Hsiao3,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2179-2200, 2023, DOI:10.32604/cmc.2023.041022

    Abstract Indonesia is a producer in the fisheries sector, with production reaching 14.8 million tons in 2022. The production potential of the fisheries sector can be optimally optimized through aquaculture management. One of the most important issues in aquaculture management is how to efficiently control the fish pond water conditions. IoT technology can be applied to support a fish pond aquaculture monitoring system, especially for catfish species (Siluriformes), in real-time and remotely. One of the technologies that can provide this convenience is the IoT. The problem of this study is how to integrate IoT devices with Firebase’s cloud data system to… More >

  • Open Access

    ARTICLE

    AID4I: An Intrusion Detection Framework for Industrial Internet of Things Using Automated Machine Learning

    Anıl Sezgin1,2,*, Aytuğ Boyacı3

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2121-2143, 2023, DOI:10.32604/cmc.2023.040287

    Abstract By identifying and responding to any malicious behavior that could endanger the system, the Intrusion Detection System (IDS) is crucial for preserving the security of the Industrial Internet of Things (IIoT) network. The benefit of anomaly-based IDS is that they are able to recognize zero-day attacks due to the fact that they do not rely on a signature database to identify abnormal activity. In order to improve control over datasets and the process, this study proposes using an automated machine learning (AutoML) technique to automate the machine learning processes for IDS. Our ground-breaking architecture, known as AID4I, makes use of… More >

  • Open Access

    ARTICLE

    A Deep CNN-LSTM-Based Feature Extraction for Cyber-Physical System Monitoring

    Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2079-2093, 2023, DOI:10.32604/cmc.2023.039683

    Abstract A potential concept that could be effective for multiple applications is a “cyber-physical system” (CPS). The Internet of Things (IoT) has evolved as a research area, presenting new challenges in obtaining valuable data through environmental monitoring. The existing work solely focuses on classifying the audio system of CPS without utilizing feature extraction. This study employs a deep learning method, CNN-LSTM, and two-way feature extraction to classify audio systems within CPS. The primary objective of this system, which is built upon a convolutional neural network (CNN) with Long Short Term Memory (LSTM), is to analyze the vocalization patterns of two different… More >

  • Open Access

    ARTICLE

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm

    Ayman Khallel Al-Ani1,*, Shams Ul Arfeen Laghari2, Hariprasath Manoharan3, Shitharth Selvarajan4, Mueen Uddin5

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2261-2279, 2023, DOI:10.32604/cmc.2023.038534

    Abstract In this paper, the application of transportation systems in real-time traffic conditions is evaluated with data handling representations. The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. Compared to the existing approach, the design model in the proposed method is made by dividing the computing areas into several cluster regions, thereby reducing the complex monitoring system where control errors are minimized. Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate… More >

  • Open Access

    ARTICLE

    A Novel Edge-Assisted IoT-ML-Based Smart Healthcare Framework for COVID-19

    Mahmood Hussain Mir1,*, Sanjay Jamwal1, Ummer Iqbal2, Abolfazl Mehbodniya3, Julian Webber3, Umar Hafiz Khan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2529-2565, 2023, DOI:10.32604/cmes.2023.027173

    Abstract The lack of modern technology in healthcare has led to the death of thousands of lives worldwide due to COVID- 19 since its outbreak. The Internet of Things (IoT) along with other technologies like Machine Learning can revolutionize the traditional healthcare system. Instead of reactive healthcare systems, IoT technology combined with machine learning and edge computing can deliver proactive and preventive healthcare services. In this study, a novel healthcare edge-assisted framework has been proposed to detect and prognosticate the COVID-19 suspects in the initial phases to stop the transmission of coronavirus infection. The proposed framework is based on edge computing… More >

  • Open Access

    ARTICLE

    Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning Model for Intrusion Detection System

    Mahmoud Ragab1,2,*, Sultanah M. Alshammari2,3, Abdullah S. Al-Malaise Al-Ghamdi2,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2497-2512, 2023, DOI:10.32604/csse.2023.041446

    Abstract The Internet of Things (IoT) system has confronted dramatic growth in high dimensionality and data traffic. The system named intrusion detection systems (IDS) is broadly utilized for the enhancement of security posture in an IT infrastructure. An IDS is a practical and suitable method for assuring network security and identifying attacks by protecting it from intrusive hackers. Nowadays, machine learning (ML)-related techniques were used for detecting intrusion in IoTs IDSs. But, the IoT IDS mechanism faces significant challenges because of physical and functional diversity. Such IoT features use every attribute and feature for IDS self-protection unrealistic and difficult. This study… More >

  • Open Access

    ARTICLE

    Edge Cloud Selection in Mobile Edge Computing (MEC)-Aided Applications for Industrial Internet of Things (IIoT) Services

    Dae-Young Kim1, SoYeon Lee2, MinSeung Kim2, Seokhoon Kim1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2049-2060, 2023, DOI:10.32604/csse.2023.040473

    Abstract In many IIoT architectures, various devices connect to the edge cloud via gateway systems. For data processing, numerous data are delivered to the edge cloud. Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency. There are two types of costs for this kind of IoT network: a communication cost and a computing cost. For service efficiency, the communication cost of data transmission should be minimized, and the computing cost in the edge cloud should be also minimized. Therefore, in this paper, the communication cost for data transmission is defined as the delay factor, and the… More >

Displaying 1-10 on page 1 of 365. Per Page