Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (50)
  • Open Access

    REVIEW

    Wireless Sensor Security Issues on Data Link Layer: A Survey

    Muhammad Zulkifl Hasan*, Zurina Mohd Hanapi, Muhammad Zunnurain Hussain

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4065-4084, 2023, DOI:10.32604/cmc.2023.036444

    Abstract A computer network can be defined as many computing devices connected via a communication medium like the internet. Computer network development has proposed how humans and devices communicate today. These networks have improved, facilitated, and made conventional forms of communication easier. However, it has also led to uptick in-network threats and assaults. In 2022, the global market for information technology is expected to reach $170.4 billion. However, in contrast, 95% of cyber security threats globally are caused by human action. These networks may be utilized in several control systems, such as home-automation, chemical and physical assault detection, intrusion detection, and… More >

  • Open Access

    ARTICLE

    Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments

    Osama A. Khashan1,*, Sultan Alamri2, Waleed Alomoush3, Mutasem K. Alsmadi4, Samer Atawneh2, Usama Mir5

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3133-3158, 2023, DOI:10.32604/cmc.2023.036217

    Abstract In recent times, technology has advanced significantly and is currently being integrated into educational environments to facilitate distance learning and interaction between learners. Integrating the Internet of Things (IoT) into education can facilitate the teaching and learning process and expand the context in which students learn. Nevertheless, learning data is very sensitive and must be protected when transmitted over the network or stored in data centers. Moreover, the identity and the authenticity of interacting students, instructors, and staff need to be verified to mitigate the impact of attacks. However, most of the current security and authentication schemes are centralized, relying… More >

  • Open Access

    ARTICLE

    Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing

    Jihyeon Yu1, Juhwan Kim1, Youngwoo Lee1, Fayozbek Rustamov2, Joobeom Yun1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3291-3315, 2023, DOI:10.32604/cmc.2023.035835

    Abstract Internet of things (IoT) devices are being increasingly used in numerous areas. However, the low priority on security and various IoT types have made these devices vulnerable to attacks. To prevent this, recent studies have analyzed firmware in an emulation environment that does not require actual devices and is efficient for repeated experiments. However, these studies focused only on major firmware architectures and rarely considered exotic firmware. In addition, because of the diversity of firmware, the emulation success rate is not high in terms of large-scale analyses. In this study, we propose the adaptive emulation framework for multi-architecture (AEMA). In… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Transmission Scheme Based on Physical Mechanism

    Ping Zhang1, Haoran Zhu1, Wenjun Li2, Osama Alfarraj3, Amr Tolba3, Gwang-jun Kim4,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3589-3605, 2023, DOI:10.32604/cmc.2023.032097

    Abstract Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply, which are not suitable for traditional security technology. The security technology based on the physical mechanism has attracted extensive attention. How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism. In this paper, superlattice technology is introduced to the security field of Internet of things, and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed. In order to ensure the… More >

  • Open Access

    ARTICLE

    Improved Hybrid Swarm Intelligence for Optimizing the Energy in WSN

    Ahmed Najat Ahmed1, JinHyung Kim2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2527-2542, 2023, DOI:10.32604/csse.2023.036106

    Abstract In this current century, most industries are moving towards automation, where human intervention is dramatically reduced. This revolution leads to industrial revolution 4.0, which uses the Internet of Things (IoT) and wireless sensor networks (WSN). With its associated applications, this IoT device is used to compute the received WSN data from devices and transfer it to remote locations for assistance. In general, WSNs, the gateways are a long distance from the base station (BS) and are communicated through the gateways nearer to the BS. At the gateway, which is closer to the BS, energy drains faster because of the heavy… More >

  • Open Access

    ARTICLE

    Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly

    Seog Chung Seo1, HeeSeok Kim2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2091-2107, 2023, DOI:10.32604/csse.2023.035064

    Abstract With the rapid development of quantum computers capable of realizing Shor’s algorithm, existing public key-based algorithms face a significant security risk. Crystals-Kyber has been selected as the only key encapsulation mechanism (KEM) algorithm in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition. In this study, we present a portable and efficient implementation of a Crystals-Kyber post-quantum KEM based on WebAssembly (Wasm), a recently released portable execution framework for high-performance web applications. Until now, most Kyber implementations have been developed with native programming languages such as C and Assembly. Although there are a few previous Kyber implementations… More >

  • Open Access

    ARTICLE

    Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach

    Sarah Alzahrani1, Joud Alderaan1, Dalya Alatawi1, Bandar Alotaibi1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 651-667, 2023, DOI:10.32604/cmc.2023.035173

    Abstract Internet of Things (IoT) devices incorporate a large amount of data in several fields, including those of medicine, business, and engineering. User authentication is paramount in the IoT era to assure connected devices’ security. However, traditional authentication methods and conventional biometrics-based authentication approaches such as face recognition, fingerprints, and password are vulnerable to various attacks, including smudge attacks, heat attacks, and shoulder surfing attacks. Behavioral biometrics is introduced by the powerful sensing capabilities of IoT devices such as smart wearables and smartphones, enabling continuous authentication. Artificial Intelligence (AI)-based approaches introduce a bright future in refining large amounts of homogeneous biometric… More >

  • Open Access

    ARTICLE

    TinyML-Based Classification in an ECG Monitoring Embedded System

    Eunchan Kim1, Jaehyuk Kim2, Juyoung Park3, Haneul Ko4, Yeunwoong Kyung5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1751-1764, 2023, DOI:10.32604/cmc.2023.031663

    Abstract Recently, the development of the Internet of Things (IoT) has enabled continuous and personal electrocardiogram (ECG) monitoring. In the ECG monitoring system, classification plays an important role because it can select useful data (i.e., reduce the size of the dataset) and identify abnormal data that can be used to detect the clinical diagnosis and guide further treatment. Since the classification requires computing capability, the ECG data are usually delivered to the gateway or the server where the classification is performed based on its computing resource. However, real-time ECG data transmission continuously consumes battery and network resources, which are expensive and… More >

  • Open Access

    ARTICLE

    Authentication of WSN for Secured Medical Data Transmission Using Diffie Hellman Algorithm

    A. Jenice Prabhu1,*, D. Hevin Rajesh2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2363-2376, 2023, DOI:10.32604/csse.2023.028089

    Abstract The applications of wireless sensor network (WSN) exhibits a significant rise in recent days since it is enveloped with various advantageous benefits. In the medical field, the emergence of WSN has created marvelous changes in monitoring the health conditions of the patients and so it is attracted by doctors and physicians. WSN assists in providing health care services without any delay and so it plays predominant role in saving the life of human. The data of different persons, time, places and networks have been linked with certain devices, which are collectively known as Internet of Things (IOT); it is regarded… More >

  • Open Access

    ARTICLE

    Improved Ant Colony Optimization and Machine Learning Based Ensemble Intrusion Detection Model

    S. Vanitha1,*, P. Balasubramanie2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 849-864, 2023, DOI:10.32604/iasc.2023.032324

    Abstract Internet of things (IOT) possess cultural, commercial and social effect in life in the future. The nodes which are participating in IOT network are basically attracted by the cyber-attack targets. Attack and identification of anomalies in IoT infrastructure is a growing problem in the IoT domain. Machine Learning Based Ensemble Intrusion Detection (MLEID) method is applied in order to resolve the drawback by minimizing malicious actions in related botnet attacks on Message Queue Telemetry Transport (MQTT) and Hyper-Text Transfer Protocol (HTTP) protocols. The proposed work has two significant contributions which are a selection of features and detection of attacks. New… More >

Displaying 11-20 on page 2 of 50. Per Page