Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    ARTICLE

    Lightweight Direct Acyclic Graph Blockchain for Enhancing Resource-Constrained IoT Environment

    Salaheddine Kably1,2,*, Mounir Arioua1, Nabih Alaoui2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5271-5291, 2022, DOI:10.32604/cmc.2022.020833

    Abstract Blockchain technology is regarded as the emergent security solution for many applications related to the Internet of Things (IoT). In concept, blockchain has a linear structure that grows with the number of transactions entered. This growth in size is the main obstacle to the blockchain, which makes it unsuitable for resource-constrained IoT environments. Moreover, conventional consensus algorithms such as PoW, PoS are very computationally heavy. This paper solves these problems by introducing a new lightweight blockchain structure and lightweight consensus algorithm. The Multi-Zone Direct Acyclic Graph (DAG) Blockchain (Multizone-DAG-Blockchain) framework is proposed for the fog-based IoT environment. In this context,… More >

  • Open Access

    ARTICLE

    Light-Weight Present Block Cipher Model for IoT Security on FPGA

    R. Bharathi*, N. Parvatham

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 35-49, 2022, DOI:10.32604/iasc.2022.020681

    Abstract The Internet of Things (IoT) plays an essential role in connecting a small number of billion devices with people for diverse applications. The security and privacy with authentication are challenging work for IoT devices. A light-weight block cipher is designed and modeled with IoT security for real-time scenarios to overcome the above challenges. The light-weight PRESENT module with the integration of encryption (E)-decryption (D) is modeled and implemented on FPGA. The PRESENT module has 64-bit data input with 80/128/256-bit symmetric keys for IoT security. The PRESENT module performs16/32/64 round operations for state register and key updation. The design mainly uses… More >

  • Open Access

    ARTICLE

    Lightweight Key Management Scheme Using Fuzzy Extractor for Wireless Mobile Sensor Network

    Eid Rehman1, Ibrahima Kalil Toure2, Kashif Sultan3, Muhammad Asif4, Muhammad Habib1, Najam Ul Hasan5, Oh-Young Song6,*, Aaqif Afzaal Abbasi1

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1695-1712, 2022, DOI:10.32604/cmc.2022.021641

    Abstract

    The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance. All such types of applications based on wireless mobile sensor network are generally using real time data, most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster network. This would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base station. But this… More >

  • Open Access

    ARTICLE

    Chaos-Based Cryptographic Mechanism for Smart Healthcare IoT Systems

    Muhammad Samiullah1, Waqar Aslam1, Arif Mehmood1, Muhammad Saeed Ahmad2, Shafiq Ahmad3, Adel M. Al-Shayea3, Muhammad Shafiq4,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 753-769, 2022, DOI:10.32604/cmc.2022.020432

    Abstract Smart and interconnected devices can generate meaningful patient data and exchange it automatically without any human intervention in order to realize the Internet of Things (IoT) in healthcare (HIoT). Due to more and more online security and data hijacking attacks, the confidentiality, integrity and availability of data are considered serious issues in HIoT applications. In this regard, lightweight block ciphers (LBCs) are promising in resource-constrained environment where security is the primary consideration. The prevalent challenge while designing an LBC for the HIoT environment is how to ascertain platform performance, cost, and security. Most of the existing LBCs primarily focus on… More >

  • Open Access

    ARTICLE

    Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

    S. Gladson Oliver1,*, T. Purusothaman2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 767-780, 2022, DOI:10.32604/csse.2022.020888

    Abstract Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing network and these entities are resource constrained and vulnerable to various security attacks. Huge number of research works are being carried out to analyze various possible attacks and to propose standards for securing communication between devices in internet of things (IoT). In this article, a robust and lightweight authentication scheme for mutual authentication between client and server using constrained application protocol is proposed. Internet of things… More >

  • Open Access

    ARTICLE

    Efficient Key Management System Based Lightweight Devices in IoT

    T. Chindrella Priyadharshini1,*, D. Mohana Geetha2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1793-1808, 2022, DOI:10.32604/iasc.2022.020422

    Abstract The Internet of Things (IoT) has changed our lives significantly. Although IoT provides new opportunities, security remains a key concern while providing various services. Existing research methodologies try to solve the security and time-consuming problem also exists. To solve those problems, this paper proposed a Hashed Advanced Encryption Standard (HAES) algorithm based efficient key management system for internet-based lightweight devices in IoT networks. The proposed method is mainly divided into two phases namely Data Owner (DO) and Data User (DU) phase. The DO phase consists of two processes namely authentication and secure data uploading. In authentication, the registration process consists… More >

  • Open Access

    ARTICLE

    Identity Governance Framework for Privileged Users

    Mansour Hammoud Alruwies1, Shailendra Mishra2,*, Mohammed Abdul Rahman AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 995-1005, 2022, DOI:10.32604/csse.2022.019355

    Abstract Information technology companies have grown in size and recognized the need to protect their valuable assets. As a result, each IT application has its authentication mechanism, and an employee needs a username and password. As the number of applications increased, as a result, it became increasingly complex to manage all identities like the number of usernames and passwords of an employee. All identities had to be retrieved by users. Both the identities and the access rights associated with those identities had to be protected by an administrator. Management couldn’t even capture such access rights because they couldn’t verify things like… More >

  • Open Access

    ARTICLE

    Medical Image Compression Method Using Lightweight Multi-Layer Perceptron for Mobile Healthcare Applications

    Taesik Lee1, Dongsan Jun1,*, Sang-hyo Park2, Byung-Gyu Kim3, Jungil Yun4, Kugjin Yun4, Won-Sik Cheong4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 2013-2029, 2022, DOI:10.32604/cmc.2022.019604

    Abstract As video compression is one of the core technologies required to enable seamless medical data streaming in mobile healthcare applications, there is a need to develop powerful media codecs that can achieve minimum bitrates while maintaining high perceptual quality. Versatile Video Coding (VVC) is the latest video coding standard that can provide powerful coding performance with a similar visual quality compared to the previously developed method that is High Efficiency Video Coding (HEVC). In order to achieve this improved coding performance, VVC adopted various advanced coding tools, such as flexible Multi-type Tree (MTT) block structure which uses Binary Tree (BT)… More >

  • Open Access

    ARTICLE

    A Lightweight Approach for Skin Lesion Detection Through Optimal Features Fusion

    Khadija Manzoor1, Fiaz Majeed2, Ansar Siddique2, Talha Meraj3, Hafiz Tayyab Rauf4,*, Mohammed A. El-Meligy5, Mohamed Sharaf6, Abd Elatty E. Abd Elgawad6

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1617-1630, 2022, DOI:10.32604/cmc.2022.018621

    Abstract Skin diseases effectively influence all parts of life. Early and accurate detection of skin cancer is necessary to avoid significant loss. The manual detection of skin diseases by dermatologists leads to misclassification due to the same intensity and color levels. Therefore, an automated system to identify these skin diseases is required. Few studies on skin disease classification using different techniques have been found. However, previous techniques failed to identify multi-class skin disease images due to their similar appearance. In the proposed study, a computer-aided framework for automatic skin disease detection is presented. In the proposed research, we collected and normalized… More >

  • Open Access

    ARTICLE

    An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy

    Seyed Amin Hosseini Seno1, Mahdi Nikooghadam1, Rahmat Budiarto2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3495-3512, 2021, DOI:10.32604/cmc.2021.019051

    Abstract Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers. In this system, service providers consider user authentication as a critical requirement. To address this crucial requirement, various types of validation and key agreement protocols have been employed. The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws. This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication… More >

Displaying 71-80 on page 8 of 100. Per Page