Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    ARTICLE

    A Lightweight Blockchain for IoT in Smart City (IoT-SmartChain)

    Zakariae Dlimi*, Abdellah Ezzati, Saïd Ben Alla

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2687-2703, 2021, DOI:10.32604/cmc.2021.018942

    Abstract The smart city is a technological framework that connects the city’s different components to create new opportunities. This connection is possible with the help of the Internet of Things (IoT), which provides a digital personality to physical objects. Some studies have proposed integrating Blockchain technology with IoT in different use cases as access, orchestration, or replicated storage layer. The majority of connected objects’ capacity limitation makes the use of Blockchain inadequate due to its redundancy and its conventional processing-intensive consensus like PoW. This paper addresses these challenges by proposing a NOVEL model of a lightweight Blockchain framework (IoT-SmartChain), with a… More >

  • Open Access

    ARTICLE

    A Lightweight Anonymous Device Authentication Scheme for Information-Centric Distribution Feeder Microgrid

    Anhao Xiang, Jun Zheng*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2141-2158, 2021, DOI:10.32604/cmc.2021.018808

    Abstract Distribution feeder microgrid (DFM) built based on existing distributed feeder (DF), is a promising solution for modern microgrid. DFM contains a large number of heterogeneous devices that generate heavy network traffice and require a low data delivery latency. The information-centric networking (ICN) paradigm has shown a great potential to address the communication requirements of smart grid. However, the integration of advanced information and communication technologies with DFM make it vulnerable to cyber attacks. Adequate authentication of grid devices is essential for preventing unauthorized accesses to the grid network and defending against cyber attacks. In this paper, we propose a new… More >

  • Open Access

    ARTICLE

    Face Age Estimation Based on CSLBP and Lightweight Convolutional Neural Network

    Yang Wang1, Ying Tian1,*, Ou Tian2

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2203-2216, 2021, DOI:10.32604/cmc.2021.018709

    Abstract As the use of facial attributes continues to expand, research into facial age estimation is also developing. Because face images are easily affected by factors including illumination and occlusion, the age estimation of faces is a challenging process. This paper proposes a face age estimation algorithm based on lightweight convolutional neural network in view of the complexity of the environment and the limitations of device computing ability. Improving face age estimation based on Soft Stagewise Regression Network (SSR-Net) and facial images, this paper employs the Center Symmetric Local Binary Pattern (CSLBP) method to obtain the feature image and then combines… More >

  • Open Access

    ARTICLE

    Lightweight Transfer Learning Models for Ultrasound-Guided Classification of COVID-19 Patients

    Mohamed Esmail Karar1,2, Omar Reyad1,3, Mohammed Abd-Elnaby4, Abdel-Haleem Abdel-Aty5,6, Marwa Ahmed Shouman7,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2295-2312, 2021, DOI:10.32604/cmc.2021.018671

    Abstract Lightweight deep convolutional neural networks (CNNs) present a good solution to achieve fast and accurate image-guided diagnostic procedures of COVID-19 patients. Recently, advantages of portable Ultrasound (US) imaging such as simplicity and safe procedures have attracted many radiologists for scanning suspected COVID-19 cases. In this paper, a new framework of lightweight deep learning classifiers, namely COVID-LWNet is proposed to identify COVID-19 and pneumonia abnormalities in US images. Compared to traditional deep learning models, lightweight CNNs showed significant performance of real-time vision applications by using mobile devices with limited hardware resources. Four main lightweight deep learning models, namely MobileNets, ShuffleNets, MENet… More >

  • Open Access

    ARTICLE

    A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation

    Yong-Woon Hwang, Im-Yeong Lee*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1747-1764, 2021, DOI:10.32604/cmc.2021.018549

    Abstract Recently, with the advancement of Information and Communications Technology (ICT), Internet of Things (IoT) has been connected to the cloud and used in industrial sectors, medical environments, and smart grids. However, if data is transmitted in plain text when collecting data in an IoT-cloud environment, it can be exposed to various security threats such as replay attacks and data forgery. Thus, digital signatures are required. Data integrity is ensured when a user (or a device) transmits data using a signature. In addition, the concept of data aggregation is important to efficiently collect data transmitted from multiple users (or a devices)… More >

  • Open Access

    ARTICLE

    Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation

    T. Kowsalya1, R. Ganesh Babu2, B. D. Parameshachari3, Anand Nayyar4, Raja Majid Mehmood5,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1447-1465, 2021, DOI:10.32604/cmc.2021.014606

    Abstract Lightweight Cryptography (LWC) is widely used to provide integrity, secrecy and authentication for the sensitive applications. However, the LWC is vulnerable to various constraints such as high-power consumption, time consumption, and hardware utilization and susceptible to the malicious attackers. In order to overcome this, a lightweight block cipher namely PRESENT architecture is proposed to provide the security against malicious attacks. The True Random Number Generator-Pseudo Random Number Generator (TRNG-PRNG) based key generation is proposed to generate the unpredictable keys, being highly difficult to predict by the hackers. Moreover, the hardware utilization of PRESENT architecture is optimized using the Dual port… More >

  • Open Access

    REVIEW

    An Evaluation of Value-Oriented Review for Software Requirements Specification

    Qiang Zhi1,*, Shuji Morisaki2

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 443-461, 2021, DOI:10.32604/csse.2021.015157

    Abstract A software requirements specification (SRS) is a detailed description of a software system to be developed. This paper proposes and evaluates a lightweight review approach called value-oriented review (VOR) to detect defects in SRS. This approach comprises setting core values based on SRS and detecting the defects disturbing the core values. To evaluate the effectiveness of the proposed approach, we conducted a controlled experiment to investigate whether reviewers could identify and record the core values based on SRS and find defects disturbing the core values. Results of the evaluation with 56 software engineers showed that 91% of the reviewers identified… More >

  • Open Access

    ARTICLE

    LBC-IoT: Lightweight Block Cipher for IoT Constraint Devices

    Rabie A. Ramadan1,2,*, Bassam W. Aboshosha3, Kusum Yadav1, Ibrahim M. Alseadoon1, Munawar J. Kashout1, Mohamed Elhoseny4,5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3563-3579, 2021, DOI:10.32604/cmc.2021.015519

    Abstract With the new era of the Internet of Things (IoT) technology, many devices with limited resources are utilized. Those devices are susceptible to a significant number of new malware and other risks emerging rapidly. One of the most appropriate methods for securing those IoT applications is cryptographic algorithms, as cryptography masks information by eliminating the risk of collecting any meaningful information patterns. This ensures that all data communications are private, accurate, authenticated, authorized, or non-repudiated. Since conventional cryptographic algorithms have been developed specifically for devices with limited resources; however, it turns out that such algorithms are not ideal for IoT… More >

  • Open Access

    ARTICLE

    Design of a Mutual Authentication and Key Agreement Protocol for WBANs

    Xiangwei Meng, Jianbo Xu*, Xiaohe Wu, Zhechong Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 107-114, 2020, DOI:10.32604/jihpp.2020.09901

    Abstract Please WBANs are a sensor network for detection and collection of sensitive data to the human body, which is lightweight and mobile. WBANs transmit sensitive and significant messages through the public channel, which makes it easy for an attacker to eavesdrop and modify the messages, thus posing a severe threat to the security of the messages. Therefore, it is essential to put in place authentication and key agreement between different communication nodes in WBANs. In this paper, a lightweight and secure authenticated key agreement protocol in wireless body area networks is designed. It is capable to reduce the cost of… More >

  • Open Access

    ARTICLE

    Intelligent Tunicate Swarm-Optimization-Algorithm-Based Lightweight Security Mechanism in Internet of Health Things

    Gia Nhu Nguyen1,2, Nin Ho Le Viet1,2, Gyanendra Prasad Joshi3, Bhanu Shrestha4,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 551-562, 2021, DOI:10.32604/cmc.2020.012441

    Abstract Fog computing in the Internet of Health Things (IoHT) is promising owing to the increasing need for energy- and latency-optimized health sector provisioning. Additionally, clinical data (particularly, medical image data) are a delicate, highly protected resource that should be utilized in an effective and responsible manner to fulfil consumer needs. Herein, we propose an energy-effi- cient fog-based IoHT with a tunicate swarm-optimization-(TSO)-based lightweight Simon cipher to enhance the energy efficiency at the fog layer and the security of data stored at the cloud server. The proposed Simon cipher uses the TSO algorithm to select the optimal keys that will minimize… More >

Displaying 81-90 on page 9 of 100. Per Page