Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is a challenging task in small… More >

  • Open Access

    ARTICLE

    Paillier Cryptography Based Message Authentication Code for IoMT Security

    S. Siamala Devi1, Chandrakala Kuruba2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2209-2223, 2023, DOI:10.32604/csse.2023.025514

    Abstract Health care visualization through Internet of Things (IoT) over wireless sensor network (WSN) becomes a current research attention due to medical sensor evolution of devices. The digital technology-based communication system is widely used in all application. Internet of medical thing (IoMT) assisted healthcare application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation. These smart medical devices may consume with limited resources and also the data generated by these devices are large in size. These IoMT based applications suffer from the issues such as security, anonymity, privacy,… More >

  • Open Access

    ARTICLE

    Active Authentication Protocol for IoV Environment with Distributed Servers

    Saravanan Manikandan1, Mosiur Rahaman1, Yu-Lin Song1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5789-5808, 2022, DOI:10.32604/cmc.2022.031490

    Abstract The Internet of Vehicles (IoV) has evolved as an advancement over the conventional Vehicular Ad-hoc Networks (VANETs) in pursuing a more optimal intelligent transportation system that can provide various intelligent solutions and enable a variety of applications for vehicular traffic. Massive volumes of data are produced and communicated wirelessly among the different relayed entities in these vehicular networks, which might entice adversaries and endanger the system with a wide range of security attacks. To ensure the security of such a sensitive network, we proposed a distributed authentication mechanism for IoV based on blockchain technology as a distributed ledger with an… More >

  • Open Access

    ARTICLE

    Message Authentication with a New Quantum Hash Function

    Yalan Wang1,2, Yuling Chen1,*, Haseeb Ahmad3, Zhanhong Wei4

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 635-648, 2019, DOI:10.32604/cmc.2019.05251

    Abstract To ensure the security during the communication, we often adopt different ways to encrypt the messages to resist various attacks. However, with the computing power improving, the existing encryption and authentication schemes are being faced with big challenges. We take the message authentication as an example into a careful consideration. Then, we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function. Firstly, the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the corresponding Hash values, which ensures… More >

Displaying 1-10 on page 1 of 4. Per Page