Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    REVIEW

    A Survey on Token Transmission Attacks, Effects, and Mitigation Strategies in IoT Devices

    Michael Juma Ayuma1, Shem Mbandu Angolo1,*, Philemon Nthenge Kasyoka2,*

    Journal on Artificial Intelligence, Vol.7, pp. 205-254, 2025, DOI:10.32604/jai.2025.067361 - 19 August 2025

    Abstract The exponential growth of Internet of Things (IoT) devices has introduced significant security challenges, particularly in securing token-based communication protocols used for authentication and authorization. This survey systematically reviews the vulnerabilities in token transmission within IoT environments, focusing on various sophisticated attack vectors such as replay attacks, token hijacking, man-in-the-middle (MITM) attacks, token injection, and eavesdropping among others. These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth, JSON Web Tokens (JWT), and bearer tokens, which are widely used in IoT ecosystems for managing device interactions and access control. The impact of such attacks… More >

  • Open Access

    ARTICLE

    Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks: An Experimental Approach

    Kithmini Godewatte Arachchige1, Mohsin Murtaza2, Chi-Tsun Cheng2, Bader M. Albahlal3,*, Cheng-Chi Lee4,5,*

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3679-3705, 2024, DOI:10.32604/cmc.2024.059378 - 19 December 2024

    Abstract Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats, with Internet of Things (IoT) security gaining particular attention due to its role in data communication across various industries. However, IoT devices, typically low-powered, are susceptible to cyber threats. Conversely, blockchain has emerged as a robust solution to secure these devices due to its decentralised nature. Nevertheless, the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks, network scalability limitations, and blockchain-specific security vulnerabilities. Blockchain, on the other hand, is a recently emerged information… More >

  • Open Access

    ARTICLE

    Framework for Effective Utilization of Distributed Scrum in Software Projects

    Basit Shahzad1, Wardah Naeem Awan1,*, Fazal-e-Amin2, Ahsanullah Abro3, Muhammad Shoaib4, Sultan Alyahya4

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 407-422, 2023, DOI:10.32604/csse.2023.022601 - 01 June 2022

    Abstract There is an emerging interest in using agile methodologies in Global Software Development (GSD) to get the mutual benefits of both methods. Scrum is currently admired by many development teams as an agile most known methodology and considered adequate for collocated teams. At the same time, stakeholders in GSD are dispersed by geographical, temporal, and socio-cultural distances. Due to the controversial nature of Scrum and GSD, many significant challenges arise that might restrict the use of Scrum in GSD. We conducted a Systematic Literature Review (SLR) by following Kitchenham guidelines to identify the challenges that More >

Displaying 1-10 on page 1 of 3. Per Page