Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    LSAP-IoHT: Lightweight Secure Authentication Protocol for the Internet of Healthcare Things

    Marwa Ahmim1, Nour Ouafi1, Insaf Ullah2,*, Ahmed Ahmim3, Djalel Chefrour3, Reham Almukhlifi4

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5093-5116, 2025, DOI:10.32604/cmc.2025.067641 - 23 October 2025

    Abstract The Internet of Healthcare Things (IoHT) marks a significant breakthrough in modern medicine by enabling a new era of healthcare services. IoHT supports real-time, continuous, and personalized monitoring of patients’ health conditions. However, the security of sensitive data exchanged within IoHT remains a major concern, as the widespread connectivity and wireless nature of these systems expose them to various vulnerabilities. Potential threats include unauthorized access, device compromise, data breaches, and data alteration, all of which may compromise the confidentiality and integrity of patient information. In this paper, we provide an in-depth security analysis of LAP-IoHT,… More >

  • Open Access

    ARTICLE

    IECC-SAIN: Innovative ECC-Based Approach for Secure Authentication in IoT Networks

    Younes Lahraoui1, Jihane Jebrane2, Youssef Amal1, Saiida Lazaar1, Cheng-Chi Lee3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.1, pp. 615-641, 2025, DOI:10.32604/cmes.2025.067778 - 31 July 2025

    Abstract Due to their resource constraints, Internet of Things (IoT) devices require authentication mechanisms that are both secure and efficient. Elliptic curve cryptography (ECC) meets these needs by providing strong security with shorter key lengths, which significantly reduces the computational overhead required for authentication algorithms. This paper introduces a novel ECC-based IoT authentication system utilizing our previously proposed efficient mapping and reverse mapping operations on elliptic curves over prime fields. By reducing reliance on costly point multiplication, the proposed algorithm significantly improves execution time, storage requirements, and communication cost across varying security levels. The proposed authentication… More >

  • Open Access

    ARTICLE

    A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs

    Sameh Zarif1,2,*, Hadier Moawad2, Khalid Amin2, Abdullah Alharbi3, Wail S. Elkilani4, Shouze Tang5, Marian Wagdy6

    Computer Systems Science and Engineering, Vol.49, pp. 79-98, 2025, DOI:10.32604/csse.2024.057439 - 03 January 2025

    Abstract Authentication is the most crucial aspect of security and a predominant measure employed in cybersecurity. Cloud computing provides a shared electronic device resource for users via the internet, and the authentication techniques used must protect data from attacks. Previous approaches failed to resolve the challenge of making passwords secure, memorable, usable, and time-saving. Graphical Password (GP) is still not widely utilized in reality because consumers suffer from multiple login stages. This paper proposes an Indexed Choice-Based Graphical Password (ICGP) scheme for improving the authentication part. ICGP consists of two stages: registration and authentication. At the… More >

  • Open Access

    ARTICLE

    IoT-Enabled Plant Monitoring System with Power Optimization and Secure Authentication

    Samsul Huda1,*, Yasuyuki Nogami2, Maya Rahayu2, Takuma Akada2, Md. Biplob Hossain2, Muhammad Bisri Musthafa2, Yang Jie2, Le Hoang Anh2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3165-3187, 2024, DOI:10.32604/cmc.2024.058144 - 18 November 2024

    Abstract Global food security is a pressing issue that affects the stability and well-being of communities worldwide. While existing Internet of Things (IoT) enabled plant monitoring systems have made significant strides in agricultural monitoring, they often face limitations such as high power consumption, restricted mobility, complex deployment requirements, and inadequate security measures for data access. This paper introduces an enhanced IoT application for agricultural monitoring systems that address these critical shortcomings. Our system strategically combines power efficiency, portability, and secure access capabilities, assisting farmers in monitoring and tracking crop environmental conditions. The proposed system includes a… More >

  • Open Access

    ARTICLE

    PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks

    Xuanang Li1, Shuangshuang Liu1, Saru Kumari2, Chien-Ming Chen1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 711-732, 2023, DOI:10.32604/cmes.2022.022667 - 29 September 2022

    Abstract Nowadays, the widespread application of 5G has promoted rapid development in different areas, particularly in the Internet of Things (IoT), where 5G provides the advantages of higher data transfer rate, lower latency, and widespread connections. Wireless sensor networks (WSNs), which comprise various sensors, are crucial components of IoT. The main functions of WSN include providing users with real-time monitoring information, deploying regional information collection, and synchronizing with the Internet. Security in WSNs is becoming increasingly essential because of the across-the-board nature of wireless technology in many fields. Recently, Yu et al. proposed a user authentication protocol for WSN. More >

  • Open Access

    ARTICLE

    Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET

    S. Neelavathy Pari1,*, K. Sudharson2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2775-2789, 2023, DOI:10.32604/csse.2023.029345 - 01 August 2022

    Abstract A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network (MANET). A MANET’s nodes could engage actively and dynamically with one another. However, MANETs, from the other side, are exposed to severe potential threats that are difficult to counter with present security methods. As a result, several safe communication protocols designed to enhance the secure interaction among MANET nodes. In this research, we offer a reputed optimal routing value among network nodes, secure computations, and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation… More >

  • Open Access

    ARTICLE

    An Efficient Sound and Data Steganography Based Secure Authentication System

    Debajit Datta1, Lalit Garg2,*, Kathiravan Srinivasan3, Atsushi Inoue4, G. Thippa Reddy3, M. Praveen Kumar Reddy3, K. Ramesh5, Nidal Nasser6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 723-751, 2021, DOI:10.32604/cmc.2021.014802 - 12 January 2021

    Abstract The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches. Firstly, a random signal is encrypted, and… More >

Displaying 1-10 on page 1 of 7. Per Page