Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access


    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

    Yang Zhao1, Jingmin An1, Hao Li1, Saru Kumari2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 555-575, 2023, DOI:10.32604/cmes.2023.026808

    Abstract The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-time detection and operation control of vehicles and real-time transmission of data and information. In the environment of VSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users, so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, in this paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTAS-ET). The scheme combines fault-tolerant and aggregate signcryption, which not only makes up for… More > Graphic Abstract

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

  • Open Access


    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an… More >

  • Open Access


    Intelligent Optimization-Based Clustering with Encryption Technique for Internet of Drones Environment

    Dalia H. Elkamchouchi1, Jaber S. Alzahrani2, Hany Mahgoub3,4, Amal S. Mehanna5, Anwer Mustafa Hilal6,*, Abdelwahed Motwakel6, Abu Sarwar Zamani6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6617-6634, 2022, DOI:10.32604/cmc.2022.031909

    Abstract The recent technological developments have revolutionized the functioning of Wireless Sensor Network (WSN)-based industries with the development of Internet of Things (IoT). Internet of Drones (IoD) is a division under IoT and is utilized for communication amongst drones. While drones are naturally mobile, it undergoes frequent topological changes. Such alterations in the topology cause route election, stability, and scalability problems in IoD. Encryption is considered as an effective method to transmit the images in IoD environment. The current study introduces an Atom Search Optimization based Clustering with Encryption Technique for Secure Internet of Drones (ASOCE-SIoD) environment. The key objective of… More >

  • Open Access


    A Secure and Efficient Signature Scheme for IoT in Healthcare

    Latika Kakkar1, Deepali Gupta1, Sarvesh Tanwar2, Sapna Saxena3, Khalid Alsubhi4, Divya Anand5, Irene Delgado Noya6,7, Nitin Goyal1,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6151-6168, 2022, DOI:10.32604/cmc.2022.023769

    Abstract To provide faster access to the treatment of patients, healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient. There is a huge limitation in the sensing layer as the IoT devices here have low computational power, limited storage and less battery life. So, this huge amount of data needs to be stored on the cloud. The information and the data sensed by these devices is made accessible on the internet from where medical staff, doctors, relatives and family members can access this information. This helps in improving the treatment as… More >

  • Open Access


    An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission

    A. Chinnappa*, C. Vijayakumaran

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4017-4031, 2022, DOI:10.32604/cmc.2022.027858

    Abstract Internet of Things (IoT) allows several low resources and controlled devices to interconnect, calculate processes and make decisions in the communication network. In the heterogeneous environment for IoT devices, several challenging issues such as energy, storage, efficiency, and security. The design of encryption techniques enables the transmission of the data in the IoT environment in a secured way. The proper selection of optimal keys helps to boost the encryption performance. With this motivation, the study presents a signcryption with quantum chaotic krill herd algorithm for secured data transmission (SCQCKH-SDT) in IoT environment. The proposed SCQCKH-SDT technique aims to effectively encrypts… More >

  • Open Access


    Lamport Certificateless Signcryption Deep Neural Networks for Data Aggregation Security in WSN

    P. Saravanakumar1, T. V. P. Sundararajan2, Rajesh Kumar Dhanaraj3, Kashif Nisar4,*, Fida Hussain Memon5,6, Ag. Asri Bin Ag. Ibrahim4

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1835-1847, 2022, DOI:10.32604/iasc.2022.018953

    Abstract Confidentiality and data integrity are essential paradigms in data aggregation owing to the various cyberattacks in wireless sensor networks (WSNs). This study proposes a novel technique named Lamport certificateless signcryption-based shift-invariant connectionist artificial deep neural networks (LCS-SICADNN) by using artificial deep neural networks to develop the data aggregation security model. This model utilises the input layer with several sensor nodes, four hidden layers to overcome different attacks (data injection, compromised node, Sybil and black hole attacks) and the output layer to analyse the given input. The Lamport one-time certificateless signcryption technique involving three different processes (key generation, signcryption and unsigncryption)… More >

  • Open Access


    Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications

    Usman Ali1,2, Mohd Yamani Idna Idris1,3,*, Jaroslav Frnda4, Mohamad Nizam Bin Ayub1, Roobaea Alroobaea5, Fahad Almansour6, Nura Modi Shagari1, Insaf Ullah7, Ihsan Ali1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2515-2532, 2022, DOI:10.32604/cmc.2022.019800

    Abstract Industrial internet of things (IIoT) is the usage of internet of things (IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-related processes to attain more profits. However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoT environment. In this paper, we propose a… More >

  • Open Access


    Novel Image Encryption and Compression Scheme for IoT Environment

    Mesfer Al Duhayyim1, Fahd N. Al-Wesabi2, Radwa Marzouk3, Manar Ahmed Hamza4, Anwer Mustafa Hilal4,*, Majdy M. Eltahir2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1443-1457, 2022, DOI:10.32604/cmc.2022.021873

    Abstract Latest advancements made in the processing abilities of smart devices have resulted in the designing of Intelligent Internet of Things (IoT) environment. This advanced environment enables the nodes to connect, collect, perceive, and examine useful data from its surroundings. Wireless Multimedia Surveillance Networks (WMSNs) form a vital part in IoT-assisted environment since it contains visual sensors that examine the surroundings from a number of overlapping views by capturing the images incessantly. Since IoT devices generate a massive quantity of digital media, it is therefore required to save the media, especially images, in a secure way. In order to achieve security,… More >

  • Open Access

    An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments

    Insaf Ullah1,*, Hira Zahid2 , Fahad Algarni3, Muhammad Asghar Khan1

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4307-4321, 2022, DOI:10.32604/cmc.2022.017380


    When the Wireless Sensor Network (WSN) is combined with the Internet of Things (IoT), it can be employed in a wide range of applications, such as agriculture, industry 4.0, health care, smart homes, among others. Accessing the big data generated by these applications in Cloud Servers (CSs), requires higher levels of authenticity and confidentiality during communication conducted through the Internet. Signcryption is one of the most promising approaches nowadays for overcoming such obstacles, due to its combined nature, i.e., signature and encryption. A number of researchers have developed schemes to address issues related to access control in the IoT literature,… More >

  • Open Access


    An Efficient Proxy Blind Signcryption Scheme for IoT

    Aamer Khan1, Insaf Ullah2,*, Fahad Algarni3, Muhammad Naeem1, M. Irfan Uddin4, Muhammad Asghar Khan2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4293-4306, 2022, DOI:10.32604/cmc.2022.017318

    Abstract Recent years have witnessed growing scientific research interest in the Internet of Things (IoT) technologies, which supports the development of a variety of applications such as health care, Industry 4.0, agriculture, ecological data management, and other various domains. IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages. However, due to the wide-open nature of the Internet, it is important to ensure the anonymity, untraceably, confidentiality, and unforgeability of communication with efficient computational complexity and low bandwidth. We designed a light weight and secure proxy blind signcryption for multi-digital messages based… More >

Displaying 1-10 on page 1 of 13. Per Page  

Share Link