Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (107)
  • Open Access

    ARTICLE

    A Tolerant and Energy Optimization Approach for Internet of Things to Enhance the QoS Using Adaptive Blended Marine Predators Algorithm

    Vijaya Krishna Akula1,*, Tan Kuan Tak2, Pravin Ramdas Kshirsagar3, Shrikant Vijayrao Sonekar4, Gopichand Ginnela5

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2449-2479, 2025, DOI:10.32604/cmc.2025.061486 - 16 April 2025

    Abstract The rapid expansion of Internet of Things (IoT) networks has introduced challenges in network management, primarily in maintaining energy efficiency and robust connectivity across an increasing array of devices. This paper introduces the Adaptive Blended Marine Predators Algorithm (AB-MPA), a novel optimization technique designed to enhance Quality of Service (QoS) in IoT systems by dynamically optimizing network configurations for improved energy efficiency and stability. Our results represent significant improvements in network performance metrics such as energy consumption, throughput, and operational stability, indicating that AB-MPA effectively addresses the pressing needs of modern IoT environments. Nodes are More >

  • Open Access

    ARTICLE

    Blockchain-Based Trust Model for Inter-Domain Routing

    Qiong Yang1, Li Ma1,2,*, Sami Ullah3, Shanshan Tu1, Hisham Alasmary4, Muhammad Waqas5,6

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4821-4839, 2025, DOI:10.32604/cmc.2025.059497 - 06 March 2025

    Abstract Border Gateway Protocol (BGP), as the standard inter-domain routing protocol, is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems (AS). BGP nodes, communicating in a distributed dynamic environment, face several security challenges, with trust being one of the most important issues in inter-domain routing. Existing research, which performs trust evaluation when exchanging routing information to suppress malicious routing behavior, cannot meet the scalability requirements of BGP nodes. In this paper, we propose a blockchain-based trust model for inter-domain routing. Our model achieves scalability by allowing the master node of… More >

  • Open Access

    ARTICLE

    A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol

    Mariam A. Alotaibi1,2,*, Sami S. Alwakeel1,*, Aasem N. Alyahya1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3467-3497, 2025, DOI:10.32604/cmc.2025.060599 - 17 February 2025

    Abstract The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the selection of appropriate routing protocols, which is crucial for maintaining high Quality of Service (QoS). The Internet Engineering Task Force’s Routing Over Low Power and Lossy Networks (IETF ROLL) working group developed the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) to meet these needs. While the initial RPL standard focused on single-metric route selection, ongoing research explores enhancing RPL by incorporating multiple routing metrics… More >

  • Open Access

    ARTICLE

    A Trusted Distributed Oracle Scheme Based on Share Recovery Threshold Signature

    Shihao Wang1, Xuehui Du1,*, Xiangyu Wu1, Qiantao Yang1,2, Wenjuan Wang1, Yu Cao1, Aodi Liu1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3355-3379, 2025, DOI:10.32604/cmc.2024.059722 - 17 February 2025

    Abstract With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put… More >

  • Open Access

    REVIEW

    Zero Trust Networks: Evolution and Application from Concept to Practice

    Yongjun Ren1, Zhiming Wang1, Pradip Kumar Sharma2, Fayez Alqahtani3, Amr Tolba4, Jin Wang5,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1593-1613, 2025, DOI:10.32604/cmc.2025.059170 - 17 February 2025

    Abstract In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defensive techniques, Zero Trust Networks (ZTN) have emerged as a widely recognized technology. Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of “never trust, always verify.” Initially proposed by John Cortez in 2010 and subsequently promoted by Google, the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments. This paper systematically compares the current mainstream cybersecurity models, thoroughly explores More >

  • Open Access

    ARTICLE

    A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain

    Binyong Li1,2,3, Liangming Deng1,*, Jie Zhang1, Xianhui Deng1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 407-426, 2025, DOI:10.32604/cmc.2024.056730 - 03 January 2025

    Abstract To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants, this research focuses on addressing the complex supply relationships in the automotive market, improving data sharing and interactions across various platforms, and achieving more detailed integration of data and operations. We propose a trust evaluation permission delegation method based on the automotive industry chain. The proposed method combines smart contracts with trust evaluation mechanisms, dynamically calculating the trust value of users based on the historical behavior of the delegated entity, network environment, and other More >

  • Open Access

    ARTICLE

    A Verifiable Trust-Based CP-ABE Access Control Scheme for Cloud-Assisted Renewable Energy Systems

    Jiyu Zhang1,*, Kehe Wu1, Ruomeng Yan1, Zheng Tian2, Yizhen Sun2, Yuxi Wu2, Yaogong Guo3

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1211-1232, 2025, DOI:10.32604/cmc.2024.055243 - 03 January 2025

    Abstract Renewable Energy Systems (RES) provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers (ES). However, securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic. Additionally, managing attributes, including addition, deletion, and modification, is a crucial issue in the access control scheme for RES. To address these security concerns, a trust-based ciphertext-policy attribute-based encryption (CP-ABE) device access control scheme is proposed for RES (TB-CP-ABE). This… More >

  • Open Access

    ARTICLE

    Assessor Feedback Mechanism for Machine Learning Model

    Musulmon Lolaev, Anand Paul*, Jeonghong Kim

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4707-4726, 2024, DOI:10.32604/cmc.2024.058675 - 19 December 2024

    Abstract Evaluating artificial intelligence (AI) systems is crucial for their successful deployment and safe operation in real-world applications. The assessor meta-learning model has been recently introduced to assess AI system behaviors developed from emergent characteristics of AI systems and their responses on a test set. The original approach lacks covering continuous ranges, for example, regression problems, and it produces only the probability of success. In this work, to address existing limitations and enhance practical applicability, we propose an assessor feedback mechanism designed to identify and learn from AI system errors, enabling the system to perform the More >

  • Open Access

    ARTICLE

    Machine Learning-Driven Classification for Enhanced Rule Proposal Framework

    B. Gomathi1,*, R. Manimegalai1, Srivatsan Santhanam2, Atreya Biswas3

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1749-1765, 2024, DOI:10.32604/csse.2024.056659 - 22 November 2024

    Abstract In enterprise operations, maintaining manual rules for enterprise processes can be expensive, time-consuming, and dependent on specialized domain knowledge in that enterprise domain. Recently, rule-generation has been automated in enterprises, particularly through Machine Learning, to streamline routine tasks. Typically, these machine models are black boxes where the reasons for the decisions are not always transparent, and the end users need to verify the model proposals as a part of the user acceptance testing to trust it. In such scenarios, rules excel over Machine Learning models as the end-users can verify the rules and have more… More >

  • Open Access

    ARTICLE

    Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments

    Wenming Wang1,2,3,*, Zhiquan Liu1, Shumin Zhang1, Guijiang Liu1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2517-2545, 2024, DOI:10.32604/cmc.2024.055184 - 18 November 2024

    Abstract Advancements in the vehicular network technology enable real-time interconnection, data sharing, and intelligent cooperative driving among vehicles. However, malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle users. Trust mechanisms serve as an effective solution to this issue. In recent years, many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes, incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the area. In this paper, we propose a distributed vehicular network scheme based on trust scores. Specifically, the designed architecture partitions multiple More >

Displaying 1-10 on page 1 of 107. Per Page