Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT

    Xiao Feng1,2,3,*, Zheng Yuan1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1881-1895, 2024, DOI:10.32604/cmc.2023.047243

    Abstract First, we propose a cross-domain authentication architecture based on trust evaluation mechanism, including registration, certificate issuance, and cross-domain authentication processes. A direct trust evaluation mechanism based on the time decay factor is proposed, taking into account the influence of historical interaction records. We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data. We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record. Then we propose an autoencoder-based trust clustering algorithm. We perform feature… More >

  • Open Access

    ARTICLE

    Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud

    S. Priya1, R. S. Ponmagal2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1895-1907, 2023, DOI:10.32604/iasc.2023.039814

    Abstract Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks. To address such threats towards cloud services, numerous techniques exist that mitigate the service threats according to different metrics. The rule-based approaches are unsuitable for new threats, whereas trust-based systems estimate trust value based on behavior, flow, and other features. However, the methods suffer from mitigating intrusion attacks at a higher rate. This article presents a novel Multi Fractal Trust Evaluation Model (MFTEM) to overcome these deficiencies. The method involves analyzing service growth,… More >

  • Open Access

    ARTICLE

    Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection

    S. Soundararajan1,*, B. R. Tapas Bapu2, C. Kotteeswaran1, S. Venkatasubramanian3, P. J. Sathish Kumar4, Ahmed Mudassar Ali2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1227-1240, 2023, DOI:10.32604/iasc.2023.025752

    Abstract Recently, Wireless Sensor Network (WSN) becomes most potential technologies for providing improved services to several data gathering and tracking applications. Because of the wireless medium, multi-hop communication, absence of physical protectivity, and accumulated traffic, WSN is highly vulnerable to security concerns. Therefore, this study explores a specific type of DoS attack identified as a selective forwarding attack where the misbehaving node in the network drops packet on a selective basis. It is challenging to determine if packet loss is caused by a collision in the medium access path, poor channel quality, or a selective forwarding assault. Identifying misbehaving nodes at… More >

  • Open Access

    ARTICLE

    A Cross-Domain Trust Model of Smart City IoT Based on Self-Certification

    Yao Wang1, Yubo Wang1, Zhenhu Ning1,*, Sadaqat ur Rehman2, Muhammad Waqas1,3

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 981-996, 2023, DOI:10.32604/iasc.2023.030091

    Abstract Smart city refers to the information system with Internet of things and cloud computing as the core technology and government management and industrial development as the core content, forming a large-scale, heterogeneous and dynamic distributed Internet of things environment between different Internet of things. There is a wide demand for cooperation between equipment and management institutions in the smart city. Therefore, it is necessary to establish a trust mechanism to promote cooperation, and based on this, prevent data disorder caused by the interaction between honest terminals and malicious terminals. However, most of the existing research on trust mechanism is divorced… More >

  • Open Access

    ARTICLE

    Hybrid Soft Computing Technique Based Trust Evaluation Protocol for Wireless Sensor Networks

    Supreet Kaur*, Vijay Kumar Joshi

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 217-226, 2020, DOI:10.31209/2018.100000064

    Abstract Wireless sensor networks (WSNs) are susceptible to safety threats due to cumulative dependence upon transmission, computing, and control mechanisms. Therefore, securing the end-to-end communication becomes a major area of research in WSNs. A majority of existing protocols are based upon signature and recommended-based trust evaluation techniques only. However, these techniques are vulnerable to wormhole attacks that happen due to lesser synchronization between the sensor nodes. Therefore, to handle this problem, a novel hybrid crossover-based ant colony optimization-based routing protocol is proposed. An integrated modified signature and recommendationbased trust evaluation protocol for WSNs is presented. Extensive experiments reveal that the proposed… More >

Displaying 1-10 on page 1 of 5. Per Page