Journals / CMC / Vol.,
Table of Content

Research Article

BEST PAPER 2021

Emerging Trends in Cyber Security for Communication Networks


Submission Deadline: 30 January 2021 (closed)

Abstract

This article has no abstract.

Keywords

Full length original and unpublished research papers based on theoretical or experimental contributions related to the below mentioned tracks are invited for submission in this special session but are not limited to:
• Secure and resilient communication and control architectures
• Secure smart metering
• Cryptography, key management, authorization and access control
• Security threat and vulnerability assessment and measurement
• Cyber-physical security information and event management
• Trust and privacy
• Security design and verification tools
• Simulation and performance analysis of security operations and services
• Network and cyber security
• Secure and resilient communication and control architectures
• Secure smart metering
• IoT Applications
• Sensing Techniques
• Communication Techniques
• Middleware Techniques
• Data Analysis Techniques
  • Research Article

    BEST PAPER 2021

    OTP-Based Software-Defined Cloud Architecture for Secure Dynamic Routing

    Tae Woo Kim1, Yi Pan2, Jong Hyuk Park1,* CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1035-1049, 2022, DOI:10.32604/cmc.2022.015546
    Abstract In the current era, anyone can freely access the Internet thanks to the development of information and communication technology. The cloud is attracting attention due to its ability to meet continuous user demands for resources. Additionally, Cloud is effective for systems with large data flow such as the Internet of Things (IoT) systems and Smart Cities. Nonetheless, the use of traditional networking technology in the cloud causes network traffic overload and network security problems. Therefore, the cloud requires efficient networking technology to solve the existing challenges. In this paper, we propose one-time password-based software-defined cloud architecture for secure dynamic routing… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Cogent and Energy Efficient Authentication Protocol for WSN in IoT

    Tariq Mahmood Butt1, Rabia Riaz1, Chinmay Chakraborty2, Sanam Shahla Rizvi3, Anand Paul4,* CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1877-1898, 2021, DOI:10.32604/cmc.2021.014966
    Abstract Given the accelerating development of Internet of things (IoT), a secure and robust authentication mechanism is urgently required as a critical architectural component. The IoT has improved the quality of everyday life for numerous people in many ways. Owing to the predominantly wireless nature of the IoT, connected devices are more vulnerable to security threats compared to wired networks. User authentication is thus of utmost importance in terms of security on the IoT. Several authentication protocols have been proposed in recent years, but most prior schemes do not provide sufficient security for these wireless networks. To overcome the limitations of… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Remote Health Monitoring Using IoT-Based Smart Wireless Body Area Network

    Farhan Aadil1, Bilal Mehmood1, Najam Ul Hasan2, Sangsoon Lim3,*, Sadia Ejaz1, Noor Zaman4 CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2499-2513, 2021, DOI:10.32604/cmc.2021.014647
    Abstract A wireless body area network (WBAN) consists of tiny health-monitoring sensors implanted in or placed on the human body. These sensors are used to collect and communicate human medical and physiological data and represent a subset of the Internet of Things (IoT) systems. WBANs are connected to medical servers that monitor patients’ health. This type of network can protect critical patients’ lives due to the ability to monitor patients’ health continuously and remotely. The inter-WBAN communication provides a dynamic environment for patients allowing them to move freely. However, during patient movement, the WBAN patient nodes may become out of range… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    LBC-IoT: Lightweight Block Cipher for IoT Constraint Devices

    Rabie A. Ramadan1,2,*, Bassam W. Aboshosha3, Kusum Yadav1, Ibrahim M. Alseadoon1, Munawar J. Kashout1, Mohamed Elhoseny4,5 CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3563-3579, 2021, DOI:10.32604/cmc.2021.015519
    Abstract With the new era of the Internet of Things (IoT) technology, many devices with limited resources are utilized. Those devices are susceptible to a significant number of new malware and other risks emerging rapidly. One of the most appropriate methods for securing those IoT applications is cryptographic algorithms, as cryptography masks information by eliminating the risk of collecting any meaningful information patterns. This ensures that all data communications are private, accurate, authenticated, authorized, or non-repudiated. Since conventional cryptographic algorithms have been developed specifically for devices with limited resources; however, it turns out that such algorithms are not ideal for IoT… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Generic Attribute Scoring for Information Decay in Threat Information Sharing Platform

    Mohammed Alshehri* CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 917-931, 2021, DOI:10.32604/cmc.2021.014848
    Abstract Cyber Threat Intelligence (CTI) has gained massive attention to collect hidden knowledge for a better understanding of the various cyber-attacks and eventually paving the way for predicting the future of such attacks. The information exchange and collaborative sharing through different platforms have a significant contribution towards a global solution. While CTI and the information exchange can help a lot in focusing and prioritizing on the use of the large volume of complex information among different organizations, there exists a great challenge ineffective processing of large count of different Indicators of Threat (IoT) which appear regularly, and that can be solved… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Load Balancing Algorithm for Migrating Switches in Software-Defined Vehicular Networks

    Himanshi Babbar1, Shalli Rani1,*, Mehedi Masud2, Sahil Verma3, Divya Anand4, Nz Jhanjhi5 CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1301-1316, 2021, DOI:10.32604/cmc.2021.014627
    Abstract In Software-Defined Networks (SDN), the divergence of the control interface from the data plane provides a unique platform to develop a programmable and flexible network. A single controller, due to heavy load traffic triggered by different intelligent devices can not handle due to it’s restricted capability. To manage this, it is necessary to implement multiple controllers on the control plane to achieve quality network performance and robustness. The flow of data through the multiple controllers also varies, resulting in an unequal distribution of load between different controllers. One major drawback of the multiple controllers is their constant configuration of the… More >

    Graphic Abstract

Share Link

WeChat scan