Most recent issue published online in the International Journal of Internet Technology and Secured Transactions.
International Journal of Internet Technology and Secured Transactions
http://www.inderscience.com/browse/index.php?journalID=190&year=2024&vol=13&issue=3
Inderscience Publishers Ltd
en-uk
support@inderscience.com
International Journal of Internet Technology and Secured Transactions
1748-569X
1748-5703
© 2024 Inderscience Enterprises Ltd.
© 2024 Inderscience Publishers Ltd
editor@inderscience.com
International Journal of Internet Technology and Secured Transactions
https://www.inderscience.com/images/files/coverImgs/ijitst_scoverijitst.jpg
http://www.inderscience.com/browse/index.php?journalID=190&year=2024&vol=13&issue=3
-
Performance analysis of consensus protocols in distributed systems
http://www.inderscience.com/link.php?id=136654
Consensus algorithms play the significant role in any blockchain system since it has to prove its performance and security. Hence, there is a need to identify the curbs of various consensus algorithms. The features of several kinds of blockchain systems rely on the consensus techniques. A detailed analysis of the algorithms has been done which might throw the limelight to researchers to devise a novel consensus algorithm. Issues due to the adoption of the consensus and solutions to overcome have been discussed. The main contribution of this work is to provide a deep insight into the consensus algorithms and its properties. There are several metrics considerations for evaluating the performance of consensus protocols. Additionally, the energy consumption of Bitcoin and Ethereum of several countries has also been presented in this work. Finally, the most commonly used consensus algorithm has been analysed along with its variant information.
Performance analysis of consensus protocols in distributed systems
D. Sumathi; T. Poongodi; Ramasamy Lakshmana Kumar; Balamurugan Balusamy
International Journal of Internet Technology and Secured Transactions, Vol. 13, No. 3 (2024) pp. 217 - 231
Consensus algorithms play the significant role in any blockchain system since it has to prove its performance and security. Hence, there is a need to identify the curbs of various consensus algorithms. The features of several kinds of blockchain systems rely on the consensus techniques. A detailed analysis of the algorithms has been done which might throw the limelight to researchers to devise a novel consensus algorithm. Issues due to the adoption of the consensus and solutions to overcome have been discussed. The main contribution of this work is to provide a deep insight into the consensus algorithms and its properties. There are several metrics considerations for evaluating the performance of consensus protocols. Additionally, the energy consumption of Bitcoin and Ethereum of several countries has also been presented in this work. Finally, the most commonly used consensus algorithm has been analysed along with its variant information.]]>
10.1504/IJITST.2024.136654
International Journal of Internet Technology and Secured Transactions, Vol. 13, No. 3 (2024) pp. 217 - 231
D. Sumathi
T. Poongodi
Ramasamy Lakshmana Kumar
Balamurugan Balusamy
VIT-AP, Amaravati, India ' School of Computing Science and Engineering, Galgotias University, Uttar Pradesh, India ' Department of Computer Applications, Hindusthan College of Engineering and Technology, Tamil Nadu, India ' Shiv Nadar University, Delhi, National Capital Region (NCR), India
blockchain
consensus algorithms
cryptocurrency
Bitcoin
Ethereum
2024-02-15T23:20:50-05:00
Copyright © 2024 Inderscience Enterprises Ltd.
13
3
217
231
2024-02-15T23:20:50-05:00
-
Security of internet of vehicles in smart cities: authentication and confidentiality aspects
http://www.inderscience.com/link.php?id=136655
With the rapid development of smart devices, communication technologies, and network elements, vehicles become more autonomous, more connected, and more intelligent. Internet of vehicles (IoV) is a new area of the internet of things (IoT) equipped with powerful multi sensors platform, connectivity and communication technologies. The communication and the cooperation between vehicles and different IoT objects can increase security risks and make vehicles more vulnerable to serious attacks (authentication attacks, confidentiality attacks, availability attacks, routing attacks, and data authenticity attacks). In this paper, we propose security schemes to detect and prevent attacks in IoV system using software defined network (SDN) and elliptic curve cryptography (ECC); first, we identify IoV concepts, then we design a network model which illustrates the global IoV architecture, after that we propose an authentication and confidentiality schemes. Finally, we provide formal and informal proof to demonstrate that our schemes can resist against various attacks.
Security of internet of vehicles in smart cities: authentication and confidentiality aspects
Roumissa Sahbi; Salim Ghanemi; Mohamed Amine Ferrag
International Journal of Internet Technology and Secured Transactions, Vol. 13, No. 3 (2024) pp. 232 - 269
With the rapid development of smart devices, communication technologies, and network elements, vehicles become more autonomous, more connected, and more intelligent. Internet of vehicles (IoV) is a new area of the internet of things (IoT) equipped with powerful multi sensors platform, connectivity and communication technologies. The communication and the cooperation between vehicles and different IoT objects can increase security risks and make vehicles more vulnerable to serious attacks (authentication attacks, confidentiality attacks, availability attacks, routing attacks, and data authenticity attacks). In this paper, we propose security schemes to detect and prevent attacks in IoV system using software defined network (SDN) and elliptic curve cryptography (ECC); first, we identify IoV concepts, then we design a network model which illustrates the global IoV architecture, after that we propose an authentication and confidentiality schemes. Finally, we provide formal and informal proof to demonstrate that our schemes can resist against various attacks.]]>
10.1504/IJITST.2024.136655
International Journal of Internet Technology and Secured Transactions, Vol. 13, No. 3 (2024) pp. 232 - 269
Roumissa Sahbi
Salim Ghanemi
Mohamed Amine Ferrag
Faculty of Technology, Embedded Systems Laboratory: LASE, Computer Science Department, Badji Mokhtar Annaba University, Annaba, Algeria ' Faculty of Technology, Embedded Systems Laboratory: LASE, Computer Science Department, Badji Mokhtar Annaba University, Annaba, Algeria ' Computer Science Department, Guelma University, 8 mai 1945, Guelma, Algeria
internet of things
IoT
internet of vehicles
IoV
network model
security
authentication
confidentiality
attacks
2024-02-15T23:20:50-05:00
Copyright © 2024 Inderscience Enterprises Ltd.
13
3
232
269
2024-02-15T23:20:50-05:00
-
An improved deep autoencoder-based network intrusion detection system with enhanced performance
http://www.inderscience.com/link.php?id=136658
The evolutions in information and communication technology (ICT) devices have led to the rise in cyber-attacks in network systems. Ensuring cybersecurity in these devices is one of the most critical and complex issues. Besides, with technological improvement, hackers have been introducing complex and malicious malware attacks into the network system, making intrusion detection a complicated task. However, various conventional IDS face severe challenges to discern and counteract such risks. Statistical research and an enhanced autoencoder classifier for the network intrusion detection system are introduced in this paper (NIDS). This work uses an optimised autoencoder feature extraction process to extract correlated features to simplify the classification process. The proposed method is estimated using the NSL-KDD, UNSW-NB15, and CIC-DDoS2019 datasets, and its performance is compared to that of current machine learning algorithms. The results indicate that the proposed AE-NIDS outperforms shallow machine learning classifiers regarding detection accuracy and false positive rate.
An improved deep autoencoder-based network intrusion detection system with enhanced performance
Bidyapati Thiyam; Shouvik Dey
International Journal of Internet Technology and Secured Transactions, Vol. 13, No. 3 (2024) pp. 270 - 290
The evolutions in information and communication technology (ICT) devices have led to the rise in cyber-attacks in network systems. Ensuring cybersecurity in these devices is one of the most critical and complex issues. Besides, with technological improvement, hackers have been introducing complex and malicious malware attacks into the network system, making intrusion detection a complicated task. However, various conventional IDS face severe challenges to discern and counteract such risks. Statistical research and an enhanced autoencoder classifier for the network intrusion detection system are introduced in this paper (NIDS). This work uses an optimised autoencoder feature extraction process to extract correlated features to simplify the classification process. The proposed method is estimated using the NSL-KDD, UNSW-NB15, and CIC-DDoS2019 datasets, and its performance is compared to that of current machine learning algorithms. The results indicate that the proposed AE-NIDS outperforms shallow machine learning classifiers regarding detection accuracy and false positive rate.]]>
10.1504/IJITST.2024.136658
International Journal of Internet Technology and Secured Transactions, Vol. 13, No. 3 (2024) pp. 270 - 290
Bidyapati Thiyam
Shouvik Dey
Department of Computer Science and Engineering, National Institute of Technology Nagaland, Dimapur, Nagaland-797103, India ' Department of Computer Science and Engineering, National Institute of Technology Nagaland, Dimapur, Nagaland-797103, India
network intrusion detection system
NIDS
machine learning
autoencoder
NSL-KDD dataset
UNSW-NB15 dataset
CIC-DDoS2019 dataset
statistical study
2024-02-15T23:20:50-05:00
Copyright © 2024 Inderscience Enterprises Ltd.
13
3
270
290
2024-02-15T23:20:50-05:00
-
Improving cloud security model for web applications using hybrid encryption techniques
http://www.inderscience.com/link.php?id=136677
The hybrid approach used in this paper aims to improve online application security. Homographic encryption and squirrel search algorithm (SSA) are combined to create this hybrid. The cloud computing model's security improved with the use of this technique. In order to improve the security of cloud data using an encryption method, this study suggests a hybrid algorithm. Utilising encryption methods is primarily done to protect or keep vast amounts of data in cloud. To improve secure data storage in cryptography, the SSA is designed in a cloud computing environment. Performance measures, including uploading time, downloading time, decryption time and encryption time, are measured in MATLAB to test the success of suggested methods. To evaluate the proposed methodology, tweet data is considered in the proposed methodology. The proposed methodology is contrasted with current approaches, like Rivest-Shamir-Adleman (RSA) and ECC-based cryptography, in order to evaluate it.
Improving cloud security model for web applications using hybrid encryption techniques
R.S. Kanakasabapathi; J.E. Judith
International Journal of Internet Technology and Secured Transactions, Vol. 13, No. 3 (2024) pp. 291 - 308
The hybrid approach used in this paper aims to improve online application security. Homographic encryption and squirrel search algorithm (SSA) are combined to create this hybrid. The cloud computing model's security improved with the use of this technique. In order to improve the security of cloud data using an encryption method, this study suggests a hybrid algorithm. Utilising encryption methods is primarily done to protect or keep vast amounts of data in cloud. To improve secure data storage in cryptography, the SSA is designed in a cloud computing environment. Performance measures, including uploading time, downloading time, decryption time and encryption time, are measured in MATLAB to test the success of suggested methods. To evaluate the proposed methodology, tweet data is considered in the proposed methodology. The proposed methodology is contrasted with current approaches, like Rivest-Shamir-Adleman (RSA) and ECC-based cryptography, in order to evaluate it.]]>
10.1504/IJITST.2024.136677
International Journal of Internet Technology and Secured Transactions, Vol. 13, No. 3 (2024) pp. 291 - 308
R.S. Kanakasabapathi
J.E. Judith
Department of Computer Applications, Noorul Islam Centre for Higher Education, Kumarcoil, India ' Department of Computer Science and Engineering, Noorul Islam Centre for Higher Education, Kumarcoil, India
cloud computing
encryption
decryption
web application
squirrel search algorithm
homographic encryption
2024-02-15T23:20:50-05:00
Copyright © 2024 Inderscience Enterprises Ltd.
13
3
291
308
2024-02-15T23:20:50-05:00