International Journal of Information Privacy, Security and Integrity (7 papers in press)
Differential Cryptanalysis on DES Cryptosystem Upto Eight Rounds
by VIKAS TIWARI, AJEET SINGH, APPALA T. NAIDU
Abstract: Differential Cryptanalysis is considered as a powerful technique in the field of cryptanalysis, applied to symmetric-key block ciphers. It is a kind of chosen plain-text attack in which the cryptanalyst has some sets of the plain-text and the corresponding cipher-text pairs of his choice. These pairs of the plain-text are related by a constant difference. Generally, it is the analysis of how differences in input information can affect the resultant difference at the output. In this paper, we present step by step implementation of differential cryptanalysis of data encryption standard(DES) upto 8-rounds.
Keywords: Block Cipher; DES; Differential Cryptanalysis; Key Schedule Algorithm; Substitution Permutation Network (SPN).
Comparison of Frequency Ratio Model and Logistic Regression Model on GIS-Based for Assessing Flood Risk Maps in Mueang Nakhon Phanom Municipality.
by Kanmanee Sroysonthawornkul, Krit Won-In
Abstract: We compared and assessed the flood risk maps produced by the frequency ratio model and the logistic regression model. The data of this investigation are the locations of 80 flooding points in Mueang Nakhon Phanom Municipality. We divided the data points into 2 groups, training data group (70% of total) and testing data group (30% of total) with 54 data and 24 data respectively. The parameters used for this study are geology, elevation, slope, drainage density, stream distance, soil drainage, and an average rainfall from Geographic Information system (GIS) data based. The relationship between flooding occurrence distributions (training data) and parameters of flooding effects were analyzed using the frequency ratio method and the logistic regression method. The accuracy of each map was evaluated by the area under the curve (AUC). The result accuracy evaluated of frequency ratio model is 0.7596 and the result of logistic regression model is 0.8293. The results are relatively good estimators of flood risk maps in the study area. In term of flooding effect parameter consideration, the important factors of flood occurrence and flood distribution are drainage density, elevation, and soil drained. The flood maps produced from this study can be used as a guideline for water resources management planning, land use planning and economic damages assessment.
Keywords: Flood risk; Frequency Ratio; Logistic Regression; Geographic Information System; Mueang Nakhon Phanom Municipality.
Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key
by Rachid RIMANI, Naima Hadj Said, Adda Ali Pacha
Abstract: Cryptography has been used as an instrument for securing confidential data, especially with the globalization of exchanges (internet, messaging and e-commerce), based on various mediums (sound, image, video). Keys have a crucial role in the security of cryptosystems and their distribution is an important primitive in cryptography. This article presents a new dynamic system of steganography (data hiding) for concealing data in a particular sequence of images intended to regulate in an unlimited time the secure transfer of the key between the different correspondents; the proposed key exchange protocol using an image registration system and a chaotic sequence is comparable to the Diffie-Hellman key exchange protocol. The use of chaos makes it possible to increase the level of confidentiality by sending to the receiver a register which contains parameters of a chaotic sequence; knowing these parameters, the receiver can extract the chaotic sequence. The purpose of using the image registration is to find the transformation between two or several images; these transformations become a tool with the chaotic sequence calculated to recover the key on the receiver side.
Keywords: chaotic sequence; Diffie-Hellman key exchange; image registration; secure transfer; steganography.
The Study of Acceptance Thai LGBTQs in Bangkok: Analysis of Attitudes from Gen-Z People
by Jirayut Monjagapate, Nakorn Rungkittanasan
Abstract: This study is intentionally created to make an awareness about being third genders in the society. We interviewed 300 interviewees who were born from 1995 to 2012, or they are called as generation-z people. Those interviewees are living in Bangkok, Thailand. The interviewees were asked about their opinions in terms of acknowledgement and perceiving on LGBTQs.
There are 2 main parts that the study tries to figure them out. In the first part, interviewees are asked to define the definition of being third genders. As a result, the majority of interviewees believes that being third gender refers to a man who wants to be a woman, and being third gender highly refers to men rather than women. However, the term “third gender” is wider than that. Therefore, people should understand more about gender diversity.
Secondly, they are asked about acceptance of third genders. The results are illustrated that male and female (referred to heterosexuality) interviewees accept third genders more than third genders accept themselves (this is based on scores that interviewees answered in terms of numerical documents only). In the same direction, in Thai society, third genders are still in limitation of regulations and official acceptance. The majority of interviewees gave a high rate of acceptance of LGBTQs. However, they still believe that nowadays, third genders are still not totally treated equally. The scores that interviewees gave and authors observed from the interview are in different level between Family and Mentality section with high variations.
Keywords: LGBTQ, Third Genders, Generation-Z
Special Issue on: NISS 2018 Internet of Things Security
Survey: Secure opportunistic routing protocols in wireless networks
by Hanane Saidi, Driss Gretete, Adnane Addaim
Abstract: Opportunistic routing (OR) protocols in wireless network schemes are a rich research field. These protocols select the best path in order to send information and take the broadcasting medium into consideration. OR tends to reach better reliability and performance than traditional routing (TR). However, they are both equally vulnerable to the same attacks because wireless networks might be deployed in hostile or unwatched environments. The approaches in terms of routing are mainly focusing on energy preservation, robustness, etc. However few work has been done to secure routing protocols especially in OR. In this paper, we are going to give an analysis of OR protocols their classifications as well as an overview on the security approaches available for opportunistic routing protocols.
Keywords: wirless networks;security;opportunistic routing.
Security Analysis for Intelligent Urban Freight Transport (IUFT)
by El Arbi Abdellaoui Alaoui, Mustapha EL MOUDDEN
Abstract: The actual evolution of the traditional transport functions resulted from to the prominent digital revolution, the emergence of the Internet of Things (IoT), the use of Intelligent Transport Systems (ITS) and the development of communication technologies. In fact, the development of the Internet of Things (IoT) and geo-localization contributes significantly in the actual evolution, meanwhile allowing the emergence of new mobility services such as e-commerce, carpooling, car sharing and management vehicle fleet. Hence, impacting strongly the traditional economic means.
In this contexte, one of the important obstacles to consider is the security.
In this paper, we will analyze the interaction between selfish smart vehicles/parcels and malicious smart vehicles/parcels, that was formulated as a game model. As a result, we have calculated the Nash equilibrium and the utilities for the both selfish smart vehicles/parcels and malicious smart vehicles/parcels, evaluate the parameters that can maximize the selfish smart vehicles/parcelss utility when the smart parcels are transported by vehicles between different centers (shops,supermarket ...) was planned and identify the potential malicious smart vehicles/parcels.
Keywords: Intelligent Transport System (ITS); Smart City; Smart Parcel; IoT;Security; Smart Vehicle; Game theory; Nash equilibrium.
Connected Car & CO2 emission Overview: Solutions, Challenges and Opportunities
by Asmaa BERDIGH, Khalid EL YASSINI
Abstract: In this paper, we define the key concepts of IoV as an application of IoT: connected car and an overview of the different communication cases leaded from vehicle to-x namely, vehicle-to-vehicle (V2V), vehicle-to-Internet (V2I), and vehicle-to-road infrastructure (V2R). We also identify promising area of research, Intra-Vehicle Connectivity and the wireless technologies likely to be used for building an intra-vehicle wireless sensor networks. This paper highlighted also the most recurrent transport issues and the IoT outcome solutions, their characteristics and challenges, within a focus on the Intra-Vehicular Wireless Sensor Networks.
Keywords: Connected Car; IoV; Intra-Vehicle Connectivity; V2V; V2I; V2R; Wireless Technologies; CO2 emission.