International Journal of Information Privacy, Security and Integrity
These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.
Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.
Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.
International Journal of Information Privacy, Security and Integrity (5 papers in press)
Differential Cryptanalysis on DES Cryptosystem Upto Eight Rounds by VIKAS TIWARI, AJEET SINGH, APPALA T. NAIDU Abstract: Differential Cryptanalysis is considered as a powerful technique in the field of cryptanalysis, applied to symmetric-key block ciphers. It is a kind of chosen plain-text attack in which the cryptanalyst has some sets of the plain-text and the corresponding cipher-text pairs of his choice. These pairs of the plain-text are related by a constant difference. Generally, it is the analysis of how differences in input information can affect the resultant difference at the output. In this paper, we present step by step implementation of differential cryptanalysis of data encryption standard(DES) upto 8-rounds. Keywords: Block Cipher; DES; Differential Cryptanalysis; Key Schedule Algorithm; Substitution Permutation Network (SPN).
Comparison of Frequency Ratio Model and Logistic Regression Model on GIS-Based for Assessing Flood Risk Maps in Mueang Nakhon Phanom Municipality. by Kanmanee Sroysonthawornkul, Krit Won-In Abstract: We compared and assessed the flood risk maps produced by the frequency ratio model and the logistic regression model. The data of this investigation are the locations of 80 flooding points in Mueang Nakhon Phanom Municipality. We divided the data points into 2 groups, training data group (70% of total) and testing data group (30% of total) with 54 data and 24 data respectively. The parameters used for this study are geology, elevation, slope, drainage density, stream distance, soil drainage, and an average rainfall from Geographic Information system (GIS) data based. The relationship between flooding occurrence distributions (training data) and parameters of flooding effects were analyzed using the frequency ratio method and the logistic regression method. The accuracy of each map was evaluated by the area under the curve (AUC). The result accuracy evaluated of frequency ratio model is 0.7596 and the result of logistic regression model is 0.8293. The results are relatively good estimators of flood risk maps in the study area. In term of flooding effect parameter consideration, the important factors of flood occurrence and flood distribution are drainage density, elevation, and soil drained. The flood maps produced from this study can be used as a guideline for water resources management planning, land use planning and economic damages assessment. Keywords: Flood risk; Frequency Ratio; Logistic Regression; Geographic Information System; Mueang Nakhon Phanom Municipality.
Special Issue on: NISS 2018 Internet of Things Security
Survey: Secure opportunistic routing protocols in wireless networks by Hanane Saidi, Driss Gretete, Adnane Addaim Abstract: Opportunistic routing (OR) protocols in wireless network schemes are a rich research field. These protocols select the best path in order to send information and take the broadcasting medium into consideration. OR tends to reach better reliability and performance than traditional routing (TR). However, they are both equally vulnerable to the same attacks because wireless networks might be deployed in hostile or unwatched environments. The approaches in terms of routing are mainly focusing on energy preservation, robustness, etc. However few work has been done to secure routing protocols especially in OR. In this paper, we are going to give an analysis of OR protocols their classifications as well as an overview on the security approaches available for opportunistic routing protocols. Keywords: wirless networks;security;opportunistic routing.
Security Analysis for Intelligent Urban Freight Transport (IUFT) by El Arbi Abdellaoui Alaoui, Mustapha EL MOUDDEN Abstract: The actual evolution of the traditional transport functions resulted from to the prominent digital revolution, the emergence of the Internet of Things (IoT), the use of Intelligent Transport Systems (ITS) and the development of communication technologies. In fact, the development of the Internet of Things (IoT) and geo-localization contributes significantly in the actual evolution, meanwhile allowing the emergence of new mobility services such as e-commerce, carpooling, car sharing and management vehicle fleet. Hence, impacting strongly the traditional economic means.
In this contexte, one of the important obstacles to consider is the security.
In this paper, we will analyze the interaction between selfish smart vehicles/parcels and malicious smart vehicles/parcels, that was formulated as a game model. As a result, we have calculated the Nash equilibrium and the utilities for the both selfish smart vehicles/parcels and malicious smart vehicles/parcels, evaluate the parameters that can maximize the selfish smart vehicles/parcelss utility when the smart parcels are transported by vehicles between different centers (shops,supermarket ...) was planned and identify the potential malicious smart vehicles/parcels. Keywords: Intelligent Transport System (ITS); Smart City; Smart Parcel; IoT;Security; Smart Vehicle; Game theory; Nash equilibrium.
Connected Car & CO2 emission Overview: Solutions, Challenges and Opportunities by Asmaa BERDIGH, Khalid EL YASSINI Abstract: In this paper, we define the key concepts of IoV as an application of IoT: connected car and an overview of the different communication cases leaded from vehicle to-x namely, vehicle-to-vehicle (V2V), vehicle-to-Internet (V2I), and vehicle-to-road infrastructure (V2R). We also identify promising area of research, Intra-Vehicle Connectivity and the wireless technologies likely to be used for building an intra-vehicle wireless sensor networks. This paper highlighted also the most recurrent transport issues and the IoT outcome solutions, their characteristics and challenges, within a focus on the Intra-Vehicular Wireless Sensor Networks. Keywords: Connected Car; IoV; Intra-Vehicle Connectivity; V2V; V2I; V2R; Wireless Technologies; CO2 emission.