Forthcoming articles

International Journal of Information Privacy, Security and Integrity

International Journal of Information Privacy, Security and Integrity (IJIPSI)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Information Privacy, Security and Integrity (7 papers in press)

Regular Issues

  • Differential Cryptanalysis on DES Cryptosystem Upto Eight Rounds   Order a copy of this article
    by VIKAS TIWARI, AJEET SINGH, APPALA T. NAIDU 
    Abstract: Differential Cryptanalysis is considered as a powerful technique in the field of cryptanalysis, applied to symmetric-key block ciphers. It is a kind of chosen plain-text attack in which the cryptanalyst has some sets of the plain-text and the corresponding cipher-text pairs of his choice. These pairs of the plain-text are related by a constant difference. Generally, it is the analysis of how differences in input information can affect the resultant difference at the output. In this paper, we present step by step implementation of differential cryptanalysis of data encryption standard(DES) upto 8-rounds.
    Keywords: Block Cipher; DES; Differential Cryptanalysis; Key Schedule Algorithm; Substitution Permutation Network (SPN).

  • Comparison of Frequency Ratio Model and Logistic Regression Model on GIS-Based for Assessing Flood Risk Maps in Mueang Nakhon Phanom Municipality.   Order a copy of this article
    by Kanmanee Sroysonthawornkul, Krit Won-In 
    Abstract: We compared and assessed the flood risk maps produced by the frequency ratio model and the logistic regression model. The data of this investigation are the locations of 80 flooding points in Mueang Nakhon Phanom Municipality. We divided the data points into 2 groups, training data group (70% of total) and testing data group (30% of total) with 54 data and 24 data respectively. The parameters used for this study are geology, elevation, slope, drainage density, stream distance, soil drainage, and an average rainfall from Geographic Information system (GIS) data based. The relationship between flooding occurrence distributions (training data) and parameters of flooding effects were analyzed using the frequency ratio method and the logistic regression method. The accuracy of each map was evaluated by the area under the curve (AUC). The result accuracy evaluated of frequency ratio model is 0.7596 and the result of logistic regression model is 0.8293. The results are relatively good estimators of flood risk maps in the study area. In term of flooding effect parameter consideration, the important factors of flood occurrence and flood distribution are drainage density, elevation, and soil drained. The flood maps produced from this study can be used as a guideline for water resources management planning, land use planning and economic damages assessment.
    Keywords: Flood risk; Frequency Ratio; Logistic Regression; Geographic Information System; Mueang Nakhon Phanom Municipality.

  • Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key   Order a copy of this article
    by Rachid RIMANI, Naima Hadj Said, Adda Ali Pacha 
    Abstract: Cryptography has been used as an instrument for securing confidential data, especially with the globalization of exchanges (internet, messaging and e-commerce), based on various mediums (sound, image, video). Keys have a crucial role in the security of cryptosystems and their distribution is an important primitive in cryptography. This article presents a new dynamic system of steganography (data hiding) for concealing data in a particular sequence of images intended to regulate in an unlimited time the secure transfer of the key between the different correspondents; the proposed key exchange protocol using an image registration system and a chaotic sequence is comparable to the Diffie-Hellman key exchange protocol. The use of chaos makes it possible to increase the level of confidentiality by sending to the receiver a register which contains parameters of a chaotic sequence; knowing these parameters, the receiver can extract the chaotic sequence. The purpose of using the image registration is to find the transformation between two or several images; these transformations become a tool with the chaotic sequence calculated to recover the key on the receiver side.
    Keywords: chaotic sequence; Diffie-Hellman key exchange; image registration; secure transfer; steganography.

  • The Study of Acceptance Thai LGBTQs in Bangkok: Analysis of Attitudes from Gen-Z People
    by Jirayut Monjagapate, Nakorn Rungkittanasan 
    Abstract: This study is intentionally created to make an awareness about being third genders in the society. We interviewed 300 interviewees who were born from 1995 to 2012, or they are called as generation-z people. Those interviewees are living in Bangkok, Thailand. The interviewees were asked about their opinions in terms of acknowledgement and perceiving on LGBTQs. There are 2 main parts that the study tries to figure them out. In the first part, interviewees are asked to define the definition of being third genders. As a result, the majority of interviewees believes that being third gender refers to a man who wants to be a woman, and being third gender highly refers to men rather than women. However, the term “third gender” is wider than that. Therefore, people should understand more about gender diversity. Secondly, they are asked about acceptance of third genders. The results are illustrated that male and female (referred to heterosexuality) interviewees accept third genders more than third genders accept themselves (this is based on scores that interviewees answered in terms of numerical documents only). In the same direction, in Thai society, third genders are still in limitation of regulations and official acceptance. The majority of interviewees gave a high rate of acceptance of LGBTQs. However, they still believe that nowadays, third genders are still not totally treated equally. The scores that interviewees gave and authors observed from the interview are in different level between Family and Mentality section with high variations.
    Keywords: LGBTQ, Third Genders, Generation-Z

Special Issue on: NISS 2018 Internet of Things Security

  • Survey: Secure opportunistic routing protocols in wireless networks   Order a copy of this article
    by Hanane Saidi, Driss Gretete, Adnane Addaim 
    Abstract: Opportunistic routing (OR) protocols in wireless network schemes are a rich research field. These protocols select the best path in order to send information and take the broadcasting medium into consideration. OR tends to reach better reliability and performance than traditional routing (TR). However, they are both equally vulnerable to the same attacks because wireless networks might be deployed in hostile or unwatched environments. The approaches in terms of routing are mainly focusing on energy preservation, robustness, etc. However few work has been done to secure routing protocols especially in OR. In this paper, we are going to give an analysis of OR protocols their classifications as well as an overview on the security approaches available for opportunistic routing protocols.
    Keywords: wirless networks;security;opportunistic routing.

  • Security Analysis for Intelligent Urban Freight Transport (IUFT)   Order a copy of this article
    by El Arbi Abdellaoui Alaoui, Mustapha EL MOUDDEN 
    Abstract: The actual evolution of the traditional transport functions resulted from to the prominent digital revolution, the emergence of the Internet of Things (IoT), the use of Intelligent Transport Systems (ITS) and the development of communication technologies. In fact, the development of the Internet of Things (IoT) and geo-localization contributes significantly in the actual evolution, meanwhile allowing the emergence of new mobility services such as e-commerce, carpooling, car sharing and management vehicle fleet. Hence, impacting strongly the traditional economic means. In this contexte, one of the important obstacles to consider is the security. In this paper, we will analyze the interaction between selfish smart vehicles/parcels and malicious smart vehicles/parcels, that was formulated as a game model. As a result, we have calculated the Nash equilibrium and the utilities for the both selfish smart vehicles/parcels and malicious smart vehicles/parcels, evaluate the parameters that can maximize the selfish smart vehicles/parcelss utility when the smart parcels are transported by vehicles between different centers (shops,supermarket ...) was planned and identify the potential malicious smart vehicles/parcels.
    Keywords: Intelligent Transport System (ITS); Smart City; Smart Parcel; IoT;Security; Smart Vehicle; Game theory; Nash equilibrium.

  • Connected Car & CO2 emission Overview: Solutions, Challenges and Opportunities   Order a copy of this article
    by Asmaa BERDIGH, Khalid EL YASSINI 
    Abstract: In this paper, we define the key concepts of IoV as an application of IoT: connected car and an overview of the different communication cases leaded from vehicle to-x namely, vehicle-to-vehicle (V2V), vehicle-to-Internet (V2I), and vehicle-to-road infrastructure (V2R). We also identify promising area of research, Intra-Vehicle Connectivity and the wireless technologies likely to be used for building an intra-vehicle wireless sensor networks. This paper highlighted also the most recurrent transport issues and the IoT outcome solutions, their characteristics and challenges, within a focus on the Intra-Vehicular Wireless Sensor Networks.
    Keywords: Connected Car; IoV; Intra-Vehicle Connectivity; V2V; V2I; V2R; Wireless Technologies; CO2 emission.