Forthcoming and Online First Articles

International Journal of Internet Protocol Technology

International Journal of Internet Protocol Technology (IJIPT)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Internet Protocol Technology (24 papers in press)

Regular Issues

  • A cross encryption scheme for data security storage in cloud computing environment   Order a copy of this article
    by Haiyan Kang, Jie Deng 
    Abstract: Cloud computing is one of the popular technologies in the development of information technology. Cloud computing not only provides users with high-performance computing, but also meets the needs of large-scale data storage. However, because the storage service provided by cloud computing is completely transparent to users, users can not understand whether their data is safe in the cloud computing environment. The resulting distrust has brought great obstacles to the development of cloud computing. Therefore, this paper first describes the basic knowledge and system architecture of cloud storage, and analyzes the development status of cloud storage. Secondly, in order to ensure the storage security of user data in the cloud computing environment, this paper studies the data encryption algorithm, and proposes a cross encryption scheme of data security storage in the cloud computing environment. Finally, the scheme is compared with the traditional hybrid encryption method. The experimental results show that the scheme has the advantages of good encryption and decryption effect, fast execution speed and high security. It is an ideal scheme for data security storage in cloud computing environment.
    Keywords: cloud computing; data encryption; DES; RSA; cross encryption.

  • Practical and Scalable Access Control Mechanism for Wireless Sensor Networks   Order a copy of this article
    by Ummer Khan, Ajaz Hussain Mir 
    Abstract: The Access Control Mechanism is a necessary security primitive for deploying a new node within the resource-constrained WSN. The mechanism prevents malicious node deployment, which could disrupt network operations entirely. In addition to accommodating the resource-constrained nature of WSN, the design of the new node access control method must also meet specific security and functional specifications. In literature, new node access control schemes have been proposed for WSN, focusing on efficiency and security strength. However, less attention is given to the functional specification of scalability and independence from time synchronisation. In this paper, an ECC-based new node access control is presented. Besides being computationally effective and secure, the scheme is scalable and doesn't have time synchronization issues. The proposed scheme's security strength and correctness have been proven using BAN logic and the Random Oracle Model. Simulations on AVISPA and Scyther tools have been performed for automatic security verification of the proposed method. The proposed scheme has also been programmed on TinyOS to perform simulation on the TOSSIM simulator and test-bed implementation on MicaZ motes.
    Keywords: Wireless Sensor network ;Access Control ;Authentication ;Key establishment; Elliptical curve Cryptography; AVISPA; TinyOS; TinyECC.

  • Secure and Verifiable Outsourcing of Euclidean Distance and Closest Pair of Points with Single Untrusted Cloud Server   Order a copy of this article
    by Shilpee Prasad, B.R. Purushothama 
    Abstract: Due to the resource constraints, often client has to outsource the computation to the untrusted cloud service provider. As cloud service providers are often untrusted, the result of the computation should be verified for the correctness. Also, the cost of verification should be less than the cost of actual computation. In this paper, we address the problem of verifying the computation of a geometric problem. In particular, we address the problem of verifying the Euclidean distance and closest pair of points returned by the single untrusted cloud service provider. We have designed verification schemes for outsourcing Euclidean distance and closest pair of points. We have proved that the proposed scheme has negligible server cheating probability. Also, the proposed scheme preserves the privacy of the outsourced data. We have implemented the closest pair of points verification scheme and show that the cost of verification is very less compared to actual computation cost. Also, compared to existing scheme the proposed scheme has less server cheating probability.
    Keywords: Outsource computation; Closest pair of points; Euclidean distance;\r\nPrivacy preserving; Cloud service provider.

  • RAD: Reinforcement Authentication Model based on DYMO Protocol for MANET   Order a copy of this article
    by Rushdi Hamamreh, Mohammed Ayyad, Mohammed Abutaha 
    Abstract: This article aimed to develop a new model based on DYMO protocol where a modification was proposed to route discovery and route maintenance processes. In route discovery process we made an authentication process between the nodes by using MD5 hashing algorithm, then we used reinforcement learning to improve the route maintenance process based on machine learning approach. At the end we used Diffie-Hellman key management to exchange the secret key to encrypt and decrypt the data between Source S and Destination D. When we tested the proposed protocol, the results show improvement in the performance of MANETs, despite the little increased in the end to end delay in comparison with DYMO protocol. This is due to the overheads in authentication and encryption processes.
    Keywords: MANET; DYMO; authentication; reinforcement; security; encryption; hashing; key distribution; nodes; path.

  • Research on Personalized Privacy-preserving Model of Multi-Sensitive Attributes   Order a copy of this article
    by Haiyan Kang, Yaping Feng, Xiameng Si, Kaili Lu 
    Abstract: In order to protect user information from being leaked, as far as possible to improve the availability of published data and realize the safe and efficient information sharing. Aiming at the anonymous privacy-preserving of multi-sensitive attribute data release in logistics industry, this paper proposes a Personalized privacy-preserving model of Multi-Sensitive attributes with Weights Clustering and Dividing (PMSWCD) by analyzing existing model. Firstly, according to the different needs of users, the corresponding weight is set for each sensitive attribute value to realize personalization and then weighted clustering. Secondly, divide the records according to the weighted average value, and select records to establish a group that satisfies l-diversity. Finally, release data based on the idea of multi-dimensional bucket. Through experimental analysis, compared with WMBF algorithm, the release ratio of important data of PMSWCD algorithm proposed in this paper is significantly improved, reaching more than 95%, which improves the availability of data.
    Keywords: Multi-Sensitive attributes; data release; personalized; privacy-preserving; weights clustering; dividing; multi-dimensional bucket; l-diversity.

  • Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA)   Order a copy of this article
    by Bhushana Samyuel Neelam, Benjamin A. Shimray 
    Abstract: The network convenience provided by TCP/IP networks in cyber-physical systems (CPS) communication redefined them as intelligent real-time systems. Along with convenience and intelligence, it also brought various network concerns into CPS communication. Some of the concerns include increased response times due to communication overheads, unnecessary delays in packet forwarding due to computational overheads, unwanted Cyber threats in critical CPS infrastructures like energy, oil, gas, etc. As future networks are focused on achieving an optimum networking solution, Recursive internetworking architecture (RINA) based on distributed IPC mechanism seems to be a promising solution. The proposed work discussed extending distributed IPC mechanisms to the client-server communication model of CPS to extract improved and consistent response times compared to TCP/IP. A CPS client-server model is developed on RINA and TCP/IP networks with connection-oriented protocols. Response times are measured by controlling the actuators, sensing the sensors' data. The comparative analysis demonstrates that RINA reduced response times by almost 50% to TCP/IP and provided more consistency than the TCP/IP.
    Keywords: Future network architectures; distributed IPC; CPS; latency; RINA.
    DOI: 10.1504/IJIPT.2023.10045826
  • Validating and Verifying LwM2M Clients with Event-B   Order a copy of this article
    by Ines Mouakher, Fatma Dhaou, J. Christian Attiogbé 
    Abstract: Lightweight Machine to Machine (LwM2M) is an open industry standard built to provide a means to remotely perform service enablement and application management for the Internet of Things (IoT). It is a communication protocol used between a client software on an IoT device, and a server software. Modelling, formal verification and validation are crucial and necessary to increase protocol reliability. In this paper, we propose a refinement-based approach that helps us to model, to validate and to verify gradually the LwM2M specification, which was carried out using Event-B and Rodin/ProB frameworks. We present a formal model of the LwM2M client, and we verify deadlock freedom and some functional safety properties like consistency of its configuration. The verification is ensured by theorem prover and model checking techniques, and the validation is supported by animation and bounded exploration of the client formal model. Moreover, the transformation into Event-B opens several possibilities to analyze existing implementations of the LwM2M client and to derive both test cases and executable code.
    Keywords: IoT; internet of things; lightweight protocols; device management; OMA LwM2M; verification and validation; V&V; Event-B.

  • Relaxed Hybrid Routing To Prevent Consecutive Attacks In Mobile Ad-Hoc Networks   Order a copy of this article
    by Dr J. Viji Gripsy, Kanchana K.r 
    Abstract: In the current trends, wi-fi networks and cellular ad-hoc community (MANET) have yielded incredible opportunity and recognition. This opportunity and popularity insisted on many forms of studies to recognition on it. This enormously bendy nature of the MANET additionally creates many community overall performance-associated and protection associated problems. Numerous security vulnerabilities threaten the technique in MANET in diverse ways . Collection variety attacks including grey hole and black hole assaults are such risky assaults that drastically weaken the functioning and performance of the network in specific situations. The proposed technique generates a fusion defines and that organizes with the ad hoc on-call for distance vector (AODV) routing protocol to slight these assaults. the new and changed protocol is called as SRD-AODV (secure route Discovery-Adhoc On-demand Distance Vector) protocol. This protocol includes one-of-a-kind additives and techniques to offer each proactive and reactive answers through deploying powerful authentication the use of the Elliptic Curve Diffie-Hellman algorithm (ECDHA) techniques. This additionally aims to comfortable the records packets and routing desk records and subsequently the incursion detection and prevention from sequential attacks in MANET. The performance of this protocol is measured with the help of overall performance parameters inclusive of packet shipping ratio, and put off. The SRD-AODV protocol additionally compares with attacked AODV and other present protocols.
    Keywords: MANET; Sequential Routing Attacks; AODV; Cryptography; Blackhole attack; Grey hole attack; Denial of Service.

  • Cognitive Wireless Communication Network Information Sharing Method Based On Blockchain Technology   Order a copy of this article
    by Wei Luo 
    Abstract: Cognitive Wireless Communication Networks provides a unified vision of the latest developments to maximize limited radio bandwidth use. The challenges of wireless technologies increase; economics and legislation would demand new multidisciplinary frameworks for spectrum sharing. Recently, cognitive radio technologies have been implemented to deal with the issue of spectrum scarcity. In this paper, a cognitive wireless network based on blockchain technology (CWN-BT) has been proposed. Blockchain strategies can provide encrypted communication networks for closed wireless transactions. Due to its multiple advantages, such as transaction speed, confidentiality, better security, increased performance, etc., blockchain technology has been considered one of the most researched fields in recent years. Since each device in a blockchain depends on the data stored in a successive unit,it ensures secured transactions and resources in the wireless cognitive network. The outcome shows that Blockchain helps to enhance wireless network security in different ways.
    Keywords: Cognitive wireless network; blockchain technology; spectrum sharing.

  • Mathematical Modelling of Packet Transmission during Reclamation Period in NewReno TCP and CTCP   Order a copy of this article
    by Bhavika Gambhava, C.K. Bhensdadia 
    Abstract: Usage of wireless links along with wired links has made the Internet growth viable even in isolated places. TCP/IP protocol suite is an indispensable element of the Internet. TCPs congestion control immensely contributes in the performance and robustness of the Internet. Flow control of TCP is invoked when a packet loss is detected by the sender. Unconditional reduction of congestion window may be considered unbefitting and results in to inferior performance. The issue is compounded in wireless channels where packet losses are frequently due to channel errors rather than congestion. In this condition, treatment for losses can be different for congestion and corruption to improve efficiency. Composite TCP (CTCP) is a loss and delay based mechanism. CTCP utilises duplicate acknowledgements along with RTT estimations to make a fair decision about the type of loss. The primary objective of this paper is to show the critical impact of Reclamation Period to regain the original value of cwnd after an episode of error. In addition to this, the paper attempts to show the performance benefit of CTCP so as to justify that if an appropriate value of cwnd can be determined though a reasonable approach, it leads to significant performance improvement without hurting the other concerns. CTCP improves performance by 96.02% and 11.54% in case of 0.001 packet error rate for erroneous and congested networks respectively. The improvement is higher with increase in error rate.
    Keywords: Reclamation Period; Round Trip Time; Congestion Window; Fast Recovery; TCP; CTCP; cwnd; ssthresh; SRTT.

  • SNTAM - Secure Neuro-Fuzzy Based Trusted Neighbor Selection and Attackers Detection in Multipath Ad-Hoc Network   Order a copy of this article
    by Sandeep Patil, Lalita Admuthe, Meenakshi Patil 
    Abstract: An ad-hoc network comprises a set of wireless nodes with no pre-defined infrastructure. They are provisional in the environment and can be created wherever and dispersed behind a restricted period. They are often validated by the deployment scenarios, where one cannot place and deal with infrastructure. e.g. combat zone, a catastrophe relief or an impulsive meeting and so on. The most well-known attribute of a wireless network is dynamic. They also have inadequate channel strength, security belief issues and functioning with narrowed battery power. In confront of the route, the data packets of an assured pathway to remove the data misleading and control overheads that consume power and bandwidth. This study explores the capabilities of working with different attacks like a vampire attack. This attack is forever hindrance to the networks by reducing the nodes bandwidth and energy. In addition, the protocol detects a replica attack that can capture the neighbor's address and act as a genuine node on the network. These two attacks can spoil the entire system activities and use network abilities. Consequently, creates questions about the trust among the nodes and the honesty of the transmissions. The proposed Secure Neuro-fuzzy Based Trusted Neighbor Selection and Attackers Detection in Multipath Ad-Hoc Network (SNTAM) protocol focused to eliminate these attackers from the network to form the communication path by an optimized way of Neuro-fuzzy techniques. The results show that SNTAM gives effective results in securing the network in all the parameters and attributes especially packet delivery ratio (PDR) which is almost 100% and residual energy of nodes which is more than compared protocol. Furthermore, SNTAM protocol can avoid sampled malicious nodes effectively.
    Keywords: MANET; Channel Capacity; Energy; Attackers; Vampire attack; Replica Attack; Trust; Reliability.

Special Issue on: Blockchain for Cognitive Wireless Communication Networks

    by Ghanshyam Gagged, Jaishakti S M 
    Abstract: Cloud computing is a progressively prevalent prototype for retrieving the resources for computing purposes, data protection is a very significant security issue because transferring data from organizations to remote machines is required if there is no guarantee of data protection from the cloud service providers. This paper suggests a secure dynamic bits standard (SDES) algorithm for transferring the data between, cloud service provider (CSP), data provider (DP), and data user (DU). The minute the data provider uploads files, it automatically uploaded to a local upload folder. Then, a process of encryption is initiated using SDES algorithm the encryption time taken was 0.003 seconds this encrypted file is uploaded into dropbox, before uploading the file into dropbox, an auto resource allocation process is commenced automatically to store the uploaded file into that resource, the cloud service provider can able to decide whether the data provider files approved or rejected. If it is approved then, those files are visible to the data users, otherwise, the files are blocked. To download the files, the data user is utilized to send the private key request to the cloud service provider, after the private key file gets produce immediately it gets sent to the data user. Then, only data user can download the files the download time for the proposed SDES is 0.2 seconds also an attacker is monitored via Session Tracking
    Keywords: Cloud Security; SDES algorithm; Encryption & Decryption mechanism; Hacker attack; Auto resource allocation technique.
    DOI: 10.1504/IJIPT.2022.10046387
  • Congruent Fine-Grained Data Mining Model for Large-Scale Medical Data Mining   Order a copy of this article
    by Arthi Jaya Kumari J, Muhammad Rukunuddin Ghalib 
    Abstract: Electronic medical data management is eased with the integration of communication technologies and the cloud/ Internet of Things (IoT) platform in recent years. The organization and mining of the data from massive repositories is a complex and time-consuming process. However, the exploitation of such massive information requires large-scale analytical procedures by accounting its significance. This article introduces congruent fine-grained data mining (CFDM) model for reducing the complexities in large-scale medical data handling. This model identifies the independent and relation-based repositories for matching the request queries in the data retrieval process. By using a classification decision-tree, the identifications are performed to improve the retrieval rate. In this classification tree, the independent and relation-based data are first analyzed for their matching consistencies. By pursuing this process, the non-matching query-data satisfying the relevance condition are grouped into a new relationship based classification. This helps to improve the matching and retrieval rate preciously in the consecutive mining instances. The proposed model improves retrieval responses, retrieving time, complexity, and data availability.
    Keywords: Big Data; Classification Learning; Decision Tree; Data Mining; Medical Data.

  • Machine Learning-based Security Active Defense ModelSecurity Active Defense Technology in the Communication Network   Order a copy of this article
    by Linjiang Xie, Feilu Hang, Wei Guo, Yao Lv, Wei Ou, C. Chandru Vignesh 
    Abstract: Nowadays, there is anticipated exponential growth in the number of internet-enabled devices, which will increase cyber threats across an expanding attack surface area. For guaranteeing network security, this study proposes the Machine Learning-based Security Active Defense Model (MLSADM). Machine learning (ML) is how Artificial Intelligence learns patterns that lead to abnormal behavior. This occurs when an Artificial Intelligence system or neural network is deceived into imperfectly recognizing or intentionally adapting the input. An emerging type of attack and a collaborative attack is measured in the attack and defense situation. Experiments have been carried out with the dynamic (learning) attacker of a static (fixed) defender, static attackers, and dynamic attackers. The findings show that the proposed model enhances network security with high accuracy in network abnormal behavior detection compared to other popular methods.
    Keywords: Communication Network; Security Active Defense Technology; Machine learning; Network Security.

  • Efficient Authentication Method using Binary Search Tree with Multi-Gateway in Wireless IoT   Order a copy of this article
    by Anita Chaudhari, Rajesh Bansode 
    Abstract: In recent days, IoT played a major part on the worldwide network. Maintaining security along with privacy of IoT nodes are the main challenge in IoT, as IoT devices are connected and operated using the Internet. Most of the authors had used different technologies for authentication like username, password, OTP, Secret key, RFID, authentication schemes implemented using a single factor, multifactor parameter which are discussed in the review section. But, they continue to suffer from few drawbacks like its adaptability to real time applications that threaten users' data protection. They also possess challenges namely forgotten, stolen, and shared with another user who is unauthorized. Therefore, a strong authentication mechanism is required, so the user can get direct access of sensor information. So, to achieve it, our research concentrates on a unique authentication scheme. The primary goal of this research is to find whether an authenticated user is traveled through and , to find whether the registered sensor is used through and . The security attacks and data hacking are handled by the proposed technique with Binary Search Trees (BST).In our research, several experiments with a different scenario like for authorized and unauthorized user has been performed and the outcome is compared with the existing methods. Based on results, the proposed work outperforms the existent method concerning users, the time required for , and sensor, communication cost, energy cost on the sensor, Packet Delivery Ratios, End-to-End delay (EED), along with throughput.
    Keywords: Internet of Things (IoT); Wireless Sensor Networks (WSNs); authentication; GWN; multi-gateway; malicious attack; IoT; BST.

    by Anjana S. Chandran 
    Abstract: The main hindrances for the development of BlockChain (BC) are the vast storage volume. Thus, finding a way to optimizing the storage mechanism to release the burden has become an important issue. Nevertheless, solely relying on a specific cloud storage supplier has several potentially serious issues, say vendor lock-in, availability, along with security. To tackle this issue, this paper proposed an effectual BC-centered scheme aimed at storage utilization with respect to Data Deduplication (DD) as well as the secure sharing of Electronics Health Records (EHR) data betwixt several entities involving patients, research institutions, as well as semi-trusted Cloud Servers (CS). And in the interim, it employs the memory via the DD concept. In this, the Stribog hashing algorithm creates the Hash Code (HC) for the uploaded file. To evade storing duplicate copies of data, DD is checked centered on this algorithm. Presently, the system utilizes the Modified Ciphertext-Policy Attribute-Based Encryption (MCP-ABE) for amassing data in the distributed cloud in an encrypted format to guarantee security. Next, the Weight and Exhaustiveness-based Harris Hawks Optimization (WEH2O) selects the Distributed CS (DCS). At last, the data are securely amassed in a BC-centered cloud that also renders security. Centered on the experimentations outcomes, the proposed work offered a better performance analogized to the other data transmission.
    Keywords: Deduplication; Electronic Health Record (EHR); Length Shift Cipher; Stribog Algorithm; Modified Ciphertext Policy-Attribute Based Encryption (MCP-ABE); and Weight and Exhaustiveness based Harris Hawks Optimization (WEH2O).

  • Enhanced-kNN(M-kNN) based Outlier Detection and Sensor Data Aggregation for Large Data Streams in the IoT-Cloud   Order a copy of this article
    by Sampath Kumar Y R, Champa H N 
    Abstract: IoT is a technology that facilitates several applications of the modern age. Wireless sensors gather real data about IoT applications. Due to their dynamic nature, a large number of sensor data results in data outliers. Sensor data determines the scope of IoT systems, whereas redundant data and outliers can significantly reduce their productivity. Detection of data outliers in early-stage makes the system robust and it also guarantees safety within an IoT ecosystem. Furthermore, redundant and pervasive deployment of wireless Sensor Nodes (SN) affects the sensor data acquisition mechanism. Usually, IoT objects have limited resources. The large-scale dataset containing valuable data requires exploring the nature of real data set by utilizing Dimensionality Reduction (DR) and classification techniques. An advanced data aggregation (DA) technique can decrease the number of total data transmissions and facilitate data accuracy. Here, a data analysis framework is suggested for DA and Outlier Detection (OD) by employing a modified K nearest neighbor (MKNN) algorithm. Further, the proposed methodology is analyzed and compared with the existing Recursive Principal Component analysis (R-PCA) technique with regard to recovery error rate as well as Energy Consumption (EC) via testing Intel lab together with NDBC-TAO data. Via varying the cluster size, the techniques are compared. As of the outcome, it can well be found that the proposed MKNN attains the lowest relative error and lowest EC for all number of cluster size for both Intel and NDBC-TAO data. The proposed model is crucial for exploring the sensor data and predicting future events based on observed sensor data analysis.
    Keywords: Data abstraction; Data acquisition; Data aggregation; IoT-Cloud; Outlier detection.

  • Processing Power Sharing Using a Gadget Power Save For Downloading Scientific Research Project   Order a copy of this article
    by Akshay Taywade, Dr.Sasikala R 
    Abstract: In Todays Era as users had become more uphill and expect to run compute intensive apps in their smartphone devices. Mobile Cloud Computing (MCC) thus combines mobile computing and Cloud Computing (CC) in order to use offloading techniques to expand mobile computer capabilities.Computer offloading solves Smart Mobile Devices (SMD) limitations such as limited computing power, limited battery life and limited storage space by distributing output and workload to other rich systems with enhanced efficiency and resources. For data modelling and analysis, scientific research also need a large amount of computing power. This paper explains about the donation of processing power from unused smartphone computing power to the mobiles that need to download projects from medicine, astronomy, geology, and physics through mobile web services. This is accomplished by developing a cellular gadget called Power Save that download and coordinate the projects to be downloaded during the dormant condition of the mobile. Once the project is downloaded, the status of project server is changed and a new task is assigned. This gadget based processing power sharing would be assistive in saving mobiles battery life and performance level of CPU. The proposed gadget is compared against certain existing applications such as HTC power to give-BOINC.
    Keywords: Cloud computing; SMDs; power sharing; Power Save;.

  • High Speed Pre Accumulator and Post Multiplier for Convolution Neural Networks with Low Power Consumption   Order a copy of this article
    by K. Mariya Priyadarshini, R.S. Ernest Ravindran, M. Sujatha, K. T. P. S. Kumar 
    Abstract: In todays phase of growing technology Convolution Neural Networks (CNN) are all over the place. It is chiefly a thriving segment in machine learning as well as Artificial Intelligences (AI) techniques. CNN need of bulk amount of computing competence and memory with higher frequency range. In this present investigation Pre-Accumulator and Post-Multipliers (PAPM) are proposed which accelerate the processing of image, video and voice. 4-bit multiplier using Carry Save Adder (CSA) is built with 6Transistors-Adder and sutras of Vedic mathematics is constructed. Accumulator of Multiplier and Accumulator are designed with Two Level Edge Triggering Flip-Flops (TLET-FF) to increase bandwidth of the memory. The proposed architecture of Multiply Accumulate (MAC) circuit consumes very less power when compared with that of existing high speed MAC structures. Performance of Accumulator is contrasted with 3 different kinds of Two Level Triggered flip-flops namely 16TLET-FF, 14TLET-FF and 12TLET-FFs. The projected MAC replaces the existing multipliers due its low power together with high frequency of operation.
    Keywords: Convolution Neural Networks; Vedic Sutras; Carry Save Adder; Flip-Flop; Multiplier and Accumulator.

  • A One-Dimensional superior logistic map based image encryption   Order a copy of this article
    by Supriya Khaitan, Shrddha Sagar, Rashi Agarwal 
    Abstract: The importance of digital media has been increased in this pandemic; the media\'s security is a huge issue; this led to the development of cryptographic techniques that are secure and fast. Chaos-based image encryption has gained popularity due to its ergodic properties. This paper proposes a 1-dimensional chaotic logistic map cryptography based on Superior iterations. Both the real and imaginary parts of the 1-Dimensionalmap generate the chaotic sequence that is further mixed with key. The new sequence is used for scrambling and diffusion of pixel values of an image. The proposed scheme was evaluated using many measures like NPCR, UACI, MSE, PSNR, and entropy; simulation result shows the proposed technique is immune to statistical, differential crypto-analysis attacks, and occlusion attacks.
    Keywords: Chaotic Map; Image Encryption; Logistic Map; Superior Iterations.

  • Priority based Sencar Deployment Strategy for Mobile Sink Data Gathering in WSN   Order a copy of this article
    by Sunita S. Patil, Senthil Kumaran T 
    Abstract: Data gathering by means of mobile sinks presents novel encounters to wireless sensor network (WSN) applications. Most of the approaches use single mobile sink or data collector which may not cover the entire network in time.The Sencars with multiple antennas select the optimum pair of sensor nodes to gather data simultaneously. In this paper, a priority based Sencar deployment strategy(PSDS) for mobile sink data gathering is proposed. In this scheme, the priority of sensed data determined depending on the urgency and deadline of data. Then one Sencar is deployed for collecting high priority (critical data) by directly visiting to the respective sensors. Another Sencar is deployed for collecting the low priority (non-critical data) from other sensors. Simulation result shows that the proposed PSDS scheme achieves better PDR and higher residual energy with minimum data gathering delay.
    Keywords: Wireless Sensor Networks; Sencars; Mobile sink.

  • Smart Approach To Constraint Programming: Intelligent Backtracking Using Artificial Intelligence   Order a copy of this article
    by Heng Du 
    Abstract: Constrained Programming is the concept used to select possible alternatives from constrained programming; a problem can be modelled in random terms. This paper proposes an AI-assisted Backtracking Scheme (AI-BS) by integrating the generic backtracking algorithm with Artificial Intelligence (AI). The AI-BS is an algorithm using intelligent backtracking (IB) inside a branch and bound context based on linear programming. The detailed study observes that the extreme dual ray associated with the infeasible linear program can be automatically extracted from minimum unfeasible sets. This research also explains the application of the proposed intelligent backtracking (IB) strategy using a branch-and-cut (BC) algorithm, which is named as IBBS. AI-assisted intelligent backtracking utilized to create a smart optimal schedule controller for home energy controllers to manage and optimize the energy consumptions peak hours. The AI-BS gives an optimal schedule for home appliances to limit the total load demand and schedule the domestic device\'s operations.
    Keywords: Artificial Intelligence; Backtracking; Branch-and-Bound Problem; Branch-and-cut; Constrained Programming; Smart home electricity controller.

  • Internet of Vehicle Things Communication Based on Big Data Analytics Integrated Internet of Things   Order a copy of this article
    by Ruiwei Chen, BalaAnand Muthu 
    Abstract: Automobile industries\' rapid development on modern wireless vehicle communication among vehicles, pedestrians, and roadside information units has been termed as the Internet of Vehicles (IoV). The significant challenges of the IoV include vehicle data management and congestion in the network. In this research, Big data analytics integrated Internet of Things framework (BDA-IoTF) is proposed to process the data received from the roadside units to minimize congestion and optimized data management. Further, the vehicle data has been analyzed for several conditions that help to analyze the network congestion. Based on the congestion level, BDA-IoTF helps evaluate the vehicles\' performance in correlation with data management. This Big Data analytics give immense support in segregation, management, and data collection based on IoT, by sending data directly to the database using Wireless radio frequency Technology. The proposed BDA-IoTF has been validated based on the optimization parameter, which outperforms conventional methods.
    Keywords: Internet of Things; Internet of Vehicles; roadside unit; sensors; big data analytics; and congestion.

  • Trust-based model for data protection and security in smart cities   Order a copy of this article
    by Jun Gao, Manas Ranjan Pradhan, Sandeep Kumar. M 
    Abstract: Different emerging innovations have been applied to develop the infrastructure for smart cities. IoT is a fast-moving technology that displays its embodiments for the promotion of humanity for prosperous and better intelligent city infrastructure. Smart City has been created by the emergence of intelligent devices on the internet of things. Smart City is suffering from possible privacy risks despite increased service efficiency. Therefore the Trust-based Security Maintenance (TBSM) model has been proposed to enhance the privacy and security aspects of knowledge management interface in many Smart cities. A trust-based framework ensures the necessary protection in smart city applications for the sensitive application development interface. Besides, a trust-based framework is enabled by big data processing to enhance data scalability and usability depending on their accompanying storage site. Security Maintenance model is developed to customise the interface for the data processing of different smart city systems for usability and privacy problems.
    Keywords: data protection; security; privacy; smart cities; Internet of Thing (IoT).