International Journal of Internet of Things and Cyber-Assurance
These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.
Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.
Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.
International Journal of Internet of Things and Cyber-Assurance (3 papers in press)
Workload Aware Incremental Repartitioning of NoSQL for OLTP applications by Anagha Bhunje, Swati Ahirrao Abstract: With the increasing popularity of internet, many applications are deployed on the web. The applications include, banking applications, gaming applications, e-commerce web applications. Different applications reply on OLTP (Online Transaction Processing) systems. OLTP systems need to be scalable and require fast response. Today modern web applications are generating huge amount of the data. One particular machine cannot handle such huge amount of the data. Relational databases are not able to handle such data.The E-Commerce applications are facing the challenge of improving the scalability of the system. Data partitioning technique is used to improve the scalability of the system. The data is distributed among the different machines. It results in expensive growth in the number of transactions. The work-load aware incremental repartitioning approach is used to balance the load among the partitions and to reduce the number of transactions that are distributed in nature. Hyper graph representation technique is used to represent the entire transactional workload in graph form. In this technique, frequently used items are collected together and group them by using Fuzzy C-means clustering algorithm. Tuple classification and migration algorithm is used for mapping clusters to partitions and after that tuples are migrated efficiently. Keywords: OLTP (Online Transaction Processing); Distributed transactions; NoSQL (Not Only Structured Query Language); Incremental repartitioning; Hyper graph; Scalability; Fuzzy C-Means clustering algorithm.rnrn.
A Brief Overview on Status of Internet of Things Research in Iran by Mehdi Dadkhah, Mohammad Lagzian, Gabriele Santoro, Mario Drobics Abstract: Internet of things (IoT) as a popular technology plays an important role in the future of the economy. Current literature highlights that IoT has different applications and will change human interaction with the virtual world. As IoT will be a key enabling technology in the future, it is important for all countries to be aware of this development and its applications, and to support related research and investments. In this paper, we aim to inspect the current status of IoT related research in Iran and present a short and brief overview on current IoT related research areas in Iran. We used Scopus as the scientific citation base to access papers published by Iranian authors in this area. Our analysis shows that Iran is in the emerging stage of IoT. Thus, Iranian scholars and institutions should pay more attention to this highly relevant topic and try to create a good body of knowledge to migrate in the maturity stage as soon as possible. Founding an especial Iranian society on Internet of thing or a journal, which focuses on IoT in Iran, could be first steps in this direction. Keywords: Internet of Things; IoT; Smart things; IoT research status; IoT Trend.
Modeling and Evaluation of Mitigation Methods against IoT Malware Mirai with Agent-Oriented Petri Net PN2 by Shingo Yamaguchi, Hiroaki Tanaka, Mohd Anuaruddin Bin Ahmadon Abstract: In this paper, we proposed a model of the infection phenomenon of an IoT malware called Mirai. We regarded the infection phenomenon as a multi-agent system and expressed it with agent-oriented Petri net called as Petri nets in a Petri net (PN2 for short). Some mitigation methods have been proposed such as rebooting infected devices and using an IoT worm called as Hajime which blocks Mirai. We reflected the methods into the PN2 model, and evaluated the methods of the model. Our results show that: 1) by rebooting the infected devices, we can drastically reduce Mirais infection rate when the delay is zero. The effect, however, is rapidly lost with the increase of the delay; 2) Hajime reduces Mirais infection rate to less than half without depending on the delay of reboot. The reduction rate, however, gradually decreases with the increase of the initial number of Hajime. Keywords: IoT; Malware; Worm; DDoS; Petri Net; Multi Agent System; Mitigation. DOI: 10.1504/IJITCA.2019.10021463