Forthcoming articles

International Journal of Internet Technology and Secured Transactions

International Journal of Internet Technology and Secured Transactions (IJITST)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Internet Technology and Secured Transactions (33 papers in press)

Regular Issues

  • Factors Influencing Bitcoin Investment Intention: The case of Oman   Order a copy of this article
    by Abdelghani Echchabi, Mohammed Mispah Said Omar, Abdullah Mohammed Ayedh 
    Abstract: The current study examines the factors that might increase the investment in Bitcoin among Muslim communities. Oman is selected as a setting for this study due to the rapid progress in the Islamic finance and investment areas that the country has witnessed though ventured in this field relatively late compared to other countries. The study used a survey questionnaire to collect data for a sample of 200 respondents. Subsequently, the collected data was analysed using structural equation modelling (SEM) as well as basic descriptive statistics and one sample t-test. The findings revealed that the respondents perceive themselves to have sufficient awareness and knowledge of the Bitcoin concept and benefits, as well as the techniques used to manage a Bitcoin account. In addition, the findings revealed that factors such as perceived ease of use, compatibility, awareness and facilitating conditions have a significant impact on Omani communities intention to invest in Bitcoin.
    Keywords: systems and technology; cryptocurrency; Bitcoin; Oman; structural equation modelling; SEM; internet; security.
    DOI: 10.1504/IJITST.2020.10030071
    by Yousef Sanjalawe, Mohammed Anbar, Qusay Alzubi 
    Abstract: Abstract: One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM available tools, based on the three characteristics (ease of use, usefulness, and users satisfaction), which build targets to be achieved in order to gain quality in software. The tools compared in this study are Log Mote, Oracle ID management, Tivoli Identity Manager, NetIQ-Novell, access sentinel, and Active directory. In order to enable users to access the available resources in a secure way, we propose a novel architecture of IDAM. The proposed architecture basically has several advantages like, autonomy, comprehensive and systematic, standardization, and scalability.
    Keywords: Identity and access management; Identity management; IDAMs tools; Evaluation.

  • Cluster based optimal sink repositioning technique for WSNs using an improved glowworm swarm optimization and S* position search algorithm   Order a copy of this article
    by B. Santhosh Kumar, P. Trinatha Rao 
    Abstract: Wireless sensor network is a group of organized sensor nodes that are limited to their resources such as limited bandwidth, energy etc. The data gathered from sensor nodes will be forwarded to the sink node to take proper actions. In order to avoid the failures, the sink nodes should be positioned in the better place for the resource optimization. In this paper, first we will apply clustering for grouping the nodes that are adjacent to sink node. Clustering is done by an improved glowworm swarm optimization (IGSO) algorithm. The node which has the shortest path is selected for position. Hence, this approach is used to find the optimal position for all the sinks in order to optimize the lifetime of the network and move according with intelligent sink positioning.
    Keywords: WSN; sink repositioning; network lifetime; sink nodes; clustering; IGSO.

  • Robust transcoding-resilient H.264 watermarking   Order a copy of this article
    by Grace C.-W. Ting, Bok Min Goi, Sze Wei Lee 
    Abstract: The H.264 standard is widely deployed for high-quality consumer video recording, storage and sharing applications such as Blu-ray DVD and streaming HD video on the internet including YouTube. In current times, since videos are easily shared live on social media and messaging mobile Apps, users need the ability to determine the ownership of these videos against being illegally distributed without proper acknowledgements to the owners, and to take actions against those who spread false videos that trigger viral fake news. Robust watermarking schemes are popularly applied techniques to solve these problems. These types of schemes are required to achieve robustness against modification attacks on the embedded watermark. In this paper, we present a robust watermarking scheme for these purposes. We demonstrate that it is able to withstand common modification attacks launched by malicious buyers aiming to modify the watermarks embedded by the owner, and that it is furthermore resilient to transcoding.
    Keywords: Security; robust; transcoding resilience; watermarking; attacks; design; HD video.

  • Blockchain application in supply chain chemical substance reporting a Delphi study   Order a copy of this article
    by Sukhraj Takhar, Kapila Liyange 
    Abstract: Blockchains utilize digital ledger technology to enable data to be encrypted, recorded and traced in a more efficient manner than traditional paper-based systems. Smart contracts extend the capabilities of a blockchain by defining specific obligations. Chemical regulations impose the need on industry to record and report the use of hazardous chemicals within products. The process of collating supply chain chemical substance reporting information is a manually intensive and lengthy process as data needs to be requested, collated, checked, verified and rolled up to assess potential business continuity risks, as well as varying levels of reporting activity back to employees, consumers and chemical regulators. The primary research question answered by this paper relates to the potential use of a blockchain with a smart contract to enable the automated collation of supply chain chemical substance information for manufactured products. This paper presents the findings from a Delphi study, where the respondents reviewed proposed concepts and provide opinions. A proposed Supply Chain Chemical Substance Reporting (SCCSR) blockchain is presented based on the findings of the Delphi study. The SCCSR blockchain enables industry to implement greater efficiencies in collecting the required chemical substance information from a supply chain, which in turn will enable the required regulatory actions to be generated, as well as the investigation of alternative less hazardous substances which may be utilized by the supply chain.
    Keywords: Supply chain chemical substance reporting; blockchain application; chemical regulations; business continuity risks; supply chain management; technology and innovation; Delphi method; automated data collection and validation; distributed ledger technology; digitalization.

  • A Survey on Emerging Issues in Interconnection Networks   Order a copy of this article
    by Mehrnaz Moudi, Mohamed Othman 
    Abstract: Nowadays, the interconnection network is considered as an important architectural choice for the future parallel system in many processors owing to the scalable nature of the interconnection network. The basic idea of interconnection is to reach efficient network communication and overcome scalability problems. Since an interconnection network plays a critical role in such computers, with millions of processors providing an efficient data transferring in the possible shortest time without congestion, designing various topologies for these networks is of high significance. This survey paper focuses on the issues emerged during the design of enhanced interconnected topologies to provide efficient inter-processor communication considering a maximum number of transferred packets in the shortest path.
    Keywords: interconnection; topology; routing; switching; traffic; congestion; deadlock.
    DOI: 10.1504/IJITST.2021.10026364
  • Secure SMS Transmission Based on Social Networks Messages   Order a copy of this article
    by Saman Shojae Chaeikar, Saeed Yazdanpanah 
    Abstract: Nowadays, short message communication has a wide range of applications in modern lives. Authentication, announcements, reports, and personal communications are the common instances of application of this widely used digital media. At transmission time, the message content spreads in the air without any intrinsic security countermeasure. As a result, the content of messages is interceptable without the need for complicated equipment. In modern methods, security has migrated from hardware to software, especially in smartphones. In this research, a method for securing short message communications is introduced which uses four distinguished cryptographic key generation factors to produce a couple of unique and dynamic encryption and decryption keys. The evaluation results show that the proposed method uses secure encryption and decryption keys, is resistant against a wide range of cryptographic and network attacks, outstandingly reduces the cost of establishing secure sessions, and highly satisfies the users with the delivered level of security and usability.
    Keywords: SMS Security; Short Message Security; Secure Communications; Secure channel; GSM operator; Social network.

  • A cost-effective strategy for Splitting and Allocating Alerts Workloads during Forensic Investigations of very large IDS logs   Order a copy of this article
    by Joshua Nehinbe 
    Abstract: The scarcity of suitable models that investigators can adopt to effectively manage and allocate resources during an outbreak of intrusions is recently gaining momentum in digital forensics. This research proposes a cost-effective model which employs two measures of impurity (as a bilateral and comparative approach) to split and allocate alerts workloads to two or more investigators of huge intrusion logs. The premise is that the splitting and allocation of the alerts workloads among investigators should be carried out such that the organization will incur no marginal cost at long run. In addition to the effective cost management, the process must guarantee timely delivery of forensic results; particularly in the face of exponentially increase in the alerts workloads generated by Intrusion Detection Systems (IDSs) and where there have been obvious diminishing returns and declining in the efficiency of the investigative staffs. Thus, the proposed model uses a sample of intrusion datasets, C++ language, Clustering, Entropy, Gini-Index and Timestamp to successfully demonstrate and visually establish the profitable split-threshold within which costs were minimal or non-existent.
    Keywords: Intrusion; intrusion detection system (IDS); detector; Gini Index; Entropy; networks forensics.

    by Rahul Kumar, Mridul Kumar Gupta, Saru Kumari 
    Abstract: Session initiation protocol (SIP) is the most prominent signaling scheme for controlling, establishing, maintaining and terminating communications on the Internet. Many researchers are working to create strong protocols for secure communication using SIP. Tu et al. proposed an improved authentication protocol for session initiation protocol. They show that their scheme can resist a number of security attacks. However, we find that their protocol suffers from inefficient login phase, inefficient password update phase, impersonation attack and unable to keep the user anonymity. To make all these types of attacks ineffective, we present a very efficient scheme for SIP. Security investigation of the proposed scheme shows that our scheme can make all the shortcomings of Tu et al.s scheme as ineffective.
    Keywords: session initiation protocol; elliptic curve cryptography; impersonation attack; inefficient login phase; user anonymity.

  • Establishing Security of Bitcoins Using Elliptic-curve Cryptography Based Protocol   Order a copy of this article
    by Dilbag Singh 
    Abstract: It is undeniable that the growth of the computer and network security is repeatedly increased since the past 40 years. In 1985-1986 encryption was applied as a primary technique for providing security. Network security technology includes authentication and authorization, data encryption, access control, security auditing. \r\nBitcoin is presently one of the most popular cryptocurrencies. The phenomenon of Bitcoin crypto-currencies is based on the public key cryptography and peer to peer network. In the Bitcoin, blockchain is used for storage of the transaction which is also called the public ledger. Digital Money or Bitcoin are used in a day to day activities, some of which are illicit and illegal. In this paper the main area is Security i.e. the main focus here is to protect Bitcoin systems from unauthorized access and from various threats using an appropriate scheme (Elliptic-curve cryptography (ECC)) protocol.\r\n
    Keywords: Bitcoin; Blockchain; cryptography; Network Security; Cryptocurrency; Automated Validation of Internet Security Protocols and Applications; AVISPA; Elliptic-curve cryptography.

  • Implementation of symbol timing recovery for estimation of clock skew   Order a copy of this article
    by S.M. Usman Hashmi, Muntazir Hussain, Fahad Bin Muslim, Kashif Inayat, Seong Oun Hwang 
    Abstract: Time synchronisation in any distributed network can be achieved by using application layer protocols for time correction. Time synchronisation method proposed in this article uses symbol timing recovery at the physical layer to correct application layer clock. This cross layer methodology diminishes the quantity of message trades needed by application layer for time synchronisation thus resulting in energy saving. Precision of skew estimate can be increased by using multiple message exchanges. Examination of the cross layer strategy including the simulation results, the experimentation outcomes and mathematical analysis demonstrates that clock skew at physical layer is same as of application layer, which is actually the skew of hardware clock within the node.
    Keywords: time synchronisation; symbol timing recovery; energy constrained distributed networks; energy efficient clock skew estimation; frequency offset estimation; sensor networks; Bayesian estimation.
    DOI: 10.1504/IJITST.2020.10033615
  • A Location-aware Routing Protocol with Adaptive Transmission Angle Management in Mobile Overlay Cognitive Ad-hoc Networks   Order a copy of this article
    by Hyukchun Oh, Kyusung Shim, Beongku An 
    Abstract: Mobile cognitive ad-hoc networks is considered as one of the promising networking solutions for future mobile networks since the licensed spectrum can share the licensed user and unlicensed user. In this paper, we propose a location-aware routing protocol, called LRP, to enhance the spectrum efficiency in mobile overlay cognitive ad-hoc network and provide a solution to reduce the control overhead by using the adaptive transmission angle management. The main contributions of this paper can be summarized as follows. First, we propose a location-aware routing protocol, called LRP, to improve the spectrum efficiency for mobile overlay cognitive ad-hoc networks. More specifically, the proposed routing protocol can establish a route by avoiding the coverage of primary users (PUs). Second, the proposed routing protocol select the next node that is the nearest node from the center line between a source node and a destination node. Thus, the proposed routing protocol can transmit the data packet stably. Third, we propose an adaptive transmission angle management that takes into account the previous session' route state in order to reduce the amount of control packet in the considered networks. From the numerical results, the proposed routing protocol and adaptive transmission angle management efficiently support the network performances such as the packet delivery ratio, control overhead, and delay by using OPNET.
    Keywords: location-aware routing protocol; adaptive angle management; overlay cognitive radio; mobile ad-hoc networks.

  • Energy-efficient Load-balanced RPL routing protocol for Internet of Things (IoTs) Networks   Order a copy of this article
    by Ali Kadhum Idrees, Athraa J.H. Witwit 
    Abstract: This article proposed energy-efficient load-balanced RPL (EL-RPL) routing protocol for IoTs networks. In this protocol, a parent selection algorithm is proposed. It selects parent in parent list to be the next hop node toward destination node in networks based on an objective function that combines between the highest remaining energy and the total number of received packets by the parent. This can balance the load on all parents in the parents list. Besides, the EL-RPL protocol improves DODAG construction by preventing DIO packets transmission to the nodes with the lower ranks. This will lead to save energy and hence enhance the networks lifetime. Many experiments were performed using the OMNeT++ network simulator to evaluate the efficiency of EL-RPL routing protocol. In comparison with some existing protocol, the results ensure that the proposed EL-RPL protocol can efficiently save energy, decrease the control packets, and improve the lifetime of the IoTs networks.
    Keywords: internet of things; IoT; RPL routing protocol; network lifetime optimisation; energy load balancing; ELB; performance evaluation.
    DOI: 10.1504/IJITST.2020.10030144
  • Utilizing AHP and PROMETHEE for evaluating the performance of online services   Order a copy of this article
    by Abeer Ghareeb, Nagy Darwish, Hesham Hefny 
    Abstract: Limited usage of online services by citizens is one of the main obstacles to the success of e-government projects. Most of the previous studies have focussed on identification of the main significant factors affecting adoption of online services by using statistical methods for hypotheses tests. However, there is a need to go a further step and propose methodologies to examine to what extent such identified adoption factors are practically achieved. This turns the adoption process of online services to be a multi-criteria decision making problem which make it more practical for handling. Therefore, this paper aims to propose a methodology to evaluate the performance of online services utilizing two of the most well-known and extensively used multi-criteria decision making methods. It uses the hierarchy structure of AHP while using ranking procedure of PROMETHEE. The proposed methodology has been applied to evaluate the performance of a sample of 24 services available on the Egyptian national portal. Each service has been analysed against nine acceptance criteria covering application and service aspects. It is found that 46% of the evaluated services tend to be performing quite reasonably.
    Keywords: Multi-criteria analysis; E-government; online services; Citizen Requirements; PROMETHEE; AHP.

  • Energy efficient cross layer time synchronisation in cognitive radio networks   Order a copy of this article
    by S.M. Usman Hashmi, Muntazir Hussain, S.M. Nashit Arshad, Kashif Inayat, Seong Oun Hwang 
    Abstract: Time synchronisation is a vital concern for any cognitive radio network (CRN) to perform dynamic spectrum management. Each cognitive radio (CR) node has to be environment aware and self adaptive and must have the ability to switch between multiple modulation schemes and frequencies. Achieving same notion of time within these CR nodes is essential to fulfil the requirements for simultaneous quiet periods for spectrum sensing. Current application layer time synchronisation protocols require multiple timestamp exchanges to estimate skew between the clocks of CRN nodes. The proposed symbol timing recovery method already estimates the skew of hardware clock at the physical layer and use it for skew correction of application layer clock of each node. The heart of application layer clock is the hardware clock and hence application layer clock skew will be same as of physical layer and can be corrected from symbol timing recovery process. So one timestamp is enough to synchronise two CRN nodes. This conserves the energy utilised by application layer protocol and makes a CRN energy efficient and can achieve time synchronisation in short span.
    Keywords: time synchronisation; cognitive radio; clock correction; symbol timing recovery.
    DOI: 10.1504/IJITST.2020.10033617
  • Automated Analysis of Blood Vessel Permeability Using Deep Learning   Order a copy of this article
    by Yoojin Chung, Hyunwoo Kim 
    Abstract: This paper presented a deep learning-based approach using CNN that automatically detects changes of permeability in the blood vessel network after exposing the vessels to chemicals. Because chemicals can affect the permeability of the vessels, it is important to characterise and quantify the changes to blood vessels accurately from time-lapse microscope images. We increased the number of data by applying diverse augmentation methods to 2,800 images. In this paper, we also devised a method of automatically labelling images as to whether there is any change in the blood vessel to obtain learning data for CNN by pre-treating images using diverse image processing methods and separately establishing thresholds for different images. To verify the performance of the developed CNN, we used 4-fold cross validation and blood vessel changes were automatically detected with an accuracy of 92.07% in the experiment.
    Keywords: Blood Vessel Network; Automated Recognition; Microfluidic Culture Platform; CNN; Blood Vessel Permeability.

  • Intelligent Intrusion Detection System Using Log Cluster Decision Tree Detection Mitigation in Complex Event Processing   Order a copy of this article
    by Sandosh S, Govindasamy V, Akila V 
    Abstract: The world of technology largely engages on the networks that provide the vast amount of data for the user all around the world. The networks can be of different domains that includes education, market or even defense. Hence the network has to be secure against any attacks that lead to intrusion. For securing the networks, several intrusion detection systems (IDS) are developed, however the possibility of intrusion remains in the networks. In the current work, we propose the novel Intelligent IDS with Log Cluster Decision Tree Detection Mitigation (IIDS-LCDTDM) technique in Complex Event Processing environment, an extension of our previous work. The novel system comprises of three major algorithms as Attribute Greedy Stepwise Selection, two-mean-log cluster along with tree detection and mitigation algorithm. The gure6percent dataset is used to evaluate the proposed algorithm for various performance metrics using Java/J2EE software. From the evaluation result, the proposed system provided the accuracy of 99.987%, which was better than our previous model with 99.9463%.
    Keywords: Intrusion Detection System; Complex Event Processing; IIDS-LCDTDM; Performance metrics.

  • Providing a model based on Poisson distribution for malware propagation assessment in Peer-to-Peer networks   Order a copy of this article
    by Shadi Haghi, Mahdi MollaMotalebi 
    Abstract: The use of peer-to-peer networks has increased dramatically in recent years in applications infrastructure such as file sharing, gaming, instant messaging and content distribution. These networks suffered from the problem of large-scale incompatibilities, which was organized by the super peer to overcome this problem. This structure has a two-layer architecture in which some nodes with more resources (higher bandwidth, higher processing power) are considered as super peers. Each super peer has a number of regular nodes (or regular members). On the other hand, it has attracted the attention of malware makers, especially worms, because they can easily be replicated and propagated in such a way. So far, several models have been presented to assess the behaviour of worm propagation in peer-to-peer network, but there has not been any effective review of how the worm propagates in super-peer networks. Hence, providing an effective model for expressing the propagation of a worm to identify its dangers and providing new solutions for detecting and confronting it in super peers networks is necessary. This paper presents a framework for modelling the connectivity of the super-peer network and then examines the behaviour of active worm propagation based on epidemic models on this framework. The results of the simulation of worm propagation behaviour in super-peer networks in comparison with the way they propagate in peer-to-peer network indicate that the worm propagate more rapidly in super-peer networks. Also, the results of the implementation indicate that the model presented in this study has achieved a significant improvement in reducing the rate of propagation of worms compared to previous work.
    Keywords: Super-peer network; flat peer-to-peer network; Malware; Active worm; Modelling worm propagation behaviour.

  • Discovering Social Bots on Twitter: A Thematic Review   Order a copy of this article
    by Rosario Gilmary, Akila Venkatesan, Govindasamy Vaiyapuri 
    Abstract: The onset of online social networks (OSN) like Twitter became a predominant platform for social expression and public relations. Twitter had 330 million monthly active users by the year 2019. With the gain in popularity, the ratio of virulent and automated accounts has also increased. It is estimated that 48 million of its functioning accounts are bots, indeed. Precisely, Twitter bots or Sybil accounts are kinds of automated web robot software that regulate activities like the tweet, retweet, like or follow via Twitter API. These bots misguide and delude genuine users by spreading spurious content. Hence, uncovering malicious bots from authentic users is obligatory to ensure a safe environment on Twitter. In this paper, the nature of Twitter bots and features of bot detection are discussed with their efficiency. Various bot detection approaches are classified based on the attributes and techniques used. Strong and weak aspects of distinct features and techniques are discussed. Key challenges and future research directions in detecting social bots are also presented. Special reference has been emphasized to contemporary emerging trends.
    Keywords: social media; twitter; OSN security; online social networks security; social bots; categorization; suspicious behaviour detections; bot detection techniques.

  • A Review on Secrecy Performance of Cooperative Relay Network With Diversity   Order a copy of this article
    by Khyati Chopra 
    Abstract: In the past few years, there has been a rapid increase in demand on transmitting data over the open wireless medium. Severe issues of information security and privacy thus arise, as the wireless transmissions may be intercepted by any unintended receiver in the network. There is a need to design the transmission system in an efficacious way, such that the available space and time can be used adequately. This becomes a challenging job as there are random variations in the channel quality due to deleterious effects of the multi-path fading. Hence, to improve the transmission reliability, coverage probability and throughput, relay aided communication draw in great attention from both academia and industry. Relays provide the advantage of cooperative diversity, where the directly transmitted signal and the relayed signal can be combined at the receiver using various diversity combining schemes to mitigate the fading effect. In this paper, we review the secrecy performance of dual-hop cooperative relay system with diversity reception and relay selection. The significance and secrecy effect of channel knowledge at the transmitter is also studied. We have corroborated that CSI knowledge at the transmitter can improve secrecy
    Keywords: Decode-forward relay; Secrecy outage probability; Channel state information; Cooperative communication; Diversity combining.

  • A hybrid blockchain proposal to improve Valued Added Tax (VAT) recovery   Order a copy of this article
    by Christophe GAIE, Markus Mueck 
    Abstract: In the present article, we propose a novel hybrid blockchain approach to improve VAT recovery, meeting privacy requirements as introduced by the European General Data Protection Regulation. Indeed, the existing blockchain systems rely on distributed decision making using different cryptocurrencies whose transparency is a real improvement to prevent tax fraud: if each node of the system which keeps an informatic track of every transaction, it will not be possible to hide cash transactions. However ensuring the transparency and security of transactions requires a tremendous amount of energy. Therefore, the idea proposed in this paper is to introduce an authority with a limited action in order to take advantage of the decentralized advantages of cryptocurrencies while reducing their energy consumption.
    Keywords: Data Analytics; Fraud Detection; Tax Recovery; Telecommunications; Blockchain; Privacy Protection.

  • Efficient way in sharing of IoT data and uses of Blockchain in Auditing the storage data   Order a copy of this article
    by Ackley Joseph Lyimo, Kakelli Anil Kumar 
    Abstract: Today the need for technology in various aspects of life has risen abruptly, hence leading to the expansion of the Internet of Things (IoT), but when it comes to IoT data, there is a myriad of issues regarding controlling and auditing it. A lack of measures taken for security can also make IoT vulnerable to a number of threats. To better maintain and minimize these threats, using Blockchain can play a significant role by auditing and recording all actions that occur while collecting the data and storing the same in the cloud. Due to the nature of consensus methods in a Blockchain system, we introduced the uses of the Interplanetary File System wherein the data collected will be stored in them and a hash value will be retrieved which will be sent to the Blockchain and recorded. In this paper we introduced better Blockchain-based design for IoT which can show the distributed control of how IoT data is collected, recorded for auditing and stored. Through this system we succeeded in achieving secure sharing of IoT data and proper utilization of cloud storage resources.
    Keywords: Blockchain; Internet of Things (IoT); Interplanetary File systems (IPFS).

  • Detecting Botnet Using Traffic Behavior Analysis and extraction of effective flow features   Order a copy of this article
    by Sanaz Feizi, Hamidreza Ghaffari 
    Abstract: Botnets is one of the most serious attacks that cause irreversible damage to systems and networks, and it is important to detect and prevent botnets as attacks using them are constantly occurring. In the paper, the botnet detection method proposed so far was analyzed, and based on the analysis, botnet detection method and effective flow features extraction method were proposed. The proposed method in this paper is able to detect and identify them not only during the attack phase, also in the C&C phase of botnet life cycle before they can attack the system or network. The proposed model is based on traffic behavior analysis to detect botnet-related command and control traffic designed by using classification through selecting effective network flow-based features, which has the advantage that it can also detect encrypted traffic. Accordingly, it is thought that the paper will be an important help for various studies in the method of detecting botnets.
    Keywords: Botnet Detection; Network Flow; Traffic Behavior Analysis; Random Forest; Intrusion Detection.

Special Issue on: ICGHIT 2019 Green and Human Information Technology

  • QoS Assurance for PON-Based Fronthaul and Backhaul Systems of 5G Cloud Radio Access Networks   Order a copy of this article
    by Muhammad Waqar, Ajung Kim 
    Abstract: The envisioned fifth generation (5G) of cellular networks is expected to provide high bandwidths and strict quality of service (QoS) to billions of smart devices at affordable budgets. The newly proposed fronthaul and backhaul (FB) segments in the C-RANs (cloud-radio access networks) be leveraging solutions to satisfy the 5G demands, but the rigorous one-way delay and packet delay variations (PDVs) requirements of fronthaul networks that can only be satisfied through the high capacity optical links increase the cost and thus, fronthaul segment becomes a bottleneck in the C-RANs. Time division multiplexing (TDM) based passive optical networks (PONs) can be a promising candidate to carry the fronthaul traffic, but the TDM-PON systems have limitations to meet the fronthaul QoS requirements due to unavoidable delays at the switching nodes. Moreover, the unification of FB traffics over the same segment is vital for fully exploit the cost benefits of the C-RANs, but due to the poor performance of the PON systems for fronthaul traffic, the backhaul traffic could not be forwarded through the same fronthaul segments. Therefore, in this paper, we propose and implemented the strict priority and frame preemption based buffering schemes to transport the FB packet flows simultaneously at tolerable delays and PDVs. The simulation result verifies that the considered schemes significantly improved the performance of the PON systems to comply with the QoS requirements of the 5G fronthaul and backhaul traffics in the C-RANs.
    Keywords: backhaul; buffering; C-RANs; frame preemption; fronthaul; strict priority; 5G networks.

Special Issue on: Effective Management of Internet of Things Breaches

  • Security and Detection Mechanism in IoT based Cloud Computing using Hybrid Approach   Order a copy of this article
    by Megha Vashishtha, Pradeep Chouksey, Dharmendra Singh Rajput, Somula Ramasubbareddy, Praveen Kumar Reddy M, Thippa Reddy G, Harshita Patel 
    Abstract: This paper presented a secure environment of IoT based cloud computing. This approach used and enhanced Rivest Cipher (RC6) method along with blowfish algorithm. The combination of RSA and RC4 is accepted for the generation of Key to get the superior security method, on image, Blowfish algorithm is applied. In this method, initially cloud provider registers the cloud user which authenticates the user, then text and image data can be uploaded in the existing four servers. The uploaded data can be viewed directly by the self-verified account without any constraint, but if those files are demanded by the other cloud users then data classification encryption standard have been applied. The textual data is practiced with the enhanced RC6 method with key processing method of RC4 and RSA algorithm. These keys are used for the data decryption from the further side. The TA gives the information of the mismatch in the last prefix of the combination of the user detail and the data. If it does not match then the data will be corrupted by the blocker algorithm and no useful information has been visualized and any type of contravention is traced at the admin side and the cloud user both. The whole parametric comparison implies that the performance of our framework is better in comparison to the traditional techniques.
    Keywords: Cloud Computing; IOT; Rivest Cipher (RC6); RSA; RC4; Blowfish;.

  • An evolutionary-based technique to characterize anomaly in Internet of Things networks   Order a copy of this article
    by Alok Kumar Shukla, Sanjeev Pippal, Deepak Singh, Somula Ramasubbareddy 
    Abstract: Internet of Things (IoT) can connect devices embedded in various systems to the internet. Distributed denial-of-service (DDoS) attacks on the Internet of Things are position a serious threat to any networks. A distributed denial-of-service attack is a malicious attempt to interrupt normal traffic of a victim system, service or enterprises by formidable the victim or its nearby infrastructure with Internet traffic overflow. Towards defending DoS attacks the significant number of mechanisms in recent years have introduced for building intrusion detection system (IDS) such as evolutionary algorithm and artificial intelligence. Unfortunately, the modern well-known DDoS attack detection strategies have been failed to rationalize the objective as fast and early detection of DDoS attack. In order to understand different DDoS attacks activities, in this paper, Teaching Learning-based Optimization (TLBO) with learning algorithm is integrated to mitigate denial of service attacks. The approach is based on building an intrusion detection system to the requirements of the monitored environment, called TLBOIDS. Furthermore, TLBOIDS selects the most relevant features from original IDS dataset which can help to distinguish typical low-rate DDoS attacks with the use classifiers namely support vector machine, decision tree, na
    Keywords: Evolutionary Algorithm; Intrusion Detection; Denial-of-Service; IoT.

  • Robust and Provable Secure Three-Factor Mutual Authentication Scheme using Smart Card   Order a copy of this article
    by Niranchana R, Amutha Prabakar Muniyandi 
    Abstract: The best solution to perform remote authentication verification is offered by the authentication scheme that opts smart card. Such schemes are developed by using the combination of password and biometric identity. Biometric based authentication schemes provide the most prominent security, when compared to the alternative schemes available for authentication. In this paper, a provable secure three-factor authentication scheme that makes use of smart card is been proposed. This authentication scheme is developed based on fundamental assumption of Discreate Logarithm Problem and Modular Exponentiation. The formal and informal security analysis for the proposed scheme shows that the authentication scheme is more secure. The efficiency of this scheme is calculated based the performance analysis for both computational and communication cost. It shows that the proposed authentication scheme is performing well, when compared to the related authentication schemes.
    Keywords: Smart Card; Authentication; Modular exponentiation; Bio-metric identification; formal security.

  • An Improved Security Approach for Attack Detection and Mitigation Over IoT Networks using HACABO & Merkle Signatures   Order a copy of this article
    by Phalguna Krishna ES, Arunkumar T 
    Abstract: IoT is an agglomeration of heterogeneous technologies and interconnected devices that are autonomous and self configurable .Its constrained resources characteristic has made it more vulnerable to harmful attacks and tend to data loss and resource exhaustion due to wireless architecture of IoT. Handling security attacks, more particularly DDoS attack is one of the key challenges in IoT environment. This paper focuses on detection and prevention mechanism of IoT attacks. For that, an attack detection mechanism with Hybrid Ant Colony African Buffalo Optimization and hash-based Merkle signature-prevention mechanism is proposed. The paper also introduces Economic DoS (E-DoS) shield mechanism using CloudWatch to prevent high rate DDoS attacks since the conventional approaches cannot prevent it. Also, the efficiency of the developed model is compared with recent works.
    Keywords: IoT; Denial of Service; E-DoS; IoT Attacks; Attack detection; Attack Prevention; Merkle signature.

  • Digital application of analog-like time perception mechanism based on Analog on Digital (AoD) theory   Order a copy of this article
    by Ziran Fan, Takayuki Fujimoto 
    Abstract: This paper analyzes the human time perception mechanism regarding the use of analog clocks based on the design theory of Analog on Digital (AoD Theory). With the examination, the authors would propose the method to apply the design elements of analog clock into the digital devices such as smart watches and smartphones to the schedule management. The proposed application represents the reality of time passing that is originally provided by analog clocks. The interface design adopts the time representation of analog clocks into the schedule display so that it can intuitively indicates the lapse of time passing for each activity scheduled in a day. Moreover, we design the users operational experience close to that of analog tools by realizing the real feel of using clocks through the representation of the spring-driven system on digital style.
    Keywords: interface design; time perception; smartphone; smart watch; information media; media design.

  • An Upgraded Model of Query Expansion Using Inverse- Term Frequency (ITF) With pertinent Response For Internet of Things   Order a copy of this article
    by Surbhi Sharma, Abhishek Kumar, Rashmi Agrawal 
    Abstract: The IOT plays an important role for recent internet access-based task to future internet and information retrieval is a field which is relate our study to the Structure, examination, association, accumulation, looking, and recovery of data. Data recovery has turned into a significant field of study and research under software engineering because of complex development of data accessible as full message, hypertext, authoritative content, catalog, numeric or bibliographic content. The research work is going on different parts of data recovery frameworks in order to improve its proficiency and unwavering quality. The target of this paper is to search the query development strategy utilizing reverse term recurrence to improve the proficiency and exactness of the data recovery framework and this accuracy in query processing leads to most recent trusted digitizing trend IOT. As the technique for assessment of query development, we will expel irrelevant, excess and uncertain words from the recovered report dependent on client query. In proposed work, we present another technique for Query Expansion (QE) which depends on inverse term recurrence with importance criticism. Getting the top regenerated records use as in importance criticism for extra QE terms and developing applicant terms. Procedure of scoring strategy appoints score to one of a kind terms and applying Inverse term frequency (ITF) to deliver the rank reduce of terms. These terms will channel through semantic activity and reweighting produce refreshed (extended) question which will again send to look through apparatus.
    Keywords: Inverse-term frequency; Query Expansion; Precision; KLD-mean; Semantic similarity; term-pooling; IOT.

  • An Architecture for Enabling IoT interoperability between cross-platforms   Order a copy of this article
    by Venkateswara Raju, Manjula R. Bharamagoudra 
    Abstract: The Internet of Things (IoT) continues to evolve and more and more IoT platforms provide access to things. However, IoTs ability lies in the development of cross-domain IoT ecosystems in these platforms, offering new, unexpected applications and value-added services. We have identified two key perspectives critical to the development of an IoT ecosystem: (i) Enable interoperability between platform development and cross- platform implementation of applications on Internet platforms; (ii) Market (or Trade Centre) to exchange and adapt IoT resources. Given these two important perspectives of an IoT ecosystem, this article introduces the BIG (Bridging the Interoperability Gap) IoT architecture as the basis for the creation of IoT ecosystems. Architecture responds to key needs that have been evaluated by industry and research associations as a key aspect of the BIG IoT project. We present a proof of the application of the concept in the context of a smart healthcare scenario. We adopted the generic RESTful Application Programming Interface (API) methodology to detect & interact the smart object platforms.
    Keywords: Internet of Things( IoT); Interoperability; Architecture; Marketplace (or)Trade centre; Healthcare; Applications; Services.

  • Enhanced Adaptive Trust Management System for Socially related IoT   Order a copy of this article
    by Geetha Venkatesan, Avadhesh Kumar 
    Abstract: The Social IoT (SIoT) is a network involving heterogeneous entities like a human, devices referred to as things are connected with social relationship. Every individual thing has its own id, functional property, limited storage and capacity. Each one expects to establish trusted communication with other reliable entities in the IoT network, which paves the essential of Trust Management System (TMS). We propose an adaptive trust management design that performs trust assessment considering both QoS and Social parameter for deciding the trustiness of a node in the IoT network. The design uses direct assessment and indirect recommendation, which are aggregated using a dynamic weighted method. The decay factor for the past experiences and dynamic updating of the trust profiles enhances the system performances. The work is compared with static, distributed, social and single trust type of system in terms of resiliency and performance. The proposed work shows very efficient trust assessment and maximum performance.
    Keywords: Internet of Things;Trust Management;Social parameter;QoS;Social IoT.

  • An Effective Cloud Based Smart Home Appliances Automation in IoT using PHMM Model   Order a copy of this article
    by M.R. Sundarakumar, S. Sankar, S.R.S. Reddy 
    Abstract: Internet of Technology (IoT) is an emerging and innovative approach to control the home appliances remotely. A trillion of devices are connected to the Internet that are controlled and monitored in real-world applications. The main goal is to provide the automation for home appliances using IoT. Wireless Sensor Networks (WSN) based home automation systems are very difficult to manage the devices using a centralized approach due to the mobility. To solve this issue, Wireless Home Automation System (WHAS) is proposed, which uses the Predictive Hidden Morkov Model (PHMM) to control the devices efficiently and conserves the energy utilization among the devices. The status of the devices are monitored continuously and selecting the device operation either in manual mode or automatic mode using the PHMM model. The proposed approach conserves more energy than traditional methods.
    Keywords: Wireless Home Automation Systems (WHAS); Internet of Things (IoT); Web of Things (WoT).