Forthcoming articles

International Journal of Internet Technology and Secured Transactions

International Journal of Internet Technology and Secured Transactions (IJITST)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Internet Technology and Secured Transactions (46 papers in press)

Regular Issues

  • AN EVALUATION OF IDENTITY AND ACCESS MANAGEMENT SYSTEMS   Order a copy of this article
    by Yousef Sanjalawe, Mohammed Anbar, Qusay Alzubi 
    Abstract: Abstract: One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM available tools, based on the three characteristics (ease of use, usefulness, and users satisfaction), which build targets to be achieved in order to gain quality in software. The tools compared in this study are Log Mote, Oracle ID management, Tivoli Identity Manager, NetIQ-Novell, access sentinel, and Active directory. In order to enable users to access the available resources in a secure way, we propose a novel architecture of IDAM. The proposed architecture basically has several advantages like, autonomy, comprehensive and systematic, standardization, and scalability.
    Keywords: Identity and access management; Identity management; IDAMs tools; Evaluation.

  • Cluster based optimal sink repositioning technique for WSNs using an improved glowworm swarm optimization and S* position search algorithm   Order a copy of this article
    by B. Santhosh Kumar, P. Trinatha Rao 
    Abstract: Wireless sensor network is a group of organized sensor nodes that are limited to their resources such as limited bandwidth, energy etc. The data gathered from sensor nodes will be forwarded to the sink node to take proper actions. In order to avoid the failures, the sink nodes should be positioned in the better place for the resource optimization. In this paper, first we will apply clustering for grouping the nodes that are adjacent to sink node. Clustering is done by an improved glowworm swarm optimization (IGSO) algorithm. The node which has the shortest path is selected for position. Hence, this approach is used to find the optimal position for all the sinks in order to optimize the lifetime of the network and move according with intelligent sink positioning.
    Keywords: WSN; sink repositioning; network lifetime; sink nodes; clustering; IGSO.

  • Robust transcoding-resilient H.264 watermarking   Order a copy of this article
    by Grace C.-W. Ting, Bok Min Goi, Sze Wei Lee 
    Abstract: The H.264 standard is widely deployed for high-quality consumer video recording, storage and sharing applications such as Blu-ray DVD and streaming HD video on the internet including YouTube. In current times, since videos are easily shared live on social media and messaging mobile Apps, users need the ability to determine the ownership of these videos against being illegally distributed without proper acknowledgements to the owners, and to take actions against those who spread false videos that trigger viral fake news. Robust watermarking schemes are popularly applied techniques to solve these problems. These types of schemes are required to achieve robustness against modification attacks on the embedded watermark. In this paper, we present a robust watermarking scheme for these purposes. We demonstrate that it is able to withstand common modification attacks launched by malicious buyers aiming to modify the watermarks embedded by the owner, and that it is furthermore resilient to transcoding.
    Keywords: Security; robust; transcoding resilience; watermarking; attacks; design; HD video.

  • Blockchain application in supply chain chemical substance reporting a Delphi study   Order a copy of this article
    by Sukhraj Takhar, Kapila Liyange 
    Abstract: Blockchains utilize digital ledger technology to enable data to be encrypted, recorded and traced in a more efficient manner than traditional paper-based systems. Smart contracts extend the capabilities of a blockchain by defining specific obligations. Chemical regulations impose the need on industry to record and report the use of hazardous chemicals within products. The process of collating supply chain chemical substance reporting information is a manually intensive and lengthy process as data needs to be requested, collated, checked, verified and rolled up to assess potential business continuity risks, as well as varying levels of reporting activity back to employees, consumers and chemical regulators. The primary research question answered by this paper relates to the potential use of a blockchain with a smart contract to enable the automated collation of supply chain chemical substance information for manufactured products. This paper presents the findings from a Delphi study, where the respondents reviewed proposed concepts and provide opinions. A proposed Supply Chain Chemical Substance Reporting (SCCSR) blockchain is presented based on the findings of the Delphi study. The SCCSR blockchain enables industry to implement greater efficiencies in collecting the required chemical substance information from a supply chain, which in turn will enable the required regulatory actions to be generated, as well as the investigation of alternative less hazardous substances which may be utilized by the supply chain.
    Keywords: Supply chain chemical substance reporting; blockchain application; chemical regulations; business continuity risks; supply chain management; technology and innovation; Delphi method; automated data collection and validation; distributed ledger technology; digitalization.

  • A Survey on Emerging Issues in Interconnection Networks   Order a copy of this article
    by Mehrnaz Moudi, Mohamed Othman 
    Abstract: Nowadays, the interconnection network is considered as an important architectural choice for the future parallel system in many processors owing to the scalable nature of the interconnection network. The basic idea of interconnection is to reach efficient network communication and overcome scalability problems. Since an interconnection network plays a critical role in such computers, with millions of processors providing an efficient data transferring in the possible shortest time without congestion, designing various topologies for these networks is of high significance. This survey paper focuses on the issues emerged during the design of enhanced interconnected topologies to provide efficient inter-processor communication considering a maximum number of transferred packets in the shortest path.
    Keywords: interconnection; topology; routing; switching; traffic; congestion; deadlock.
    DOI: 10.1504/IJITST.2021.10026364
     
  • Secure SMS Transmission Based on Social Networks Messages   Order a copy of this article
    by Saman Shojae Chaeikar, Saeed Yazdanpanah 
    Abstract: Nowadays, short message communication has a wide range of applications in modern lives. Authentication, announcements, reports, and personal communications are the common instances of application of this widely used digital media. At transmission time, the message content spreads in the air without any intrinsic security countermeasure. As a result, the content of messages is interceptable without the need for complicated equipment. In modern methods, security has migrated from hardware to software, especially in smartphones. In this research, a method for securing short message communications is introduced which uses four distinguished cryptographic key generation factors to produce a couple of unique and dynamic encryption and decryption keys. The evaluation results show that the proposed method uses secure encryption and decryption keys, is resistant against a wide range of cryptographic and network attacks, outstandingly reduces the cost of establishing secure sessions, and highly satisfies the users with the delivered level of security and usability.
    Keywords: SMS Security; Short Message Security; Secure Communications; Secure channel; GSM operator; Social network.

  • A cost-effective strategy for Splitting and Allocating Alerts Workloads during Forensic Investigations of very large IDS logs   Order a copy of this article
    by Joshua Nehinbe 
    Abstract: The scarcity of suitable models that investigators can adopt to effectively manage and allocate resources during an outbreak of intrusions is recently gaining momentum in digital forensics. This research proposes a cost-effective model which employs two measures of impurity (as a bilateral and comparative approach) to split and allocate alerts workloads to two or more investigators of huge intrusion logs. The premise is that the splitting and allocation of the alerts workloads among investigators should be carried out such that the organization will incur no marginal cost at long run. In addition to the effective cost management, the process must guarantee timely delivery of forensic results; particularly in the face of exponentially increase in the alerts workloads generated by Intrusion Detection Systems (IDSs) and where there have been obvious diminishing returns and declining in the efficiency of the investigative staffs. Thus, the proposed model uses a sample of intrusion datasets, C++ language, Clustering, Entropy, Gini-Index and Timestamp to successfully demonstrate and visually establish the profitable split-threshold within which costs were minimal or non-existent.
    Keywords: Intrusion; intrusion detection system (IDS); detector; Gini Index; Entropy; networks forensics.

  • AN ENHANCEMENT OF ECC BASED SESSION INITIATION PROTOCOL   Order a copy of this article
    by Rahul Kumar, Mridul Kumar Gupta, Saru Kumari 
    Abstract: Session initiation protocol (SIP) is the most prominent signaling scheme for controlling, establishing, maintaining and terminating communications on the Internet. Many researchers are working to create strong protocols for secure communication using SIP. Tu et al. proposed an improved authentication protocol for session initiation protocol. They show that their scheme can resist a number of security attacks. However, we find that their protocol suffers from inefficient login phase, inefficient password update phase, impersonation attack and unable to keep the user anonymity. To make all these types of attacks ineffective, we present a very efficient scheme for SIP. Security investigation of the proposed scheme shows that our scheme can make all the shortcomings of Tu et al.s scheme as ineffective.
    Keywords: session initiation protocol; elliptic curve cryptography; impersonation attack; inefficient login phase; user anonymity.

  • Establishing Security of Bitcoins Using Elliptic-curve Cryptography Based Protocol   Order a copy of this article
    by Dilbag Singh 
    Abstract: It is undeniable that the growth of the computer and network security is repeatedly increased since the past 40 years. In 1985-1986 encryption was applied as a primary technique for providing security. Network security technology includes authentication and authorization, data encryption, access control, security auditing. \r\nBitcoin is presently one of the most popular cryptocurrencies. The phenomenon of Bitcoin crypto-currencies is based on the public key cryptography and peer to peer network. In the Bitcoin, blockchain is used for storage of the transaction which is also called the public ledger. Digital Money or Bitcoin are used in a day to day activities, some of which are illicit and illegal. In this paper the main area is Security i.e. the main focus here is to protect Bitcoin systems from unauthorized access and from various threats using an appropriate scheme (Elliptic-curve cryptography (ECC)) protocol.\r\n
    Keywords: Bitcoin; Blockchain; cryptography; Network Security; Cryptocurrency; Automated Validation of Internet Security Protocols and Applications; AVISPA; Elliptic-curve cryptography.

  • Implementation of Symbol Timing Recovery for Estimation of Clock Skew   Order a copy of this article
    by Muhammad Usman Hashmi, Muntazir Hussain, Fahad Bin Muslim, Kashif Inayat, Seong Oun Hwang 
    Abstract: Time synchronization in any distributed network can be achieved by using application layer protocols for time correction. Time synchronization method proposed in this article uses symbol timing recovery at the physical layer to correct application layer clock. This cross layer methodology diminishes the quantity of message trades needed by application layer for time synchronization thus resulting in energy saving. Precision of skew estimate can be increased by using multiple message exchanges. Examination of the cross layer strategy including the simulation results, the experimentation outcomes and mathematical analysis demonstrates that clock skew at physical layer is same as of application layer, which is actually the skew of hardware clock within the node.
    Keywords: Time synchronization; Symbol timing recovery; Energy constrained distributed networks; Energy efficient clock skew estimation; Frequency offset estimation; Sensor networks; Bayesian estimation.

  • A Location-aware Routing Protocol with Adaptive Transmission Angle Management in Mobile Overlay Cognitive Ad-hoc Networks   Order a copy of this article
    by Hyukchun Oh, Kyusung Shim, Beongku An 
    Abstract: Mobile cognitive ad-hoc networks is considered as one of the promising networking solutions for future mobile networks since the licensed spectrum can share the licensed user and unlicensed user. In this paper, we propose a location-aware routing protocol, called LRP, to enhance the spectrum efficiency in mobile overlay cognitive ad-hoc network and provide a solution to reduce the control overhead by using the adaptive transmission angle management. The main contributions of this paper can be summarized as follows. First, we propose a location-aware routing protocol, called LRP, to improve the spectrum efficiency for mobile overlay cognitive ad-hoc networks. More specifically, the proposed routing protocol can establish a route by avoiding the coverage of primary users (PUs). Second, the proposed routing protocol select the next node that is the nearest node from the center line between a source node and a destination node. Thus, the proposed routing protocol can transmit the data packet stably. Third, we propose an adaptive transmission angle management that takes into account the previous session' route state in order to reduce the amount of control packet in the considered networks. From the numerical results, the proposed routing protocol and adaptive transmission angle management efficiently support the network performances such as the packet delivery ratio, control overhead, and delay by using OPNET.
    Keywords: location-aware routing protocol; adaptive angle management; overlay cognitive radio; mobile ad-hoc networks.

  • Energy-efficient Load-balanced RPL routing protocol for Internet of Things (IoTs) Networks   Order a copy of this article
    by Ali Kadhum Idrees, Athraa J.H. Witwit 
    Abstract: This article proposed energy-efficient load-balanced RPL (EL-RPL) routing protocol for IoTs networks. In this protocol, a parent selection algorithm is proposed. It selects parent in parent list to be the next hop node toward destination node in networks based on an objective function that combines between the highest remaining energy and the total number of received packets by the parent. This can balance the load on all parents in the parents list. Besides, the EL-RPL protocol improves DODAG construction by preventing DIO packets transmission to the nodes with the lower ranks. This will lead to save energy and hence enhance the networks lifetime. Many experiments were performed using the OMNeT++ network simulator to evaluate the efficiency of EL-RPL routing protocol. In comparison with some existing protocol, the results ensure that the proposed EL-RPL protocol can efficiently save energy, decrease the control packets, and improve the lifetime of the IoTs networks.
    Keywords: internet of things; IoT; RPL routing protocol; network lifetime optimisation; energy load balancing; ELB; performance evaluation.
    DOI: 10.1504/IJITST.2020.10030144
     
  • Utilizing AHP and PROMETHEE for evaluating the performance of online services   Order a copy of this article
    by Abeer Ghareeb, Nagy Darwish, Hesham Hefny 
    Abstract: Limited usage of online services by citizens is one of the main obstacles to the success of e-government projects. Most of the previous studies have focussed on identification of the main significant factors affecting adoption of online services by using statistical methods for hypotheses tests. However, there is a need to go a further step and propose methodologies to examine to what extent such identified adoption factors are practically achieved. This turns the adoption process of online services to be a multi-criteria decision making problem which make it more practical for handling. Therefore, this paper aims to propose a methodology to evaluate the performance of online services utilizing two of the most well-known and extensively used multi-criteria decision making methods. It uses the hierarchy structure of AHP while using ranking procedure of PROMETHEE. The proposed methodology has been applied to evaluate the performance of a sample of 24 services available on the Egyptian national portal. Each service has been analysed against nine acceptance criteria covering application and service aspects. It is found that 46% of the evaluated services tend to be performing quite reasonably.
    Keywords: Multi-criteria analysis; E-government; online services; Citizen Requirements; PROMETHEE; AHP.

  • Energy Efficient Cross Layer Time Synchronization in Cognitive Radio Networks   Order a copy of this article
    by Syed Muhammad Usman Hashmi, Muntazir Hussain, Syed Muhammad Nashit Arshad, Kashif Inayat, Seong Oun Hwang 
    Abstract: Time synchronization is a vital concern for any Cognitive RadiornNetwork (CRN) to perform dynamic spectrum management. Each CognitivernRadio (CR) node has to be environment aware and self adaptive and must havernthe ability to switch between multiple modulation schemes and frequencies.rnAchieving same notion of time within these CR nodes is essential to fulfillrnthe requirements for simultaneous quiet periods for spectrum sensing. Current application layer time synchronization protocols require multiple timestamp exchanges to estimate skew between the clocks of CRN nodes. The proposed symbol timing recovery method already estimates the skew of hardware clock at the physical layer and use it for skew correction of application layer clock of each node. The heart of application layer clock is the hardware clock and hence application layer clock skew will be same as of physical layer and can be corrected from symbol timing recovery process. So one timestamp is enough to synchronize two CRN nodes. This conserves the energy utilized by application layer protocol and makes a CRN energy efficient and can achieve time synchronization in short span.
    Keywords: time synchronization; cognitive radio; clock correction; symbolrntiming recovery.

  • Automated Analysis of Blood Vessel Permeability Using Deep Learning   Order a copy of this article
    by Yoojin Chung, Hyunwoo Kim 
    Abstract: The paper presented a deep learning-based approach that automatically detects changes in the blood vessel network permeability. In-vitro construction of perfusable blood vessel networks that mimic skin vasculature has been developed to test sensitivity to various chemical used in cosmetics industry. Because chemicals can affect the permeability of the vessels, it is important to characterize and quantify the changes to blood vessels accurately from time-lapse microscope images. Objective and quantitative comparisons are needed so that chemical safety can be compared with respect to composition and concentration. In this paper, we constructed an optimized model using CNN (Convolution Neural Network) to automatically detect changes such as permeability and shape in blood vessel network after exposing the vessels to chemicals. Fluorescently labeled dextran dye was filled outside the vessels while applying the chemicals from outside, through a membrane-like material that simulate the skin. Fluorescence time-lapse images were taken to measure the infiltration of fluorescent dye into the blood vessels as the vessel walls were damaged by the chemicals. The number of data was increased to use them as CNN data by applying diverse augmentation methods to 2,800 original images. To use images as CNN data, each image should be labeled as to whether there is any change in the blood vessel in the image and it not only takes much time for a human to put a label on each of the numerous images but also is impossible to carry out this work with consistency. In this paper, we also devised a method of automatically labeling images as to whether there is any change in the blood vessel to obtain learning data for CNN by pre-treating images using diverse image processing methods and separately establishing thresholds for different images. To verify the performance of the developed CNN, we used 4-fold cross validation and blood vessel changes were automatically detected with an accuracy of 92.07 % in the experiment.
    Keywords: Blood Vessel Network; Automated Recognition; Microfluidic Culture Platform; CNN; Blood Vessel Permeability.

  • Intelligent Intrusion Detection System Using Log Cluster Decision Tree Detection Mitigation in Complex Event Processing   Order a copy of this article
    by Sandosh S, Govindasamy V, Akila V 
    Abstract: The world of technology largely engages on the networks that provide the vast amount of data for the user all around the world. The networks can be of different domains that includes education, market or even defense. Hence the network has to be secure against any attacks that lead to intrusion. For securing the networks, several intrusion detection systems (IDS) are developed, however the possibility of intrusion remains in the networks. In the current work, we propose the novel Intelligent IDS with Log Cluster Decision Tree Detection Mitigation (IIDS-LCDTDM) technique in Complex Event Processing environment, an extension of our previous work. The novel system comprises of three major algorithms as Attribute Greedy Stepwise Selection, two-mean-log cluster along with tree detection and mitigation algorithm. The gure6percent dataset is used to evaluate the proposed algorithm for various performance metrics using Java/J2EE software. From the evaluation result, the proposed system provided the accuracy of 99.987%, which was better than our previous model with 99.9463%.
    Keywords: Intrusion Detection System; Complex Event Processing; IIDS-LCDTDM; Performance metrics.

  • Providing a model based on Poisson distribution for malware propagation assessment in Peer-to-Peer networks   Order a copy of this article
    by Shadi Haghi, Mahdi MollaMotalebi 
    Abstract: The use of peer-to-peer networks has increased dramatically in recent years in applications infrastructure such as file sharing, gaming, instant messaging and content distribution. These networks suffered from the problem of large-scale incompatibilities, which was organized by the super peer to overcome this problem. This structure has a two-layer architecture in which some nodes with more resources (higher bandwidth, higher processing power) are considered as super peers. Each super peer has a number of regular nodes (or regular members). On the other hand, it has attracted the attention of malware makers, especially worms, because they can easily be replicated and propagated in such a way. So far, several models have been presented to assess the behaviour of worm propagation in peer-to-peer network, but there has not been any effective review of how the worm propagates in super-peer networks. Hence, providing an effective model for expressing the propagation of a worm to identify its dangers and providing new solutions for detecting and confronting it in super peers networks is necessary. This paper presents a framework for modelling the connectivity of the super-peer network and then examines the behaviour of active worm propagation based on epidemic models on this framework. The results of the simulation of worm propagation behaviour in super-peer networks in comparison with the way they propagate in peer-to-peer network indicate that the worm propagate more rapidly in super-peer networks. Also, the results of the implementation indicate that the model presented in this study has achieved a significant improvement in reducing the rate of propagation of worms compared to previous work.
    Keywords: Super-peer network; flat peer-to-peer network; Malware; Active worm; Modelling worm propagation behaviour.

  • Discovering Social Bots on Twitter: A Thematic Review   Order a copy of this article
    by Rosario Gilmary, Akila Venkatesan, Govindasamy Vaiyapuri 
    Abstract: The onset of online social networks (OSN) like Twitter became a predominant platform for social expression and public relations. Twitter had 330 million monthly active users by the year 2019. With the gain in popularity, the ratio of virulent and automated accounts has also increased. It is estimated that 48 million of its functioning accounts are bots, indeed. Precisely, Twitter bots or Sybil accounts are kinds of automated web robot software that regulate activities like the tweet, retweet, like or follow via Twitter API. These bots misguide and delude genuine users by spreading spurious content. Hence, uncovering malicious bots from authentic users is obligatory to ensure a safe environment on Twitter. In this paper, the nature of Twitter bots and features of bot detection are discussed with their efficiency. Various bot detection approaches are classified based on the attributes and techniques used. Strong and weak aspects of distinct features and techniques are discussed. Key challenges and future research directions in detecting social bots are also presented. Special reference has been emphasized to contemporary emerging trends.
    Keywords: social media; twitter; OSN security; online social networks security; social bots; categorization; suspicious behaviour detections; bot detection techniques.

  • A Review on Secrecy Performance of Cooperative Relay Network With Diversity   Order a copy of this article
    by Khyati Chopra 
    Abstract: In the past few years, there has been a rapid increase in demand on transmitting data over the open wireless medium. Severe issues of information security and privacy thus arise, as the wireless transmissions may be intercepted by any unintended receiver in the network. There is a need to design the transmission system in an efficacious way, such that the available space and time can be used adequately. This becomes a challenging job as there are random variations in the channel quality due to deleterious effects of the multi-path fading. Hence, to improve the transmission reliability, coverage probability and throughput, relay aided communication draw in great attention from both academia and industry. Relays provide the advantage of cooperative diversity, where the directly transmitted signal and the relayed signal can be combined at the receiver using various diversity combining schemes to mitigate the fading effect. In this paper, we review the secrecy performance of dual-hop cooperative relay system with diversity reception and relay selection. The significance and secrecy effect of channel knowledge at the transmitter is also studied. We have corroborated that CSI knowledge at the transmitter can improve secrecy
    Keywords: Decode-forward relay; Secrecy outage probability; Channel state information; Cooperative communication; Diversity combining.

  • A hybrid blockchain proposal to improve Valued Added Tax (VAT) recovery   Order a copy of this article
    by Christophe GAIE 
    Abstract: In the present article, we propose a novel hybrid blockchain approach to improve VAT recovery, meeting privacy requirements as introduced by the European General Data Protection Regulation. Indeed, the existing blockchain systems rely on distributed decision making using different cryptocurrencies whose transparency is a real improvement to prevent tax fraud: if each node of the system which keeps an informatic track of every transaction, it will not be possible to hide cash transactions. However ensuring the transparency and security of transactions requires a tremendous amount of energy. Therefore, the idea proposed in this paper is to introduce an authority with a limited action in order to take advantage of the decentralized advantages of cryptocurrencies while reducing their energy consumption.
    Keywords: Data Analytics; Fraud Detection; Tax Recovery; Telecommunications; Blockchain; Privacy Protection.

  • Efficient way in sharing of IoT data and uses of Blockchain in Auditing the storage data   Order a copy of this article
    by Ackley Joseph Lyimo, Kakelli Anil Kumar 
    Abstract: Today the need for technology in various aspects of life has risen abruptly, hence leading to the expansion of the Internet of Things (IoT), but when it comes to IoT data, there is a myriad of issues regarding controlling and auditing it. A lack of measures taken for security can also make IoT vulnerable to a number of threats. To better maintain and minimize these threats, using Blockchain can play a significant role by auditing and recording all actions that occur while collecting the data and storing the same in the cloud. Due to the nature of consensus methods in a Blockchain system, we introduced the uses of the Interplanetary File System wherein the data collected will be stored in them and a hash value will be retrieved which will be sent to the Blockchain and recorded. In this paper we introduced better Blockchain-based design for IoT which can show the distributed control of how IoT data is collected, recorded for auditing and stored. Through this system we succeeded in achieving secure sharing of IoT data and proper utilization of cloud storage resources.
    Keywords: Blockchain; Internet of Things (IoT); Interplanetary File systems (IPFS).

  • Efficient and secured information transfer for congestion avoidance and collision detection in vehicular ad hoc networks (V2V) methodology   Order a copy of this article
    by Jaya Subalakshmi Ramamoorthi, Arun Kumar Sangaiah 
    Abstract: Vehicular ad hoc networks (VANET) connects the vehicle and the infrastructure in solving various issues on the travel path. In this paper, a multi-hop routing protocol is established to transfer the information among vehicles when the infrastructure is out of range from the source and provides warning system on congestion level. This increases the efficiency and reduces the cost of establishing the infrastructure mechanism at various points. The timely reporting at the infrastructure for decision making is the key concern and it has been addressed in this proposed concept. In addition, a payload format is proposed with the essential parameters such as position status, speed, heading, vehicle identification number, date etc. This gives the complete information about the vehicle thereby updating the database for future reference. Simulations of route path, message transfer frequency and time frame distribution is done with NS-2.
    Keywords: vehicle to vehicle; communication; multi-hop; payload; congestion; collision detection; NS-2.
    DOI: 10.1504/IJITST.2020.10029372
     
  • New hybrid framework to detect phishing web pages, based on rules and variant selection of features   Order a copy of this article
    by Youness Mourtaji, Mohammed Bouhorma, Daniyal Alghazzawi 
    Abstract: Phishing phenomena are increasing day after day due to its simplicity to use; it is enough for hackers to clone legitimate website and send it by e-mail to victims to access it within the use of social engineering techniques to lure them and gain their confidence. Hackers use the lack of knowledge of regular users when surfing on the internet and understanding the role of uniform resource locator (URL) of a web page. This fact let hackers create malicious forms of URLs, like very long ones or containing some suspicious characters. Despite cloning web pages, hackers can inject malicious codes into this web page for nefarious uses, so detecting or preventing this kind of web pages is the objective of this paper. We present a new hybrid framework to identify phishing web pages based on different ways and methodologies for features extraction techniques using only the URL as the main entry and without having any visual experience before, also we use hybrid analysis to be complete and accurate.
    Keywords: malicious web page; hybrid analysis; machine learning; network security intelligence.
    DOI: 10.1504/IJITST.2020.10022920
     
  • Parallel visible light communication system using video camera and LED for communicating and indoor positioning   Order a copy of this article
    by Sadeq Moradzadeh, Gholamreza Abaeiani, Amir Hooshang Mazinan, Mojtaba Alizadeh 
    Abstract: Visible light communication (VLC) is a desirable indoor communication system to transfer data using visible light. In this paper, visible light communication system using LED and video camera is considered as a transmitter and receiver for communicating and positioning, respectively. A new method is proposed for indoor positioning by the help of statistics and image processing tools. Furthermore, the proposed method is utilised based on neural networks and in variant moments in order to find and follow new location of the transmitter. The effectiveness of the proposed method is evaluated and proved by conducting experiments.
    Keywords: visible light communication; VLC; neural networks invariant moments; indoor positioning; LED.
    DOI: 10.1504/IJITST.2020.10029373
     

Special Issue on: Internet Technologies and Business Systems Cases from the Gulf Cooperation Council

  • Factors Influencing Bitcoin Investment Intention: The case of Oman   Order a copy of this article
    by Abdelghani Echchabi, Mohammed Mispah Said Omar, Abdullah Mohammed Ayedh 
    Abstract: The current study examines the factors that might increase the investment in Bitcoin among Muslim communities. Oman is selected as a setting for this study due to the rapid progress in the Islamic finance and investment areas that the country has witnessed though ventured in this field relatively late compared to other countries. The study used a survey questionnaire to collect data for a sample of 200 respondents. Subsequently, the collected data was analysed using structural equation modelling (SEM) as well as basic descriptive statistics and one sample t-test. The findings revealed that the respondents perceive themselves to have sufficient awareness and knowledge of the Bitcoin concept and benefits, as well as the techniques used to manage a Bitcoin account. In addition, the findings revealed that factors such as perceived ease of use, compatibility, awareness and facilitating conditions have a significant impact on Omani communities intention to invest in Bitcoin.
    Keywords: systems and technology; cryptocurrency; Bitcoin; Oman; structural equation modelling; SEM; internet; security.
    DOI: 10.1504/IJITST.2020.10030071
     

Special Issue on: NISS2018 Mobile Networks and Information Systems Security

  • Assessing node mobility impact on routing performances in MANETs   Order a copy of this article
    by Younes Ben Chigra, Abderrahim Ghadi, Mohamed Bouhorma 
    Abstract: Mobile ad hoc network (MANET) plays a major role in enabling data communication in infrastructures-less areas. Network performance relies on the capacity of mobile nodes to process data packet and deliver it to the right destination at lower cost. Since nodes are free to move toward random destination, data delivery from a source to a destination might be disturbed due to frequent topology changes. Hence, mobility in mobile ad hoc network represents the main issue that should be addressed carefully while designing routing protocols. The purpose of this paper is to study the impact of node mobility on the performance of well-known routing protocols such as destination-sequenced distance vector (DSDV), dynamic source routing (DSR) and ad-hoc on demand distance vector (AODV). We assessed the efficiency of each protocol under high mobility environment using various values of speed and pause. Performance assessment is based on the conventional metrics such as latency, throughput, packet delivery ratio (PDR) and routing overhead. Moreover, we introduced two new metrics called path change factor (PCF) and route repair influence (RRI) for accuracy purpose. The study demonstrates that AODV has better performances in high mobility environment.
    Keywords: mobile ad hoc networks; MANET; routing protocols; mobility; QoS; NS2; metrics.
    DOI: 10.1504/IJITST.2020.10029368
     
  • A scatter search algorithm to configure service function chaining   Order a copy of this article
    by Adel Bouridah, Hacene Belhadef 
    Abstract: Network functions virtualisation (NFV) emerges to deal with the challenges of reducing both the capital expenses (CAPEX) and operational expenses (OPEX) of cloud providers. The NFV is done by implementing network functions and providing them as software commodities. Network services are provided by chaining a set of network functions together. The key problem will be how and where network functions should be placed in the network and how traffic is routed through them. This is the well-known service function chaining problem and it is known to be NP-hard so exhaustive search algorithms have no significant benefit in large-scale context. This paper proposes a scatter search-based solution to configure service function chain. The aim is to produce the optimal number and placement of the required virtual network functions with the dynamic traffic steering over them. This is done while respecting computing and network resources constraints.
    Keywords: network function virtualisation; NFV; service function chaining; SFC; scatter search.
    DOI: 10.1504/IJITST.2020.10029369
     
  • Enhancing multipath routing using an efficient multicriteria sorting technique   Order a copy of this article
    by Layla Aziz, Said Raghay, Hanane Aznaoui 
    Abstract: Saving energy in MANET represents a critical issue due to its material architecture. This paper aims to improve ad-hoc on-demand multipath distance vector routing (AOMDV) using multicriteria analysis method. In order to construct effective disjoints paths, our approach focuses on sorting the different available paths considering several important criteria. Our objective is improving the network performances and routing stability using an efficient multicriteria method called Electre Tri. The use of this technique enhances data reach ability and minimises the required delay during packets forwarding. The proposed approach is evaluated comparatively to well known routing protocols considering various metrics. Simulation results prove that our approach improves significantly the network lifetime and the transmission delay.
    Keywords: AOMDV; MANET; multicriteria analysis; multipath routing; Electre Tri.
    DOI: 10.1504/IJITST.2020.10029370
     
  • Towards an agent-based framework for urban traffic congestion management   Order a copy of this article
    by Sara Berrouk, Abdelaziz El Fazziki, Zakaria Boucetta 
    Abstract: This paper introduces an integrated solution to the road congestion problem by modelling the road network, using real-time traffic data and drivers' parameters to compute the proposed congestion index for each road segment and generating recommendations to avoid the most congested trajectories. The proposed framework combines the benefits of the multi-agent systems, traffic data from static sensors and big data tools in order to optimise the traffic flow in urban areas. The congestion indexes are used in the road network generation which is represented by a weighted graph. The edges' costs are computed based on the congestion indexes and the edge's properties and vary when new traffic records are retrieved. In this study, the Hadoop framework is used in the data gathering and analysis along with an improved version of Dijkstra for the least congested path finding which allows the proposed framework to reach a higher level of performance.
    Keywords: big data; Dijkstra; Hadoop MapReduce; multi-agent systems; road network modelling; traffic congestion; route recommendations.
    DOI: 10.1504/IJITST.2020.10029371
     

Special Issue on: Machine Learning Algorithms for the Era of Integrated Internet of Things and Mobile Edge Computing

  • An early prevention method for node failure in wireless sensor networks   Order a copy of this article
    by S. Siva Rama Krishnan, Arunkumar Thangavelu 
    Abstract: Wireless sensor networks are used to monitor physical or environmental conditions such as temperature and pressure as well as to study the quality of certain environmental and natural entities like air and water bodies by collecting data about the various components present in the air/water at a given spot and time. But the complete data generated by the nodes in each iteration is not always useful, as most of them give the redundant information or details which does not provide any essential information, just bulge up the amount of data being transmitted. Therefore, this paper aims to formulate an early prevention method (EPM) which not only gives a way to detect failed nodes, but also increases the overall efficiency of the network by reducing the overhead at the sink.
    Keywords: node failure; data aggregation; node efficiency; node life span; network overhead; bucketing; recommendation routing; network accuracy; wireless sensor network.
    DOI: 10.1504/IJITST.2020.10029362
     
  • Hybrid machine learning model for healthcare monitoring systems   Order a copy of this article
    by M.K. Nallakaruppan, U. Senthil Kumaran 
    Abstract: The human life is facing a daunting task to handle the physical ailments. The late diagnosis of many diseases leads to serious complications on the human health. The lack of medical awareness is the primary cause of the lack of diagnosis and treatment which allows the disease grows easily. The prescribe work provides a solution to physically challenged or elderly people through web-based remote health monitoring facilities. The system collects the data, classifies them, apply the machine learning algorithms to ensure the data integrity. The reports are then generated and supplied to doctors for further examination of the patient record for taking medical decisions. We form a hybrid cluster of machine learning algorithms to ensure the increased accuracy and reduced error rate on the patient data measurement.
    Keywords: support vector machine; SVM; body area network; BAN; internet of things; IoT; global system for mobile communication; GSM; wireless sensor networks; WSN; general packet radio services; GPRS.
    DOI: 10.1504/IJITST.2020.10029361
     
  • Performance evaluation of ICI self-cancellation schemes in fractional wavelet-based OFDM system   Order a copy of this article
    by R. Ayeswarya, N. Amutha Prabha 
    Abstract: The widely used multi carrier modulation technique in the current wireless scenario is orthogonal frequency division multiplexing (OFDM). It is severely affected by frequency offsets and leads to inter carrier interference (ICI). Fractional wavelet transforms (FrWT)-based OFDM model is proposed to mitigate the effect of ICI by its orthogonal fractional wavelets. The performance of FrWT involved OFDM model is comparatively analysed through various mapping schemes of ICI self-cancellation in order to mitigate frequency offsets. This system overcomes the drawback of ICI self-cancellation and shows improved bandwidth efficiency without any cyclic prefix. Simulation results are carried out for the proposed model and compared with exiting Fourier transform and wavelet transform-based OFDM system. The analysis is performed for a range of normalised frequency offsets values. The proposed model performance is tested with various mapping schemes against a frequency offset of 0.05. It is proved that FrWT-based OFDM with ICI self-cancellation gives reduced bit error rate (BER) of 10–5 at 8 dB signal to noise ratio (SNR). From various graphs, it states that weighted conjugated transformation results in effective mitigation of ICI with BER achievement of 10-4.4 at frequency offset of 0.1.
    Keywords: bit error rate; BER; frequency offsets; fast Fourier transform; FFT; fractional wavelet transforms; FrWT; ICI self-cancellation; orthogonal frequency division multiplexing; OFDM.
    DOI: 10.1504/IJITST.2020.10029363
     
  • Survey of methodologies for quantifying software reliability   Order a copy of this article
    by Ganesh Viswanathan, J. Prabhu 
    Abstract: An important problem that arises in the testing of software programs is that given piece of source code is reliable or not. Software reliability is an important segment of software quality. So software reliability must be quantified. Quantification refers to measurement. A number of software metrics and statistical reliability models have emerged during the past four decades but no model can solve the issue. In this paper, we conduct a survey on various software reliability metrics and models.
    Keywords: software reliability; software reliability metrics; software reliability assessment; survey of software reliability quantification.
    DOI: 10.1504/IJITST.2020.10029364
     
  • Prevention of rushing attack in MANET using threshold-based approach   Order a copy of this article
    by S. Sankara Narayanan, G. Murugaboopathi 
    Abstract: Mobile ad hoc networks are a collection of mobile nodes that works without the centralised infrastructure. Every mobile node not only acts as host, it also works as router to forward packets that are received from neighbour nodes. Mobile ad hoc networks are useful in military environments, automated battlefields, emergency, rescue operations, disaster recovery, educational, home and entertainment applications. Here data must be routed via intermediate nodes. Rushing attack is one of the network layer attacks in MANET. In this attack, when the attacker node receives the route request packet, it immediately forwards the route request packet to its neighbours without processing the packet. Threshold-based approach is used to detect rushing attack in MANET. Proposed method provides better packet delivery ratio and throughput in presence of rushing attacker. Simulation results show that our modified DSR protocol performs better compared to secure DSR algorithm.
    Keywords: rushing attack; MANET; modified dynamic source routing; MDSR.
    DOI: 10.1504/IJITST.2020.10021950
     
  • A queuing theory model for e-health cloud applications   Order a copy of this article
    by M. Sathish Kumar, M. Iyappa Raja 
    Abstract: A healthcare application plays a significant role in people's healthier life in recent times. Cloud computing is an ease technology that provides resources to users on demand. In high-performance computing, cloud has been outgrew technology for providing its services to e-health applications by pay-as-you-go model. Workload management for e-health applications in the cloud is one of the major areas to focus on to achieve availability in e-health cloud. To manage the workload, elasticity is the key characteristics where the workloads are scaled up and down on demand. This can be achieved by effectively allocating and de-allocating virtual machines (VM). Henceforth VM allocation and de-allocation are the major issues in e-health cloud. In this paper, a Markovian-based queueing model is presented to manage the elasticity of an e-health cloud. There are two conditions were analysed in which 'virtual machine is failed' and the 'virtual machine can be recovered' and 'cannot be recovered'. The proposed model helps to improve the virtual machine scaling without changing the type of machine.
    Keywords: healthcare; e-health; cloud; queuing; Markov.
    DOI: 10.1504/IJITST.2020.10029365
     
  • EC(DH)2: an effective secured data storage mechanism for cloud based IoT applications using elliptic curve and Diffie-Hellman   Order a copy of this article
    by Balasubramanian Prabhu Kavin, Sannasi Ganapathy 
    Abstract: In the rapid growth of cloud computing with internet of things (IoT) technology utilisation in this fast world, security is an essential issue in cloud data storage and access the encrypted data. In the past, several researchers have worked on data storage mechanisms and came up with different ideas to fulfil the cloud user's expectation. Even though, they have failed to provide the sufficient security on cloud. For providing better security over the cloud, we propose a new elliptic curve and Diffie-Hellman based data storage mechanism called EC(DH)2. Here, the standard Diffie-Hellman algorithm is used twice as DH2 and it is combined with the standard elliptic curve cryptographic algorithm for performing secured storage in cloud based IoT applications. The experiments have been conducted by using the various sizes of documents and files for evaluating the proposed EC(DH)2 algorithm and is proven that it provides better protection and increased key size.
    Keywords: cloud computing; Diffie-Hellman; DH; security; elliptic curve cryptography; ECC; internet of things; IoT; data storage.
    DOI: 10.1504/IJITST.2020.10029366
     
  • Automated intelligent public lighting system   Order a copy of this article
    by Sudha Senthilkumar, K. Brindha, Amlan Jena 
    Abstract: Intelligent street lighting refers to public street lighting that adapts to movement by pedestrians, cyclists and cars. This type of lighting is different from traditional, stationary illumination, or dimmable street lighting that dims at predetermined times. Intelligent street lighting, also referred to as adaptive street lighting, dims when no activity is detected, but brightens when movement is detected. Apart from that in this model of intelligent street lighting the lights will be configured to interact with each other to inform further lights to turn on or off when activity is detected near them. This ensures that people always walk in well-lit areas but area where activity is not detected remains dark thus saving energy. The lights will also be fitted with sensors to detect available sunlight initially and only come into action when required instead of predetermined times, it will also have access to a web API that provides average sunrise and sunset times in the region to save energy by reducing usage of the sensor itself.
    Keywords: GSM model; sensor light; IoT; microcontroller.
    DOI: 10.1504/IJITST.2020.10029367
     

Special Issue on: ICGHIT 2019 Green and Human Information Technology

  • QoS Assurance for PON-Based Fronthaul and Backhaul Systems of 5G Cloud Radio Access Networks   Order a copy of this article
    by Muhammad Waqar, Ajung Kim 
    Abstract: The envisioned fifth generation (5G) of cellular networks is expected to provide high bandwidths and strict quality of service (QoS) to billions of smart devices at affordable budgets. The newly proposed fronthaul and backhaul (FB) segments in the C-RANs (cloud-radio access networks) be leveraging solutions to satisfy the 5G demands, but the rigorous one-way delay and packet delay variations (PDVs) requirements of fronthaul networks that can only be satisfied through the high capacity optical links increase the cost and thus, fronthaul segment becomes a bottleneck in the C-RANs. Time division multiplexing (TDM) based passive optical networks (PONs) can be a promising candidate to carry the fronthaul traffic, but the TDM-PON systems have limitations to meet the fronthaul QoS requirements due to unavoidable delays at the switching nodes. Moreover, the unification of FB traffics over the same segment is vital for fully exploit the cost benefits of the C-RANs, but due to the poor performance of the PON systems for fronthaul traffic, the backhaul traffic could not be forwarded through the same fronthaul segments. Therefore, in this paper, we propose and implemented the strict priority and frame preemption based buffering schemes to transport the FB packet flows simultaneously at tolerable delays and PDVs. The simulation result verifies that the considered schemes significantly improved the performance of the PON systems to comply with the QoS requirements of the 5G fronthaul and backhaul traffics in the C-RANs.
    Keywords: backhaul; buffering; C-RANs; frame preemption; fronthaul; strict priority; 5G networks.

Special Issue on: Effective Management of Internet of Things Breaches

  • Security and Detection Mechanism in IoT based Cloud Computing using Hybrid Approach   Order a copy of this article
    by Megha Vashishtha, Pradeep Chouksey, Dharmendra Singh Rajput, Somula Ramasubbareddy, Praveen Kumar Reddy M, Thippa Reddy G, Harshita Patel 
    Abstract: This paper presented a secure environment of IoT based cloud computing. This approach used and enhanced Rivest Cipher (RC6) method along with blowfish algorithm. The combination of RSA and RC4 is accepted for the generation of Key to get the superior security method, on image, Blowfish algorithm is applied. In this method, initially cloud provider registers the cloud user which authenticates the user, then text and image data can be uploaded in the existing four servers. The uploaded data can be viewed directly by the self-verified account without any constraint, but if those files are demanded by the other cloud users then data classification encryption standard have been applied. The textual data is practiced with the enhanced RC6 method with key processing method of RC4 and RSA algorithm. These keys are used for the data decryption from the further side. The TA gives the information of the mismatch in the last prefix of the combination of the user detail and the data. If it does not match then the data will be corrupted by the blocker algorithm and no useful information has been visualized and any type of contravention is traced at the admin side and the cloud user both. The whole parametric comparison implies that the performance of our framework is better in comparison to the traditional techniques.
    Keywords: Cloud Computing; IOT; Rivest Cipher (RC6); RSA; RC4; Blowfish;.

  • An evolutionary-based technique to characterize anomaly in Internet of Things networks   Order a copy of this article
    by Alok Kumar Shukla, Sanjeev Pippal, Deepak Singh, Somula Ramasubbareddy 
    Abstract: Internet of Things (IoT) can connect devices embedded in various systems to the internet. Distributed denial-of-service (DDoS) attacks on the Internet of Things are position a serious threat to any networks. A distributed denial-of-service attack is a malicious attempt to interrupt normal traffic of a victim system, service or enterprises by formidable the victim or its nearby infrastructure with Internet traffic overflow. Towards defending DoS attacks the significant number of mechanisms in recent years have introduced for building intrusion detection system (IDS) such as evolutionary algorithm and artificial intelligence. Unfortunately, the modern well-known DDoS attack detection strategies have been failed to rationalize the objective as fast and early detection of DDoS attack. In order to understand different DDoS attacks activities, in this paper, Teaching Learning-based Optimization (TLBO) with learning algorithm is integrated to mitigate denial of service attacks. The approach is based on building an intrusion detection system to the requirements of the monitored environment, called TLBOIDS. Furthermore, TLBOIDS selects the most relevant features from original IDS dataset which can help to distinguish typical low-rate DDoS attacks with the use classifiers namely support vector machine, decision tree, na
    Keywords: Evolutionary Algorithm; Intrusion Detection; Denial-of-Service; IoT.

  • Robust and Provable Secure Three-Factor Mutual Authentication Scheme using Smart Card   Order a copy of this article
    by Niranchana R, Amutha Prabakar Muniyandi 
    Abstract: The best solution to perform remote authentication verification is offered by the authentication scheme that opts smart card. Such schemes are developed by using the combination of password and biometric identity. Biometric based authentication schemes provide the most prominent security, when compared to the alternative schemes available for authentication. In this paper, a provable secure three-factor authentication scheme that makes use of smart card is been proposed. This authentication scheme is developed based on fundamental assumption of Discreate Logarithm Problem and Modular Exponentiation. The formal and informal security analysis for the proposed scheme shows that the authentication scheme is more secure. The efficiency of this scheme is calculated based the performance analysis for both computational and communication cost. It shows that the proposed authentication scheme is performing well, when compared to the related authentication schemes.
    Keywords: Smart Card; Authentication; Modular exponentiation; Bio-metric identification; formal security.

  • An Improved Security Approach for Attack Detection and Mitigation Over IoT Networks using HACABO & Merkle Signatures   Order a copy of this article
    by Phalguna Krishna ES, Arunkumar T 
    Abstract: IoT is an agglomeration of heterogeneous technologies and interconnected devices that are autonomous and self configurable .Its constrained resources characteristic has made it more vulnerable to harmful attacks and tend to data loss and resource exhaustion due to wireless architecture of IoT. Handling security attacks, more particularly DDoS attack is one of the key challenges in IoT environment. This paper focuses on detection and prevention mechanism of IoT attacks. For that, an attack detection mechanism with Hybrid Ant Colony African Buffalo Optimization and hash-based Merkle signature-prevention mechanism is proposed. The paper also introduces Economic DoS (E-DoS) shield mechanism using CloudWatch to prevent high rate DDoS attacks since the conventional approaches cannot prevent it. Also, the efficiency of the developed model is compared with recent works.
    Keywords: IoT; Denial of Service; E-DoS; IoT Attacks; Attack detection; Attack Prevention; Merkle signature.

  • Digital application of analog-like time perception mechanism based on Analog on Digital (AoD) theory   Order a copy of this article
    by Ziran Fan, Takayuki Fujimoto 
    Abstract: This paper analyzes the human time perception mechanism regarding the use of analog clocks based on the design theory of Analog on Digital (AoD Theory). With the examination, the authors would propose the method to apply the design elements of analog clock into the digital devices such as smart watches and smartphones to the schedule management. The proposed application represents the reality of time passing that is originally provided by analog clocks. The interface design adopts the time representation of analog clocks into the schedule display so that it can intuitively indicates the lapse of time passing for each activity scheduled in a day. Moreover, we design the users operational experience close to that of analog tools by realizing the real feel of using clocks through the representation of the spring-driven system on digital style.
    Keywords: interface design; time perception; smartphone; smart watch; information media; media design.

  • An Upgraded Model of Query Expansion Using Inverse- Term Frequency (ITF) With pertinent Response For Internet of Things   Order a copy of this article
    by Surbhi Sharma, Abhishek Kumar, Rashmi Agrawal 
    Abstract: The IOT plays an important role for recent internet access-based task to future internet and information retrieval is a field which is relate our study to the Structure, examination, association, accumulation, looking, and recovery of data. Data recovery has turned into a significant field of study and research under software engineering because of complex development of data accessible as full message, hypertext, authoritative content, catalog, numeric or bibliographic content. The research work is going on different parts of data recovery frameworks in order to improve its proficiency and unwavering quality. The target of this paper is to search the query development strategy utilizing reverse term recurrence to improve the proficiency and exactness of the data recovery framework and this accuracy in query processing leads to most recent trusted digitizing trend IOT. As the technique for assessment of query development, we will expel irrelevant, excess and uncertain words from the recovered report dependent on client query. In proposed work, we present another technique for Query Expansion (QE) which depends on inverse term recurrence with importance criticism. Getting the top regenerated records use as in importance criticism for extra QE terms and developing applicant terms. Procedure of scoring strategy appoints score to one of a kind terms and applying Inverse term frequency (ITF) to deliver the rank reduce of terms. These terms will channel through semantic activity and reweighting produce refreshed (extended) question which will again send to look through apparatus.
    Keywords: Inverse-term frequency; Query Expansion; Precision; KLD-mean; Semantic similarity; term-pooling; IOT.

  • An Architecture for Enabling IoT interoperability between cross-platforms   Order a copy of this article
    by Venkateswara Raju, Manjula R. Bharamagoudra 
    Abstract: The Internet of Things (IoT) continues to evolve and more and more IoT platforms provide access to things. However, IoTs ability lies in the development of cross-domain IoT ecosystems in these platforms, offering new, unexpected applications and value-added services. We have identified two key perspectives critical to the development of an IoT ecosystem: (i) Enable interoperability between platform development and cross- platform implementation of applications on Internet platforms; (ii) Market (or Trade Centre) to exchange and adapt IoT resources. Given these two important perspectives of an IoT ecosystem, this article introduces the BIG (Bridging the Interoperability Gap) IoT architecture as the basis for the creation of IoT ecosystems. Architecture responds to key needs that have been evaluated by industry and research associations as a key aspect of the BIG IoT project. We present a proof of the application of the concept in the context of a smart healthcare scenario. We adopted the generic RESTful Application Programming Interface (API) methodology to detect & interact the smart object platforms.
    Keywords: Internet of Things( IoT); Interoperability; Architecture; Marketplace (or)Trade centre; Healthcare; Applications; Services.

  • An Effective Cloud Based Smart Home Appliances Automation in IoT using PHMM Model   Order a copy of this article
    by M.R. Sundarakumar, S. Sanakr, S.R.S. Reddy 
    Abstract: Internet of Technology (IoT) is an emerging and innovative approach to control the home appliances remotely. A trillion of devices are connected to the Internet that are controlled and monitored in real-world applications. The main goal is to provide the automation for home appliances using IoT. Wireless Sensor Networks (WSN) based home automation systems are very difficult to manage the devices using a centralized approach due to the mobility. To solve this issue, Wireless Home Automation System (WHAS) is proposed, which uses the Predictive Hidden Morkov Model (PHMM) to control the devices efficiently and conserves the energy utilization among the devices. The status of the devices are monitored continuously and selecting the device operation either in manual mode or automatic mode using the PHMM model. The proposed approach conserves more energy than traditional methods.
    Keywords: Wireless Home Automation Systems (WHAS); Internet of Things (IoT); Web of Things (WoT).