Forthcoming and Online First Articles

International Journal of Security and Networks

International Journal of Security and Networks (IJSN)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Security and Networks (6 papers in press)

Regular Issues

  • Security in Smart Home Environment: Issues, Challenges, and Countermeasures - A Survey   Order a copy of this article
    by Redhwan Saad, Khaled Al Soufy, Samir Shaheen 
    Abstract: The accelerated spread of the IoT and rapid development of modern communication networks and technologies have connected the physical world with computational elements in the Smart Home environment. The smart home is based on IoT technology which facilitates device observing in order to increase the availability of various tools for securing home automation. Thus, it has been used as a feature of the future wireless sensor network to be able to operate without human intervention. However, it's vulnerable to vulnerabilities and security threats. Due to interconnected, heterogeneous, and dynamic nature of the smart home, challenges related to security, authentication, and confidentiality are created. In this paper attacks on the security of smart homes are investigated to assess their impact on the security of the system as a whole. The technologies and security solutions in such environment are also identified. Therefore, current security measures are discussed to counter such security attacks.
    Keywords: Internet of Things; malware; Security attacks; and Smart Home.

  • Research on system safety in the case of component failure based on degree correlation   Order a copy of this article
    by Wuchao Shi 
    Abstract: Nowadays, complex systems play an irreplaceable role in life, network security reflects a series of network controllability problems. In this paper, we focus on the topological characteristics of the network, starting from the degree correlation of the network, and studying the controllability of the network for different network types. For different network data sets, we adopt different security strategies to protect the network. Experiments show that the network controllability of different data sets under different security strategies is very different. Neutral networks and networks with the same configuration have little difference in the performance of each node in the face of network attacks; in the face of network attacks with heterogeneous networks, the security protection strategy of the central node can maintain network security to the greatest extent. Through different security strategies to achieve network controllability, the greatest possible realization of system security.
    Keywords: Network controllability; topological characteristics; degree correlation; security strategies.

  • MB-CIM: A Multi-round Budgeted Competitive Influence Maximization   Order a copy of this article
    by Nadia Niknami, Jie Wu 
    Abstract: Maximizing influence spread through a social network has attracted significant research interest recently Influence maximization is trying to select a small set of seed users in the social network to maximize the spread of influence CIM addresses the competition where multiple competing sources propagate in the same network. Competitors need to decide which nodes in the given social network would be an influential one and how many resources should be allocated to the potential social network member so that identifying the best algorithm for the influence maximization under budget constraint has become a demanding task. We are interested in multi-round CIM where each competitor needs to decide the location and the amount of budget to invest in the most influential members simultaneously and repeatedly under a given total budget. This paper proposes a tree-approximate game-theoretical framework and introduces the new measurement as a dynamic node weight.
    Keywords: budget allocation; game theory; reinforcement learning; social networks; multi-round influence maximization.
    DOI: 10.1504/IJSN.2022.10046054
  • A Slice-Based Encryption Scheme for IPFS   Order a copy of this article
    by Changsong Zhou, Guozi Sun, Xuan You, Yu Gu 
    Abstract: The interplanetary file system (IPFS) has been used more and more widely because of its advantages of smooth integration with the current blockchain platform and its advantages as a distributed file system. However, the authors found that IPFS has some privacy issues that it cannot completely avoid unauthorised access to data by malicious nodes. In response to this problem, the authors propose a lightweight encryption scheme based on the characteristics of IPFS file slicing combined with AES256 and SHA256, which can be smoothly integrated into IPFS. During the upload process, this scheme encrypts some sliced file blocks according to the strategy formulated by the user. During the download process, the encrypted block is identified and decrypted according to a special encryption method. Through this scheme, the system can increase file security without affecting the performance of IPFS itself and retain the deduplication effect of IPFS to the utmost extent.
    Keywords: advanced encryption standard; AES; SHA256; blockchain; distributed storage; security; Merkle DAG; interplanetary file system; IPFS; slice.
    DOI: 10.1504/IJSN.2022.10047182
  • An Ex-convict Recognition Method Based on Text Mining   Order a copy of this article
    by Mingyue Qiu, Xueying Zhang, Xingmeng Wang 
    Abstract: Currently, a large proportion of existing cases in the grassroots public security organisations were committed by ex-convicts. Grassroots police officers cannot directly and rapidly judge whether a suspect is an ex-convict who has committed a case. To solve this problem, an attempt is made to analyse the case report data in a branch bureau in 2021 through data mining. Using the brief case texts in the case report data as the data source, different models based on various algorithms were established to judge whether the ex-convict committed the case. Next, using different algorithms, the ex-convict in the database was ascertained based on the similarity degree results. Finally, the similarity results (the highest similarity reached 94.8) using different methods were calculated, added, and ranked in descending order to submit an ex-convict list to the grassroots police officers for further artificial judgement. Accordingly, grassroots police officers can conduct rapid recognition of ex-convicts when a case is reported. The present model is tested well in the actual applications in the local police stations, suggesting that the model can provide overwhelming support in the daily work of police stations, and with the mutual cooperation and gradual promotion among the police stations, large amounts of human and material resources can finally be saved.
    Keywords: natural language processing; text mining; similarity analysis; recognition of people with previous conviction.
    DOI: 10.1504/IJSN.2022.10049089
  • Privacy Preserving Dynamic Data Release Based on Non-synonymous Diverse Anatomy   Order a copy of this article
    by Yan Yan, Eyeleko Anselme Herman, Adnan Mahmood, Sun Zichao, Dong Zhuoyue, Xu Fei 
    Abstract: The publishing and using of big data brought unprecedented convenience to users. However, it also results in the disclosure of personal privacy information. In order to mitigate the privacy leakage risk of sensitive information during dynamic data updating, this paper envisages a non-synonymous diverse anatomy method for the privacy preserving dynamic data publishing. The envisaged method inherits the advantages of the traditional anatomy method, retains the availability of the original data to the greatest extent, and avoids the loss of information caused by the generalisation process. A series of indicators are designed to evaluate the synonymous linkage between non-numerical sensitive values. A novel grouping mechanism is further proposed to achieve l-diversity anatomy by combining the concept of synonymous linkage and synonymous entropy with the dynamic update procedure. Experimental analysis suggests that the envisaged method can provide better privacy protection effect on the published data.
    Keywords: privacy protection; data publishing; anatomy; synonymous attack; l-diversity; dynamic data update.
    DOI: 10.1504/IJSN.2022.10051234