{"title":"Statistical cryptanalysis of seven classical lightweight ciphers","authors":"Runa Chatterjee, Rajdeep Chakraborty","doi":"10.1007/s41870-024-02175-4","DOIUrl":"https://doi.org/10.1007/s41870-024-02175-4","url":null,"abstract":"<p>The smart world currently employs smart devices that are inextricably linked with everyday life. These smart devices are lightweight due to their small size, low memory capacity, low-power batteries, and limited computational capability.Conventional cryptographic algorithms aren’t applicable there. This demand leads to the development of lightweight cryptography (LWC). In various literature surveys, many researchers analysed lightweight ciphers in terms of area, throughput, latency, power consumption, energy dissipation, encryption-decryption time, etc. However, no single paper includes a variety of statistical cryptanalysis of LWCs. Such a type of bit-level data analysis checks the vulnerabilities of algorithms against different kinds of attacks. It ensures the difficulties of cryptanalysis. This paper has included seven classical lightweight ciphers PRESENT, SIMON, TEA, SPECK, CLEFIA, MICKEY2.0, and GRAIN V1, for statistical data analysis. The analysis includes non-homogeneity, avalanche ratio, entropy, floating frequency, frequency distribution, auto-correlation, periodicity, 4-gram pattern analysis.Moreover, four randomness like frequency, serial, run, and poker tests are also added. Finally, a comparative and compact discussion has made on ciphers’ efficiency. This study makes a trade-off, which proves the uniqueness of this work. It opens a new window for the upcoming researchers to search their work area.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sunil Kumar K N, Pavan P. Kashyap, Darshan A. Bhyratae, Suhas A. Bhyratae, A. Kalaivani
{"title":"CNN-BO-LSTM: an ensemble framework for prognosis of liver cancer","authors":"Sunil Kumar K N, Pavan P. Kashyap, Darshan A. Bhyratae, Suhas A. Bhyratae, A. Kalaivani","doi":"10.1007/s41870-024-02190-5","DOIUrl":"https://doi.org/10.1007/s41870-024-02190-5","url":null,"abstract":"<p>Computer-assisted diagnosis (CAD) is preferred for cancer identification across the globe, which relies on computerized image processing. The creation of previous CAD instruments involved a semi-automated approach that employed traditional deep learning techniques. Such techniques are not well versed with CAD instruments in terms of accuracy. Therefore, the given manuscript presents a convolutional neural network normalized architecture embedded with Bayesian optimization and long short-term memory (CNN-BO-LSTM) for the identification of liver cancer. Early pre-processing is done on the input magnetic resonance imaging (MRI) scan images to improve clarity. Next, we used dynamic binary classification to apply the accurate and region of interest (ROI) extracting approach. It is followed by automatic retrieval of CNN-based appearances from the ROI approach. For classification purposes, LSTM is used, which categorizes the images as benign or malignant. The proposed design’s testing outcomes, which combine characteristics with CNN-based ROI extraction and LSTM classification, surpassed the current state-of-the-art techniques.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"99 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive grouped balanced binary tree based multi user secure data transmission on cloud","authors":"P. Pavithra, B. Hariharan","doi":"10.1007/s41870-024-02165-6","DOIUrl":"https://doi.org/10.1007/s41870-024-02165-6","url":null,"abstract":"<p>Secure multi-keyword search for outsourced cloud data has gained popularity, especially for scenarios involving multiple data owners. This work proposes a method for secure multi-keyword searches across encrypted cloud data from various owners, utilizing an administrator or trustworthy third party for key management. The approach employs the TF-IDF model and Vector Space Model (VSM) to generate index and query vectors, and uses an advanced Attribute-Based Encryption (ABE) algorithm for data privacy. The Improved Dingo Optimization Algorithm (IDOA) optimally selects the key value. Encrypted emails are sent to a cloud server, and a Grouped Balanced Binary (GBB) tree structure is used for index construction. The Greedy Depth-First Search (GDFS) method efficiently searches the index, grouping relevant documents to exclude unnecessary ones. Performance is evaluated based on memory usage, execution time, encryption and decryption times, and search times, implemented in Java and tested on a cloud simulator.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RAMD and transient analysis of a juice clarification unit in sugar plants","authors":"Kanak Saini, Monika Saini, Ashish Kumar, Dinesh Kumar Saini","doi":"10.1007/s41870-024-02147-8","DOIUrl":"https://doi.org/10.1007/s41870-024-02147-8","url":null,"abstract":"<p>The main objective of present work is to analyse the reliability measures of a juice clarification unit in sugar plants under the concepts of various redundancy polices. The juice clarification unit (JCU) is a complex system having eight subsystems configured according to various redundancies internally. It is assumed that all the associated random variables follow exponential distribution. The Markov birth–death process and basic reliability arguments are used to derive Reliability, Availability, Maintainability, and Dependability (RAMD) measures as well as Runge–Kutta forth order is used to derive transient solution. The numerical results for reliability, availability, maintainability, Mean Time Between Failure (MTBF), Mean Time to Repair (MTTR), and dependability are derived to identify the most sensitive component. The system attains transient availability 0.995881 at 5-time units. To highlight the importance of the study numerical results of transient availability are derived by making 10% and 50% variation in failure and repair rates. The derived numerical results of the proposed model draw significant insights that can be directly used in the design and maintenance process of juice clarification unit. It will improve the plant efficiency. It will give designers a solid plan to use resources intelligently and make strategies that make juice clarification unit live to work better.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Ubaidullah Bokhari, Abeer Masroor, Basil Hanafi
{"title":"Securing data transmission channels between smart devices and the cloud using homomorphic encryption for blood pressure monitoring sensors","authors":"Mohammad Ubaidullah Bokhari, Abeer Masroor, Basil Hanafi","doi":"10.1007/s41870-024-02195-0","DOIUrl":"https://doi.org/10.1007/s41870-024-02195-0","url":null,"abstract":"<p>Ensuring the secure transmission of data between smart devices and the cloud is paramount in the context of Blood Pressure Monitoring Sensors. In the realm of “Securing Data Transmission Channel between Smart Devices and Cloud using Homomorphic Encryption for Blood Pressure” “Monitoring sensors play a crucial role in various applications.” The incorporation of homomorphic encryption is considered essential to guarantee the privacy and security of health data. In smart cities, where mobile healthcare networks play a vital role, concerns arise over the transmission of sensitive health information to untrusted cloud servers. Our focus lies in the development of a specialized architecture explicitly designed for the unique requirements of Blood Pressure Monitoring Sensors. Within this paper, a concise yet comprehensive framework, for mobile healthcare networks is outlined, emphasizing three secure medical calculations encompassing tasks such as computing average heart rate detecting long QT syndrome, and performing Chi-square tests are integral aspects of healthcare. Through this methodology, a distinctive and innovative solution is provided, tailored specifically to the challenges of securing data transmission channels for Blood Pressure Monitoring Sensors.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of ultra-wideband Sziklai pair based LNAs for wireless communication applications","authors":"Syed Shamroz Arshad, Geetika Srivastava, SachchidaNand Shukla","doi":"10.1007/s41870-024-02188-z","DOIUrl":"https://doi.org/10.1007/s41870-024-02188-z","url":null,"abstract":"<p>Noise figure (NF) and linearity at higher frequencies are challenging tasks in Low Noise Amplifiers (LNAs) design. The existing LNAs impose limits on these parameters resulting in enhanced NF. In this paper, two ultra-wide band (UWB) small signal Sziklai pair based LNAs are proposed with improved linearity and minimum NF for high frequency wireless communication. Theses LNAs use NMOS Sziklai and PMOS Sziklai pairs as amplifying components with bandwidth boosting arrangement in common source mode. The simulation results indicate that NMOS LNA exhibits bandwidth of 580.554 GHz with noise figure of 1.66 dB at 63.09 GHz, whereas PMOS LNA shows bandwidth of 299.956 GHz, with noise figure of 11.71 dB at 283.09 GHz, at 180 nm CMOS technology. Furthermore, NMOS and PMOS LNAs show high linearity with input 1 dB compression point (P1dB) of 0.883 dBm and 0.822 dBm while input third order intercept point (IIP3) are 10.22 dBm and 6.72 dBm respectively. Compared to CMOS LNA, bulk CMOS LNA, GaAs pHEMT LNA, and SiGe BiCMOS LNA, the proposed LNAs significantly improve power gain, bandwidth, noise figure, linearity, and area. To further expand the bandwidth, three stage broadband distributed amplifiers (DAs) are also configured using the designed LNAs which measures the bandwidth of 0–7.5 GHz and 10,000–800,000 THz. The performance of these LNAs is verified through designing D-band microwave tuneable second order band reject filter (BRF) which exhibits ultra-wide band (UWB) of 110.362 GHz, notch depth of 10.3 GHz while consuming DC power of 68.32 pW at a supply voltage of ± 3 V.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting the undetectable: GAN-based strategies for network intrusion detection","authors":"Ruchi Bhatt, Gaurav Indra","doi":"10.1007/s41870-024-02172-7","DOIUrl":"https://doi.org/10.1007/s41870-024-02172-7","url":null,"abstract":"<p>This study addresses the challenge of enhancing network security by proposing a novel intrusion detection system using Generative Adversarial Networks. Traditional intrusion detection system often fail to keep up with rapidly evolving cyber threats. Our approach integrates Generative Adversarial Networks to dynamically learn and adapt to both genuine and adversarial network traffic patterns. Using the KDD Cup 1999 dataset for validation, we design a sophisticated Generative Adversarial Network architecture with a generator and discriminator to improve the resilience of intrusion detection system. Our experimental results demonstrate the model’s effectiveness, evaluated through metrics such as F1 score, accuracy, precision, and recall. This research advances the state-of-the-art in cybersecurity by showcasing the potential of Generative Adversarial Networks to fortify intrusion detection system against evolving threats, underscoring the necessity for adaptive defense mechanisms in modern network security.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"113 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Muthubalaji, Vijaykumar Kamble, Vaishali Kuralkar, Tushar Waghmare, T. Jayakumar
{"title":"An innovative muted ant colony optimization (MAPO) controlling for grid PV system","authors":"S. Muthubalaji, Vijaykumar Kamble, Vaishali Kuralkar, Tushar Waghmare, T. Jayakumar","doi":"10.1007/s41870-024-02178-1","DOIUrl":"https://doi.org/10.1007/s41870-024-02178-1","url":null,"abstract":"<p>Reducing the power quality problems and regulating the output DC voltage are considered as the essential problems need to be addressed for ensuring the increased performance of grid-PV systems. Different converter topologies and controlling strategies have been developed for this purpose in conventional works, but they are constrained by the major issues of increased computation complexity, high output error, harmonic distortions, and decreased voltage gain. Hence, this research work objects to develop a novel Mutated Ant Province Optimization (MAPO) algorithm incorporated with the modified SEPIC DC-DC converter techniques for solving the regulating the output voltage with reduced harmonics. In order to maximize the power output from the solar PV systems, the Perturb & Observe (P&O) Maximum Peak Point Tracking (MPPT) controlling technique is developed. Subsequently, the photovoltaic (PV) output voltage exhibits a stochastic behavior, necessitating effective regulation to enhance the output gain. The modified SEPIC DC-DC converter is employed for this specific objective, since it effectively adjusts the output voltage with minimized harmonics. However, the performance of the converter is solely dependent on the controller, as it generates controlling signals by optimally selecting parameters. Also, the switching components used in the converter circuit are operated based on the controlling signals. During simulations, Various measurements are used to validate and compare the effectiveness of the suggested converter and controlling mechanisms.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing VANET communication using squid game optimization based energy aware clustering approach","authors":"R. Rajakumar, T. Suresh, K. Sekar","doi":"10.1007/s41870-024-02176-3","DOIUrl":"https://doi.org/10.1007/s41870-024-02176-3","url":null,"abstract":"<p>Vehicular Ad-Hoc Networks (VANETs) are studied wireless networks that enable communication among vehicles and roadside infrastructure. The role a vital play in improving on-road safety, efficacy, and convenience by enabling real-time data interchange for controlling traffic, infotainment services, and collision avoidance. Energy efficiency in VANETs is vital because of the restricted power resources of vehicles. Methods like clustering, vehicles are categorized into groups to decrease communication overhead, and meta-heuristic approaches that optimize network performance by intelligent problem-solving approaches are deployed to exploit energy efficiency while preserving network reliability and responsiveness. These methodologies contribute to the effective implementation of VANETs, ensuring sustainable and dependable communication in dynamic vehicular environments. In this study, a new Squid Game Optimization based Energy Aware Clustering Approach (SGO-EACA) technique for VANET is introduced. The goal of the SGO-EACA technique is to optimally choose the cluster heads (CHs) and produce clusters in the VANET in such a way as to realize energy efficiency. In the SGO-EACA technique, the concept of typical Korean sport is used where the attackers try to achieve their goal, but players try to eliminate each other. Moreover, the SGO-EACA approach derives a fitness function (FF) containing multiple metrics such as Residual Energy (RE), Trust Level, Degree Difference, Total Energy consumption, Distance to Base Station (DBS), and Mobility. The simulation values exposed that the SGO-EACA approach surpassed earlier state-of-the-art approaches with respect to various aspects.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced agricultural supply chain management: integrating blockchain and young’s double-slit experiment for enhanced security","authors":"Esakki Muthu Santhanam, Kartheeban kamatchi","doi":"10.1007/s41870-024-02180-7","DOIUrl":"https://doi.org/10.1007/s41870-024-02180-7","url":null,"abstract":"<p>In the agricultural supply and food, chain Ensuring product safety is important which includes monitoring the effective logistics management and advancements of agricultural products. An effective model that guarantees sufficient safety of the product is required because many issues have been raised regarding contamination risks and food safety. Thus, an efficacious model is introduced in this article referred to as Blockchain Based-Crossover Young’s double-slit (BC-CYD) algorithm, which enables securing agriculture-based data in supply chain management. The developed approach successfully executes the transactions in the traceability and tracking of products with high-level security for the agricultural supply chain. The developed method utilizes an authentication process in provenance tracking and product information storage. The developed BC-CYD method improves safety and efficiency by obtaining higher security, reliability, and integrity. Here, product transactions are stored in the blockchain ledger, thereby, the developed model offers high-level traceability and transparency in a capable manner in the supply chain management. The effectiveness of the proposed BC-CYD method is assayed, where evaluation parameters quantify the efficiency of the developed BC-CYD method. Based on the performance rates of Precision, ROC, accuracy, and Processing time, the developed BC-CYD method’s effectiveness is ascertained as higher. The suggested BC-CYD method yields a greater precision of 97.4% and its accuracy is 98.8% with lower processing time and training time.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}