{"title":"IoT Structure based Supervisor and Enquired the Greenhouse Parameters","authors":"Abduljaleel Al- Hasnawi, L. Abdul-Rahaim, Hassan Muwafaq Gheni, Zahraa Emad Fadel","doi":"10.58346/jisis.2024.i1.009","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.009","url":null,"abstract":"The world on the beginning of a new period of regeneration and developing with the increase of Internet and also Internet of Thing (IoT) in the market commercial application. where a new revolution can be made by characterizing its important. The rapprochement of the universal system and the power of sophisticated calculating, sensing with low cost and add create of communication supported by the Internet. In this paper, the green house system is consisting of two sections they are the software and hardware sections. Hardware has three types of sensors for natural environment measuring and gateway (router). Software consists of monitoring and controlling sub system, and IoT cloud, vb.Net software is used to write the programs codes for the proposed system. The environmental parameters of the greenhouse are continuously recorded by various sensors, and the collected data is displayed on a customized website. The system software has the ability to monitor and control the green house environment variables like humidity, temperature and water level on the greenhouse. Thus, the greenhouse can be monitored and controlling from anywhere and at any time. The fundamental aims of this paper have been achieved with the help of all systems parts. The green house environment has been displayed using the IoT cloud and the control is done over the internet connection. The system is implemented in practices. The system result gives an accurate indication that the system is reliable and work completely.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"51 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Nonredundant SVD-based Precoding Matrix for Blind Channel Estimation in CP-OFDM Systems Over Channels with Memory","authors":"Osamah Al-Qadhi, L. Abdul-Rahaim","doi":"10.58346/jisis.2024.i1.018","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.018","url":null,"abstract":"In this paper, we investigate blind channel estimation in cyclic, prefixed orthogonal frequency division multiplexing (OFDM) systems using precoding matrices. Many studies show how the performance of bit error rate (BER) and mean square error of channel estimation are impacted by using a circulant matrix as a precoding matrix. We investigate a new structure for the precoding matrix in which the first row is generated by an exponentially decreasing equation along with the Toeplitz function and deploying singular value decomposition (SVD) to generate the final precoder matrix. This type of SVD-based precoding matrix has been presented and simulated under various circumstances. The resulting precoding matrix is employed in two different OFDM systems to estimate the channel frequency response vector up to scalar ambiguity. The proof of the precoding matrix full rank property is presented, along with other criteria that help with the development of various precoding matrices.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"31 38","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Onno W. Purbo, Prasetyo Purnomo, Dimaz Arno Prasetio, Agung Budi Prasetio, Dr. Tubagus Asep Nurdin
{"title":"Identifying Large Young Hacker Concentration in Indonesia","authors":"Onno W. Purbo, Prasetyo Purnomo, Dimaz Arno Prasetio, Agung Budi Prasetio, Dr. Tubagus Asep Nurdin","doi":"10.58346/jisis.2024.i1.004","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.004","url":null,"abstract":"An Indonesian 2023 Capture the Flag competition for 18-year-olds is looked at for the first time. It engaged a diverse participant profile, encompassing high school students and the general public from various regions. Java Island saw the most participation, especially in East Java, with little interest from Jakarta's youth, possibly due to the abundance of distractions. Despite varied educational backgrounds, vocational institutes, notably in East Java, featured prominently. Gender diversity was limited, with no female participants progressing to the final stage. Analysis of problem categories indicated diverse performance, highlighting challenges in digital signature, online hacking, network analysis, and database assault. Normalization emphasized problems within high school students' capabilities, suggesting the integration of cybersecurity education into curricula. Finalists predominantly hail from Central and East Java, indicating a regional concentration. Younger, non-Javanese participants underscored passion's role in success. Successful profiles revealed independent skill acquisition through online platforms, especially John Hammond's YouTube channel, emphasizing the need for accessible cybersecurity education resources. The study advocates prioritizing ICT education, particularly in networking, online hacking, OSINT, and cryptography, to enhance high school CTF participation and performance. The findings showcase the significance of passion-driven, self-directed learning in fostering ethical hacking skills among Indonesian youth.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"29 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samer H. Atawneh, Ziad Alshammari, Mousa AL- Akhras, Bayan Abu Shawar
{"title":"A Security Framework for Addressing Privacy Issues in the Zoom Conference System","authors":"Samer H. Atawneh, Ziad Alshammari, Mousa AL- Akhras, Bayan Abu Shawar","doi":"10.58346/jisis.2024.i1.016","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.016","url":null,"abstract":"The COVID-19 pandemic had a significant impact on many facets of human behavior. Most significantly, it required significant changes to how daily activities were conducted. The majority of individuals were forced to work and communicate from home due to social distancing, which opened the door for more virtual meetings. Since most organizations started allowing their employees to work from home, the majority of online meeting platforms—like Zoom and Microsoft Teams—have become more and more popular. Online meetings were not only used by businesses but also by educational institutes to carry out online learning, hospitals to conduct meetings and certain surgeries, and many other industries. The online meetings are practical and simple to organize, but their information security is not as high as that of conventional meetings. Security and privacy issues resulted from this. The safety of personal information such as names, contacts, and locations, the security of online recordings since sensitive information was discussed in most meetings, the security of data while it was in transit, and the potential for competitors to intercept your business were among the many security issues that were raised. Zoom, as one of the famous online conference systems, faced many global concerns, such as sharing private information with third parties, exposing users to unauthorized bullying calls, and adopting questionable end-to-end encryption processes. Additionally, companies have had virtual meetings hacked, leading to privacy issues since hackers can obtain data illegally. Therefore, this research proposes a security framework to address the privacy issues in the Zoom system by applying a set of governance and technical controls. The governance controls provide a strategic view of how an organization controls its security while implementing the technical controls avoids privacy issues in online conference systems. The proposed framework implements a set of technical controls such as encryption, auditing, authentication, and role-based access control. The results were promising and significantly addressed Zoom's privacy issues.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"16 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Effect of Information and Communication Technology (ICT) on Trade in Services in the United States","authors":"Myeongjoo Kang","doi":"10.58346/jisis.2024.i1.017","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.017","url":null,"abstract":"The pandemic of COVID-19 appears to boost trade in services and even the ICT service exports in the U.S. The U.S. has been recognized as the world's largest services market and became a leading exporter and importer of services over the last two decades. In this perspective, this study attempts to empirically identify the impact of ICT on trade in services and ICT service exports in the U.S. by employing the modified gravity model of trade from 1990 to 2021. The results indicate that overall ICT access and ICT use have significant positive effects on the trade in services and ICT service exports, but others brought about different results. The study also finds two important facts. First, FTS has a positive effect on the trade in services and ICT services exports, while, MCS has a completely negative effect on both the trade in services and ICT services exports. More interestingly, the dimension of ICT use of IUI and FBS have a different impact on both trade in services and ICT services exports. Another important finding is that the coefficients of IUI and FBS in relation to the trade in services have an unexpected negative sign, while both IUI and FBS have a positive influence on ICT service exports. Finally, these empirical results imply that ICT use has played a more productive role in enhancing ICT service exports than that of ICT access in the U.S. Consequently, these results might provide vital policy insights for the development of ICT and more rapid growth of services trade.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"34 43","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Elman Deep Learning Model for Intrusion Detection System in Internet of Things","authors":"G. Parimala, R. Kayalvizhi","doi":"10.58346/jisis.2024.i1.008","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.008","url":null,"abstract":"Many researchers have developed intrusion detection systems in the past using conventional techniques such as artificial neural networks, fuzzy clustering, evolutionary algorithms, association rule mining, and support vector machines. However, in terms of false negative rates and detection rates, these methods did not yield the best outcomes. To address these problems, we proposed a hybrid deep learning model (HDLM) based on intrusion detection and prevention in IoT devices. Initially, the data are collected from KDDCup-99 and NSL-KDD datasets. Then, the important features are extracted from the dataset using the Forward Feature Selection Algorithm (FFSA). Finally, the extracted features are given to the HDLM classifier. The proposed HDLM is a combination of Elman Recurrent Neural Network (ERNN) and Subtraction-Average-Based Optimizer (SABO). The performance of the suggested method is assessed using performance metrics including precision, recall, accuracy, sensitivity, specificity, and F_Measure. The experimental results show that the proposed method attained the maximum intrusion detection accuracy of 98.52%.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"22 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combination of Alphanumeric Password and Graphic Authentication for Cyber Security","authors":"Joseph Teguh Santoso, Budi Raharjo, Agus Wibowo","doi":"10.58346/jisis.2024.i1.002","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.002","url":null,"abstract":"The main objective of this research is to create a more secure and user-friendly password-generation method that is less vulnerable to attacks such as shoulder surfing. Similarly, while textual or alphanumeric passwords are not entirely secure, they also come with certain limitations, including issues related to memory. The novelty of this research is the development of a new algorithm (Secure Password Algorithm/SPA) for password generation that uses graphics to generate textual input from users based on user perceptions. This method is more resilient against attacks like shoulder surfing and offers a more secure and user-friendly way of creating passwords. This research uses a combination of literature review and SPA proposals to create passwords with graphical and encryption techniques. The literature review examines the weaknesses of existing graphical and text password methods. The proposed algorithm focuses on user perception and confidential data to create more secure and easy-to-use passwords. The research results show that this research can provide a new, more secure, and user-friendly method of generating passwords such as shoulder surfing. Research supports software implementation of these algorithms and psychometric, psychological, and psychiatric studies to improve user input and protect systems from malicious attacks. Graphical passwords provide better recall compared to textual passwords, and the proposed algorithm for password generation using graphical and encryption techniques provides a more secure and user-friendly method of password generation that is less vulnerable to attacks such as shoulder surfing. The proposed new encryption algorithm has succeeded in overcoming various potential weaknesses and attacks on previous encryption methods. The test results demonstrate the efficiency and near invulnerability of the SPA algorithm against brute force attacks on specific security parameters. Tested alongside AES, shows comparable security levels, particularly in resource-constrained environments. To address doubts, the paper establishes evaluation standards for computational complexity, resistance to known attacks, and adaptability to evolving threats. The algorithm has the potential to be a stronger and more secure solution for generating passwords to safeguard confidential user information.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"36 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138601528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ChatGPT and Cybersecurity: Risk Knocking the Door","authors":"Muawia. A. Elsadig","doi":"10.58346/jisis.2024.i1.001","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.001","url":null,"abstract":"Numerous advancements in natural language processing (NLP) have been made possible by the development of artificial intelligence (AI). In particular, the recent large growth in this field has been attributed to the development of sophisticated conversational AI systems such as ChatGPT. Since ChatGPT was released in November 2022, its outstanding features and capabilities have amazed millions of users. However, there is an increasing concern about its capacity to further the objectives of bad actors. In particular, ChatGPT provides new opportunities for hackers to compromise cybersecurity. This article provides a thorough investigation and discussion of how ChatGPT can significantly support hackers in committing various attacks. This investigation covers the recent state-of- the-art in research work that conducted on this context. In addition, some responses of the ChatGPT regarding its positive and negative impacts on cybersecurity were evaluated and discussed. The article concluded that ChatGPT has significantly supported hacking behaviors and can be exploited to spread malicious activities. Therefore, continuous development and enforcement of appropriate standards to prevent negative effects are required. To achieve this, policymakers and developers should work together, considering public user concerns and the misuse of this promising tool. Finally, this article provides thoughtful discussions and recommendations that can contribute to improving IA-based systems.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"12 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138603625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sindhusaranya B., Yamini R., Manimekalai Dr.M.A.P., Geetha Dr.K.
{"title":"Federated Learning and Blockchain-Enabled Privacy-Preserving Healthcare 5.0 System: A Comprehensive Approach to Fraud Prevention and Security in IoMT","authors":"Sindhusaranya B., Yamini R., Manimekalai Dr.M.A.P., Geetha Dr.K.","doi":"10.58346/jisis.2023.i4.014","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.014","url":null,"abstract":"The proliferation of Internet and Communication Technologies (ICTs) has ushered in a period often referred to as Industry 5.0. The subsequent development is accompanied by the healthcare industry coining Healthcare 5.0. Healthcare 5.0 incorporates the Internet of Things (IoT), enabling medical imaging technologies to facilitate early diagnosis of diseases and enhance the quality of healthcare facilities' service. Nevertheless, the healthcare sector is currently experiencing a delay in adopting Artificial Intelligence (AI) and big data technologies compared to other sectors under the umbrella of Industry 5.0. This delay may be attributed to the prevailing concerns about data privacy within the healthcare domain. In recent times, there has been a noticeable increase in the use of Machine Learning (ML) enabled adaptive Internet of Medical Things (IoMT) systems with different technologies for medical applications. ML is an essential component of the IoMT system, as it optimizes the trade-off between delay and energy consumption. The issue of data fraud in classical learning models inside the distributed IoMT system for medical applications remains a significant research challenge in practical settings. This paper proposes Federated Learning and Blockchain-Enabled Privacy-Preserving (FL-BEPP) for Fraud Prevention and Security (FPS) in the IoMT framework. The system incorporates numerous dynamic strategies. This research examines the medical applications that exhibit hard constraints, such as deadlines, and soft constraints, such as resource consumption, when executed on distributed fog and cloud nodes. The primary objective of FL-BEPP is to effectively detect and safeguard the confidentiality and integrity of data across many tiers, including local fog nodes and faraway clouds. This is achieved by minimizing power use and delay while simultaneously meeting the time constraints associated with healthcare workloads.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"64 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138606397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mi-ju Kim, Yu-bin Go, So-yeon Choi, Nam-sun Kim, Cheol-hee Yoon, Wonhyung Park
{"title":"A Study on the Analysis of Law Violation Data for the Creation of Autonomous Vehicle Traffic Flow Evaluation Indicators","authors":"Mi-ju Kim, Yu-bin Go, So-yeon Choi, Nam-sun Kim, Cheol-hee Yoon, Wonhyung Park","doi":"10.58346/jisis.2023.i4.013","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.013","url":null,"abstract":"The study analyzes the reason for the steady increase in the number of traffic accidents in Yongin City, Gyeonggi-do, despite the improvement of Korea's traffic accident system and the decrease in the number of traffic accidents. Seven years of traffic accident data is collected to analyze major legal violations and accident risks and to derive accident-prone areas and road risk indices through QGIS mapping. Based on this analysis, it identifies the causes of accidents in multiple accident areas, proposes improvement measures like the installation of a median strip and an unmanned traffic control device near a crosswalk, and emphasizes the significance of driver awareness and safety education. The aim of the study is to analyze road risk factors and suggest improvement measures to prevent traffic accidents, with the goal of improving the traffic situation in Yongin city.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"124 42","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138606849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}