{"title":"An improved deep autoencoder-based network intrusion detection system with enhanced performance","authors":"Bidyapati Thiyam, Shouvik Dey","doi":"10.1504/ijitst.2023.10056364","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10056364","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Employment contract and wage payment using blockchain and smart contract","authors":"Eugene Rhee","doi":"10.1504/ijitst.2023.127387","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127387","url":null,"abstract":"Employment contracts recorded on blockchain have the strength to make it impossible to falsify or modify the agreements between employers and employees. The fact is that the work input through the application remains on the blockchain, and the manager shares it, which is expected to significantly improve the disadvantaged position of part-time workers. As a way to recognise and solve recent problems with employment contracts and wage problems, this paper proposes to store employment contracts in blocks using blockchain technology, enable accurate wage payments using smart contracts, and also store wage information in blocks. In addition, it can be proved by using the contents stored in the block when problems occur later.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing security in IoT systems via blockchain","authors":"Anurag Parcha, Sanjana Mishra, Aditya Bist, Reema Agarwal, Sagar Gupta, Saahil Sharma, R. Sathyaraj","doi":"10.1504/ijitst.2023.127391","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127391","url":null,"abstract":"Today, IoT systems have become prominent, especially in the fields of healthcare, agriculture, and manufacturing. IoT systems encompass numerous devices that become targets for attacks and exploitation, thereby making these systems prone to security vulnerabilities. While IoT has become a widespread technology by virtue of its scalability, dependability, and ease of access, its shortcomings should also be addressed. Currently, client-server model of networking is employed in IoT devices which use a single gateway for transferring data and connecting through a cloud server. This model demands a high cost for cloud maintenance and network equipment. Furthermore, a single gateway is not secure as one failed node can compromise the entire network. To improve security, we propose the inclusion of blockchain technology; a distributed ledger where data is stored across several nodes, thereby eliminating single point failure. This project proposes the benefits of blockchain technology in conjunction with security of IoT systems.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Velliangiri, Iwin Thanakumar Joseph, Shanthini Pandiaraj, P. Leela Jancy, Ch. Madhubabu
{"title":"An enhanced security framework for IoT environment using Jaya optimisation-based genetic algorithm","authors":"S. Velliangiri, Iwin Thanakumar Joseph, Shanthini Pandiaraj, P. Leela Jancy, Ch. Madhubabu","doi":"10.1504/ijitst.2023.127388","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127388","url":null,"abstract":"The internet of things (IoT) employs a cloud network, and the data stored in the cloud servers are highly vulnerable to various attacks. As per the current analysis report, around 23% of IoT devices are prone to attack. The data stored in the cloud storage are highly vulnerable to attacks leading to a pullback factor of 15% in economic growth. Considering the above security of the IoT devices, this paper proposes a framework integrating the Jaya algorithm and genetic algorithm to achieve an optimal detection of intrusion in the IoT network. The JA is a parameter less algorithm that does not require any precise control parameters. In contrast, the GA is a meta-heuristic approach that produces reasonable quality solutions for complex functions. The extensive analysis of the proposed algorithm yield better performance in vital parameters like accuracy, recall and F-score.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comprehensive blockchain technology survey: architecture, applications and challenges","authors":"Gajala Praveen, Piyush Kumar Singh, Prabhat Ranjan","doi":"10.1504/ijitst.2023.127389","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127389","url":null,"abstract":"Blockchain technology has evolved to solve the complexity and privacy issues associated with online digital content distribution in the last decade. Several studies have centred on different implementations of blockchain technology, and there is no comprehensive survey of the technology from both a technical and an application viewpoint. To close this gap, we conducted a detailed blockchain technology survey. This paper gives an in-depth look at blockchain technology. It discusses the blockchain fundamentals, taxonomy, characteristics, architecture of blockchain, and accessible consensus mechanisms used in the various blockchain systems. This paper also gives blockchain applications in multiple domains, including finance, medical, banking, etc. In addition, this paper presents an overview of the various problems that currently exist in blockchain technology and future research directions.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"14 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of blockchain based smart contract system to understand its performance in different applications","authors":"P. Amudha, V. Devi","doi":"10.1504/ijitst.2023.10054299","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10054299","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A contemporary anti-phishing framework based on visual cryptography and steganography","authors":"Alkesh Gupta, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag","doi":"10.1504/ijitst.2023.129586","DOIUrl":"https://doi.org/10.1504/ijitst.2023.129586","url":null,"abstract":"In new technologies developing tremendously, and with this, the usage of online commodities has also seen a surge with a drastic daily increase in the number of users. Online support has also led to increased online attacks on the user's confidential data, leading to financial and social loss. Phishing is one such online attack using which an attacker impersonates any authentic organisation to deceive and take advantage of users to steal various private information like passwords, payment card details, etc. These days, attackers have easy access to new tools and techniques which can easily evade many existing anti-phishing techniques. To enhance the security of the user's confidential information and protect them from such phishing attacks, this paper proposes a new approach that uses visual cryptography and steganography. This approach will help the user keep its identity and login credentials confidential unless the website proves its trustworthiness.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135584267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of consensus protocols in distributed systems","authors":"B. Balusamy, Ram Kumar, T. Poongodi, D. Sumathi","doi":"10.1504/ijitst.2023.10053139","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10053139","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security of internet of vehicles in smart cities: authentication and confidentiality aspects","authors":"Roumissa Sahbi, S. Ghanemi, M. Ferrag","doi":"10.1504/ijitst.2023.10053899","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10053899","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TRO-CP-ABE: a secure and flexible layer with traceability and easy revocation in ciphertext-policy attribute-based encryption","authors":"K. Srinivas, A. Nikose","doi":"10.1504/ijitst.2023.10054300","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10054300","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}