International Journal of Internet Technology and Secured Transactions最新文献

筛选
英文 中文
An improved deep autoencoder-based network intrusion detection system with enhanced performance 一种改进的基于深度自编码器的网络入侵检测系统
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10056364
Bidyapati Thiyam, Shouvik Dey
{"title":"An improved deep autoencoder-based network intrusion detection system with enhanced performance","authors":"Bidyapati Thiyam, Shouvik Dey","doi":"10.1504/ijitst.2023.10056364","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10056364","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Employment contract and wage payment using blockchain and smart contract 使用区块链和智能合约的劳动合同和工资支付
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.127387
Eugene Rhee
{"title":"Employment contract and wage payment using blockchain and smart contract","authors":"Eugene Rhee","doi":"10.1504/ijitst.2023.127387","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127387","url":null,"abstract":"Employment contracts recorded on blockchain have the strength to make it impossible to falsify or modify the agreements between employers and employees. The fact is that the work input through the application remains on the blockchain, and the manager shares it, which is expected to significantly improve the disadvantaged position of part-time workers. As a way to recognise and solve recent problems with employment contracts and wage problems, this paper proposes to store employment contracts in blocks using blockchain technology, enable accurate wage payments using smart contracts, and also store wage information in blocks. In addition, it can be proved by using the contents stored in the block when problems occur later.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing security in IoT systems via blockchain 通过区块链实现物联网系统的安全性
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.127391
Anurag Parcha, Sanjana Mishra, Aditya Bist, Reema Agarwal, Sagar Gupta, Saahil Sharma, R. Sathyaraj
{"title":"Implementing security in IoT systems via blockchain","authors":"Anurag Parcha, Sanjana Mishra, Aditya Bist, Reema Agarwal, Sagar Gupta, Saahil Sharma, R. Sathyaraj","doi":"10.1504/ijitst.2023.127391","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127391","url":null,"abstract":"Today, IoT systems have become prominent, especially in the fields of healthcare, agriculture, and manufacturing. IoT systems encompass numerous devices that become targets for attacks and exploitation, thereby making these systems prone to security vulnerabilities. While IoT has become a widespread technology by virtue of its scalability, dependability, and ease of access, its shortcomings should also be addressed. Currently, client-server model of networking is employed in IoT devices which use a single gateway for transferring data and connecting through a cloud server. This model demands a high cost for cloud maintenance and network equipment. Furthermore, a single gateway is not secure as one failed node can compromise the entire network. To improve security, we propose the inclusion of blockchain technology; a distributed ledger where data is stored across several nodes, thereby eliminating single point failure. This project proposes the benefits of blockchain technology in conjunction with security of IoT systems.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An enhanced security framework for IoT environment using Jaya optimisation-based genetic algorithm 使用基于Jaya优化的遗传算法的物联网环境增强安全框架
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.127388
S. Velliangiri, Iwin Thanakumar Joseph, Shanthini Pandiaraj, P. Leela Jancy, Ch. Madhubabu
{"title":"An enhanced security framework for IoT environment using Jaya optimisation-based genetic algorithm","authors":"S. Velliangiri, Iwin Thanakumar Joseph, Shanthini Pandiaraj, P. Leela Jancy, Ch. Madhubabu","doi":"10.1504/ijitst.2023.127388","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127388","url":null,"abstract":"The internet of things (IoT) employs a cloud network, and the data stored in the cloud servers are highly vulnerable to various attacks. As per the current analysis report, around 23% of IoT devices are prone to attack. The data stored in the cloud storage are highly vulnerable to attacks leading to a pullback factor of 15% in economic growth. Considering the above security of the IoT devices, this paper proposes a framework integrating the Jaya algorithm and genetic algorithm to achieve an optimal detection of intrusion in the IoT network. The JA is a parameter less algorithm that does not require any precise control parameters. In contrast, the GA is a meta-heuristic approach that produces reasonable quality solutions for complex functions. The extensive analysis of the proposed algorithm yield better performance in vital parameters like accuracy, recall and F-score.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comprehensive blockchain technology survey: architecture, applications and challenges 全面的区块链技术调查:架构、应用和挑战
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.127389
Gajala Praveen, Piyush Kumar Singh, Prabhat Ranjan
{"title":"A comprehensive blockchain technology survey: architecture, applications and challenges","authors":"Gajala Praveen, Piyush Kumar Singh, Prabhat Ranjan","doi":"10.1504/ijitst.2023.127389","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127389","url":null,"abstract":"Blockchain technology has evolved to solve the complexity and privacy issues associated with online digital content distribution in the last decade. Several studies have centred on different implementations of blockchain technology, and there is no comprehensive survey of the technology from both a technical and an application viewpoint. To close this gap, we conducted a detailed blockchain technology survey. This paper gives an in-depth look at blockchain technology. It discusses the blockchain fundamentals, taxonomy, characteristics, architecture of blockchain, and accessible consensus mechanisms used in the various blockchain systems. This paper also gives blockchain applications in multiple domains, including finance, medical, banking, etc. In addition, this paper presents an overview of the various problems that currently exist in blockchain technology and future research directions.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of blockchain based smart contract system to understand its performance in different applications 分析基于区块链的智能合约系统,了解其在不同应用中的性能
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10054299
P. Amudha, V. Devi
{"title":"Analysis of blockchain based smart contract system to understand its performance in different applications","authors":"P. Amudha, V. Devi","doi":"10.1504/ijitst.2023.10054299","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10054299","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A contemporary anti-phishing framework based on visual cryptography and steganography 基于视觉密码和隐写术的当代反网络钓鱼框架
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.129586
Alkesh Gupta, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag
{"title":"A contemporary anti-phishing framework based on visual cryptography and steganography","authors":"Alkesh Gupta, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag","doi":"10.1504/ijitst.2023.129586","DOIUrl":"https://doi.org/10.1504/ijitst.2023.129586","url":null,"abstract":"In new technologies developing tremendously, and with this, the usage of online commodities has also seen a surge with a drastic daily increase in the number of users. Online support has also led to increased online attacks on the user's confidential data, leading to financial and social loss. Phishing is one such online attack using which an attacker impersonates any authentic organisation to deceive and take advantage of users to steal various private information like passwords, payment card details, etc. These days, attackers have easy access to new tools and techniques which can easily evade many existing anti-phishing techniques. To enhance the security of the user's confidential information and protect them from such phishing attacks, this paper proposes a new approach that uses visual cryptography and steganography. This approach will help the user keep its identity and login credentials confidential unless the website proves its trustworthiness.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135584267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of consensus protocols in distributed systems 分布式系统中一致性协议的性能分析
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10053139
B. Balusamy, Ram Kumar, T. Poongodi, D. Sumathi
{"title":"Performance analysis of consensus protocols in distributed systems","authors":"B. Balusamy, Ram Kumar, T. Poongodi, D. Sumathi","doi":"10.1504/ijitst.2023.10053139","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10053139","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of internet of vehicles in smart cities: authentication and confidentiality aspects 智慧城市车联网安全:认证和保密方面
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10053899
Roumissa Sahbi, S. Ghanemi, M. Ferrag
{"title":"Security of internet of vehicles in smart cities: authentication and confidentiality aspects","authors":"Roumissa Sahbi, S. Ghanemi, M. Ferrag","doi":"10.1504/ijitst.2023.10053899","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10053899","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TRO-CP-ABE: a secure and flexible layer with traceability and easy revocation in ciphertext-policy attribute-based encryption tr - cp - abe:在基于密文策略属性的加密中具有可追溯性和易于撤销的安全灵活层
International Journal of Internet Technology and Secured Transactions Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10054300
K. Srinivas, A. Nikose
{"title":"TRO-CP-ABE: a secure and flexible layer with traceability and easy revocation in ciphertext-policy attribute-based encryption","authors":"K. Srinivas, A. Nikose","doi":"10.1504/ijitst.2023.10054300","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10054300","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信