{"title":"OVM-OSN: an optimal validation model applied to detection of fake accounts on online social networks","authors":"P. Rao, J. Gyani, G. Narsimha","doi":"10.1504/IJITST.2021.10035678","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10035678","url":null,"abstract":"Social network sites have millions of users, all sharing personal information in an unwilling manner with friends and contacts. The recent reports point out these networks are spread-through with millions of fake accounts, which affects the users' security and privacy. To overcome such issues, online social networks (OSNs) utilise the fake detection methods to preserve the user privacy and system reliability. Since, the fake account detection is very predominant and a crucial process in OSNs, in this paper, we propose an optimal validation model (OVM), which detects the fake accounts on OSNs, named as OVM-OSN. It is a simple yet efficient computational process for community detection. In OVM-OSN, we employ a novel community detection method utilising the multi-swarm fruit fly optimisation. Then, we use fuzzy-based decision model to differentiate the fake from normal accounts, which maximise the trustworthiness of online identities. Hence, this proposed OVM-OSN method is reliable even under link, node failure strategies and it is tested with Facebook and Google+ networks. Simulation results show the effectiveness of OVM-OSN method in terms of detection rate compared to the cooperative and adaptive decentralised identity validation model.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45025213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster-based optimal sink repositioning technique for WSNs using an improved glowworm swarm optimisation and S* position search algorithm","authors":"B. K. Shreyamsha Kumar, P. Rao","doi":"10.1504/IJITST.2021.10035183","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10035183","url":null,"abstract":"Wireless sensor network is a group of organised sensor nodes that are limited to their resources such as limited bandwidth, energy etc. The data gathered from sensor nodes will be forwarded to the sink node to take proper actions. In order to avoid the failures, the sink nodes should be positioned in the better place for the resource optimisation. In this paper, first we will apply clustering for grouping the nodes that are adjacent to sink node. Clustering is done by an improved glowworm swarm optimisation (IGSO) algorithm. The node which has the shortest path is selected for position. Hence, this approach is used to find the optimal position for all the sinks in order to optimise the lifetime of the network and move according with intelligent sink positioning.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46201779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yousef K. Sanjalawe, Mohammed Anbar, Qusay M. Al-zoubi
{"title":"An evaluation of identity and access management systems","authors":"Yousef K. Sanjalawe, Mohammed Anbar, Qusay M. Al-zoubi","doi":"10.1504/IJITST.2021.10035182","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10035182","url":null,"abstract":"One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM available tools, based on the three characteristics (ease of use, usefulness, and user's satisfaction), which build targets to be achieved in order to gain quality in software. The tools compared in this study are Log Mote, Oracle ID management, Tivoli Identity Manager, NetIQ-Novell, Access Sentinel, and Active Directory. In order to enable users to access the available resources in a secure way, we propose a novel architecture of IDAM. The proposed architecture basically has several advantages like, autonomy, comprehensive and systematic, standardization, and scalability.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46865272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust transcoding-resilient H.264 watermarking","authors":"G. C. Ting, B. Goi, S. Lee","doi":"10.1504/IJITST.2021.10035184","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10035184","url":null,"abstract":"The H.264 standard is widely deployed for high-quality consumer video recording, storage and sharing applications such as Blu-ray DVD and streaming HD video on the internet including YouTube. In current times, since videos are easily shared live on social media and messaging mobile apps, users need the ability to determine the ownership of these videos against being illegally distributed without proper acknowledgements to the owners, and to take actions against those who spread false videos that trigger viral fake news. Robust watermarking schemes are popularly applied techniques to solve these problems. These types of schemes are required to achieve robustness against modification attacks on the embedded watermark. In this paper, we present the design of a new robust watermarking scheme for these purposes, namely that achieves robustness against common modification attacks aiming to change the watermarks embedded by the owner, and it is furthermore resilient to transcoding. The latter property ensures that the embedded watermark remains detectable despite having undergone the common video processing operation of transcoding.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47506733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced countermeasures against IoT hacking by DDoS","authors":"Eugene Rhee","doi":"10.1504/ijitst.2021.10039865","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10039865","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Anbuudayasankar, K. Vimalkumar, S. K. Vasudevan, M. S. Narassima
{"title":"Blockchain-based seamless end-to-end shipping with android application","authors":"S. Anbuudayasankar, K. Vimalkumar, S. K. Vasudevan, M. S. Narassima","doi":"10.1504/ijitst.2021.10043083","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10043083","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent intrusion detection system using log cluster decision tree detection mitigation in complex event processing","authors":"S. Sandosh, V. Govindasamy, G. Akila","doi":"10.1504/ijitst.2021.116746","DOIUrl":"https://doi.org/10.1504/ijitst.2021.116746","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Expanded test frequency band and improved field uniformity in a reverberation chamber for networked system by dual-band quadratic residue diffusers","authors":"E. Rhee","doi":"10.1504/IJITST.2021.10037611","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10037611","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67217098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Centralised and distributed authentication scheme in internet of things: review and outlook","authors":"Upendra Verma, Diwakar Bhardwaj","doi":"10.1504/IJITST.2021.10038453","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10038453","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67217965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust-based duopoly secure game models for cooperative relay networks","authors":"M. Alam, Akanksha Sondhi, Khyati Chopra","doi":"10.1504/IJITST.2021.10038758","DOIUrl":"https://doi.org/10.1504/IJITST.2021.10038758","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}