{"title":"Embedded security framework for M2M communication using ULBC and Rubik’s Cube encryption algorithm","authors":"M. Salunke, P. Mahalle, G. Shinde","doi":"10.47974/jdmsc-1755","DOIUrl":"https://doi.org/10.47974/jdmsc-1755","url":null,"abstract":"The potential of a variety of stockholders has increased as a direct result of the development of the Internet of Things and cloud computing. These individuals are now able to communicate and share data in a productive manner. This interaction with devices is regarded as extremely helpful and advantageous by a lot of users. Inadequate configuration of a network system makes it an easy target for potential security breaches. This is why it is important that a security framework is developed for the Internet of Things (IoT) and cloud computing models. This paper talks about the various frameworks that are used in these two technologies. It also explores the various security methods that are used to protect the devices that are connected to the cloud. Numerous studies have shown that there are various ways that people can manipulate the operations of machine-to-machine (M2M) in the digital world. While analyzing the methodology used in this technology, it is also important to keep in mind the security levels of the cloud and IoT ecosystem. The development of a secure connection between the various devices that are connected to the cloud is also important to ensure that the network is protected from security threats. This paper aims to provide a framework that will allow the integration of the Cloud and IoT and the Cloud Framework for Machine-to-Machine communication. The paper aims to develop a secure framework that will allow the integration of the Cloud and IoT with secure framework for Machine-to-Machine communication using (ultra-lightweight block cipher) ULBC and Rubik’s Cube encryption algorithm.","PeriodicalId":408043,"journal":{"name":"Journal of Discrete Mathematical Sciences & Cryptography","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126183770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Triple vertex of cycle graph for polyalphabetic encryption scheme","authors":"Manal Hatif Kadhim, R. K. Ajeena","doi":"10.47974/jdmsc-1565","DOIUrl":"https://doi.org/10.47974/jdmsc-1565","url":null,"abstract":"A new version of the polyalphabetic encryption scheme (PES) has been proposed based on the triple vertex cycle graph (TVCG). In the current study, a new definition for TVCG is given. The PES has been modified based on the TVCG. The security in comparison with the previous symmetric encryption schemes is increased. The ciphertext of the plaintext, in the proposed PES, is sent to the receiver entity as the TVCG. Based on cycle graph Cn, the TVCG is created depending on the encrypted letters of the plaintext bits and the rules of a secret key. In the current study, a study case of the proposed TVCG-PES is presented as a new experimental result. Then, the security issues of the TVCG-PES are determined. The TVCGPES is considered as a new insight for more secure communications.","PeriodicalId":408043,"journal":{"name":"Journal of Discrete Mathematical Sciences & Cryptography","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116373244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Sharma, N. Yadav, Sundar Suhrith Adavi, D. S. D. Reddy, B. Gupta
{"title":"A two stage hybrid intrusion detection using genetic algorithm in IoT networks","authors":"V. Sharma, N. Yadav, Sundar Suhrith Adavi, D. S. D. Reddy, B. Gupta","doi":"10.47974/jdmsc-1737","DOIUrl":"https://doi.org/10.47974/jdmsc-1737","url":null,"abstract":"Today, almost 90% of the technology in usage is linked with IoT (Internet of Things). which brings the question, what is IoT? Internet of things is a system of co-related computers, electronic devices, and objects. IoT essentially controls almost every online service which we avail without human -to-human interaction. An IDS is a hardware or software system that automatically monitors, identifies, and alerts a computer or network against attacks and intrusions. The proposed hybrid model makes use of genetic algorithm with UNSW NB-15 dataset which contains multiple classes of attack to provide a huge variety of attacks which will help to simulate different kinds of attack which will help train the model better. We have used CNN and LSTM model for extracting features. By detecting the attacks quickly, we can identify potential intruders and limit the damage. Feature selection and classification have been performed using Generic algorithm. This hybrid model helps to check whether the alert is an attack or not, if yes what kind of attack is it. the proposed Hybrid model works better than a conventional intrusion detection system, we got 99.38% accuracy from this model.","PeriodicalId":408043,"journal":{"name":"Journal of Discrete Mathematical Sciences & Cryptography","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125429233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of computer vision based secure image enrichment techniques on image classification model","authors":"A. S. Rao, K. Mahantesh","doi":"10.47974/jdmsc-1777","DOIUrl":"https://doi.org/10.47974/jdmsc-1777","url":null,"abstract":"Growing advancement in Artificial Intelligence has led to developing systems which can think, analyze, recognize patterns and are capable enough to convert data into information has turned out to be a major prerequisite. An effort to provide enriched data with Computer Vision based Image Enrichment techniques and its impact on performance of Deep learning algorithms (VIRNet) is analyzed in the research. At first, various image enrichment technique like sharpening, denoising, color enhancement which makes the dominant features more visible which can be easily captured by the classification model. Later, popular computer vision techniques for image segmentation which differentiates the background and foreground area like Deeplabv3, Mask R-CNN and Region based segmentation methods are applied and its impact over Classification model is analyzed. The experimental study was conducted on popular image dataset Caltech 101 and Caltech-256, from the results it is clearly evident the image enrichment based on CLAHE outweighs the popular segmentation methods. Besides image segmentation and enrichment techniques, implementing an AES encryption in the process helps in protecting the sensitive data and ensures the data is kept private and secure. An image classification algorithm using deep learning equipped with AES encryption is implemented, which adds a layer of security to an image processing system.","PeriodicalId":408043,"journal":{"name":"Journal of Discrete Mathematical Sciences & Cryptography","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"More secure on the symmetric encryption schemes based on triple vertex path graph","authors":"M. K. Shathir, Ghassan. E. Arif, R. K. Ajeena","doi":"10.47974/jdmsc-1564","DOIUrl":"https://doi.org/10.47974/jdmsc-1564","url":null,"abstract":"A triple vertex (TV) and triple vertex path (TVP) graph are defined as new concepts. These concepts consider the main point of this work to modify the symmetric encryption (SE) schemes and increase the security level in comparison with the previous ES schemes. In proposed ES schemes, the ciphertexts of the plaintexts are sent to the receiver entity as the TVP graph. Two study cases of the proposed TVPG-SE schemes are presented as new experimental results. The security issues of the proposed TVPG-SE schemes have been determined. The TVPG-SE schemes consider new insights for more secure communications.","PeriodicalId":408043,"journal":{"name":"Journal of Discrete Mathematical Sciences & Cryptography","volume":"20 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120872036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Highly secure intelligent computer data detection of anomalies","authors":"Upasana Gupta, Vaishali Singh, Dinesh Goyal","doi":"10.47974/jdmsc-1767","DOIUrl":"https://doi.org/10.47974/jdmsc-1767","url":null,"abstract":"The latest technology is focusing on the detection of different attacks occurring in the cloud and IoT data centers and services. So, there is a need of providing high dimensional security for the data. The appraisal issue prompts the suggestion of a coordinated methodology for sifting the unusual data of interest and perspectives for seeing anticipated exceptions in the new youngster around subspaces of high-layered enormous information. High-layered immense information requires significant computational memory and brings a tremendous computational weight, no matter what the way that continuous figuring sources solid areas are. Thus, the fundamental examination objective of this assessment is to develop an adaptable system for inconsistency recognizing confirmation that arrangements with the issue of the scourge of dimensionality in goliath instructive combinations. The issue of irregularity range has different highlights, and how we depict irregularities, the sort of information, and anticipated surrender can have a critical effect on recognizable confirmation techniques. As a result of these contrasts, issue plans shift enormously, requiring the utilize of different shrewd frameworks to address them.","PeriodicalId":408043,"journal":{"name":"Journal of Discrete Mathematical Sciences & Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128878348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural network based image object detection and tracking for security and surveillance","authors":"Nishu Sethi, S. B. Bajaj","doi":"10.47974/jdmsc-1780","DOIUrl":"https://doi.org/10.47974/jdmsc-1780","url":null,"abstract":"The saliency map obtained from the source image determines the efficacy of the traditional seam carving process. The importance map proposed in this paper is used to highlight the shadows and important objects in the images. It combines the saliency map, shadow map, and gradient map acquired from the image to discover the image’s prominent regions. The proposed map, when compared to others, highlights more distinct details with the state-of-the-art. The improved seam carving technique is paired with cropping and warping image retargeting operators in the suggested hybrid sequence. By labelling a picture with a class label and object localisation, the coordinates of the objects are generated using R-CNN object detection techniques. This will help in identifying the non-salient objects from the image for security and surveillance purposes with pin-point accuracy.","PeriodicalId":408043,"journal":{"name":"Journal of Discrete Mathematical Sciences & Cryptography","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Ajitha, Arun Mozhi Selvi Sundarapandi, M. Soniya, T. Tamilvizhi
{"title":"An IoT-based integrated health monitoring of bulk milk cooler","authors":"P. Ajitha, Arun Mozhi Selvi Sundarapandi, M. Soniya, T. Tamilvizhi","doi":"10.47974/jdmsc-1764","DOIUrl":"https://doi.org/10.47974/jdmsc-1764","url":null,"abstract":"Bulk Milk Cooler (BMC) Health Monitoring at the milk collection centre assists the reception of the quality of milk at the dairy plant level, which improves the quality of milk received by the dairy plants and reduces the rejection or wastage of milk when it arrives at the dairy plant. The BMC health monitoring includes the pH of the milk storage tank, digital temperature sensor which is free from frequent external calibration, and accuracy does’t with lengthy cables, agitator rpm monitoring which is used to access the health of the agitator in BMC. Similarly, the health of the compressor which maintains 4 degrees C is also accessed. Based on cloud server/webpage-based analytics software as well as mobile phone-based software for live health monitoring, the agents/dairy plant supervisor can take a quick decision to recover the health of BMC, by mobilizing the manpower/service engineer, so that the quality of milk can be maintained at the collection/storage centre level.","PeriodicalId":408043,"journal":{"name":"Journal of Discrete Mathematical Sciences & Cryptography","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121719431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Foreword of Special Issue on : Current Research Trends in Secure Computer Vision, IoT and Machine Learning","authors":"Dinesh Goyal","doi":"10.47974/jdmsc-26-3-foreword","DOIUrl":"https://doi.org/10.47974/jdmsc-26-3-foreword","url":null,"abstract":"Security has been the most perpetual domain, with advancements in other domains and applications like Computer vision, IoT and Machine learning, is today’s most rapidly growing technical domains to facilitate better human life across the globe and is highly dominated with statistics and data analytics using data science, artificial intelligence, and Machine Learning. All these application areas have developed new security requirements. Recent progress in these fields has been driven both by the development of new learning algorithms and theory by the ongoing explosion in the availability of online data and low-cost computation. With more advancements in technology compelled with need of scaling has provided a challenge to security of system and its architecture. Thus there is a diehard need for secure models or architectures in domains of computer vision, IoT models and Data analytics using Machine Learning.","PeriodicalId":408043,"journal":{"name":"Journal of Discrete Mathematical Sciences & Cryptography","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arun Kumar, Himanshu Sharma, S. Mathur, Dimpal Sharma, Girraj Khandelwal, G. Sharma
{"title":"Computer vision, machine learning based monocular biomechanical and security analysis","authors":"Arun Kumar, Himanshu Sharma, S. Mathur, Dimpal Sharma, Girraj Khandelwal, G. Sharma","doi":"10.47974/jdmsc-1741","DOIUrl":"https://doi.org/10.47974/jdmsc-1741","url":null,"abstract":"Modern computer vision technologies have served to bridge the gap between contemporary scientific analysis and machine learning assisted digital processing. Within the field of biomechanics, applied strategies incorporating both conventional and machine assisted means have shown great success in augmenting the observations of electromyogram graphical sensors; albeit within the constraints of specialized, multiple-source arrays. The ongoing study represents an endeavor to utilize several distinct technologies to achieve similar results with the application of a single optical sensor. This paper documents the research, development, and implementation of a monocular feature extraction pipeline, designed for the intended use of supplementing modern athletic biomechanical analysis and the security of the data. We will examine the techniques presented by related works, and how we have implemented these strategies into our framework.","PeriodicalId":408043,"journal":{"name":"Journal of Discrete Mathematical Sciences & Cryptography","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115046159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}