首页期刊导航|International journal of internet technology and secured transactions: IJITST
期刊信息/Journal information
International journal of internet technology and secured transactions: IJITST
Inderscience Enterprises Ltd
Inderscience Enterprises Ltd
季刊
1748-569X
International journal of internet technology and secured transactions: IJITST/Journal International journal of internet technology and secured transactions: IJITST
D. SumathiT. PoongodiRamasamy Lakshmana KumarBalamurugan Balusamy...
217-231页
查看更多>>摘要:Consensus algorithms play the significant role in any blockchain system since it has to prove its performance and security. Hence, there is a need to identify the curbs of various consensus algorithms. The features of several kinds of blockchain systems rely on the consensus techniques. A detailed analysis of the algorithms has been done which might throw the limelight to researchers to devise a novel consensus algorithm. Issues due to the adoption of the consensus and solutions to overcome have been discussed. The main contribution of this work is to provide a deep insight into the consensus algorithms and its properties. There are several metrics considerations for evaluating the performance of consensus protocols. Additionally, the energy consumption of Bitcoin and Ethereum of several countries has also been presented in this work. Finally, the most commonly used consensus algorithm has been analysed along with its variant information.
查看更多>>摘要:With the rapid development of smart devices, communication technologies, and network elements, vehicles become more autonomous, more connected, and more intelligent. Internet of vehicles (IoV) is a new area of the internet of things (IoT) equipped with powerful multi sensors platform, connectivity and communication technologies. The communication and the cooperation between vehicles and different IoT objects can increase security risks and make vehicles more vulnerable to serious attacks (authentication attacks, confidentiality attacks, availability attacks, routing attacks, and data authenticity attacks). In this paper, we propose security schemes to detect and prevent attacks in IoV system using software defined network (SDN) and elliptic curve cryptography (ECC); first, we identify IoV concepts, then we design a network model which illustrates the global IoV architecture, after that we propose an authentication and confidentiality schemes. Finally, we provide formal and informal proof to demonstrate that our schemes can resist against various attacks.
查看更多>>摘要:The evolutions in information and communication technology (ICT) devices have led to the rise in cyber-attacks in network systems. Ensuring cybersecurity in these devices is one of the most critical and complex issues. Besides, with technological improvement, hackers have been introducing complex and malicious malware attacks into the network system, making intrusion detection a complicated task. However, various conventional IDS face severe challenges to discern and counteract such risks. Statistical research and an enhanced autoencoder classifier for the network intrusion detection system are introduced in this paper (NIDS). This work uses an optimised autoencoder feature extraction process to extract correlated features to simplify the classification process. The proposed method is estimated using the NSL-KDD, UNSW-NB15, and CIC-DDoS2019 datasets, and its performance is compared to that of current machine learning algorithms. The results indicate that the proposed AE-NIDS outperforms shallow machine learning classifiers regarding detection accuracy and false positive rate.
查看更多>>摘要:The hybrid approach used in this paper aims to improve online application security. Homographic encryption and squirrel search algorithm (SSA) are combined to create this hybrid. The cloud computing model's security improved with the use of this technique. In order to improve the security of cloud data using an encryption method, this study suggests a hybrid algorithm. Utilising encryption methods is primarily done to protect or keep vast amounts of data in cloud. To improve secure data storage in cryptography, the SSA is designed in a cloud computing environment. Performance measures, including uploading time, downloading time, decryption time and encryption time, are measured in MATLAB to test the success of suggested methods. To evaluate the proposed methodology, tweet data is considered in the proposed methodology. The proposed methodology is contrasted with current approaches, like Rivest-Shamir-Adleman (RSA) and ECC-based cryptography, in order to evaluate it.