i-manager's Journal on Information Technology (JIT)


Volume 12 Issue 1 January - March 2023

Research Paper

New Digital Signature Scheme Based on MDLP and Multinacci Matrices

Manju Sanghi*
Alliance University, Karnataka, India.
Sanghi, M. (2023). New Digital Signature Scheme Based on MDLP and Multinacci Matrices. i-manager’s Journal on Information Technology, 12(1), 1-7. https://doi.org/10.26634/jit.12.1.19775

Abstract

A new digital signature scheme based on Matrices Discrete Logarithm Problem (MDLP) and generalized Fibonacci or Multinacci matrices is proposed. The security of the scheme is based on the difficulty of solving the Discrete Logarithm Problem (DLP) in matrices. MDLP is a new one-way function based on matrices that provides the same security as the DLP. The use of matrices increases the complexity of the scheme, as it involves matrix exponentiation rather than integers. In the proposed scheme, the signer uses a Multinacci matrix Fkn to generate the signature and an inverse Multinacci matrix Fn-k to verify it. The computational complexity and security of the scheme are also discussed.

Research Paper

Personalized Itinerary Planning Using an Adaptive Genetic Algorithm

Madhuravani* , Kakkurla Vivek**, Mohammed Sammer Khan***, Chinthapally Rishitha Reddy****, Kodiganti Shiva Prasad *****
*-*****Sreyas Institute of Engineering and Technology, Hyderabad, India.
Madhuravani, Vivek, K., Khan, M. S., Reddy, C. R., and Prasad, K. S. (2023). Personalized Itinerary Planning Using an Adaptive Genetic Algorithm. i-manager’s Journal on Information Technology, 12(1), 8-14. https://doi.org/10.26634/jit.12.1.19804

Abstract

Planning an itinerary for travelling can be tedious, time-consuming, and challenging. This is especially true for tourists who have limited time budgets and are unfamiliar with a wide range of Points-of-Interest (POIs) in a city. To address this challenge, this paper proposes an Adaptive Genetic Algorithm (AGA) for personalized itinerary planning. This approach considers travelers' preferences, such as mandatory POIs, total number of POIs, POI popularity, POI cost, and POI rating. It views the itinerary planning problem as a multi-objective optimization problem and proposes an Adaptive Genetic Algorithm (AGA) to solve this problem. The results show that the AGAM algorithm is a promising approach for personalized itinerary planning. It is able to find itineraries that meet the traveler's preferences that are efficient in terms of time, cost, and overall rating.

Review Paper

Improving the Performance and Reliability of RPL Networks through Security Analysis and QoS Support

Viju Prakash Maria John*
School of Computing and Innovative Technologies (Major in Cloud Technologies), British University Vietnam, Hanoi.
John, V. P. M. (2023). Improving the Performance and Reliability of RPL Networks through Security Analysis and QoS Support. i-manager’s Journal on Information Technology, 12(1), 15-22. https://doi.org/10.26634/jit.12.1.19825

Abstract

This review presents the integration of security analysis with Quality of Service (QoS) support in the Routing Protocol for Low power and Lossy networks (RPL). This study highlights the importance of the security and QoS. A methodology for security analysis and evaluation of QoS support was proposed. An algorithm for integrating security analysis and QoS support in RPL is presented, addressing the vulnerability assessment and dynamic adaptation of route selection. This review highlights the significance of research on enhancing security and QoS support in RPL and its potential to contribute to the field of low-power and lossy networks.

Review Paper

A Censorious Interpretation of Cyber Theft and its Footprints

V. Smirthy Singh* , Doreen Robin D.**, C. R. Rene Robin***
*Department of Physics, Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for Women, Chennai, Tamil Nadu, India.
**Computational Intelligence Research Foundation (CIRF), Chennai, Tamil Nadu, India.
***Department of Computer Science and Engineering, Sri Sairam Engineering College, Chennai, Tamil Nadu, India.
Singh, V. S., Robin, D. D., and Robin, C. R. R. (2023). A Censorious Interpretation of Cyber Theft and its Footprints. i-manager’s Journal on Information Technology, 12(1), 23-31. https://doi.org/10.26634/jit.12.1.19394

Abstract

Cybercrime is a type of crime that steals information from an owner and uses it for criminal purposes. There are other types of theft related to this crime, including identity theft, data theft, and deep fakes. This study provides a detailed analysis of cybercrime. The world has become more advanced in communication, especially after the invention of the internet, which provides a feasible environment for online dealings such as e-shopping, internet banking, and online payments. Although progress has been made to enhance innovation and development, there is a high risk of cybercrime worldwide. It has had a significant impact on digital platforms, adding both positives and negatives to global networking systems. Internet technology has been used by a few people for criminal activities, such as unauthorized access to networks and scams. These criminal activities or offences related to the internet, referred to as cybercrimes, are discussed in this paper.

Case Study

Unmasking the Shadows: Investigating Cyber Scams and its Strategies for Prevention

Kiruthiga V.* , Doreen Robin D.**, C. R. Rene Robin***
*Department of Commerce, Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for Women, Chennai, India.
**Computational Intelligence Research Foundation (CIRF), Chennai, India.
***Department of Computer Science and Engineering, Sri Sairam Engineering College, Chennai, India.
Kiruthiga, V., Robin, D. D., and Robin, C. R. R. (2023). Unmasking the Shadows: Investigating Cyber Scams and its Strategies for Prevention. i-manager’s Journal on Information Technology, 12(1), 32-37. https://doi.org/10.26634/jit.12.1.19792

Abstract

Cybercrime is mainly related to online fraud and encompasses various criminal activities through computers and online platforms, posing significant challenges in today's technologically advanced world. The case study presented herein investigates the use of unsolicited mass email messages as a prominent method employed by cybercriminals. These messages, disseminated via instant messaging, text messaging, or other digital messaging systems, serve as a deceptive means to defraud unsuspecting individuals. This study aims to enhance our understanding of the techniques, motives, and impact of online fraud. Furthermore, it highlights the attractiveness of online fraud to advertisers, who exploit its low operating costs beyond managing mailing lists. This aspect underscores the complex interplay between cybercriminals, their targets, and the broader digital ecosystem where illicit activities intertwine with legitimate platforms. By delving into the realm of cybercrime, this case study serves as a valuable resource for researchers and individuals seeking to understand the evolving nature of cyber threats. It emphasizes the importance of heightened awareness, robust cybersecurity measures, and the need for continuous adaptation to mitigate the risks posed by cybercriminals in an interconnected world.