Volume 10, Issue 5, October 2019

Investigating Buffer Extension in Multi-Hop Networks for Packet Delay Improvement
Pages: 1-6 (6) | [Full Text] PDF (952K)
Zilole Simate, Ryuji Kohno
Graduate Studies Department, Physics, Electrical and Computer Engineering Yokohama National University, Japan

Abstract -
Mesh networks are increasing day by day with their use. And common among them are Low power wide area networks (LPWAN) which have found significant use. In wireless sensors, in most configurations, the relay nodes do not generate their own traffic but simply pass on to the next node. As a cost saving measure, or to increase the coverage, relay nodes can admit traffic by acting as an access point as well as a bridge. Most devices available on the market have limited buffer sizes as a result, using these devices for this purpose may result in packet losses or delays due to the finite size of the buffer. An investigation is done on such a type of network and the end to end delay and buffer length dynamics are observed.
 Index Terms - Multihop Networks, Buffer and Mesh Networks
Interface Platforms Usability for Gold Marketing: A Study of Selected Gold Miners in Migori County- Kenya
Pages: 7-11 (5) | [Full Text] PDF (248K)
Ogalo Aboge Jane, James Onyango Abila, Lamek Ronoh
Department of Information Communication and Technology Services, Rongo University, P.O Box 103, 40404 Rongo
School of Information, Communication and Media Studies, Rongo University, P.O Box 103, 40404 Rongo

Abstract -
Gold marketing like any other modern product marketing should be done in a global based platform, to ensure suitable buying with best prices possible in a timely way. However, gold marketing in developing countries Kenya inclusive still rely on middlemen marketing strategies, despite of having advanced and efficient marketing information technological opportunities as the trend has not picked well in some of the developing and third world nations. The objectives of this study were to: (i) examine the type of interfaces currently being used by miners to market gold; (ii) identify type of calls the miners are able to make to create awareness that they have gold to sell; and (iii) find out the ability of the miners to send and retrieve text messages using mobile phones. The findings of the study showed that there exist various types of user interfaces for gold marketing with the most popular being Audio phone calls (37.7%). The findings further indicated that a good number of gold miners still rely on the tradition of waiting for brokers at the mines (22.6%), to buy their gold what is called on site traders. On the other hand, it was realized that, the miners’ ability to send and retrieve text messages using the mobile phones was at (94.34%). The study recommends a need to design an interface model to enable integration of mobile phones (USSD code technology) as a suitable interface for gold marketing in Migori County to promote timely marketing with better pricing, ease of use and access of the interface by marketers. This will lead to adoption of Business to Business (B2B) marketing strategy whereby gold miners sell their gold to buyers who also sell to middlemen or manufacturing industries.
 Index Terms - Interface Patterns, Platform, Mobile Based Marketing and Online Marketing
IoT Hybrid Security Model Using Cryptography and Open Authorization 2.0
Pages: 12-21 (10) | [Full Text] PDF (493K)
Jihad Qaddour
School of Information Technology, Illinois State University, Normal, IL, USA

Abstract -
The IoT technology handles sensitive data across different networks. It is used in many parts of everyday society, such as hospital, industry and home technology. However, the increased use of IoT has resulted in demand in advanced security systems that protect network resources as well as access to information transmitted through the network. Evolution in technology has resulted in the development of various security systems, which protect the IoT network. However, they were not able to close all the loopholes in securing IoT networks such as DoS, DDoS, and men-in-the-middle attacks. In this paper, we proposed a hybrid security model for IoT, which includes integrated authorization protocols for various layers of the IoT platform. Moreover, OAuth 2.0 was integrated with the public key for authorization of various nodes in the network. Further, the proposed model includes the use of the Application Server (AS), which includes two main OAuth Application Programming Interfaces (API) and the Protection API to advance the identity recognition and authorization in different layers. Finally, MQTT was utilized with the OAuth protocol to secure the messaging.
 Index Terms - Internet of Thing (IoT), Open Authorization (OAuth) 2.0 Profile, Message Queuing Telemetry Transport (MQTT) and Hybrid Cryptographic
IoT Blockchain: Integration and Challenges
Pages: 22-27 (4) | [Full Text] PDF (266K)
Fabiha Hashmat
----

Abstract -
IoT devices have data that is critical to the operation of safety and security applications. Due to the unavailability of centralized infrastructure, the integrity of data has to be ascertained by the devices themselves. This turns out to be a challenge because of the multitude of security functions and mechanisms. Optimizing diverse security functions in the absence of dedicated infrastructure nodes such as AAA (Authentication, Authorization and Accounting) and CA, is not verifiable in terms of what is necessarily required and what is sufficient to business specific needs. In this work, we have proposed “Design and Prototyping of IoT Blockchains for Sensor Data Provenance” for providing Blockchain for IoT constrained devices. We have developed light scale and suitable Blockchain according to IoT devices which have constrained nature. We have added the necessary features related to IoT domain in the block header which are: Device Data, Device ID and Device Location. After that we have analyzed the blockchain by varying the key performance indicators of blockchain (block size and no. of transactions/ block) to calculate the throughput rate of our proposed Blockchain on a constrained device (Raspberry Pi 2 Model B). We have added a feature of entropy calculation for the data entered in the Blockchain so that we could optimize the storage the storage capacity of Blockchain by adding only entropy-based sensor data.
 Index Terms - Blockchain, IoT, Security and Provenance
Pages: 28-35 (8) | [Full Text] PDF (526K)

Abstract -
 Index Terms -
Pages: - (-) | [Full Text] PDF (246K)

Abstract -
 Index Terms -