Forthcoming and Online First Articles

International Journal of Information Technology, Communications and Convergence

International Journal of Information Technology, Communications and Convergence (IJITCC)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Information Technology, Communications and Convergence (3 papers in press)

Regular Issues

  • Security issues in mobile money eco-system   Order a copy of this article
    by Job Matovu, Drake Patrick Mirembe, Odongo Steven Eyobu 
    Abstract: The growing adoption of mobile payment systems has challenges related to data security resulting in financial loss and criminal money transfer. It is against this background that this study sought to investigate security issues popular in mobile money systems in Uganda, with some of the guiding research questions: How is insecurity witnessed in different mobile money transactions? What are the best practices that have been used by banking institutions to secure withdrawal transactions? How can these best practices from the banking institutions be adopted in mobile money systems? The study adopted a mix-research approach involving both qualitative and quantitative data collection and analysis methods. A total of 465 participants responded to the study. The study results show that, the great reliance on a single factor of authentication is major contributor to insecurity in mobile money transactions. The study found that, the single authentication factor (PIN) on withdraw transaction can be replaced with a multi-factor authentication (based on knowledge, ownership and biotic authenticators) to improve authentication of mobile money withdrawer transactions.
    Keywords: mobile payment systems; authentication attacks; mobile security; mobile; payment; security.
    DOI: 10.1504/IJITCC.2024.10070258
     
  • Text steganography using linear congruence   Order a copy of this article
    by Ravneet Kaur, Ankit Pant, Fnu Avi, Parag Jain, Vibha Gaur 
    Abstract: Steganography and cryptography are the two most commonly used approaches for sending a secret message but they may make the system vulnerable to others if used individually. Therefore, an integrated approach consisting of steganography and cryptography can give more security and robustness. This article presents a novel text-based steganographic solution to conceal data through linear congruence and encrypt it using cryptography. The proposed steganography approach is based on the key generation process and does not insert or overwrite bits in the cover text. The cover text remains in its original form with no changes or additions. A hidden message is sent based on the stego-key, generated with a mapping function of the cover text using linear congruence and the automated encryption algorithm. The secret message is retrieved from the cover text at the receiver using this key and the inverse automatic encryption algorithm. The approach uses simple file manipulation and a modified linearly congruential pseudo-random number generator implementation. The intact or unchanged cover text can prevent the detection of hidden text by most of the conventional stegano-analysis techniques and thereby offers an effective method of communicating hidden or secret messages between sender and receiver.
    Keywords: steganography; cryptography; steganalysis; text-steganography; mapping function; sender; receiver.
    DOI: 10.1504/IJITCC.2024.10070256
     
  • FDMA approach for smart grid and green communications   Order a copy of this article
    by Basetty Mallikarjuna 
    Abstract: The goal of this article is a new approach for competitors in the area of smart grid and green communications. The integrated services like internet of things (IoT)-based cloud begins up in the smart grid environment provides consciousness for new cross-disciplinary research. In this article, a suggested feedback-based data management assistance (FDMA) offers networking services, large storage, huge computation, and data processing to the end-users and among IoT-based cloud contains integrated environment of smart grid. The real-time applications of IoT, like smart home, smart car, smart city to achieve smart country and demand less latency and response time to process the enormous amount of data. The anticipated feedback-based data management plan offers a new resource management method, which is comprised of a unified structural design and retains the SLA and QoS parameters. The simulated environment analysed with the ThingSpeak open source platform and derives the smart parking application and examined the iFogSim with MATLAB tool kits has demonstrated that the intended methodology is efficient and appropriate for smart interaction in IoT-based cloud.
    Keywords: internet of things; IoT; iFogSim; quality of service; QoS; service-level agreement; SLA; feedback-based data management assistance; FDMA; ThingSpeak; cloud data centres.
    DOI: 10.1504/IJITCC.2024.10070234