Australian Journal of Wireless Technologies, Mobility and Security <p><strong>Journal history ( Since 2011 serving researcher's)<br><br></strong>Ausjournal serves to disseminate to the public results of current and on-going works in various areas of computer sciences and engineering. It had taken initiative in August 2012 to setup editorial board and published its first inaugural edition in February 2012, and regularly publishing yearly issues. It has completed 7 years of service for upcoming researchers.</p> ABN 87476928054 Swinger Hill ACT Australia en-US Australian Journal of Wireless Technologies, Mobility and Security 2200-1875 <p>&nbsp;<strong>© 2011-2019&nbsp;Australian Journal of Wireless Technologies, Mobility and Security e-ISSN 2200-1883</strong></p> Implementation of Digital Signature Algorithm by using Elliptical Curve p-192 <p>The public key cryptographic algorithms considered unsuitable for Internet of Things due to use of longer keys, stressful calculations and consumption of battery resources for 16bit processers. This paper presents a novel algorithm based on elliptical curve for securing communication between internet of things by use of single coordinate system of Elliptical curve cryptography. Though lengdre symbol or single coordinate system exist in mathematics literature, it’s use for securing IoT devices is fairly new. In the proposed system IoT device transfer one coordinate of public key with extra bit allowing to save 50 % of bandwidth and storage for IoT devices.&nbsp;&nbsp;</p> Darshana Pritam Shah Namita Pritam Shah ##submission.copyrightStatement## 2019-02-07 2019-02-07 1 1 1 4 10.21276/Ausjournal/2019.1.1.1 Exploratory Analysis of Block Chain Security Vulnerabilities <p>Distributed ledger technology or block chain, is a progressing future domain, and accepting its constraint and boundaries will be serious to employing it into the Internet of Things or in any other technologies. Obviously, the security and trust and privacy issues will pitch in as well as other constrains. The Distributed ledger technology has drawn major attraction of the next-generation financial technology due to its security, and also it’s extensively used in the design of smart cities and other areas of business or industry throughout the world. In this paper, we will first discuss on block chain domain and its process and then focuses on possibilities of block chain security analysis threat occurrence and in the area of public domain where it’s attracting more and more hackers’ threats. This paper provides helpful guidance and reference for future research works.</p> Pavan Manjunath Pritam Gajkumar Shah ##submission.copyrightStatement## 2019-02-08 2019-02-08 1 1 5 10 10.21276/Ausjournal/2019.1.1.2 Solution of m – inputs and n-outputs control systems synthesis problem using the Lyapunov gradient speed vector function <p>This paper describes one method of research and synthesis of control systems with m-inputs and n-outputs by the output of the object by the gradient-speed method of Lyapunov vector functions. The task of the synthesis of the regulator and the observer is considered as a system that can provide the specified (desired) transition characteristics of a closed system</p> Zh.О Basheyeva М.А Beisenbi ##submission.copyrightStatement## 2019-02-08 2019-02-08 1 1 11 14 A Survey on Real Time Database <p>Real time database supports variety of applications as per their&nbsp;performance and response time. Data management in Real time&nbsp;system has been maintained to produce fast turnaround query&nbsp;time. In this paper will explain what are real time database&nbsp;applications and its characteristics in respect with data and its<br>consistency. It further explains transactions and scheduling.&nbsp;Policy to sustain against deadlock is explained and measures that&nbsp;results in to concurrency are explained and comparison is shown.</p> Krishna Shah Devansh Jani ##submission.copyrightStatement## 2019-02-21 2019-02-21 1 1 12 15 Advanced data analysis and data mining model for Internet of Things in smart city: A Survey <p>Abstract— as information is a vital asset, it is important to improve information quality and increment the adequacy of the information. Presently a day’s exercises and basic leadership in an association depends on information and data acquired from information examination, which gives different administrations to developing solid and exact process. In any case, recognizing different parts of information quality from definition, measurements, types, methodologies, strategies are basic to prepare techniques and procedures for enhancing information. The genuine reason for poor information quality can be ascribed to an absence of supporting business forms and inadequate investigation procedures. Superb information can expand open door for accomplishing top administrations in an association. In the meantime information quality appraisal is a precondition for advising the clients about the conceivable employments of the information. This paper audits the work done on information quality evaluation to enhance the nature of the information and considered multi layer information digging model for Internet of Things to address the issues in information accumulation. Give answer for the open difficulties in information gathering layer by embracing proposed information quality evaluation process with input system for information quality that has great expansibility and versatility and can address the issues of IoT information quality appraisal.</p> Seema S Sushma B ##submission.copyrightStatement## 2019-02-14 2019-02-14 1 1 16 23 Cascading of RBFN, PNN and SVM for Improved Type-2 Diabetes Prediction Accuracy <p>Diabetes is a metabolic disorder caused by a defect in insulin secretion or action (or both) leading to hyperglycemia (high glucose levels) . Over time, hyperglycemia damages nerves and blood vessels, leading to complications like heart disease, stroke, kidney disease, blindness, nerve problems, gum infections and amputation. In order to increase the classification accuracy on diabetes data in this paper a dual-stage cascaded ensemble framework is proposed. This frame work has two stages, the first stage consists of simple Radial Basis Neural Network (RBFN) and simple Probabilistic Neural Network (PNN). The results from both the neural networks are combined and serve as inputs to the second stage classifier called support vector machine. The soundness of proposed framework is validated using Pima Indians Diabetes dataset. The Experimental results indicate that the proposed Dual stage network out performs individual as well as state of-the-art models.</p> Krishna Swaroop Ramalingaswamy Cheruku Damoder Reddy Edla ##submission.copyrightStatement## 2019-02-15 2019-02-15 1 1 24 27 A Survey: Prospects of Internet of Things (IoT) Using Cryptography Based on its Subsequent Challenges <p>In Today’s era of information data plays vital role in communication, Security has been a ponderous affair for the professionals in any field. Security is not about only protection of assets but privacy and authority to access in legitimate terms too. Cryptography provides the functionality that protects and secures the data through its encryption algorithms and authentication to its end users. IoT has been most attractive topic/area in recent era. Privacy and security is an inseparable part of this technology. Which could affect in multi fold, so, the paper majorly focuses on four major challenges involving Security, Privacy, Compatibility and Connectivity of IOT and apprehension of IoT with its provided solution of using cryptographic algorithms.<br><br></p> Dhruvi Mewada Nidhi Dave Prof.Rohan Kumar Prajapati ##submission.copyrightStatement## 2019-02-15 2019-02-15 1 1 28 30 Machine to Machine Metamorphosis to the IOT <p>The Internet of Things (IoT) is going to be the next group of Internet revolution linking more and more devices on Internet network or encouraging domain for next-generation communication systems. The data transferred by the machines or set device over the internet should be safely secured, and the data should be transmitted only to the intended system, then delivering the data to any another users or devices. The Machine-To-Machines and Internet of Things (IoT) communications are used in the wide-areas of applications such as transportation, smart grids, interactive education, e-healthcare, home area networks, agriculture sector. This paper will focus the Machine-To-Machines and Internet of Things (IoT) and the subset of Industrial Internet of Things (IoT) ecosystem and also focuses on vulnerabilities and security prone issues, these paper will provide insight guidance and reference for future research works.</p> Pavan Manjunathmin Dr. Pritam Gajkumar Shah ##submission.copyrightStatement## 2019-02-16 2019-02-16 1 1 31 34 Intra-Optimised Lightweight Enciphering Algorithm based on MQTT Protocol for Internet of Things Secure Application <p>Recent advances in technology have led to rapid growth of Internet of Things (IoT) systems which incorporate numerous miniaturized low powered devices with large numbers of sensors and actuators collecting and exchanging data autonomously over the internet generating enormous amounts of data that needs to be secured. Traditional encryption algorithms are not suitable due to great complexity and numerous rounds for encryption and decryption operations. There is however a rising need for elaborate lightweight encryption algorithms with less complexity for optimum security in resource constrained communication networks. In this paper, a lightweight encryption algorithm called Intra-Optimized Lightweight Enciphering (ILE) Algorithm is proposed. The proposed scheme is complemented by watchdogs who are deployed in the clusters to achieve optimum security for the overall generated clusters at less cost and is simulated on Message Queue Telemetry Transport (MQTT) protocol using Mosquito broker in Cooja simulator and the performance was evaluated. Results from simulations show that the proposed algorithm offers significant security, improved performance and power drain without compromising the quality of service and further a comparison was made with existing lightweight algorithms.</p> Ronald Chiwariro S Rajendran ##submission.copyrightStatement## 2019-02-16 2019-02-16 1 1 35 40 Constructing An Appropriate Neural Network For Maximizing Sugarcane Yield In A Particular Region <p>With vast degree of industrialization there is a severe amount of depletion in the Levels of soil fertility which in turn could impact the growth of crops. Care needs to be taken to identify the right soil conducive for growing various kinds of crops. This work focuses on the ideal variety of sugar cane crop that could be grown in a particular type of soil in India which in turn could maximize the overall yield of sugarcane. An additional parameter dealing with the amount of sugar content has also been taken into consideration. The choice of an appropriate decision would go a long way in reducing avoidable losses in terms of both capital and effort. With this view in perspective, a wide range of artificial neural networks have been constructed and the results have been compiled. Besides, choices of appropriate training function and learning rates have been made.</p> Rajesh S Budihal S Krishna Anand ##submission.copyrightStatement## 2019-02-18 2019-02-18 1 1 48 55