JOURNAL OF MOBILE COMPUTING, COMMUNICATIONS & MOBILE NETWORKS https://stmcomputers.stmjournals.com/index.php/JoMCCMN <p align="center"><strong>ISSN: 2349-901X</strong></p> <p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> 6.035</p> <p align="center"><strong>Index Copernicus </strong>(<a href="https://journals.indexcopernicus.com/search/details?id=124977">ICV: 56.07</a>)</p> <p><strong>Journal DOI no</strong>.: 10.37591/JoMCCMN</p> en-US Tue, 28 Nov 2023 00:00:00 +0000 OJS 3.3.0.7 http://blogs.law.harvard.edu/tech/rss 60 Enhancing Secure Communication Through Hybrid Steganography and Public Key Cryptography https://stmcomputers.stmjournals.com/index.php/JoMCCMN/article/view/750 <p><em>This research pioneers an innovative paradigm in secure data communication by seamlessly merging Public Key Digital Image Steganography with public key cryptography. The proposed method leverages the formidable strength of the RSA algorithm, employing a robust 1024-bit key size for secure data encryption. In parallel, the imperceptibility of the F5 steganographic technique is harnessed to clandestinely embed the encrypted message within a cover image. Unlike conventional methods, our scheme introduces matrix embedding, a technique that minimizes alterations to the message length while providing unparalleled steganographic capacity, expedited processing, and resilience against both visual and statistical attacks. The RSA algorithm, with its robust 1024-bit key size, forms the bedrock of our cryptographic framework. This asymmetric encryption technique not only facilitates secure data transmission through robust key exchange but also ensures the confidentiality of the concealed message. Simultaneously, the F5 steganographic technique is employed to achieve imperceptible embedding, seamlessly integrating the encrypted message within the cover image without compromising visual integrity. In a departure from traditional approaches, our scheme introduces matrix embedding, a novel technique that optimizes the concealment process. This innovative method minimizes changes to the message length, thereby preserving the integrity of the concealed information. The result is a system characterized by high steganographic capacity, expedited processing speed, and a robust defense against both visual and statistical attacks. The experimental validation of our proposed method encompasses a thorough assessment of steganographic capacity, processing speed, and robustness. The results not only endorse the effectiveness of the RSA-F5-matrix embedding hybrid but also underscore its practical viability. The scheme emerges as a robust solution for secure data communication, offering a delicate balance between security, efficiency, and concealment integrity.</em></p> Ushaa Eswaran, Vivek Eswaran, Keerthna Murali, Vishal Eswaran Copyright (c) 2023 JOURNAL OF MOBILE COMPUTING, COMMUNICATIONS & MOBILE NETWORKS https://stmcomputers.stmjournals.com/index.php/JoMCCMN/article/view/750 Wed, 31 Jan 2024 00:00:00 +0000 Revolution of Digital Payment in India https://stmcomputers.stmjournals.com/index.php/JoMCCMN/article/view/735 <p><em>India's digital payment revolution is rewriting the country's financial narrative at a remarkable pace. Fuelled by the phenomenal success of the Unified Payments Interface (UPI), India has witnessed a staggering surge in digital transactions. To put it in perspective, in financial year 2023, more than 100 billion digital transactions took place across India. This study aims to examine the digital payment revolution in India, delving into the various factors driving this transformation. The digital payment revolution began predominantly in 2016, following demonetization, and has continued to grow ever since. In addition to demonetization, several other factors have contributed to this revolution, such as increased access to the internet, the impact of COVID-19, rising financial literacy, and various government initiatives. In addition to these aspects, the research work examines the changing consumer behaviour and preferences, along with the socio-economic impact of digital payment adoption, particularly on rural and unbanked populations. Increased influence of Fintech companies, digital wallets, and mobile banking applications have provided innovative and user-friendly platforms for conducting transactions. And we also discussed about the Hackers disruption in UPI transaction in India, causing financial instability and loss of trust in digital payment system. But Regulatory support from the Reserve Bank of India (RBI) has been instrumental in shaping the digital payment landscape. The RBI's policies and regulations have not only ensured the security of digital transactions, but also in the future, RBI is planning its Digital Currency. Understanding the pivotal role of finance in India's digital payment revolution is critical for both professionals and policymakers, as they navigate a landscape where innovation knows no bounds. </em></p> Shubham Badak, Vaibhav Kolte, Mamta Agrawal, Sonia Gupta Copyright (c) 2023 JOURNAL OF MOBILE COMPUTING, COMMUNICATIONS & MOBILE NETWORKS https://stmcomputers.stmjournals.com/index.php/JoMCCMN/article/view/735 Tue, 16 Jan 2024 00:00:00 +0000 User Engagement in Mobile Applications: Modeling and Predicting https://stmcomputers.stmjournals.com/index.php/JoMCCMN/article/view/734 <p><em>The mobile ecosystem is expanding rapidly, making app developers highly competitive. To keep users engaged, apps can anticipate when they might disengage, allowing developers to implement intervention tactics. This work demonstrates that it is possible to accurately forecast user disengagement using numerical models. The framework includes Cox proportional hazards, negative binomial, random forest, boosted-tree, and optimized agglomerative hierarchical clustering models. A 12-month observation dataset from a trash recycling app development validates the approach. The optimal clustering model enhances UE predictability and user identification, with random forest classifiers or boosted-tree methods yielding the best results.</em></p> B.M. Rajesh, Archana C., Santhiya G. Copyright (c) 2023 JOURNAL OF MOBILE COMPUTING, COMMUNICATIONS & MOBILE NETWORKS https://stmcomputers.stmjournals.com/index.php/JoMCCMN/article/view/734 Thu, 11 Jan 2024 00:00:00 +0000 Enhancing Wireless Network Security: A Comprehensive Review and Future Perspectives https://stmcomputers.stmjournals.com/index.php/JoMCCMN/article/view/732 <p><em>This study provides a thorough examination of wireless network security, addressing current challenges and proposing future strategies for enhanced protection. It delves into vulnerabilities such as eavesdropping, unauthorized access, and denial-of-service attacks prevalent in wireless environments. The study explores cryptographic protocols, intrusion detection systems, and authentication mechanisms crucial for safeguarding wireless networks. Additionally, it discusses emerging technologies, including machine learning and blockchain, as potential solutions to fortify wireless security. This comprehensive review aims to guide researchers, practitioners, and policymakers in shaping the future of secure wireless communication.</em></p> Ajish M. Thomos, Soni Joy, Rose Mariya Joy Copyright (c) 2023 JOURNAL OF MOBILE COMPUTING, COMMUNICATIONS & MOBILE NETWORKS https://stmcomputers.stmjournals.com/index.php/JoMCCMN/article/view/732 Wed, 24 Jan 2024 00:00:00 +0000 Compound Transmission Security for Mobile Cloud Computing Using Spread Spectrum Technique https://stmcomputers.stmjournals.com/index.php/JoMCCMN/article/view/733 <p><em>By accessing data stored in remote data centres, "mobile cloud computing" provides users with IT services tailored to their specific needs. It also provides the infrastructure to support hosting for pervasive applications in the corporate, scientific, and consumer spheres. The cloud or data centre server cannot automatically lease the appropriate amount of services based on the needs of the users. So, Mobile Cloud Computing (MCC) consists of three sub-modules viz. Mobile Computing, Wireless Communication Networks, and Cloud Computing. While keeping least costs to a minimum and offloading to cloud infrastructures, the following are the basic ideas that will form the basis of the proposed study on the secure scheduling of resources in mobile cloud computing. In our research study, we are using 5G Cellular Technology as a mode of wireless communication. When offloading and retrieving data from a cloud data centre, the 5th generation of mobile communications is expected to spur innovation in vertical sectors. These verticals generate many use cases with different requirements that future 5G networks must efficiently handle. Network slicing may be a logical way to support a large range of vertical-specific services on single network architecture. This study introduces network slicing for 5G systems. The key elements that enable network slicing are summarised first. Next, we introduce the ONF's SDN architecture and demonstrate its slicing tools. Although such a design enables network slicing, it lacks key functionalities that NFV can provide. Thus, we examine ETSI's SDN-NFV architecture proposal. We also show an SDN-NFV scenario for network slice realization. FHSS systems safeguard wireless communication from jamming and unwanted signal reception. The jammer or unwanted receiver must not know the spreading code to achieve such themes. Unencrypted M-sequences cannot spread code securely. Hidden frequency hopping, an encryption mechanism applied to spreading codes, is proposed to improve FHSS security. All spread spectrum data transmission systems can use the proposed encryption security algorithm, which is dependable. FHSS's multi-user detection makes multiuser interference important to study. Thus, optimum pair "key-input" selection is provided to reduce interference below the specified constant threshold. It is essential to have architecture in place that can automatically handle resource allocation policies and a scheduling algorithm. Next, we will talk about some approaches to security algorithms during wireless communication mode offloading and retrieving data from the cloud server. Finally, we summarise the open research issues to encourage further research.</em></p> Vikram Patalbansi, Jayshree Jain, G. Prasnna Laxmi Copyright (c) 2023 JOURNAL OF MOBILE COMPUTING, COMMUNICATIONS & MOBILE NETWORKS https://stmcomputers.stmjournals.com/index.php/JoMCCMN/article/view/733 Thu, 11 Jan 2024 00:00:00 +0000