https://ijccn.com/index.php/IJCCN/issue/feed International Journal of Computing and Communication Networks 2020-09-12T18:52:13+00:00 Editor-in-Chief editorial@ijccn.com Open Journal Systems https://ijccn.com/index.php/IJCCN/article/view/17 An Overview of Internet of Things: Understanding the Issues and Challenges of a More Connected World 2020-09-12T18:52:13+00:00 Muhammad Saidu Aliero msaidua2000@gmail.com Abubakar Musa Ahmad msaidua2000@gmail.com Ubaida Shehu Kalgo msaidua2000@gmail.com Salisu Adamu Aliero msaidua2000@gmail.com <p style="text-align: justify;">Internet of Things (IoT) is an emerging filed for technical, social, and economic significance. Consumer products, durable goods, cars and trucks, industrial and utility components, sensors, and other everyday objects are being combined and connected with Internet and powerful data analytic capabilities that promise to transform the traditional services. Projection of IoT on the Internet and economy is impressive, with some anticipating as many as 100 billion connected IoT devices and a global economic impact of more than $11 trillion by 2025. At the same time, the IoT has been suffered from various challenges that need to be addressed with new standards, methods, and systems and provide more potential benefits. Attention-grabbing headlines about the hacking of Internet-connected devices, surveillance concerns, and privacy fears already have captured public attention. Technical challenges need new standards and policies, legal and development challenges need new methods and systems. This review paper presents a detail about current IoT challenges to help the new researchers in this area and filed to navigate the dialogue surrounding the IoT in the light of the competing predictions about its promises and perils. &nbsp;</p> 2020-04-24T00:00:00+00:00 ##submission.copyrightStatement## https://ijccn.com/index.php/IJCCN/article/view/26 Blockchain Consensuses Algorithms Based on Proof of Work: A Comparative Analysis 2020-09-12T18:52:13+00:00 Amal Alrashid Mohamed Amooly5151@gmail.com Ashraf Osman Ibrahim ashrafosman2@gmail.com <p>This paper is addressing the comparison of proof of work to the alternatives that are either hybrid with the proof of work or work as the same way as it. The algorithms that satisfies these criteria was proof of capacity, proof of activity, and trinity consensus algorithm. The research was conducted to specify which consensus algorithm has provided a better enhancement for the limitations of proof of work consensus algorithm. Current investigation focused on the enhancements in energy and electricity consumption, possibility of majority attack, and the efficiency of the cryptographic algorithm within each of the selected consensus algorithm. Results of the comparison showed that trinity consensus algorithm has achieved 25.01% better hardware energy consumption, and better scalability by 400% bigger block size, 128571.4% more transaction rate, instant block and transaction times, and 33.3% less confirmations. While having the maximum costs of maintaining the majority of the network resources but it recorded the lowest efficiency of encryption algorithm of 527 ms run time, 76.4 CPU utilization, and 4.357 memory utilization. From the given results we can conclude that the trinity consensus algorithm is a great alternative that could enhance the Proof of Work Blockchain limitations&nbsp;impressively, and it could one day dominate the world of Blockchain as more efficient alternative to Proof of work.</p> 2020-04-24T00:00:00+00:00 ##submission.copyrightStatement## https://ijccn.com/index.php/IJCCN/article/view/27 Automatic Fake News Detection: Issues and Solutions 2020-09-12T18:52:13+00:00 Ali Raza aliraza.1354@gmail.com Shafiq Ahmed Aliraza.1354@gmail.com Mariam Bibi Aliraza.1354@gmail.com Malik Rehan Aliraza.1354@gmail.com Hira Anwar Aliraza.1354@gmail.com <table> <tbody> <tr> <td width="685"> <p>Internet and social media have gained popularity due to its involvement in human life for any sort of information access and sharing social life stories and events generally. It is observed that every one-in-three person has to access social media platforms throughout the world. With the popularity of social media, there are some issues related to fake information or news. Fake news has a serious impact on societies in terms of ethical, social, and financial matters. It is more serious when fake news is used for any political benefits, against forces and military establishment. This paper presents comprehensive literature to highlight fake news issues and available datasets such as Facebook, Twitter, and Weibo. This paper also discusses the available solutions and algorithms such as naïve based, NLP techniques, artificial intelligence algorithms. The paper reviewed the latest research and reputable journal and technically discussed their highlighted factors. This review paper will benefit the new researchers in the field of automatic fake news detection and prevention for their research. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p> </td> </tr> </tbody> </table> <p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</p> 2020-09-12T15:12:28+00:00 ##submission.copyrightStatement## https://ijccn.com/index.php/IJCCN/article/view/28 Security Threats in Cloud Computing: Trend and Challenges 2020-09-12T18:52:13+00:00 Kaneez e Rubab rubab.ansari25@yahoo.com Talha Azhar mohammadtalha01@gmail.com Muhammad Anwar anwer.mirza@gmail.com Saqib Majeed saqibmajeed23874@iqraisb.edu.pk <p>Recently due to the increasing popularity of cloud computing, the people are attracting<br>their services and offers without knowing the security threats. Users think that that cloud is more<br>secure as compared to any other services. This fact leads to serious problems for users. This is why<br>the security of the cloud has become a major issue. In this paper, we investigate the recent and most<br>common threats of cloud computing. After a detailed investigation, we discuss the seven major<br>threats related to cloud computing. These risks are related to cloud computing and are the main<br>guidance for risk analysis for organizations or customers to switch their services on the cloud<br>computing platform. The organization or customers must know about these threats before adapting<br>any cloud service or interface. This paper will guide the new researchers in the field of cloud<br>computing and its security services to design more secure and reliable solutions in the future.</p> 2020-09-12T18:31:36+00:00 ##submission.copyrightStatement##