Статьи журнала - International Journal of Wireless and Microwave Technologies

Все статьи: 532

Securing Musical Streams: Leveraging ElGamal Encryption in REST API Frameworks for PWAs

Securing Musical Streams: Leveraging ElGamal Encryption in REST API Frameworks for PWAs

Timothy John Pattiasina

Статья научная

Subscription music platforms, like many web applications, increasingly rely on Progressive Web Apps (PWAs) to enhance user experience. These PWAs function by exchanging data with servers or REST APIs. However, the current reliance on REST APIs poses significant security risks due to vulnerabilities in data transmission. To address this issue, this research integrates the El Gamal cryptographic algorithm into the architecture of a subscription music platform. By incorporating the El Gamal cryptographic algorithm, this research endeavors to fortify the security posture of data exchanged between users and servers through REST APIs. This encryption method was selected for its robust resistance to various cryptographic attacks, providing a strong defense against unauthorized interception and tampering of sensitive information. To evaluate the efficacy of the El Gamal integration, a rigorous white box testing regimen was employed, encompassing metrics such as cyclomatic complexity and basic path testing. These assessments comprehensively examined the code's structure and execution to identify potential vulnerabilities and ensure the correct implementation of the cryptographic algorithm. The findings of the white box testing unequivocally demonstrated the successful integration of El Gamal cryptography on both the client and server components of the subscription music platform, effectively safeguarding the confidentiality and integrity of data transmitted via REST APIs. This research contributes to the advancement of secure communication protocols within web applications, particularly subscription-based platforms. Through the implementation of robust encryption, the study enhances data integrity and confidentiality, ultimately building user trust.

Бесплатно

Securing Peer-to-Peer Distributions with Trusted Platform Modules

Securing Peer-to-Peer Distributions with Trusted Platform Modules

Hao Li, Yu Qin, Qianying Zhang, Shijun Zhao

Статья научная

We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution is based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.

Бесплатно

Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey

Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey

Akash Vaibhav, Dilendra Shukla, Sanjoy Das, Subrata Sahana, Prashant Johri

Статья научная

Vehicular Ad hoc Network could manage the various critical issues of road transport. That is why it is the most crucial field of research for most of the researchers. This survey paper discusses various issues related to Security Challenges, Security Architecture actors, Security Authentication, Application Constraints, various trust models etc. this paper encourages you to think about various fields of work need to be carried out in this field for the better VANET environment. Various schemes have been mentioned which could be improved further as per considering various real time conditions.

Бесплатно

Selecting the COTS Components Using Ad-hoc Approach

Selecting the COTS Components Using Ad-hoc Approach

Somya Goyal, Anubha Parashar

Статья научная

This paper presents the current scenario of our software industry which is deploying CBSE approach to construct high quality deliverable software products at shorter time to market. As both Vendor-specific and OSS COTS components are equally popular now-a-days. Hence, the availability of a wide range of COTS components in market is quite high. To select the best suitable candidate among the various available components, various formal methods and techniques like OTSO have been introduced by researchers. In this paper, COTS based software development & SDLC under CBSE tradition are discussed. Along with this discussion, it uncovers the fact that our software developers are applying Ad-hoc techniques as per their taste for making the selection of the most appropriate components for their projects rather than following the formal methods. Through this paper, various possible reasons behind the ‘Not-so-In-Use’ nature of these formal methods are being reported.

Бесплатно

Signal Strength Variation and Propagation Profiles of UHF Radio Wave Channel in Ondo State, Nigeria

Signal Strength Variation and Propagation Profiles of UHF Radio Wave Channel in Ondo State, Nigeria

A. Akinbolati, O. Akinsanmi, K.R. Ekundayo

Статья научная

This study investigated the received signal strength and the propagation profiles for UHF channel 23, broadcast signal in Ondo State, Nigeria, at various elevation levels. The signal strength was measured quantitatively across the state along several routes with the aid of a digital field strength meter. A global positioning system (GPS) receiver was used to determine the elevation above ground level, the geographic coordinates and the line of sight of the various data points from the base station. Data obtained were used to plot the elevation and propagation profiles of the signal along measurement's routes. Results showed that the signal strength was strongest towards the northern parts with respect to distance compared to other routes with the same distance contrary to inverse square law. The threshold signal level for the station was 20dBµV which was recorded up to 50km line of sight from the transmitter towards the northern parts of the state where higher levels of elevation of data locations were recorded and 42km towards the southern parts with lower values of elevation. The propagation profiles for all the routes follow the elevation pattern of the study areas, with some farther locations recording higher signal strength compared to closer locations to the transmitter contrary to theoretical expectation. The overall results show that elevation above ground level is a key factor to be considered for UHF transmission and reception (location of transmitters, transmitting antenna's height, directivity and gain. Others are, transmitter output power, receiving antenna's height and gain) in the study areas.

Бесплатно

Simulation Design of AOS Cross Layer Transmission

Simulation Design of AOS Cross Layer Transmission

Bi Mingxue, Wang Hongxia

Статья научная

In this paper, the AOS effective throughput rate is analyzed firstly. Then, in order to improve the effective throughput rate, a scheme of AOS cross layer transmission system is presented. In the proposed scheme, based on the space channel state, the dynamic optimization parameters of AOS Space Date Link Protocol sublayer and AOS Sync and Channel Coding sublayer are selected. Then the switch thresholds are presented. Finally, the effective throughput rate of the proposed AOS cross layer transmission system is simulated. Simulations show that the throughput rate can be optimized effectively.

Бесплатно

Simulation of rectangular ring micro-strip patch antenna to enhance impedance bandwidth for UWB wireless applications

Simulation of rectangular ring micro-strip patch antenna to enhance impedance bandwidth for UWB wireless applications

Anant Raj Mishra, Ankit Gambhir, Rajeev Arya

Статья научная

In this paper, simulation of rectangular ring micro-strip patch antenna for ultra wideband (UWB) wireless applications is done. The attractiveness of this antenna is that it employs solo patch that makes it easy to fabricate and economical as well. It also mitigates the issue of misalignment. By making use of matching rectangular strips, impedance bandwidth enhancement is also attained. At centre frequency return loss is not more than -10dB. It demonstrates superior radiation characteristics and reasonable gain in the whole operating band. In the designing of proposed antenna, micro-strip feeding is used for power supply purpose. CST Microwave studio suit 10 is used for the simulation purpose of the proposed antenna, which is a 3D electromagnetic field tool for simulation of electromagnetic field in all frequency bands. After simulation of proposed antenna, enhancement in impedance bandwidth of 20.60%, frequency range of 1.8533 GHz, radiation efficiency of 92.51%, and gain of 3.765dbi are obtained.

Бесплатно

Smart Factory based on IIoT: Applications, Communication Networks and Cybersecurity

Smart Factory based on IIoT: Applications, Communication Networks and Cybersecurity

Yazen S. Sheet, Mohammed Younis Thanoun, Firas S. Alsharbaty

Статья научная

Smart factory represents one of the main Industrial Internet of Things applications that contribute in the industrial activities in the smart cities. This field acquires a special attention with the age of industry 4 from upgrading the passive machine into cyber physical system point of view. However, the process of developing the traditional factory into smart factory faces some issues regarding to handle smart and safe management such as handling the requirements of smart factory applications and the communication networks that should transfer the data among different parts. The current review paper highlights the up-to-date related works in the field of industry 4 in terms of industrial internet of things (IIoT) to filling the gap between the operational technologies and information technologies. Hence, the different architectures of IIoT are taken into consideration of research paper scope in terms of investigation and analysis. This work concentrates on the smart factory application and aims to connect between applications requirements and communication networks in the field of the smart factory in order to hold the optimum management to this aspect. Moreover, the expected cyberthreats and cyberattacks in the smart factory are captured in this work to explain the suitable countermeasures against such cyberattacks.

Бесплатно

Smart Home Security Using Facial Authentication and Mobile Application

Smart Home Security Using Facial Authentication and Mobile Application

Khandaker Mohammad Mohi Uddin, Shohelee Afrin Shahela, Naimur Rahman, ‪Rafid Mostafiz‬, Md. Mahbubur Rahman‬‬‬

Статья научная

In this fast-paced technological world, individuals want to access all their electronic equipment remotely, which requires devices to connect over a network via the Internet. However, it raises quite a lot of critical security concerns. This paper presented a home automation security system that employs the Internet of Things (IoT) for remote access to one's home through an Android application, as well as Artificial Intelligence (AI) to ensure the home's security. Face recognition is utilized to control door entry in a highly efficient security system. In the event of a technical failure, an additional security PIN is set up that is only accessible by the owner. Although a home automation system may be used for various tasks, the cost is prohibitive for many customers. Hence, the objective of this paper is to provide a budget and user-friendly system, ensuring access to the application and home attributes by using multi-modal security. Using Haar Cascade and LBPH the system achieved 92.86% accuracy while recognizing face.

Бесплатно

Smart locker: IOT based intelligent locker with password protection and face detection approach

Smart locker: IOT based intelligent locker with password protection and face detection approach

Niaz Mostakim, Ratna R. Sarkar, Md. Anowar Hossain

Статья научная

In today’s world, security becomes a very important issue. We are always concerned about the security of our valuables. In this paper, we propose an IOT based intelligent smart locker with OTP and face detection approach, which provides security, authenticity and user-friendly mechanism. This smart locker will be organized at banks, offices, homes and other places to ensure security. In order to use this locker firstly the user have to login. User has to send an unlock request code (OTP) and after getting a feedback Email with OTP, he/she will be able to unlock the locker to access his/her valuables. We also introduce face detection approach to our proposed smart locker to ensure security and authenticity.

Бесплатно

Smarter Way to Access Multiple Mobile Cloud Applications without Interoperability Issues

Smarter Way to Access Multiple Mobile Cloud Applications without Interoperability Issues

P Thanapal, K Marimuthu, S Rajkumar, R Niranchana

Статья научная

As we are in the world of emerging technologies people have more awareness about it especially Smartphone’s. Usage of Smartphone’s has been increased tremendously. Different operating systems (OS) are used in smart phones such as MAC OS, Android, and Windows OS etc. Most of the applications are run on their appropriate platform. Cloud is the simplest way to run certain application over cross platforms. Many cloud vendors are there who provides several kinds of applications and software which can be accessed by the users. In that Application Programming Interfaces (APIs) helps us to create a cloud application over the market. However there will be chances to occur Interoperability issues while users were working on a cross platforms. In order to overcome this issue a framework has been proposed named Mobile Cloud Middleware (MCM). MCM will recover the interoperability issues over multiple cloud services on mobile devices. Here in this paper we proposed effective result to solve the Interoperability issue by integrating Mobile Enterprise with MCM.

Бесплатно

Software Defect Detection-oriented Static Analysis Techniques

Software Defect Detection-oriented Static Analysis Techniques

Hua ZHANG

Статья научная

This paper mainly studies the method of static analysis techniques; discuss static analysis techniques status and progress, as well as the characteristics of static analysis.

Бесплатно

Software Defined Network: The Next Generation Internet Technology

Software Defined Network: The Next Generation Internet Technology

Kshira Sagar Sahoo, Sambit Kumar Mishra, Sampa Sahoo, Bibhudatta Sahoo

Статья научная

Software Defined Networks is an emerging network paradigm which introduces programmability to networks and has the capability to dynamically configure the network. In a traditional IP based network the control part and the data forwarding elements are imposed in a single box that has very limited ability to configure the network, some vendor specific codes run on the forwarding elements to perform this task. SDN takes another approach by decoupling the controller part from the data plane part. It is the next generation Internet technology that solves the ossification of the Internet, along with creating massive innovations so that network management can be easily handled. In this paper, we are trying to explore the different layers, various protocols supported by SDN, along with discuss the numerous benefits of it.

Бесплатно

Sorting of Acrylonitrile-Butadiene-Styrene and Polystyrene Plastics by Microwave Cavity Resonance

Sorting of Acrylonitrile-Butadiene-Styrene and Polystyrene Plastics by Microwave Cavity Resonance

Yuya Mori, Takehiko Kobayashi, KenTahara

Статья научная

This paper presents a new sorting method for acrylonitrile-butadiene-stryrene (ABS) and poly styrene (PS) by means of microwave cavity resonator perturbation. In this method, a small piece of sample material is inserted into a cavity resonator at a point when the electric and magnetic fields mark the maximum and the minimum values, respectively. Experiments were carried out with use of 1-, 2-, 5-, and 10-GHz resonators and ABS and PS samples of various sizes. Loss angles of polarizability (tan χ) exhibited differences large enough to achieve accurate sorting between ABS and PS.

Бесплатно

Spectrum Sharing Technologies for Cognitive IoT Networks: Challenges and Future Directions

Spectrum Sharing Technologies for Cognitive IoT Networks: Challenges and Future Directions

Bekele M. Zerihun, Thomas O. Olwal, Murad R. Hassen

Статья научная

In recent years, the number of devices connected to the Internet has been increased exponentially, which creates a new ecosystem known as the Internet of Things (IoT). According to Cisco’s prediction, it is expected that over 50 billion devices will be connected to the Internet by 2020. In fact, IoT is expected to be a key enabling technology to accommodate the massive connectivity of heterogeneous smart devices in the upcoming fifth-generation networks. However, in a limited resource environment, the existing spectrum will not be sufficient to satisfy all these spectrum demand. Sharing the idle spectrum in licensed and unlicensed bands is a feasible solution for effective IoT deployment. Therefore, in this paper, we provide a survey of advanced spectrum sharing techniques and emerging IoT technologies to exploit the spectrum both in existing licensed cellular infrastructures and unlicensed spectrum bands. To the best of our knowledge, different from the existing literature, we identify the potential research challenges and suggest future directions for efficient IoT deployment in next-generation wireless networks.

Бесплатно

Structure and Control of Flywheel Energy Converter

Structure and Control of Flywheel Energy Converter

Yiming He, Xianyi Qian

Статья научная

On the basis of the flywheel energy converter’s structure in wind power turbine, we have used permanent-magnet synchronism motor as energy converter and built mathematical model. We have studied and realized control method of wind power turbine’s constant output power. By analyzing the mathematical model, we have concluded that the needed time of stored energy is three times longer than constant torque control time, and the needed motor power is one second of constant torque control. When flywheel starts from zero speed to basic speed ([(ω_max)/5]), the constant torque control method will be acquired. When flywheel speeds up between [(ω_max)/5] and ω_max , the amplitude power control will be acquired. What we have studied is very important to realize constant output power.

Бесплатно

Study of 2457 MHz WIFI Network Signal Strength at Indoor and Outdoor Enviroment

Study of 2457 MHz WIFI Network Signal Strength at Indoor and Outdoor Enviroment

Si Ting Ng, Y.S. Lee, Kavinesh S Radhakrishna, Thiruvarasu Muthu Krishnan

Статья научная

This paper presents a study of free space path loss of WIFI network using Cell Info Lite App and WIFI analyzer tool. This paper focuses on experimental tests by using WIFI router, mobile phones to measure and analyze the loss of signal strength over distance from 0 meter to 9 meter. The result of Free Space Path Loss (FSPL) for frequency 2457 MHz shows that the longer the distance, the worse the signal get. In addition, the experiment test indoor and outdoor was done analyse. The results of the comparison conclude that the signal strength becomes weak can affect by distance and obstacles such as door, wall. Signal strength also can say from colors which is when the measurement result shows green color is strong signal while orange color is weak signal and red color is bad signal. When the signal strength become weak Wi-Fi analyzer was displayed green zone to red zone. The paper purpose showed that where the area have a stronger/weaker connection in a house environment.

Бесплатно

Study on Quality Evaluation System for University Students

Study on Quality Evaluation System for University Students

He Yongqiang, Yang Mingming

Статья научная

From the qualitative and quantitative perspectives, by use of modern educational philosophy and statistics evaluation theory, this thesis makes study on the theory for university students’ comprehensive quality evaluation. It makes careful analysis on the students’ daily life according to their characters, and makes scientific classification after picking up the main aspects, and then, combining the design principle of indictor system and hierarchic method, it establishes scientific and reasonable comprehensive quality evaluation indicator system for university students, which is easy to operate and meets the demand of the age. So the system can measure and evaluate the comprehensive quality of university students in a more scientific and objective way. Meanwhile, this thesis puts forward effective methods for university students’ comprehensive quality evaluation under new situations.

Бесплатно

Study on Replica Strategy in the Grid Environment

Study on Replica Strategy in the Grid Environment

Rui-qiong Zhong, Yun-jia Xi, De-zhi Han

Статья научная

An effective replica management method can save bandwidth, reduce latency, balance load, and improve system reliability. A comprehensive scheme is introduced to manage replica for the grid environment. The schemes of replica creation and placement based on the frequency of visits and storage space, replica replacement based on the replica value, and replica selection based on comprehensive performance are proposed. Our scheme can achieve optimization of data distribution and replication, improve the efficiency of data visits in the grid environment.

Бесплатно

Study on System Architecture Design of University Students Quality Evaluation

Study on System Architecture Design of University Students Quality Evaluation

He Yongqiang, Wang Jiaxin

Статья научная

In order to improve the comprehensive qualities of students in all respects, fully reflect and evaluate the achievements of students, inspire students to improve themselves unceasingly, encourage them to strive to be the best, develop their personalities and strive for truth and innovation, as well as achieve the institutionalization, standardization and scientificalness of students management work gradually, meanwhile, along with the development of university construction and students management, maintenance and management of students' data information has been exceptionally heavy, so it cries out for a set of reasonable and convenient students quality evaluation system. Students' quality evaluation system is designed to make better use of computer technology in managing and inquiring about total performance of students' qualities. Through analysis of the objective of system construction, combining design principle of the system, this thesis analyses and designs the quality evaluation system architecture from the perspectives of architecture, function module and security model.

Бесплатно

Журнал