International Journal of Wireless and Microwave Technologies @ijwmt
Статьи журнала - International Journal of Wireless and Microwave Technologies
Все статьи: 544

Research on Trustworthy Distributed System
Статья научная
To arrive at the goal of intensifying the trustworthiness and controllability of distributed systems, the core function of secure algorithms and chips should be fully exerted. Through building the trustworthy model between distributed system and user behaviors, constructing the architecture of trustworthiness distributed systems, intensifying the survivability of services, and strengthening the manageability of distributed systems, the secure problem of distributed systems is to be radically solved. By setting up the trustworthy computing circumstance and supplying the trustworthy validation and the active protection based on identity and behavior for trustworthy distributed system, we will reach the goal of defending the unaware viruses and inbreak. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy distributed system. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed.
Бесплатно

Research on Wireless Network Security Awareness of Average Users
Статья научная
Network insecurity has become an increasing problem in the world of computer networks. Technical experts have tried to combat this by improving the technical awareness of the threats and technical solutions involved in Wireless Local Networks (WLAN) through technical reports and policy enforcement. The average users' knowledge and awareness of network security, how they react to the warnings and implement security measures is also very important. Current studies on users' awareness of security policies, whether it has been communicated well enough and how aware WLAN users are to the threats and issues involved are still not fully ascertained. To fill this gap it is important to find out the users basic knowledge of the security measures and policies. In this paper, statistical methods were developed and adopted in other to compare the knowledge of Information Technology (IT) related employees and that of non-technical employees on how aware they are of WLAN security threats and security measures. The techniques the paper has adopted revealed the knowledge gap between non-technical and technical users. This revelation is significant and therefore requiring more efficient methods for creating awareness on WLAN threats and countermeasures among average users.
Бесплатно

Resource Efficient Security Mechanism for Cloud of Things
Статья научная
Cloud of Things (CoT) relates to the convergence between Cloud Computing (CC) and the Internet of Things (IoT) and has significantly transformed the way services are delivered in the ubiquitous realm of devices. This integration has become essential because of the huge data being generated by IoT devices, requiring an infrastructure for storage and processing. Such infrastructure is provided by Cloud Computing services with massive space for data storage and exceptional platform to process complex data. IoT networks are vulnerable to multiple security breaches because of the growing usage of IoT devices in user personal systems. This leads to security and privacy threats that need to be addressed. IoT consists of resource limited devices which have feeble computing power, battery source and storage capacity. This paper addresses security issue by proposing usage of obfuscation and encryption techniques to scramble the data at IoT devices which is later on stored in encrypted form at the cloud server. The data at IoT devices is classified into highly critical or less critical and accordingly the appropriate technique between encryption and obfuscation is applied. The proposed mechanism is evaluated in terms of processing time for cryptographic operations at IoT devices. Evaluation results depict that the proposed mechanism is 1.17 times faster than [22] in terms of encryption and decryption times.
Бесплатно

Review on Light Fidelity (Li-Fi) - An Advancement of Wireless Network
Статья научная
Nowadays, Li-Fi is becoming very popular and catching the interest of a number of users with its advanced technology-based features. It brings a new resolution in the wireless communication and people are showing so much curiosity to know about it. Li-Fi is an optical wireless communication-based technology which transmits data over the network through a light source like LED’s instead of radio frequency signals (RF) with very high data rate. The aim of this paper is to give full- fledged knowledge about Li-Fi & its applications. This paper also attempts to clarify the basic difference between wireless technologies and their evolution & how this new technology is leading all over the world with its features like less power consumption, less requirement of maintenance, & bi-directional in nature. Li-Fi eliminates the effect of harmful radiations that occur due radio signals as in Wi-Fi and has less latency rate. This paper gives an overview and the general idea about working on Li-Fi technology and how it will help in the development of bright future as it is beyond the expectations of end users.
Бесплатно

Roadmap from 4G to 6G in Smart Cities Impact and Challenges
Статья научная
The world is now turning towards automation also the use of virtual reality is expanding day by day, the need for faster and reliable communication has been increased. This technology will play a key role towards the development of Smart Cities, where government is majorly focusing. The urge of quicker and more secure communication (wireless) is making us switch towards the 6G or sixth generation communication. To the benefit of its citizens and businesses, a smart city is a location where the traditional networks and services have been enhanced via the use of digital and telecommunication technology. Infrastructure, social capital, which also includes traditional skills and community institutions, and digital technologies are all combined in smart cities to promote sustainable economic growth and provide a desirable environment for all residents. By 2035, the publisher believes that as smart city infrastructure develops, 6G will be a crucial component of communications, applications, content, and commerce in smart cities. We go over the progress of beyond 5G and advanced 5G features in order to forecast important 6G requirements and showcase 6G potential. In comparison to 5G, we will also discuss 6G scenarios, requirements, and technology components. There are lots of challenges associated with 5G’s wireless communication network one of them is limited data speed. We will also be focusing on these challenges associated with technology and also the plans to use this technology towards the development of smart cities. The 5G wireless communication network is currently facing the challenge of limited data speed and billions of data-intensive applications are used. To resolve this problem many developers and researchers are working on advanced technologies so that they can consummate the wireless service demands. So that we can shift ourselves from 5G to 6G and fulfil our expectations towards smart city. In addition, there are varied use cases of the wireless 6G technology in education, media and entertainment, tourism.
Бесплатно

Routing in Hybrid Software Defined Networking using Hop-Count Approach
Статья научная
Software-Defined Networking is a network framework that involves in separating a network’s control functions from its data forwarding functions, centralizing its intelligence, and abstraction its underlying architecture from applications and services. Hybrid Software-Define Networking is a framework which supports both the legacy protocols and the Software Defined Networking protocols to operate in the same environment. In this paper, we present an efficient technique for finding the shortest path between any two nodes in Hybrid SDN by reducing the complicated network topology to a basic topology while taking hop count into account. In the suggested proposal, a subgraph is generated from a complicated network, and the best path is found using a modified Bellman-Ford method, which saves time. The emulation test bed in Mininet was established for various numbers of nodes, and the results were analysed. The modified Bellman-Ford algorithm selects the optimal path between the two nodes. For networks with different numbers of nodes, the proposed approach offered a significant increase in the TCP throughput when compared with that of Spanning Tree Protocol. The number of packets received by the SDN controller is less with the proposed work. This increases TCP throughput by reducing the broadcast packets.
Бесплатно

SDN Interfaces: Protocols, Taxonomy and Challenges
Статья научная
The ever-increasing demands of Internet services like video on demand, big data applications, IoE and multi-tenant data centers have compelled the network industry to change its conventional non-evolving network architecture. Software Defined Network (SDN) has emerged as a promising network architecture which provides necessary abstractions and novel APIs to facilitate network innovations and simplifies network resource management by breaking the conventional network into multiple planes. All these SDN planes interact through open interfaces or APIs which are commonly categorized into southbound, northbound and west/eastbound interfaces. In this manuscript, we have identified and emphasized various communication protocols used at south and northbound interfaces. We have provided a taxonomy of south and northbound communication protocols based on their dependence, capabilities and properties. The pros and cons associated with each communication mechanism are highlighted and the numerous research challenges and open issues involved at these two interfaces are elucidated. In addition to it, we have proposed the necessary abstractions and extensions required in communication protocols at these two interfaces to simplify real-time monitoring and virtualization in next generation networks.
Бесплатно

SQL Injection Detection Tools Advantages and Drawbacks
Статья научная
SQL injection attack is a major threat to web application security. It has been rated as one of the most dangerous vulnerabilities for a web-based application. Based on the Open Web Application Security Project (OWASP), it is measured as one of the top ten. Many types of research have been made to face this attack either by preventing the threat or at least detecting it. We aim in this paper to give an overview of the SQL injection (SQLI) attack and classify these attacks and prevention and detection tools. We introduce the most current techniques and tools that are used to prevent and detect SQLI and highlight their strengths and weaknesses.
Бесплатно

Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network
Статья научная
In underwater environment, the sensor nodes are deployed for collecting information and sending back to the base station. Establishing astute communication link among these sensor nodes in a multi-link routing environment is a key challenge for all underwater routing protocols. A sagacious communication link can only guarantee the maximum data transfer rate. The link selection mechanism of three underwater routing protocol i.e, Energy-aware Opportunistic Routing (EnOR) protocol, Shrewd Underwater Routing Synergy using Porous Energy Shell (SURS-PES) and Underwater Shrewd Packet Flooding Mechanism (USPF) have been investigated. After analyzing performance results of these protocols interms of packet delivery ratio, end-to-end delay, network lifespan and energy consumption using NS2 with AquaSim 2.0 simulator. The protocol existing, with sagacious link selection mechanism in multi-link routing environment has been identified. The identification of this sagacious link selection mechanism is a novel approach which can give specific knowledge for targeted output without wasting resources for irrelevant objectives.
Бесплатно

Scheduling and Queuing Strategies for Energy Efficient Routings in WMSNs
Статья научная
The single-path transmission protocols, cause throughput degradation for multimedia applications, considering the limited bandwidth and energy constraint of multimedia sensor nodes. Congestion on the network is a result of the issue of transferring a large amount of data. For multimedia data with low reliability, single path routing necessitates real-time Quality of Service (QoS) parameters and large bandwidth congestions that arise in intermediate nodes due to low memory. Consequently, leading to queuing delays and packet loss. Each chosen path must independently fulfill the corresponding QoS criteria while building the multiple paths for a multimedia application. Finding multiple paths with low path costs and high reliability while achieving application-specific QoS parameters is the aim of the effort.
Бесплатно

Статья научная
Wireless body area networks (WBANs) are employed to monitor and collect physiological data using wearable and implantable sensor nodes for remote medical applications. Due to the sensitive nature of the data transmitted over open wireless channels, robust security measures are critical. WBANs are particularly susceptible to threats such as eavesdropping, man-in-the-middle attacks, node capture, and replay attacks. Moreover, the constrained nature of sensor nodes and duplicate occurrence of keys makes it challenging for cryptographic key management protocols to function efficiently without increasing the computational and storage overhead of the security protocol. This work proposes a secure and efficient key management protocol designed for key establishment, revocation, and renewal of compromised keys in WBANs. The protocol leverages elliptic curve cryptography (ECC) and integrates a keychain hash function mechanism to eliminate the reuse of keys and execute key computations efficiently. Furthermore, it utilizes an authentication method based on authentication tables, which reduces the number of messages exchanged and minimizes computational overhead. To guarantee the protocol's robustness, a formal validation using BAN logic was conducted, validating that the protocol meets key security requirements, which include, confidentiality, integrity, and authentication. An informal security analysis further demonstrates the protocol's resilience against impersonation, eavesdropping, man-in-the-middle, replay, and injection attacks. A performance evaluation of the protocol’s computational and storage costs was also carried out. The results show that while our protocol incurs lower computational costs compared to some related works, it exhibits slightly higher costs compared to others. In terms of storage overhead, our protocol outperforms most existing solutions. Future work will focus on optimizing the protocol and exploring further efficiency improvements in its implementation within a WBAN testbed.
Бесплатно

Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm
Статья научная
Mobile ad hoc networks (MANETs) are very useful in various scenarios where there is need of fast deployment of the network and expensive set up is not required. With these benefits, there are some issues related to these networks. One of these issues is of secure communication. Malicious nodes can easily attack existing routing protocols for MANETs like DSR. In this paper we have proposed a modification of DSR by using message digest. The proposed work produces better results in terms of different metrics when compared with the results of DSR. When a route is set up between the two communicating mobile nodes, the data is sent through a secure key which is not impossible for the intruder nodes to intercept. This halts intrusion in the network. A message digest is created of the data packets.
Бесплатно

Securing Musical Streams: Leveraging ElGamal Encryption in REST API Frameworks for PWAs
Статья научная
Subscription music platforms, like many web applications, increasingly rely on Progressive Web Apps (PWAs) to enhance user experience. These PWAs function by exchanging data with servers or REST APIs. However, the current reliance on REST APIs poses significant security risks due to vulnerabilities in data transmission. To address this issue, this research integrates the El Gamal cryptographic algorithm into the architecture of a subscription music platform. By incorporating the El Gamal cryptographic algorithm, this research endeavors to fortify the security posture of data exchanged between users and servers through REST APIs. This encryption method was selected for its robust resistance to various cryptographic attacks, providing a strong defense against unauthorized interception and tampering of sensitive information. To evaluate the efficacy of the El Gamal integration, a rigorous white box testing regimen was employed, encompassing metrics such as cyclomatic complexity and basic path testing. These assessments comprehensively examined the code's structure and execution to identify potential vulnerabilities and ensure the correct implementation of the cryptographic algorithm. The findings of the white box testing unequivocally demonstrated the successful integration of El Gamal cryptography on both the client and server components of the subscription music platform, effectively safeguarding the confidentiality and integrity of data transmitted via REST APIs. This research contributes to the advancement of secure communication protocols within web applications, particularly subscription-based platforms. Through the implementation of robust encryption, the study enhances data integrity and confidentiality, ultimately building user trust.
Бесплатно

Securing Peer-to-Peer Distributions with Trusted Platform Modules
Статья научная
We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution is based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.
Бесплатно

Статья научная
Vehicular Ad hoc Network could manage the various critical issues of road transport. That is why it is the most crucial field of research for most of the researchers. This survey paper discusses various issues related to Security Challenges, Security Architecture actors, Security Authentication, Application Constraints, various trust models etc. this paper encourages you to think about various fields of work need to be carried out in this field for the better VANET environment. Various schemes have been mentioned which could be improved further as per considering various real time conditions.
Бесплатно

Selecting the COTS Components Using Ad-hoc Approach
Статья научная
This paper presents the current scenario of our software industry which is deploying CBSE approach to construct high quality deliverable software products at shorter time to market. As both Vendor-specific and OSS COTS components are equally popular now-a-days. Hence, the availability of a wide range of COTS components in market is quite high. To select the best suitable candidate among the various available components, various formal methods and techniques like OTSO have been introduced by researchers. In this paper, COTS based software development & SDLC under CBSE tradition are discussed. Along with this discussion, it uncovers the fact that our software developers are applying Ad-hoc techniques as per their taste for making the selection of the most appropriate components for their projects rather than following the formal methods. Through this paper, various possible reasons behind the ‘Not-so-In-Use’ nature of these formal methods are being reported.
Бесплатно

Signal Strength Variation and Propagation Profiles of UHF Radio Wave Channel in Ondo State, Nigeria
Статья научная
This study investigated the received signal strength and the propagation profiles for UHF channel 23, broadcast signal in Ondo State, Nigeria, at various elevation levels. The signal strength was measured quantitatively across the state along several routes with the aid of a digital field strength meter. A global positioning system (GPS) receiver was used to determine the elevation above ground level, the geographic coordinates and the line of sight of the various data points from the base station. Data obtained were used to plot the elevation and propagation profiles of the signal along measurement's routes. Results showed that the signal strength was strongest towards the northern parts with respect to distance compared to other routes with the same distance contrary to inverse square law. The threshold signal level for the station was 20dBµV which was recorded up to 50km line of sight from the transmitter towards the northern parts of the state where higher levels of elevation of data locations were recorded and 42km towards the southern parts with lower values of elevation. The propagation profiles for all the routes follow the elevation pattern of the study areas, with some farther locations recording higher signal strength compared to closer locations to the transmitter contrary to theoretical expectation. The overall results show that elevation above ground level is a key factor to be considered for UHF transmission and reception (location of transmitters, transmitting antenna's height, directivity and gain. Others are, transmitter output power, receiving antenna's height and gain) in the study areas.
Бесплатно

Simulation Design of AOS Cross Layer Transmission
Статья научная
In this paper, the AOS effective throughput rate is analyzed firstly. Then, in order to improve the effective throughput rate, a scheme of AOS cross layer transmission system is presented. In the proposed scheme, based on the space channel state, the dynamic optimization parameters of AOS Space Date Link Protocol sublayer and AOS Sync and Channel Coding sublayer are selected. Then the switch thresholds are presented. Finally, the effective throughput rate of the proposed AOS cross layer transmission system is simulated. Simulations show that the throughput rate can be optimized effectively.
Бесплатно

Статья научная
In this paper, simulation of rectangular ring micro-strip patch antenna for ultra wideband (UWB) wireless applications is done. The attractiveness of this antenna is that it employs solo patch that makes it easy to fabricate and economical as well. It also mitigates the issue of misalignment. By making use of matching rectangular strips, impedance bandwidth enhancement is also attained. At centre frequency return loss is not more than -10dB. It demonstrates superior radiation characteristics and reasonable gain in the whole operating band. In the designing of proposed antenna, micro-strip feeding is used for power supply purpose. CST Microwave studio suit 10 is used for the simulation purpose of the proposed antenna, which is a 3D electromagnetic field tool for simulation of electromagnetic field in all frequency bands. After simulation of proposed antenna, enhancement in impedance bandwidth of 20.60%, frequency range of 1.8533 GHz, radiation efficiency of 92.51%, and gain of 3.765dbi are obtained.
Бесплатно

Smart Factory based on IIoT: Applications, Communication Networks and Cybersecurity
Статья научная
Smart factory represents one of the main Industrial Internet of Things applications that contribute in the industrial activities in the smart cities. This field acquires a special attention with the age of industry 4 from upgrading the passive machine into cyber physical system point of view. However, the process of developing the traditional factory into smart factory faces some issues regarding to handle smart and safe management such as handling the requirements of smart factory applications and the communication networks that should transfer the data among different parts. The current review paper highlights the up-to-date related works in the field of industry 4 in terms of industrial internet of things (IIoT) to filling the gap between the operational technologies and information technologies. Hence, the different architectures of IIoT are taken into consideration of research paper scope in terms of investigation and analysis. This work concentrates on the smart factory application and aims to connect between applications requirements and communication networks in the field of the smart factory in order to hold the optimum management to this aspect. Moreover, the expected cyberthreats and cyberattacks in the smart factory are captured in this work to explain the suitable countermeasures against such cyberattacks.
Бесплатно