Статьи журнала - International Journal of Wireless and Microwave Technologies
Все статьи: 532
A Novel Approach to Simulate DDoS Attack
Статья научная
Due to the rapid spread of botnets, distributed denial of service attacks have become more and more frequent and fatal. In order to detect and defend DDoS attack, many researches have been done, such as using NS2 to simulate such attacks. However, the major bottlenecks in large-scale network simulation are the memory usage and simulation time. In this paper, we present a novel approach to simulate DDoS attack, called Analytical Packet Forwarding Model (APFM), which simplifies the procedure of packet forwarding based on computation. The experimental results show that our model ensures the authenticity of the overall simulation procedure and simulation results, compared to NS2. The most significant contribution of APFM is that it significantly reduced the memory usage and simulation time.
Бесплатно
Статья научная
In this paper, a novel compact dual-band complementary split ring resonator (CSRR)-loaded microstrip patch antenna placed on ground plane loaded with L-shape slot is proposed for satisfying WLAN and WiMAX applications simultaneously. The proposed antenna consists of a complementary split ring resonator (CSRR) embedded on the patch structure and an L-shape slot on the ground plane. The resonant frequency and effective parameters of the CSRR are also determined. In addition, a design evolution and various parametric analysis of the antenna are carried out in order to study the effects of various parameters and to provide information for designing, modifying, and optimizing such an antenna. The CSRR is exploited to create resonance at 5.775 GHz while the L-shape slot resonates at 3.550GHz for dual-band operation. The -10dB return loss bandwidths of the antenna are 290 MHz (3.40-3.69) GHz and 210MHz (5.65-5.86) GHz, which cover both the WiMAX frequency band (3.4-3.69) GHz and the WLAN frequency band (5.725-5.825) GHz. The overall size of the antenna is 37mm×25mm×1.6mm. Gains of 0.5dB and 2 dB are obtained at 3.550 GHz and 5.775 GHz, respectively.
Бесплатно
A Novel Dual Polarized Dual Feed Multi-Band Meander-Line Antenna for Mobile Applications
Статья научная
A multi-band dual polarized log periodic meander-line antenna is presented in this paper. The Ansoft HFSS 3-D EM simulator is employed for design simulation. The proposed antenna is realized on a FR-4 Epoxy substrate with εr = 4.4 and tan ξ = 0.02. The size of the antenna is 14.5 x 20 x 1.59 mm3. The proposed antenna is fabricated and comparison between simulated and measured result for return loss has been observed and is found in good agreement. In addition to micro-strip transmission line feed, a capacitive probe feed has been introduced and enhancement in impedance bandwidth has been observed as compared to only transmission line feeding method. Small size of the antenna enables itself to be introduced in complex systems and can be used for various applications including GSM1800/1900, WCDMA2100 and LTE1800/2300/3700 TDD for mobile handsets and mobile assisted health applications.
Бесплатно
A Novel Framework for Real-Time IP Reputation Validation Using Artificial Intelligence
Статья научная
This research paper introduces and discusses deeply an approach to the real-time IP reputation (IPR) concept and its validation process for an Amazon Web Services Web Application Firewall (AWS WAF) backend application safeguarding using intelligence (AI) technologies. Also, the study examines existing IP reputation solutions over AWS WAF which Evaluates methodologies highlighting the difficulties faced and real-world challenges in validating IPR while utilizing OpenAI’s generative AI language models the framework aims to automate the extraction and interpretation of IP-related information from AWS S3 real-time log storage sources such as logs, and natural language reports based on JSON structure. These dedicated algorithms developed, and AI model concepts are powered by processing language enabling them to identify incidents and detect patterns of IP behavior that should indicate security risks. Also, models do not directly access databases, as they can analyze data from APIs featured and with local maintenance database such that AbuseIPDB to evaluate the reputation of IP addresses Integrating AI into the process of validating IPs can greatly improve cybersecurity operations by summarizing findings and providing insights ultimately saving time and resources.
Бесплатно
A Novel IoT Based Approach to Notify Motion Detection in User’s Absence through Handheld Devices
Статья научная
Security Camera Notifier helps detect any motion (i.e., suspicious activity) happening in the personal room in the user’s absence. Nowadays, privacy & security are major concerns. User can install a security camera in the room which helps them to keep their belongings & any other important things safe under surveillance. Unlike other CCTV activities, this process doesn’t require 24hrs surveillance. It doesn’t require a long list of equipment like big cameras or a big screen (say TV) to watch activities or even a heavy budget. It is simple and easy to install. A stranger wouldn’t be able to guess that there’s a secret security camera installed in the room. This protocol works when a hidden camera placed in the room detects any motion in the user’s time off. A notification is sent to users mobile; the moment the camera detects any kind of motion (say someone entering the room). Here, the user would be provided with ‘@snap’ function, if he/she sends ‘@snap’ then the camera will capture a live picture of that moment and send it to the Smartphone. So, by this process security of the room is assured in user absence.
Бесплатно
Статья научная
Selecting high quality web services based upon QoS(Quality of Service) is a significant task in service-oriented computing environments. In this paper, according a real Quality of Web Service data sets:QWS Dataset (1.0), we developed a Weighted Grey Relational Analysis Model(WGRAM) for web service selection based on QoS, and combined with Analytic Hierarchy Process(AHP) and Grey Relational Analysis (GRA) to prioritize the relative importance of the QoS of web services. The comprehensive evaluation model (WGRAM) fully considered the influence of many factors given by experts, incorporating the qualitative analysis of the index of various factors and the quantization for scientific decision-making, it can provide weighted grey relational degree for each Web Services with the same functions(operations), and the grey relational sequence which can guide the optimal service selection from multiple functions similar service. The model possessed the characteristic of simple calculating process, and the result was reliable, It’s a reliable and effective method of web service quality factor assessment and a significant attempt for web services selection.
Бесплатно
A Novel Orthogonal Minimum Correlation Spreading Code in CDMA System
Статья научная
Code Division Multiple Access (CDMA) is a technique in which transmission of information takes place simultaneously over the same available channel bandwidth. CDMA systems make use of spread spectrum (SS) technique for transmission of information by employing spreading codes. Each user is assigned with a unique spreading code which acts as a signature code for that individual user. The CDMA system experiences Multiple Access Interference (MAI) and Inter Symbol Interference (ISI) because of the non-orthogonality of the spreading codes. Both the MAI and ISI are the functions of auto-correlation and cross-correlation values of the spreading code respectively. In this paper, a novel orthogonal spreading code called “Orthogonal Minimum Correlation Spreading Code” (OMCSC) has been proposed which can serve a large number of users and is simultaneously expected to reduce the effect of MAI and ISI. Moreover, the Bit Error Rate (BER) performance of the proposed code has been compared with the existing codes using Additive White Gaussian Noise (AWGN) channel under multi-user scenario.
Бесплатно
A Novel RTS/CTS based Relative Time Synchronization Technique for RFID based Wireless Sensor Network
Статья научная
Wireless Sensor Network (WSN) is a self-configuring and highly flexible distributed network used for real time monitoring and is comprised of a number of wireless, minute, battery-operated independent sensor nodes connected to a common sink. Due to energy considerations, the network is generally divided into clusters and the entire communication is carried out through the cluster heads. The clock mismatch between various nodes and clusters often leads to collisions, delay and data loss. In order to overcome this problem, a novel RTS/CTS based Relative Time Synchronization Protocol is being proposed for Radio-Frequency Identification based WSN. It achieves better performance due to its energy efficiency and lower service messages. Simulation results show a substantial improvement in the net throughput and reliability of the network when compared with the GPS-based Synchronization technique.
Бесплатно
Статья научная
Live virtual machine migration is a valuable feature for the virtualized data center or cloud environment. This is the process to migrate running virtual machines from one physical host to another host. Live virtual machine migration can be used to provide various benefits such as server consolidation, energy-saving, and maintenance. It is a valuable feature for the virtualized data center or cloud environment. Cloud computing provides IT capabilities as a service and its key technology is virtualization. The key benefit of virtualization is to offer better resource employment by executing various VMs on the same physical system. In this research, we analyze the performance of the various hypervisors based on their migration features and compares the migration feature. Hypervisors are Xen, VMWare, KVM, and their migration feature are XenMotion, vMotion, and KVM migration, respectively. According to our study, we find that there are many factors that affect the performance of the live virtual machine migration such as a long downtime, the large amount of data that is sent in an iteration manner so with a higher dirtying rate the total migration time extends. In our comparison, we show VMWare has the least downtime. We also identify and discuss the various research challenges in detail to stimulate the researchers to work in this direction.
Бесплатно
A Proposal for Detection of Underground Water Contamination via Multilayer Reflection Approach
Статья научная
Contamination and degradation in the quality of the fresh water under the ground is one of the major problems of our world. Water quality on the other hand, determined by the physical, chemical and biological compounds in the water. TDS (Total Dissolved Solid), salinity, dissolved oxygen, temperature, metabolic wastes, toxic compounds and conductivity are some of the major indicators of the water quality. These items are sometimes correlated and any increase in one factor may decrease/increase other factors as well. The aim of this work is to develop an idea about the contamination due to chemicals dissolved or biological anomalies in the water. Mainly the indicator of this change has been examined by the change in the conductivity parameter, which is a major electrical property that affects the Electromagnetic reflectivity of the surface ground.
Бесплатно
A QoS Multicast Routing in TDMA-Based MANET Using Directional Antennas
Статья научная
In this paper, a quality of service (QoS) multicast routing protocol in mobile ad hoc networks (MANET) using directional antennas has been presented. Many important applications, such as audio/video conferencing, require the quality of service guarantee. Directional antenna technology provides the capability for considerable increase in spatial reuse, which increases the efficiency of communication. This paper studies TDMA-based timeslot allocation and directional antennas, and presents an effective algorithm for calculating bandwidth of a multicast tree. We also propose a novel DSR-based QoS multicasting routing agrotithm. The simulation result shows the performance of this routing protocol in terms of call success rate.
Бесплатно
Статья научная
The directed routing protocol ends in failure when it faces a situation of the destination node with a very low velocity in a sparse ad hoc network so that none of nodes exist in its forwarding zone. Illuminated by BFDREAM and ZONER, the paper firstly proposes a novelty routing protocol that is fairly immune to forwarding failure through projecting the present source node on the boundaries of convex baffle holes of underwater acoustic networks in deep sea. Compared with DREAM and BFDREAM, the experimental results show our protocol achieves a great improvement in decreasing the propagation delay and reducing quantities of the non-effect information. So the new protocol may have a bright application prospect in deep sea acoustic networks.
Бесплатно
A Rectangular Microstrip Patch Antenna for Wireless Communications Operates in Dual Band
Статья научная
A single layer substrate compact dual band rectangular micro-strip patch antenna with transmission line feeding is designed for Wireless Local Area Networks (WLAN) implementation. The desired antenna consists of a rectangular patch having two I-slots and a dielectric material with dielectric constant of 2.4. The use of cavity model with transmission line feed has the favor of low profile, high gain and wide bandwidth of the antenna. The antenna has overall size of 46.9 mm by 38.01 mm and gives bandwidth of about 90 MHz at resonance frequency of 2.45 GHz and that of 115 MHz at 4.1 GHz frequency with Defected Ground Structure (DGS). The antenna with DGS has return losses -21.25 dB at 2.45 GHz and -27.5 dB at 4.1 GHz where the gains are 6.70 dB for 2.45 GHz and 6.80 dB for 4.1 GHz. Finally the designed antenna has been simulated using Computer Simulation Technology (CST) microwave studio 2009 and it is comparable with manual computation results which are found to be suitable for WLAN applications.
Бесплатно
Статья научная
Probabilistic parametric functions such as density and distribution functions modeled to depict certain stochastic behaviour are used to express the fundamental theories of reliability engineering. In the existing works of literature, a few probability distribution functions have been well reported. However, selecting and identifying the most suitable distribution functions to reliably model and fit datasets remain. This work examines the application of three different methods for selecting the best function to model and fit measured data. The methods comprise the parametric maximum likelihood estimation, Akaike Information Criteria and the Bayesian Information Criteria. In particular, these methods are implemented on Signal Interference to Noise Ratio (SINR) data acquired over an operational Long Term Evolution (LTE) mobile broadband networks in a typical built-up indoor and outdoor campus environment for three months. Generally, results showed a high level of consistency with the Kolmogorov-Semirnov Criteria. Specifically, the Weibull distribution function showed the most credible performance for radio signal analysis in the three study locations. The explored approach in this paper would find useful applications in modeling, design and management of cellular network resources.
Бесплатно
A Robust Autofocusing Approach for Estimating Directions-of-Arrival of Wideband Signals
Статья научная
In this paper, we introduce a robust method for wideband DOA estimation which does not require any preliminary DOA estimation or calibration of the array during the whole estimating process with the performance similar to the autofocusing approach. Our method is based on the autofocusing approach and uses the ESPRIT algorithm during the narrowband processing stage. Meanwhile, we suggest the method of selecting the best focusing frequency which minimizes the mean square error.
Бесплатно
A Scalable Simulation Method for Network Attack
Статья научная
In order to found a scalable platform for attack resistance test, this paper proposed a simulation method for network attack. We designed a modular framework and using XML to describe the test cases. We also realized both stateful and stateless attacks by Socket programming and Jpcap packet forging method. Experiment results showed that the system has good scalability and provides a template-based testing circuit.
Бесплатно
A Scheme on PN Code Tracking of DS/FH Signals for Telemetry, Tracking, and Commanding (TT&C)
Статья научная
The impact of Doppler frequency hopping on code tracking performance is simulated. A design on pseudo-noise (PN) Code Tracking Loop aided by the carrier tracking loop according to the carrier frequency hoping pattern is proposed in this paper. This scheme can be applied in the Telemetry, Tracking, and Commanding system which uses Direct Sequence/Frequency Hopping Spread Spectrum (DS/FH) hybrid spread spectrum technology. Simulations of the code tracking loop under different carrier to noise ratios are compared based on this scheme. The results show this method on PN code tracking of DS/FH signals is valid.
Бесплатно
Статья научная
The blockchain technology has been widely adopted for various applications due to its decentralization, transparency, and security features. Consensus algorithms, such as Proof of Work (PoW) and Proof of Stake (PoS), are fundamental components of blockchain technology, ensuring the integrity and validity of the blockchain network. However, the current consensus algorithms face challenges such as scalability, energy consumption, and security threats. To address these challenges, a new secure network for streamlined and high-performance consensus algorithm based on blockchain technology has been proposed. This new network incorporates the advantages of PoW and PoS, resulting in a hybrid consensus algorithm that is more efficient and secure than the existing algorithms. Additionally, the new network utilizes a dynamic sharding mechanism to improve scalability, reducing the overall processing time of transactions. The simulation results help identify potential vulnerabilities and inefficiencies in the consensus algorithm. Optimal combinations of block interval and propagation delay are determined based on specific use cases, balancing high throughput with security and consensus stability. The study also validates the security of Proof-of-Work (PoW) by comparing the fraction of generated blocks with the expected blocks based on miners' hashing power. This study establishes a foundation for future improvements in consensus algorithms, contributing to their evolution and facilitating the implementation of blockchain applications in various domains such as finance, healthcare, supply chain management, and more. The proposed solution aims to provide a more robust and efficient blockchain platform that can handle a higher volume of transactions while maintaining its security features.
Бесплатно
A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing
Статья научная
Computation process has changed itself from desktop computing to cluster computing and to grid computing and now a days it goes towards cloud computing. In today's trend, Cloud computing is being preferred by majority of the organization because of its major advantages in terms of scalability and multi tenancy. Among all these advantageous features of cloud computing, the only hitch is the security of the data that is stored in the cloud. The security clause rests with the cloud service provider but security can be applied on client side also and it is possible if the user knows how his data is secured. This paper proposes a mechanism which can help the user to ensure the security of his data at the client-side.
Бесплатно
A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack
Статья научная
The security issue of MA(mobile agent) is concerned for a long time, Especially for attack from malicious hosts. The paper proposes a new security routing protocol whose highlight is integrating group signature into MA system. It will decrease the probability that malicious hosts cluster to skip one host deliberately, and avoid too much invalid connection to host who is offline or rejective to service. Besides, in new protocol, each host will hold less public keys of other hosts and save time on verifying MA. The last superiority of new protocol is improving the efficiency of DoS(denial of service) attacker tracing.
Бесплатно