Статьи журнала - International Journal of Wireless and Microwave Technologies
Все статьи: 532
An Energy-Efficient Wireless Sensor Network (EE-WSN) for Hazard and Crack Detection in Coal Mines
Статья научная
This paper presents a detailed study focused on the utilization of energy-efficient wireless sensor networks (WSNs) specifically designed for hazard and crack detection in coal mines. The primary objective of this research is to develop a WSN system that operates on low power consumption, enabling real-time monitoring of hazardous conditions and cracks within coal mines. The proposed system incorporates energy-efficient methods and protocols to minimize power usage and prolong the lifespan of sensor nodes. The study encompasses the complete design and implementation of a prototype WSN system, followed by a thorough evaluation of its performance within a simulated environment. The obtained results demonstrate the effectiveness of the proposed system in detecting hazards and cracks in real-time while consuming minimal power. Consequently, this research underscores the potential of energy-efficient WSNs to enhance the safety and efficiency of coal mining operations. Moreover, the findings of this study have broader implications, as they can serve as a foundation for the development of similar systems applicable to other hazardous environments, including oil rigs, nuclear power plants, and forest fires. By adopting the energy-efficient WSN approach outlined in this research, these industries can benefit from improved safety measures and enhanced operational efficiency.
Бесплатно
An Enhanced LEACH Routing Algorithm for Energy Conservation in A Wireless Sensor Network
Статья научная
It has been well established that the lifetime of a Wireless Sensor Network (WSN) depends on the energy of the sensor nodes which is limited by the battery capacity of the nodes. This challenge has led to research efforts towards developing a more efficient energy based routing algorithms and architectures. One of such popular algorithm is the Low-Energy Adaptive Clustering Hierarchy (LEACH). The LEACH approach adopts randomized rotation of local base stations (or cluster-heads (CH)) to evenly distribute energy load amongst the sensors in the network. A variant of LEACH known as Vice-LEACH (V-LEACH) introduces the concept of a vice-CH that takes over the role of the main CH in the event of CH death. Random selection of cluster- head node in both LEACH and V-LEACH ignore node's residual energy and the optimal number and distribution of cluster head is not ensured in all rounds. This work presents an enhanced cluster-based routing algorithm which took into consideration the residual energy of nodes in the network while maintaining the optimal number of CHs throughout the network lifetime. A sensor network was developed on OPNET Modeler software tool and simulation tests were performed to evaluate the performance of the enhanced routing algorithm on the network. Simulation results showed that this enhanced routing algorithm distributed network energy consumption across the network nodes hence significantly improving the lifetime of the sensor network.
Бесплатно
An Enhanced Method Utilizing Hopfield Neural Model for Mobile Agent Protection
Статья научная
Mobile agent is a piece of computer code that organically goes from one host to the another in a consistent or inconsistent environment to distribute data among users. An autonomous mobile agent is an operational programme that may migrate from one computer to machine in different networks under its own direction. Numerous health care procedures use the mobile agent concept. An agent can choose to either follow a predetermined course on the network or determine its own path using information gathered from the network. Security concerns are the main issue with mobile agents. Agent servers that provide the agents with a setting for prosecution are vulnerable to attack by cunning agents. In the same way agent could be carrying sensitive information like credit card details, national level security message, passwords and attackers can access these files by acting as a middle man. In this paper, optimized approach is provided to encrypt the data carried by mobile agent with Advanced Encryption Standard (AES) algorithm and secure key to be utilized by the AES Encryption algorithm is generated with the help of Hopfield Neural Network (HNN). To validate our approach, the comparison is done and found that the time taken to generate the key using HNN is 1101ms for 1000 iterations which is lesser than the existing models that are Recurrent Neural Networks and Multilayer Perceptron Network models. To add an additional level of security, data is encoded using hash maps which make the data not easily readable even after decrypting the information. In this way it is ensured that, when the confidential data is transmitted between the sender and the receiver, no one can regenerate the message as there is no exchange of key involved in the process.
Бесплатно
An Enhanced Reputation-based for Detecting Misbehaving Nodes in MANET
Статья научная
In this paper, we propose an enhanced approach based on first-hand reputation with allows to detected misbehavior node in Manet. The network's security is an important challenge in this kind of networks. The main objective of the misbehaving nodes in AODV routing protocol deletes all data packets that received thus, don’t transmit to their destination. In a reputation-based system, each node overhears the activity of its neighbors (transmit and receive) in first-hand or combined with second-hand. Our approach is composed of three-phase directly monitoring, calculating reputation value and node isolation. The reputation value is enhanced by the packet dropped due to other events such as overloading of queue and node availability. The node with a negative reputation will be isolated, and an alert packet will be distributed to neighboring nodes to inform, afterwards an improved local repair is started. The simulation results show that the proposed approach can detect and isolate a malicious node, which improves the packet delivery ratio and lowest increasing in the throughput, while reducing the success rate of the misbehaving nodes.
Бесплатно
An Epistemic Model Checking Approach to Web Service Compositions
Статья научная
Due to the dynamics of Web services, the openness and variability of Internet, and the loosely-coupled developing approach of Web services, the development and execution process of Web service compositions becomes uncertain, which imperils the trustworthy properties. In this paper we abstract Web service compositions as multi-agent systems, propose a formal model BSTS for modeling BPEL, develop and implement two translation algorithms B2S and S2I, to translate BPEL into BSTS and translate BSTS into the input language ISPL of the model checker MCMAS for multi-agent systems, respectively. The proposed method supports not only temporal properties, but also epistemic and cooperation properties, which are supported only in multi-agent systems. We implemented the prototype tool, called MCWS, for the proposed method. We modeled and verified an example of Web service compositions. The experimental results show the validity of MCWS.
Бесплатно
An Evaluation of Systems for Detection and Prevention of DoS Attacks in SDN Networks
Статья научная
This paper proposes a study on systems for the detection and prevention of Denial-of-Service attacks (DoS) in Software-Defined Network (SDN) architectures. After a survey of the characteristics of SDN and DoS attacks, we introduce a system based on several components and the sFlow protocol to detect and react to different types of attacks, both from single and distributed sources. The considered attacks include all the main flooding techniques, besides the slowris approach. Finally, an experimental example of an attack on a SDN controller is presented to highlight the interaction between the components and evaluate their timely mitigation effects against the threat.
Бесплатно
An Extended Research on the Blood Donor Community as a Mobile Application
Статья научная
In the developing and the least developed countries, the number of blood banks are limited and it is hard to find a blood donor with exact blood group in a crucial moment. Patients have to suffer a lot and in some cases, death is inevitable. Emergency situations like- accidents, ongoing treatments and elective surgeries create critical and immediate need for specific group of blood. In this regards, a little attention has been given on the easier availability of blood from nearest locations. In this paper, we propose a mobile phone application by which anyone will be able to look for their desired blood group at the nearest location. A large number of people is currently using smartphones running on different operating systems. The application will be developed in different platforms e.g. Android, Windows Phone or iOS, where only registered person, with willingness to donate blood will be able to access the service.
Бесплатно
An Improved Dynamic Probabilistic Packet Marking Algorithm
Статья научная
An improved dynamic probabilistic packet marking algorithm named IDPPM is presented, which not only can reduce the marking overhead of routers near the attackers, but also can locate attack source rapidly and accurately. The challenge of weakest node and weakest link is solved with the price of a little more numbers of packets to reconstruct the attack path. Theoretical analysis and NS2 simulation demonstrate the effectiveness of the algorithm.
Бесплатно
An Incentive Compatible Reputation Model for P2P Networks
Статья научная
An important challenge regarding peer's trust assessment in peer-to-peer (P2P) networks is how to cope with such issues as the fraudulent behaviors and the dishonest feedback behaviors from malicious peers, and the issue of inactive recommendations to others. However, these issues cannot be effectively addressed by the existing solutions. Thus, an incentive compatible reputation management model for P2P networks, named ICRM, is proposed to solve them. In ICRM, the metric of time zone is used to describe the time property of the transaction experience and the recommendation. Three other metrics such as the direct trust value, the recommendation trust value and the recommendation credibility, based on the metric of time zone are applied to express accurately the final trust level of a peer. Furthermore, the participating level is introduced as the metric to identify a peer's activeness degree. Theoretical analysis and simulation experiments demonstrate that, ICRM can effectively suppress the malicious behaviors such as providing unreliable services, or giving dishonest feedbacks to others in the P2P networks. What's more, it also can incent peers to offer recommendations to others more actively.
Бесплатно
An Ontology based Approach for Context-Aware Security in the Internet of Things (IoT)
Статья научная
Due to increased number of IoT devices, the marketplace is showing significant growth of sensor deployments around the world. The context involved in any IoT environment needs proper storage, processing and interpretation to get deeper insights from it. Previous research has not focussed much on context-ware security in IoT environment and has primarily relied on context-ware computing methods. In this research paper we implement logical decisions among IoT nodes in healthcare system using ontological approach. With the help of ontological method collected data is transferred between various healthcare devices to the knowledge base thereby achieving security of context like patient data by providing deeper insights, so as to generate intelligent suggested solutions. Incorporation of context-aware rules based on common experience for specific healthcare scenario is done to get implicit insight among IoT nodes. This work designs security ontology using Security Toolbox: Attacks & Countermeasures (STAC) framework that is implemented in Protégé 5. Moreover, Pellet (Incremental) reasoned is used to evaluate the ontology. Emergency ontology that can prove helpful at emergency times has also been designed. Different parameters addressed in this work are authentication, access-control, authorization and privacy using context-awareness methodology that can enable naive users make informed security decision.
Бесплатно
An Overview of Reconfigurable Antennas for Wireless Body Area Networks and Possible Future Prospects
Статья научная
The use of antennas in various fields and applications is gaining much importance because of their growing advancements and numerous facilities. Due to their vast advantages, now wearable antennas are used in fields of personal healthcare, entertainment, military and many others. For the fabrication of wearable antennas, many aspects need special consideration in order to manufacture a safe system for the user. As the applications of wireless body centric communication with antennas has a great variability, so enhancements are made in the systems by integrating reconfigurable antennas in it. These antennas work better than the single installed antennas because of their adjustable parameters thus increasing the performance of whole system. This paper provides an overview of the existing antennas and their applications, in order to better understand ways in which the limitations associated with wearable antennas could be overcome in the future. Certain design challenges which occur during the fabrication of wearable antennas like safety, cost and tolerance in addition to the recent advancements in this field are discussed. Designing a particular antenna for body area network mainly depends upon the application of the user and the place of installation. To build a review about the reconfigurable antenna for body centric communication, 15 papers from the last 6 years are consulted which fall under the domain of wearable antennas. There is still a margin of improvement in this field and better technologies will be introduced in coming years which include precision medicine.
Бесплатно
An Unconditionally Secure Authentication Code For Multi-Source Network Coding
Статья научная
In network system, network coding allows intermediate nodes to encode the received messages before forwarding them, thus network coding is vulnerable to pollution attacks. Besides, the attacks are amplified by the network coding process with the result that the whole network maybe pollutes. In this paper, we proposed a novel unconditionally secure authentication code for multi-source network coding, which is robust against pollution attacks. For the authentication scheme based on theoretic strength, it is robust against those attackers that have unlimited computational resources, and the intermediate nodes therein can verify the integrity and origin of the encoded messages received without having to decode them, and the receiver nodes can check them out and discard the messages that fail the verification. By this way, the pollution is canceled out before reaching the destinations.
Бесплатно
Статья научная
Recent advancement in microelectronics and sensor devices have led to the development of a new family of networks called Internet of things (IoT). One of the challenges of IoT is the integration of autonomous and smart devices with multiple constraints specific to the wireless sensor network (WSN) environment. Among these constraints, the most important constraint is the energy efficiency of medium access control (MAC) protocol. To solve this problem, we propose an improved protocol called clustering based load adaptive MAC (CLA-MAC) for WSNs in IoT scenario, which involves mainly traffic load balancing within each cluster to provide a tuneable trade-off between energy consumption, delay, and throughput. The proposed solution makes the MAC protocol more energy efficient by reducing competition between sensor nodes with the adoption of clustering scheme and traffic distribution, which can significantly reduce the probability of collision and idle listening. Simulation results indicate that the proposed approach performs better compared with load adaptive MAC (LA-MAC) protocol in typical IoT scenario.
Бесплатно
An improved IOT Authentication Process based on Distributed OTP and Blake2
Статья научная
The Internet of Things operates in vital areas and involves people, objects, and networks. Indeed, it ensures the interconnection and exchange of critical information that does not tolerate flaws. A successful attack on an object in one of these fields will cause fatal damage. Therefore, securing IOTs requires particular attention to the used protocols. It is essential to choose adapted protocols to the requirements of the objects and provide maximum security. Authentication is the first entry to IOTs that must be optimal and secure, without encumbering objects with limited capacities. To address this issue and to avoid concentration points, we present an improved authentication protocol based on the Blake2 hash function and the distribution of calculating OTP function. We will then evaluate, in terms of spatial and temporal complexity, the improvement brought to the IOT authentication process by the proposed process. We will prove that the use of these technics ensure a secure authentication that consumes less time and less memory.
Бесплатно
Analysis and Detection of various DDoS attacks on Internet of Things Network
Статья научная
Internet of Things is used for those devices, which are connected over a network, once the devices are connected to the internet they are known as smart devices. These devices share information and communicate with each other to influence our day to day lives. Due to the rise in these devices, security is compromised. Malware is malicious software that can damage the computer, server, or network intentionally. Malware can also exploit the confidentiality, integrity, availability (CIA) triad. Rather than the traditional malware, IoT malware can damage different internet connected devices such as routers, DVRs, CCTV, or many internets connected devices. The IoT devices are more vulnerable due to weak passwords, missing authentication schemes, backdoor entries, lack of high-security algorithms, and plug and play services. There is no widespread survey available about IoT malware in an efficiently organized manner, publicly. In this article, we have classified the IoT malware according to their release and provide on the basis of their functionalities, growth, revolution, and their detection mechanism. We perform DDoS attack on Raspberry PI to hamper the home automation system. We employ Wireshark to monitor network traffic and demonstrate the service unavailability.
Бесплатно
Analysis of AODV Protocol against Pause Time Using NS2.34
Статья научная
An ad hoc network is very popular because of its easy deployment. It is a self-organising network which has dynamic topology. The routing is a major issue in the ad hoc network due to its node mobility. As nodes are moving continuously the source to destination pair is completely broken and repeated route discovery increases delay and network load and reduces throughput of ad hoc network. The routing protocols play a vital role in data transmission and affect the efficiency of the ad hoc network. Also, mobility factor affects the efficiency of the ad hoc network. The ad hoc network is said to be efficient if it transfers data with higher throughput, minimum delay and low overheads. In this paper, researcher studies efficiency of AODV protocol against node mobility. The node mobility term relates to the pause time i.e. the amount of time node is stable at a particular location. The high pause time means nodes in the network have low mobility and low pause time means nodes have high mobility. The performance of AODV protocol is evaluated on the basis of four performance matrices i.e. throughput, delay, routing load, and packet delivery ratio using the Network simulator NS2.34. This study will help the researcher further to regulate the scenario parameters of ad hoc network which will help to improve performance of the protocol.
Бесплатно
Analysis of Alamouti Diversity Schemes and Techniques for Wireless Communication
Статья научная
External communications clients seek higher communication levels, better speech quality and higher network limitations due to limited radio recurrence spectrum connectivity, bandwidth, channel efficiency, physical zones and transmitting problems induced by factors such as blurring (Fading) and multi-way bending (Distortion). Fading is a significant impedance of the remote communication tube. Within this article, we find different procedures for alleviating the fading issue in the remote system. The simple solution to the fading problem will be to have the fading edge of the transmitter. In any scenario, this is not a fruitful agreement in any way whatsoever. One exchange agreement is beneficial to take a stance on the truthful behaviour of the deteriorating outlet. There follows the basic concept of good variety; where at least two inputs from the recipient are required to receive uncorrelated signals.
Бесплатно
Analysis of Trusted Identity Based Encryption (IBE-Trust) Protocol for Wireless Sensor Networks
Статья научная
The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discuss the term trusted based on the specifications of Trusted Computing Group (TCG) and presents an IBE-Trust security protocol utilizing well-known identity based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.
Бесплатно
Analysis of filter bank multi-carrier system for 5G communications
Статья научная
The FBMC now days preferred for 5th Generation communication system. In this paper a detail analysis on Filter bank multi-carrier system for different cases. In FBMC that represents the transmitted data through IFFT available spectral bandwidth into sub-bands. The digital frequency response of the filter simulates for 5G communications with better response.
Бесплатно
Статья научная
This paper deals with the design and study of parameters of square shaped microstrip patch antenna suitable for 5G communication systems. It is designed on Rogers RT Duroid 5880, which has a dielectric constant of 2.2. In this study, a micro-strip line fed patch antenna array, operating at a resonant frequency of 10.21GHz which is preferred for 5G applications, is implemented using the Computer Simulation Technology (CST) software. The designed antenna attained a fractional bandwidth of 1.62%, a wide bandwidth of 165 MHz and a reflection coefficient of -14.341dB. The transmission line used for the antenna is an inset feed. In order to design a microstrip patch antenna, the substrate material and its thickness are initially selected. The selection of a proper dielectric material and its thickness is very crucial in designing microstrip patch antenna. This paper also explains how antenna performance changes with the thickness variation of the substrate. The modified antennas can operate around 28 GHz and 10 GHz, the frequency bands recently proposed for 5G applications. The radiation pattern, return loss, 3D gain and VSWR curves are simulated for all designed antennas.
Бесплатно