Статьи журнала - International Journal of Wireless and Microwave Technologies

Все статьи: 454

Resource Efficient Security Mechanism for Cloud of Things

Resource Efficient Security Mechanism for Cloud of Things

Adil Bashir, Sahil Sholla

Статья научная

Cloud of Things (CoT) relates to the convergence between Cloud Computing (CC) and the Internet of Things (IoT) and has significantly transformed the way services are delivered in the ubiquitous realm of devices. This integration has become essential because of the huge data being generated by IoT devices, requiring an infrastructure for storage and processing. Such infrastructure is provided by Cloud Computing services with massive space for data storage and exceptional platform to process complex data. IoT networks are vulnerable to multiple security breaches because of the growing usage of IoT devices in user personal systems. This leads to security and privacy threats that need to be addressed. IoT consists of resource limited devices which have feeble computing power, battery source and storage capacity. This paper addresses security issue by proposing usage of obfuscation and encryption techniques to scramble the data at IoT devices which is later on stored in encrypted form at the cloud server. The data at IoT devices is classified into highly critical or less critical and accordingly the appropriate technique between encryption and obfuscation is applied. The proposed mechanism is evaluated in terms of processing time for cryptographic operations at IoT devices. Evaluation results depict that the proposed mechanism is 1.17 times faster than [22] in terms of encryption and decryption times.

Бесплатно

Review on Light Fidelity (Li-Fi) - An Advancement of Wireless Network

Review on Light Fidelity (Li-Fi) - An Advancement of Wireless Network

Ramandeep Kaur, Himanshu Walia

Статья научная

Nowadays, Li-Fi is becoming very popular and catching the interest of a number of users with its advanced technology-based features. It brings a new resolution in the wireless communication and people are showing so much curiosity to know about it. Li-Fi is an optical wireless communication-based technology which transmits data over the network through a light source like LED’s instead of radio frequency signals (RF) with very high data rate. The aim of this paper is to give full- fledged knowledge about Li-Fi & its applications. This paper also attempts to clarify the basic difference between wireless technologies and their evolution & how this new technology is leading all over the world with its features like less power consumption, less requirement of maintenance, & bi-directional in nature. Li-Fi eliminates the effect of harmful radiations that occur due radio signals as in Wi-Fi and has less latency rate. This paper gives an overview and the general idea about working on Li-Fi technology and how it will help in the development of bright future as it is beyond the expectations of end users.

Бесплатно

Routing in Hybrid Software Defined Networking using Hop-Count Approach

Routing in Hybrid Software Defined Networking using Hop-Count Approach

Rohitaksha K., A.B. Rajendra, J. Mohan

Статья научная

Software-Defined Networking is a network framework that involves in separating a network’s control functions from its data forwarding functions, centralizing its intelligence, and abstraction its underlying architecture from applications and services. Hybrid Software-Define Networking is a framework which supports both the legacy protocols and the Software Defined Networking protocols to operate in the same environment. In this paper, we present an efficient technique for finding the shortest path between any two nodes in Hybrid SDN by reducing the complicated network topology to a basic topology while taking hop count into account. In the suggested proposal, a subgraph is generated from a complicated network, and the best path is found using a modified Bellman-Ford method, which saves time. The emulation test bed in Mininet was established for various numbers of nodes, and the results were analysed. The modified Bellman-Ford algorithm selects the optimal path between the two nodes. For networks with different numbers of nodes, the proposed approach offered a significant increase in the TCP throughput when compared with that of Spanning Tree Protocol. The number of packets received by the SDN controller is less with the proposed work. This increases TCP throughput by reducing the broadcast packets.

Бесплатно

SDN Interfaces: Protocols, Taxonomy and Challenges

SDN Interfaces: Protocols, Taxonomy and Challenges

Suhail Ahmad, Ajaz Hussain Mir

Статья научная

The ever-increasing demands of Internet services like video on demand, big data applications, IoE and multi-tenant data centers have compelled the network industry to change its conventional non-evolving network architecture. Software Defined Network (SDN) has emerged as a promising network architecture which provides necessary abstractions and novel APIs to facilitate network innovations and simplifies network resource management by breaking the conventional network into multiple planes. All these SDN planes interact through open interfaces or APIs which are commonly categorized into southbound, northbound and west/eastbound interfaces. In this manuscript, we have identified and emphasized various communication protocols used at south and northbound interfaces. We have provided a taxonomy of south and northbound communication protocols based on their dependence, capabilities and properties. The pros and cons associated with each communication mechanism are highlighted and the numerous research challenges and open issues involved at these two interfaces are elucidated. In addition to it, we have proposed the necessary abstractions and extensions required in communication protocols at these two interfaces to simplify real-time monitoring and virtualization in next generation networks.

Бесплатно

SQL Injection Detection Tools Advantages and Drawbacks

SQL Injection Detection Tools Advantages and Drawbacks

Hazem M. Harb, Derar Eleyan, Amna Eleyan

Статья научная

SQL injection attack is a major threat to web application security. It has been rated as one of the most dangerous vulnerabilities for a web-based application. Based on the Open Web Application Security Project (OWASP), it is measured as one of the top ten. Many types of research have been made to face this attack either by preventing the threat or at least detecting it. We aim in this paper to give an overview of the SQL injection (SQLI) attack and classify these attacks and prevention and detection tools. We introduce the most current techniques and tools that are used to prevent and detect SQLI and highlight their strengths and weaknesses.

Бесплатно

Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network

Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network

Shahzad Ashraf, Sehrish Saleem, Tauqeer Ahmed

Статья научная

In underwater environment, the sensor nodes are deployed for collecting information and sending back to the base station. Establishing astute communication link among these sensor nodes in a multi-link routing environment is a key challenge for all underwater routing protocols. A sagacious communication link can only guarantee the maximum data transfer rate. The link selection mechanism of three underwater routing protocol i.e, Energy-aware Opportunistic Routing (EnOR) protocol, Shrewd Underwater Routing Synergy using Porous Energy Shell (SURS-PES) and Underwater Shrewd Packet Flooding Mechanism (USPF) have been investigated. After analyzing performance results of these protocols interms of packet delivery ratio, end-to-end ‎delay, network lifespan and energy consumption using NS2 with AquaSim 2.0 simulator. The protocol existing, with sagacious link selection mechanism in multi-link routing environment has been identified. The identification of this sagacious link selection mechanism is a novel approach which can give specific knowledge for targeted output without wasting resources for irrelevant objectives.

Бесплатно

Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm

Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm

Pooja Kundu, Neeti Kashyap

Статья научная

Mobile ad hoc networks (MANETs) are very useful in various scenarios where there is need of fast deployment of the network and expensive set up is not required. With these benefits, there are some issues related to these networks. One of these issues is of secure communication. Malicious nodes can easily attack existing routing protocols for MANETs like DSR. In this paper we have proposed a modification of DSR by using message digest. The proposed work produces better results in terms of different metrics when compared with the results of DSR. When a route is set up between the two communicating mobile nodes, the data is sent through a secure key which is not impossible for the intruder nodes to intercept. This halts intrusion in the network. A message digest is created of the data packets.

Бесплатно

Securing Peer-to-Peer Distributions with Trusted Platform Modules

Securing Peer-to-Peer Distributions with Trusted Platform Modules

Hao Li, Yu Qin, Qianying Zhang, Shijun Zhao

Статья научная

We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution is based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.

Бесплатно

Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey

Security Challenges, Authentication, Application and Trust Models for Vehicular Ad Hoc Network- A Survey

Akash Vaibhav, Dilendra Shukla, Sanjoy Das, Subrata Sahana, Prashant Johri

Статья научная

Vehicular Ad hoc Network could manage the various critical issues of road transport. That is why it is the most crucial field of research for most of the researchers. This survey paper discusses various issues related to Security Challenges, Security Architecture actors, Security Authentication, Application Constraints, various trust models etc. this paper encourages you to think about various fields of work need to be carried out in this field for the better VANET environment. Various schemes have been mentioned which could be improved further as per considering various real time conditions.

Бесплатно

Selecting the COTS Components Using Ad-hoc Approach

Selecting the COTS Components Using Ad-hoc Approach

Somya Goyal, Anubha Parashar

Статья научная

This paper presents the current scenario of our software industry which is deploying CBSE approach to construct high quality deliverable software products at shorter time to market. As both Vendor-specific and OSS COTS components are equally popular now-a-days. Hence, the availability of a wide range of COTS components in market is quite high. To select the best suitable candidate among the various available components, various formal methods and techniques like OTSO have been introduced by researchers. In this paper, COTS based software development & SDLC under CBSE tradition are discussed. Along with this discussion, it uncovers the fact that our software developers are applying Ad-hoc techniques as per their taste for making the selection of the most appropriate components for their projects rather than following the formal methods. Through this paper, various possible reasons behind the ‘Not-so-In-Use’ nature of these formal methods are being reported.

Бесплатно

Signal Strength Variation and Propagation Profiles of UHF Radio Wave Channel in Ondo State, Nigeria

Signal Strength Variation and Propagation Profiles of UHF Radio Wave Channel in Ondo State, Nigeria

A. Akinbolati, O. Akinsanmi, K.R. Ekundayo

Статья научная

This study investigated the received signal strength and the propagation profiles for UHF channel 23, broadcast signal in Ondo State, Nigeria, at various elevation levels. The signal strength was measured quantitatively across the state along several routes with the aid of a digital field strength meter. A global positioning system (GPS) receiver was used to determine the elevation above ground level, the geographic coordinates and the line of sight of the various data points from the base station. Data obtained were used to plot the elevation and propagation profiles of the signal along measurement's routes. Results showed that the signal strength was strongest towards the northern parts with respect to distance compared to other routes with the same distance contrary to inverse square law. The threshold signal level for the station was 20dBµV which was recorded up to 50km line of sight from the transmitter towards the northern parts of the state where higher levels of elevation of data locations were recorded and 42km towards the southern parts with lower values of elevation. The propagation profiles for all the routes follow the elevation pattern of the study areas, with some farther locations recording higher signal strength compared to closer locations to the transmitter contrary to theoretical expectation. The overall results show that elevation above ground level is a key factor to be considered for UHF transmission and reception (location of transmitters, transmitting antenna's height, directivity and gain. Others are, transmitter output power, receiving antenna's height and gain) in the study areas.

Бесплатно

Simulation Design of AOS Cross Layer Transmission

Simulation Design of AOS Cross Layer Transmission

Bi Mingxue, Wang Hongxia

Статья научная

In this paper, the AOS effective throughput rate is analyzed firstly. Then, in order to improve the effective throughput rate, a scheme of AOS cross layer transmission system is presented. In the proposed scheme, based on the space channel state, the dynamic optimization parameters of AOS Space Date Link Protocol sublayer and AOS Sync and Channel Coding sublayer are selected. Then the switch thresholds are presented. Finally, the effective throughput rate of the proposed AOS cross layer transmission system is simulated. Simulations show that the throughput rate can be optimized effectively.

Бесплатно

Simulation of rectangular ring micro-strip patch antenna to enhance impedance bandwidth for UWB wireless applications

Simulation of rectangular ring micro-strip patch antenna to enhance impedance bandwidth for UWB wireless applications

Anant Raj Mishra, Ankit Gambhir, Rajeev Arya

Статья научная

In this paper, simulation of rectangular ring micro-strip patch antenna for ultra wideband (UWB) wireless applications is done. The attractiveness of this antenna is that it employs solo patch that makes it easy to fabricate and economical as well. It also mitigates the issue of misalignment. By making use of matching rectangular strips, impedance bandwidth enhancement is also attained. At centre frequency return loss is not more than -10dB. It demonstrates superior radiation characteristics and reasonable gain in the whole operating band. In the designing of proposed antenna, micro-strip feeding is used for power supply purpose. CST Microwave studio suit 10 is used for the simulation purpose of the proposed antenna, which is a 3D electromagnetic field tool for simulation of electromagnetic field in all frequency bands. After simulation of proposed antenna, enhancement in impedance bandwidth of 20.60%, frequency range of 1.8533 GHz, radiation efficiency of 92.51%, and gain of 3.765dbi are obtained.

Бесплатно

Smart Home Security Using Facial Authentication and Mobile Application

Smart Home Security Using Facial Authentication and Mobile Application

Khandaker Mohammad Mohi Uddin, Shohelee Afrin Shahela, Naimur Rahman, ‪Rafid Mostafiz‬, Md. Mahbubur Rahman‬‬‬

Статья научная

In this fast-paced technological world, individuals want to access all their electronic equipment remotely, which requires devices to connect over a network via the Internet. However, it raises quite a lot of critical security concerns. This paper presented a home automation security system that employs the Internet of Things (IoT) for remote access to one's home through an Android application, as well as Artificial Intelligence (AI) to ensure the home's security. Face recognition is utilized to control door entry in a highly efficient security system. In the event of a technical failure, an additional security PIN is set up that is only accessible by the owner. Although a home automation system may be used for various tasks, the cost is prohibitive for many customers. Hence, the objective of this paper is to provide a budget and user-friendly system, ensuring access to the application and home attributes by using multi-modal security. Using Haar Cascade and LBPH the system achieved 92.86% accuracy while recognizing face.

Бесплатно

Smart locker: IOT based intelligent locker with password protection and face detection approach

Smart locker: IOT based intelligent locker with password protection and face detection approach

Niaz Mostakim, Ratna R. Sarkar, Md. Anowar Hossain

Статья научная

In today’s world, security becomes a very important issue. We are always concerned about the security of our valuables. In this paper, we propose an IOT based intelligent smart locker with OTP and face detection approach, which provides security, authenticity and user-friendly mechanism. This smart locker will be organized at banks, offices, homes and other places to ensure security. In order to use this locker firstly the user have to login. User has to send an unlock request code (OTP) and after getting a feedback Email with OTP, he/she will be able to unlock the locker to access his/her valuables. We also introduce face detection approach to our proposed smart locker to ensure security and authenticity.

Бесплатно

Smarter Way to Access Multiple Mobile Cloud Applications without Interoperability Issues

Smarter Way to Access Multiple Mobile Cloud Applications without Interoperability Issues

P Thanapal, K Marimuthu, S Rajkumar, R Niranchana

Статья научная

As we are in the world of emerging technologies people have more awareness about it especially Smartphone’s. Usage of Smartphone’s has been increased tremendously. Different operating systems (OS) are used in smart phones such as MAC OS, Android, and Windows OS etc. Most of the applications are run on their appropriate platform. Cloud is the simplest way to run certain application over cross platforms. Many cloud vendors are there who provides several kinds of applications and software which can be accessed by the users. In that Application Programming Interfaces (APIs) helps us to create a cloud application over the market. However there will be chances to occur Interoperability issues while users were working on a cross platforms. In order to overcome this issue a framework has been proposed named Mobile Cloud Middleware (MCM). MCM will recover the interoperability issues over multiple cloud services on mobile devices. Here in this paper we proposed effective result to solve the Interoperability issue by integrating Mobile Enterprise with MCM.

Бесплатно

Software Defect Detection-oriented Static Analysis Techniques

Software Defect Detection-oriented Static Analysis Techniques

Hua ZHANG

Статья научная

This paper mainly studies the method of static analysis techniques; discuss static analysis techniques status and progress, as well as the characteristics of static analysis.

Бесплатно

Software Defined Network: The Next Generation Internet Technology

Software Defined Network: The Next Generation Internet Technology

Kshira Sagar Sahoo, Sambit Kumar Mishra, Sampa Sahoo, Bibhudatta Sahoo

Статья научная

Software Defined Networks is an emerging network paradigm which introduces programmability to networks and has the capability to dynamically configure the network. In a traditional IP based network the control part and the data forwarding elements are imposed in a single box that has very limited ability to configure the network, some vendor specific codes run on the forwarding elements to perform this task. SDN takes another approach by decoupling the controller part from the data plane part. It is the next generation Internet technology that solves the ossification of the Internet, along with creating massive innovations so that network management can be easily handled. In this paper, we are trying to explore the different layers, various protocols supported by SDN, along with discuss the numerous benefits of it.

Бесплатно

Sorting of Acrylonitrile-Butadiene-Styrene and Polystyrene Plastics by Microwave Cavity Resonance

Sorting of Acrylonitrile-Butadiene-Styrene and Polystyrene Plastics by Microwave Cavity Resonance

Yuya Mori, Takehiko Kobayashi, KenTahara

Статья научная

This paper presents a new sorting method for acrylonitrile-butadiene-stryrene (ABS) and poly styrene (PS) by means of microwave cavity resonator perturbation. In this method, a small piece of sample material is inserted into a cavity resonator at a point when the electric and magnetic fields mark the maximum and the minimum values, respectively. Experiments were carried out with use of 1-, 2-, 5-, and 10-GHz resonators and ABS and PS samples of various sizes. Loss angles of polarizability (tan χ) exhibited differences large enough to achieve accurate sorting between ABS and PS.

Бесплатно

Spectrum Sharing Technologies for Cognitive IoT Networks: Challenges and Future Directions

Spectrum Sharing Technologies for Cognitive IoT Networks: Challenges and Future Directions

Bekele M. Zerihun, Thomas O. Olwal, Murad R. Hassen

Статья научная

In recent years, the number of devices connected to the Internet has been increased exponentially, which creates a new ecosystem known as the Internet of Things (IoT). According to Cisco’s prediction, it is expected that over 50 billion devices will be connected to the Internet by 2020. In fact, IoT is expected to be a key enabling technology to accommodate the massive connectivity of heterogeneous smart devices in the upcoming fifth-generation networks. However, in a limited resource environment, the existing spectrum will not be sufficient to satisfy all these spectrum demand. Sharing the idle spectrum in licensed and unlicensed bands is a feasible solution for effective IoT deployment. Therefore, in this paper, we provide a survey of advanced spectrum sharing techniques and emerging IoT technologies to exploit the spectrum both in existing licensed cellular infrastructures and unlicensed spectrum bands. To the best of our knowledge, different from the existing literature, we identify the potential research challenges and suggest future directions for efficient IoT deployment in next-generation wireless networks.

Бесплатно

Журнал