Статьи журнала - International Journal of Wireless and Microwave Technologies

Все статьи: 454

Analysis and Detection of various DDoS attacks on Internet of Things Network

Analysis and Detection of various DDoS attacks on Internet of Things Network

Atika Bansal, Divya Kapil, Anupriya, Sagar Agarwal, Vishan Kumar Gupta

Статья научная

Internet of Things is used for those devices, which are connected over a network, once the devices are connected to the internet they are known as smart devices. These devices share information and communicate with each other to influence our day to day lives. Due to the rise in these devices, security is compromised. Malware is malicious software that can damage the computer, server, or network intentionally. Malware can also exploit the confidentiality, integrity, availability (CIA) triad. Rather than the traditional malware, IoT malware can damage different internet connected devices such as routers, DVRs, CCTV, or many internets connected devices. The IoT devices are more vulnerable due to weak passwords, missing authentication schemes, backdoor entries, lack of high-security algorithms, and plug and play services. There is no widespread survey available about IoT malware in an efficiently organized manner, publicly. In this article, we have classified the IoT malware according to their release and provide on the basis of their functionalities, growth, revolution, and their detection mechanism. We perform DDoS attack on Raspberry PI to hamper the home automation system. We employ Wireshark to monitor network traffic and demonstrate the service unavailability.

Бесплатно

Analysis of AODV Protocol against Pause Time Using NS2.34

Analysis of AODV Protocol against Pause Time Using NS2.34

Samiksha Nikam, B.T. Jadhav

Статья научная

An ad hoc network is very popular because of its easy deployment. It is a self-organising network which has dynamic topology. The routing is a major issue in the ad hoc network due to its node mobility. As nodes are moving continuously the source to destination pair is completely broken and repeated route discovery increases delay and network load and reduces throughput of ad hoc network. The routing protocols play a vital role in data transmission and affect the efficiency of the ad hoc network. Also, mobility factor affects the efficiency of the ad hoc network. The ad hoc network is said to be efficient if it transfers data with higher throughput, minimum delay and low overheads. In this paper, researcher studies efficiency of AODV protocol against node mobility. The node mobility term relates to the pause time i.e. the amount of time node is stable at a particular location. The high pause time means nodes in the network have low mobility and low pause time means nodes have high mobility. The performance of AODV protocol is evaluated on the basis of four performance matrices i.e. throughput, delay, routing load, and packet delivery ratio using the Network simulator NS2.34. This study will help the researcher further to regulate the scenario parameters of ad hoc network which will help to improve performance of the protocol.

Бесплатно

Analysis of Alamouti Diversity Schemes and Techniques for Wireless Communication

Analysis of Alamouti Diversity Schemes and Techniques for Wireless Communication

Muhammad Noor Danish, Qamar Atta Ul Haq, Hamza Nadeem

Статья научная

External communications clients seek higher communication levels, better speech quality and higher network limitations due to limited radio recurrence spectrum connectivity, bandwidth, channel efficiency, physical zones and transmitting problems induced by factors such as blurring (Fading) and multi-way bending (Distortion). Fading is a significant impedance of the remote communication tube. Within this article, we find different procedures for alleviating the fading issue in the remote system. The simple solution to the fading problem will be to have the fading edge of the transmitter. In any scenario, this is not a fruitful agreement in any way whatsoever. One exchange agreement is beneficial to take a stance on the truthful behaviour of the deteriorating outlet. There follows the basic concept of good variety; where at least two inputs from the recipient are required to receive uncorrelated signals.

Бесплатно

Analysis of Trusted Identity Based Encryption (IBE-Trust) Protocol for Wireless Sensor Networks

Analysis of Trusted Identity Based Encryption (IBE-Trust) Protocol for Wireless Sensor Networks

Yusnani Mohd Yussoff, Habibah Hashim

Статья научная

The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discuss the term trusted based on the specifications of Trusted Computing Group (TCG) and presents an IBE-Trust security protocol utilizing well-known identity based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.

Бесплатно

Analysis of filter bank multi-carrier system for 5G communications

Analysis of filter bank multi-carrier system for 5G communications

Sarala Patchala, M.Sailaja

Статья научная

The FBMC now days preferred for 5th Generation communication system. In this paper a detail analysis on Filter bank multi-carrier system for different cases. In FBMC that represents the transmitted data through IFFT available spectral bandwidth into sub-bands. The digital frequency response of the filter simulates for 5G communications with better response.

Бесплатно

Analysis the effect of changing height of the substrate of square shaped microstrip patch antenna on the performance for 5G application

Analysis the effect of changing height of the substrate of square shaped microstrip patch antenna on the performance for 5G application

Rafia Nishat Toma, Imtiaj Ahmmed Shohagh, Md Nazmul Hasan

Статья научная

This paper deals with the design and study of parameters of square shaped microstrip patch antenna suitable for 5G communication systems. It is designed on Rogers RT Duroid 5880, which has a dielectric constant of 2.2. In this study, a micro-strip line fed patch antenna array, operating at a resonant frequency of 10.21GHz which is preferred for 5G applications, is implemented using the Computer Simulation Technology (CST) software. The designed antenna attained a fractional bandwidth of 1.62%, a wide bandwidth of 165 MHz and a reflection coefficient of -14.341dB. The transmission line used for the antenna is an inset feed. In order to design a microstrip patch antenna, the substrate material and its thickness are initially selected. The selection of a proper dielectric material and its thickness is very crucial in designing microstrip patch antenna. This paper also explains how antenna performance changes with the thickness variation of the substrate. The modified antennas can operate around 28 GHz and 10 GHz, the frequency bands recently proposed for 5G applications. The radiation pattern, return loss, 3D gain and VSWR curves are simulated for all designed antennas.

Бесплатно

Analysis, Design and Realization of Negative Impedance Converter Circuit with Current Feedback Operational Amplifier

Analysis, Design and Realization of Negative Impedance Converter Circuit with Current Feedback Operational Amplifier

Sami Durukan, Asim Egemen Yilmaz, Mahmut Keser

Статья научная

Negative impedance converter (NIC) circuits are very interesting and beneficial building blocks with the capability of generating negative resistance, capacitance and/or inductance elements which do not exist as a singular electrical component in practice. They are commonly used for the impedance matching and parasitic element cancellation in electrically small antennas and amplifier circuits. In this study, a special kind of NIC circuit in HF band up to 30 MHz is analysed, designed and physically realised with a current feedback (CFB) operational amplifier (OPAMP) which is the core active element of the NIC circuit. The non-inverting terminal of CFB OPAMP is used for RF input signal with the elimination of DC offset voltage in the proposed NIC circuit. The negative impedance conversion capability of the circuit is theoretically proved and simulated first. This capability of CFB OPAMP to generate negative impedance is very important in high-frequency applications as they have low distortion and faster switching than that of voltage feedback (VFB) OPAMP. For the physical realizations, printed circuit board (PCB) is designed and manufactured on FR-4 dielectric material. Measurement results obtained from the realized circuit with resistive (100Ω) and capacitive (10pF) loads to be converted negatively showed that the negative impedance conversion performance of the circuit is very close to its theoretical behaviour in the lower HF frequencies generally in 3- 20 MHz band.

Бесплатно

Analytical Model for Wireless Channel of Vehicle-to-Vehicle Communications

Analytical Model for Wireless Channel of Vehicle-to-Vehicle Communications

Raghda Nazar Minihi, Haider M. AlSabbagh

Статья научная

Vehicle-to-Vehicle (V2V) communication system is a network of vehicles that communicate with each other to exchange information. The environment between vehicles affect in the signals that travel from the transmitter to the receiver, subsequently, it is important to comprehend the underlying characteristics propagation channels. This paper discusses and models some of the key metrics such as path loss, power delay profile, and delay spread at 5.2 GHz carrier frequency. The analyses are presented for two scenarios; both of the transmitter and receiver are stationary and in moving case with considering the direction of the moving and the separation between the vehicles. Likewise, a probability of a presence of some impediments in between of the vehicles with various separations is considered. The achieved results show that path loss for many types of environments may be predicted with using the presented model channel Model and location of the obstacles is sensitive to the received signals.

Бесплатно

Android Based Inventory Management with NFC Enabled for Faster Tracking Items at a Steel Company: A Case Study

Android Based Inventory Management with NFC Enabled for Faster Tracking Items at a Steel Company: A Case Study

Suci Laksono

Статья научная

One of the business activities in the company is Inventory management. Stocktaking is an important process to ensure stable operation. A conventional method for item identification is through an attached human-readable label. Employees use an inventory sheet of paper to keep track of items. We propose new system inventory management based on an android application to increase time efficiency for Obtain data tracking through NFC (Near Field Communication) tag-based system. This approach involved 11 participants who performed stocktaking to compare performance between the new and old systems. We collect 54 of the Sample data for time evaluation using a t-test to analyze the data. The result was significantly shorter time in stocktaking process of new system than conventional method (df = 26, t = -7.075, p < .001). Furthermore, the proposed system could be a viable solution for reduce the time needed to complete the stocktaking process in the company.

Бесплатно

Application of Artificial Neural Networks for Detecting Malicious Embedded Codes in Word Processing Documents

Application of Artificial Neural Networks for Detecting Malicious Embedded Codes in Word Processing Documents

Sisay Tumsa

Статья научная

Artificial Neural Networks have been widely used in security and privacy domains for alleviating the issues of malicious attacks. Several embedded codes like Visual Basic for Application Macros are reasonably powerful scripts that can help to automate iterative processes in word processing documents. It has been observed that, unethical hackers exploit these embedded scripts for their malicious intents. Since most of the Microsoft Word users are unaware of such malicious attacks because they are layman end users and mistakenly considers less suspicious contents. And therefore, these hackers prefer to use Microsoft Office documents as most vulnerable items for or Attack vectors. As a general approach, non-executable files are assumed to be less vulnerable than executable files. This implies that these document files could provide an easy and convenient exploitable pathway that can allow hackers to execute their intended malicious actions on the victim’s machine. This research paper presents an automatic detection of malicious embedded codes in general and Microsoft Office documents as a specific case for experimental analysis. This research paper considered only malicious behavior of the embedded codes i.e. checks the status of inclusion or exclusion of the executable code. The malicious datasets are developed to create a knowledgebase where documents are pre-processed. Thereafter the data sets are disassembled using reverse engineering and then malicious features are extracted from the documents. In this research paper, nineteen different malicious keys were extracted. Later, feature reduction technique was applied. Based upon actions; these malicious keys were reduced to eight behaviors. Finally, a machine is trained using artificial neural network with eight input features; extracted from individual disassembled scripts. Afterwards, output nodes that represent malicious or benign behavior classify the existence of attack i.e. exists or does not exists. Based on the training model, a total of seven hundred ninety-two samples of documents were tested. Finally, the research has achieved an average accuracy of 92.2% in the identification of maliciousness of embedded codes in Microsoft Office documents as a case. This result shows that the proposed system has high accuracy in detecting malicious Embedded in word processing documents.

Бесплатно

Application of Digital Mockup Technology

Application of Digital Mockup Technology

Gaoming Ding

Статья научная

Digital simulation design is one of the mechanical product modern design methods. We have introduced the concept and meaning of digital mockup technology in mechanical design and its architecture, design cycle, which are concerned multi-domain UML, multi-body dynamics and multidisciplinary design. We also have analyzed the automobile digital simulation design method and digital mockup technology.

Бесплатно

Application of PKI in Encrypting Communications and Verifying Identities of Users in the Internet Banking

Application of PKI in Encrypting Communications and Verifying Identities of Users in the Internet Banking

Xingyu Gong, Shangfu Gong

Статья

This paper analyzes and researches the theories of the encryption communications and identities authentication over the Internet banking based on the PKI technology. Combined with the specific Internet banking system, this research tries to design Internet banking system communication encryption and identities verification and the workflow and main functions. Implementing application to enhance confidentiality of the information transferred by the network communication, this research solves the problems of encrypting Internet banking data and verifying the identities of users and Internet banking. Finally, this paper explores the key technology more in-depth in the designing.

Бесплатно

Applications of Leaky-wave Antennas: A Review

Applications of Leaky-wave Antennas: A Review

Hafiz Suliman Munawar

Статья научная

This review discusses some of the widely used applications of Leaky-wave antennas (LWA) along with their certain types. LWAs have been used extensively in various fields since their origin in the 1940s. They provide wide range of applications that include radars, human sensors, imaging and satellite communication. These antennas have advantage of frequency scanning in a single sweep which make them better choice for frequency scanning applications. Different techniques are integrated with them which increase their importance by providing ease of fabrication and low-profile system. In addition to discussing different types of LWA, this paper contains a comparative analysis of these types which helps in providing a clear knowledge of how and where these antennas can be used. Most of the antenna parameters have a tradeoff between gain and radiation patter, for which careful evaluation of these parameters is needed to make a choice for antenna. Slight modification in the antenna renders great increase in its performance or sometimes degrade it as well. LWA are used for 5G applications which is the latest trend and has great potential of development in coming years. Recent advances in LWA put emphasis on attaining radiations at the broadside which is a challenge for them. The challenges and possible future directions which can draw from existing data have been briefly discussed in this review. To form this review, 15 papers from last 6 years are considered which discusses various parameters of these antennas like radiation pattern, directivity and their fabrication complexities.

Бесплатно

Approaches of Buried Object Detection Technology

Approaches of Buried Object Detection Technology

Nagashree R N, Aswini N

Статья научная

This paper describes the different art of buried object detection technology and algorithms. This detection of buried object finds application in many areas, importantly in the Landmine detection which is of growing concern due to the danger of buried landmines to people’s lives, economic growth and development. This paper describes and analyzes different technology available. The approaches discussed are Electrical Impedance Tomography, X-ray backscatter, Infrared Systems, Acoustics/seismic systems; Neutron based Method and finally Ground-Penetrating Radar with two commonly available approaches: Least squares and SVD approach. Finally, the paper concludes highlighting the need to improve the way this information is processed and compared.

Бесплатно

Area Limitations on Smart Grid Computer Networks

Area Limitations on Smart Grid Computer Networks

Vasileios Karagiannis

Статья научная

Smart grid implementations rely on the real-time monitoring and controlling of the electric power grid. To achieve real time there is need for a messaging system with minimum delays. After mentioning latest implementations and their delays we analyze the role of the different communication protocols needed within smart grids and we describe key factors to a message's delay. Taking into consideration a packet's speed constraints we then calculate a radius, within which, the ETSI communication requirements for smart grids are satisfied.

Бесплатно

BER Analysis with Adaptive Modulation Coding in MIMO-OFDM for WiMAX using GNU Radio

BER Analysis with Adaptive Modulation Coding in MIMO-OFDM for WiMAX using GNU Radio

B. Siva Kumar Reddy, B. Lakshmi

Статья научная

This paper explores how MIMO increases channel capacity and how the fundamental characteristics of a MIMO system can create significant test challenges. Spatial modulation (SM) is the latest developed modulation method in the field of communication. The latest research on this shows that SM is useful to achieve the multiplexing gain for the single antenna system, this avoids the inter-channel interference but the spatial modulation is inherently unable to get transmit-diversity. In other words, SM is a novel modulation technique which combines the high multiplexing gain provided by the spatial modulation and transmit-diversity gain, given by the space time block codes (STBCs) technology. Different space-time block coding (STBC) schemes including Alamouti’s STBC for 2 transmit antennas as well as orthogonal STBC (OSTBC) for 3 and 4 transmit antennas are explored. The result of using these MIMO techniques is higher data rate or longer transmit range without requiring additional bandwidth or transmit power. This paper presents a detailed study of diversity coding for MIMO systems. In addition, adaptive modulation and coding (AMC) technique in conjunction with MIMO techniques constitute a technological breakthrough that greatly helps in satisfying the ever increasing demands of wireless networks. This paper presents a performance study of Mobile WiMAX networks based on MIMO and AMC perspectives. It also describes how to implement WiMAX PHY with MIMO on software defined radio (SDR) experimental setup with the help of USRP N210 as hardware and GNU Radio as software platforms.

Бесплатно

BER Evaluation of FSO Link with Hybrid Amplifier for Different Duty Cycles of RZ Pulse in Different Conditions of Rainfall

BER Evaluation of FSO Link with Hybrid Amplifier for Different Duty Cycles of RZ Pulse in Different Conditions of Rainfall

Pooja Kumari, Rajeev Thakur

Статья научная

Free Space Optics is a medium with high bandwidth which has maximum data rate. Demand for large data speed capacity has been increasing exponentially due to the massive spread of internet services. So with the growing transmission rate and demand in the field of optical communication, the electronic regeneration has become more expensive. With the introduction of power optical amplifiers the cost of converting optical signals to electronic signals has been brought down immensely. This research paper describes the effect of varying duty cycle on BER performance of the FSO link with hybrid amplifier having different attenuation.

Бесплатно

BER Performance Optimization of the SFBC-OFDM System for Economical Receiver Design with Imperfect Channel Estimation

BER Performance Optimization of the SFBC-OFDM System for Economical Receiver Design with Imperfect Channel Estimation

Md. Jakaria Rahimi, Md. Shaikh Abrar Kabir, Azhar Niaz, Md. Jahidul Islam, Oli Lowna Baroi

Статья научная

In this paper, the bit error rate (BER) performance of SFBC-OFDM systems for frequency selective fading channels is observed for various antenna orientations and modulation schemes. The objective is to find out a suitable configuration with minimum number of receiving antenna that requires minimum signal power level at the receiver to provide reliable voice and video communication. We have considered both M-ary phase shift keying (MPSK) and M-ary quadrature amplitude modulation (MQAM) in the performance analysis considering both perfect and imperfect channel state information (CSI). The authors have expressed the BER under imperfect channel estimation condition as a function of BER under perfect channel condition in this paper. The finding shows, for a BTS with 4 transmitting antenna and MS with 2 receiving antenna BPSK performs better for both perfect and imperfect CSI. Maximum permissible channel estimation error increases with the usage of more receiving antenna at the expense of increased cost.

Бесплатно

Big Data Compression in Mobile and Pervasive Computing

Big Data Compression in Mobile and Pervasive Computing

PankajDeep Kaur, Sandeep Kaur, Amneet Kaur

Статья научная

The usability of Mobile devices and portable computers has been increased very rapidly. The main focus of modern research is to handle the big data in Mobile and pervasive computing. This paper gives an overview of Mobile Data Challenge which was a smart phone based research done by Nokia through Lausanne Data Collection Campaign. The Mobile Data Challenge was introduced when the amount of mobile data was seen to be increased very much in a short period of time. The rise of big data demands that this data can be accessed from everywhere and anytime. For handling such a huge amount of data e.g. SMS, images, videos etc, this data must be compressed for easy transmission over the network. It also helps in reducing the storage requirements. There are various techniques for the compression of data that are discussed in this paper. SMAZ and ShortBWT techniques are used to compress SMS. JPEG and Anamorphic Stretch Transform are used to compress the images.

Бесплатно

Bluetooth Low Energy (BLE) and Feed Forward Neural Network (FFNN) Based Indoor Positioning for Location-based IoT Applications

Bluetooth Low Energy (BLE) and Feed Forward Neural Network (FFNN) Based Indoor Positioning for Location-based IoT Applications

M.W.P. Maduranga, Ruvan Abeysekera

Статья научная

In the recent development of the Internet of Things (IoT), Artificial Intelligence (AI) plays a significant role in enabling cognitive IoT applications. Among popular IoT applications, location-based services are considered one of the primary applications where the real-time location of a moving object is estimated. In recent works, AI-based techniques have been investigated to the indoor localization problem, showing significant advantages over deterministic and probabilistic algorithms used for indoor localization. This paper presents a feasibility study of using Bluetooth Low Energy (BLE) and Feed Forward Neural Networks (FFNN) for indoor localization applications. The signal strength values received from thirteen different BLE ibeacon nodes placed in an indoor environment were trained using a Feed-Forward Neural Network (FFNN). The FFNN was tested under other hyper-parameter conditions. The prediction model provides reasonably good accuracy in classifying the correct zone of 86% when batch size is 100 under the learning rate of 0.01.Hence the FFNN could be used to implement on location-based IoT applications.

Бесплатно

Журнал