International Journal of Wireless and Microwave Technologies (IJWMT)

IJWMT Vol. 9, No. 1, Jan. 2019

Cover page and Table of Contents: PDF (size: 788KB)

Table Of Contents

REGULAR PAPERS

A Hybrid Cryptosystem to Enhance Security in IoT Health Care System

By Kavitha.S P.J.A.Alphonse

DOI: https://doi.org/10.5815/ijwmt.2019.01.01, Pub. Date: 8 Jan. 2019

Internet of Things (IoT) based health care system provides an essential interface between tiny devices and customers, who require customary checking by remedial focus. The technological innovation is important to guarantee the data protection and security among customer and devices, though it is vulnerable by various security assaults. The cryptographic technique is a prominent method for data protection in a healthcare management system. Single cryptographic algorithm based solution suffered to provide efficient security as its high probability of attacks. So this paper proposes a hybrid cryptographic algorithm that secures the sensitive medicinal information in IoT health care system.  The proposed hybrid algorithm is dealing with various security attacks in a proficient way, and also increases its performance when compared to other cryptographic algorithms.

[...] Read more.
Performance Analysis of NLM Interleaving Scheme for CPM OFDM System

By Gayatri Gupta Aasheesh Shukla

DOI: https://doi.org/10.5815/ijwmt.2019.01.02, Pub. Date: 8 Jan. 2019

A New Logistic Map interleaving is the most common method for continuous phase modulation based orthogonal frequency division multiplexing (CPM-OFDM) system over a fading channel. The selection of a "good" interleaver having to express in order that the interleavers are weakly correlated. Interleaver doesn’t involve massive memory to reserve it and a massive bandwidth to communicate in the midst of the transmitter and the receiver, and need to be simple to produce. An efficient chaotic maps randomization (CMR) generates scrambled uncorrelated randomized data can greatly improved the performance of CPM-OFDM system and improved symbol error rate (SER) could be attained. In this study, advise a new one-dimensional chaotic map, the "New Logistic Map (NLM)". Encryption is carried out with logistic map even as a chaotic logistic map interleaving process is used to boost the immunity to noise and fading in communication channel. Furthermore, a evaluation between NLM interleaving and random interleaving is performed in terms of bit error rate(BER).Simulation results shows that the data transmission over wireless channel using propose NLM interleaving is more immune to fading and noise and get better the performance of CPM-OFDM system.

[...] Read more.
Multiband Microstrip Antenna Using Modified Pi-Shape Slot on Ground Plane

By Poonam A. Kadam Amit A. Deshmukh

DOI: https://doi.org/10.5815/ijwmt.2019.01.03, Pub. Date: 8 Jan. 2019

This paper proposes a multiband microstrip antenna with modified pi-shape slot cut on the ground plane for wireless applications. Complete modal analysis and design process of the proposed antenna is demonstrated explaining the modes contributing to achieve the bands. By placing the modified pi-slot in the appropriate position on the ground plane, it tunes TM10, TM12, TM02 and TM20 and TM22 mode frequencies with respect to the fundamental mode frequency and thus realizes four band response which includes one broadband response having 164 MHz (6.5%) bandwidth. The bandwidth in the other bands are in the range of 6 MHz - 30 MHz. The surface currents at these modes are also altered to yield broadside radiation pattern. Suspended version of this antenna is also proposed that offers triple bands and improved broadside gain of around 4 dBi at the broadband besides 2.5 dBi and 1 dBi gain at other two modes. The proposed antenna saves 56% area with respect to the equivalent un-slotted microstrip antenna.

[...] Read more.
Design and Performance Analysis of a Triple Band Micro-Strip Patch Antenna with CPW-Fed

By Rahul Tiwari Laxman Yogi Ashish Bagwari Vivek Singh Kushwah

DOI: https://doi.org/10.5815/ijwmt.2019.01.04, Pub. Date: 8 Jan. 2019

A compact microstrip patch antenna (RMPA) using systematic coplanar waveguide (CPW-Fed) triple printed antenna has designed for WiMAX/WLAN applications in this paper.  A prototype CPW-Fed antenna was fabricated with FR4 Substrate with the dielectric constant of 4.4 and thickness h =1.6 mm. The antenna primarily consists of the symmetrical coplanar waveguide with rectangular slotted patch and excite by a 50 Ω CPW feed line for impedance matching to generate wide triple operating bands. This antenna is suitable for the range from 2.39 -2.75 GHz, 3.4-3.7GHz and 4.6 -6.9 GHz. It is designed miniaturized CPW-Fed microstrip patch antenna has a compact size 20 mm x 35 mm.  In this paper researcher has focused on to improve the gain, impedance bandwidth and also have lower return losses, better impedance matching. The simulated results show that the proposed antenna has achieved wider bandwidth with satisfactory gain by introducing a stub with CPW-Fed in the assistant of a rectangular slot in the upper layer. 

[...] Read more.
Design of Effective Security Architecture for Mobile Cloud Computing to Prevent DDoS Attacks

By Kaushik Sekaran G.Raja Vikram B.V. Chowdary

DOI: https://doi.org/10.5815/ijwmt.2019.01.05, Pub. Date: 8 Jan. 2019

A DOS (Denial of Service) attack, as its name suggests, denies or blocks access to certain services by flooding either the bandwidth of a specified network or by targeting its connectivity. There are much security challenges in mobile cloud computing. Cloud indicates a period of the computing where the services, which are an application, are made available by the internet. Cloud based computing is very adjustable and cheap as to providing a platform for various IT services. The mobile systems can hinge on the cloud based computing with mobile agents and can undertake various processes such as the searching or storing, etc. While it’s very economic, it has many challenges such as the security. Various researches have been carried out to build a secure mobile cloud based computing. In this paper, we have viewed and analyzed the DDOS (Distributed Denial of Service) attacks in depth to prevent it in the mobile cloud computing.

[...] Read more.
DDoS Attack Detection Using C5.0 Machine Learning Algorithm

By Hariharan. M Abhishek H. K B. G. Prasad

DOI: https://doi.org/10.5815/ijwmt.2019.01.06, Pub. Date: 8 Jan. 2019

Distributed Denial of Service has always been an issue while dealing with network security. The potential of DDoS attacks is not limited by any security measures. This type of attack does not attempt to breach a security perimeter but aims to make the service unavailable to legitimate users. This is particularly an issue in private clouds as public clouds have sophisticated systems to prevent DDoS attacks. DDoS attacks can be used as a shield for other malicious activities. Open resource access model of the Internet is exploited by Distributed Denial of Service attackers. The main objective of this paper is to detect DDoS attacks using C5.0 machine learning algorithm and compare the results with other state of the art classifiers like Naïve Bayes classifier and C4.5 decision tree classifier. The focus is on an offline detection model.

[...] Read more.