International Journal of Wireless and Microwave Technologies (IJWMT)

ISSN: 2076-1449 (Print)

ISSN: 2076-9539 (Online)

DOI: https://doi.org/10.5815/ijwmt

Website: https://www.mecs-press.org/ijwmt

Published By: MECS Press

Frequency: 6 issues per year

Number(s) Available: 76

(IJWMT) in Google Scholar Citations / h5-index

IJWMT is committed to bridge the theory and practice of wireless and microwave technologies. From innovative ideas to specific algorithms and full system implementations, IJWMT publishes original, peer-reviewed, and high quality articles in the areas of wireless and microwave technologies. IJWMT is a well-indexed scholarly journal and is indispensable reading and references for people working at the cutting edge of wireless and microwave technology applications.

 

IJWMT has been abstracted or indexed by several world class databases: Google Scholar, Microsoft Academic Search, Baidu Wenku, Open Access Articles, CNKI, GetInfo, WorldCat, OneSearch, ZB MED, CrossRef, JournalTOCs, etc..

Latest Issue
Most Viewed
Most Downloaded

IJWMT Vol. 14, No. 5, Oct. 2024

REGULAR PAPERS

Securing Musical Streams: Leveraging ElGamal Encryption in REST API Frameworks for PWAs

By Timothy John Pattiasina

DOI: https://doi.org/10.5815/ijwmt.2024.05.01, Pub. Date: 8 Oct. 2024

Subscription music platforms, like many web applications, increasingly rely on Progressive Web Apps (PWAs) to enhance user experience. These PWAs function by exchanging data with servers or REST APIs. However, the current reliance on REST APIs poses significant security risks due to vulnerabilities in data transmission. To address this issue, this research integrates the El Gamal cryptographic algorithm into the architecture of a subscription music platform. By incorporating the El Gamal cryptographic algorithm, this research endeavors to fortify the security posture of data exchanged between users and servers through REST APIs. This encryption method was selected for its robust resistance to various cryptographic attacks, providing a strong defense against unauthorized interception and tampering of sensitive information. To evaluate the efficacy of the El Gamal integration, a rigorous white box testing regimen was employed, encompassing metrics such as cyclomatic complexity and basic path testing. These assessments comprehensively examined the code's structure and execution to identify potential vulnerabilities and ensure the correct implementation of the cryptographic algorithm. The findings of the white box testing unequivocally demonstrated the successful integration of El Gamal cryptography on both the client and server components of the subscription music platform, effectively safeguarding the confidentiality and integrity of data transmitted via REST APIs. This research contributes to the advancement of secure communication protocols within web applications, particularly subscription-based platforms. Through the implementation of robust encryption, the study enhances data integrity and confidentiality, ultimately building user trust. 

[...] Read more.
Heuristic – Driven Disjoint Alternate Path Switching – Based Fault Resilient Multi- Constraints Routing Protocol for SDN-mIOT

By Suprith Kumar K. S. Eesha D. Pooja A. P. Monika Sharma D.

DOI: https://doi.org/10.5815/ijwmt.2024.05.02, Pub. Date: 8 Oct. 2024

The last few years have witnessed exponential rise in internet-of-things (IoT) systems for communication; yet, ensuring quality-of-service (QoS) and transmission reliability over mobile topology has remained challenge. Despite the fact that the use of software defined networks (SDN) have enabled IoTs to achieve resource efficiency and reliability; it doesn’t guarantee optimality of the solution over the network with high dynamism and non-linearity. Moreover, the major at hand SDN-IoT protocols have applied standalone node parameters to perform routing and allied transmission decision that confine its robustness over dynamic network topologies. Interestingly, none of the state-of-art SDN-IoT protocols could address the problem of iterative link-outage and corresponding network discovery cost. Furthermore, even multi-path selection strategies too failed in addressing the problem of joined shortest path selection and allied iterative link-outage due to the common node failure. Considering it as motivation, in this paper a novel and robust Heuristic-Driven Disjoint Alternate Path Switching -based Fault-Resilient Multi-Constraints Routing Protocol for SDN-mIOT system (HDAP-SDNIoT) is proposed. HDAP-SDNIoT exploits multiple dynamic parameters like medium access control information, flooding and congestion probability information. HDAP-SDNIoT exploits aforesaid node parameters to perform node profiling that serves multi-constraints best forwarding path selection. The proposed model retrieves multiple best alternating paths which are fed as input to the Adaptive Genetic Algorithm (AGA) that retains three disjoint best forwarding paths. HDAP-SDNIoT protocol at first avoids any malicious node(s) to become forwarding node, while it provides auto-switching capability to the forwarding node to select a disjoint forwarding alternate path in case of any link-outage in current forwarding path. _Simulation results confirm robustness of the proposed model in terms of high packet delivery rate of 96.5%, low packet loss rate 3.5% and low delay of 211 ms that affirms its suitability towards real-time SDN-mIoT applications.

[...] Read more.
Development of a Phishing Website Detection Model Using Classification Algorithm

By Olugbenga A. Madamidola Ilobekemen P. Oladoja Peace B. Falola Matthew W. Omojola

DOI: https://doi.org/10.5815/ijwmt.2024.05.03, Pub. Date: 8 Oct. 2024

In the contemporary digital landscape, the proliferation of malware presents a significant threat to the security and integrity of computer systems and networks. Traditional signature-based detection methods are increasingly ineffective against the evolving landscape of sophisticated malware variants. Consequently, there is a pressing need for innovative approaches to malware detection that can adapt to emerging threats in real-time. This research aims to develop a malware detection system using machine learning algorithms. Random Forest classifier and Logistic regression were deployed for the classification of malware based on the features extracted from the CIC-MalMem-2022 dataset. The Malware detection system model was implemented using the Python programming language and evaluated using major performance metrics like F1-score, precision, recall, and accuracy to assess the model’s performance. A comparison between the logistic regression model and the random forest model showed that the Random Forest model approach performed better than the logistic model in detecting malware, achieving accuracies of 98% and 94% respectively. In summary, the report concludes that the developed Malware Detection System using Machine Learning, specifically the Random Forest and Logistic regression models, shows promise in effectively detecting malware and highlights the importance of leveraging Artificial Intelligence for combating malware threats in the computing community.

[...] Read more.
Design and Analysis of Microstrip Patch Antennas with Polygonal and Rectangular Defected Ground Structures for Sub-6GHz Applications

By Padmasree Ramineni Abhinay Nimmala

DOI: https://doi.org/10.5815/ijwmt.2024.05.04, Pub. Date: 8 Oct. 2024

Microstrip Patch Antennas (MPAs) play a critical role in modern wireless communication systems due to their compact size, easy integration, and capability to ensure reliable communication across wide frequency ranges. This paper introduces enhanced designs of rectangular MPAs aimed at overcoming the narrow bandwidth limitation commonly found in traditional designs. Three innovative configurations are proposed: one featuring a simple rectangular slot on the ground plane, another integrating polygonal Defected Ground Structures (DGS), and a third utilizing rectangular DGS. These antennas are optimized at a frequency of 4 GHz using High Frequency Structural Simulator (HFSS) software to significantly improve antenna performance. The MPA without DGS showed a return loss of -21.124 dB at a resonant frequency of 4 GHz, with a Voltage Standing Wave Ratio(VSWR) of 4.8038 and a gain of 3.88 dBi. In contrast, the MPA with Polygonal DGS exhibited significant improvements, achieving a return loss of -26.87 dB at a resonant frequency of 4.1 GHz, along with a VSWR of 1.3721 and a gain of 4.38 dBi. Similarly, the MPA with Rectangular DGS demonstrated superior characteristics, with a return loss of -27.08 dB, resonance at 3.825 GHz, a VSWR of 1.4399, and a gain of 4.00 dBi. These results underscore the effectiveness of DGS in broadening the bandwidth and improving the performance of MPAs for applications below 6 GHz, making them highly suitable for next-generation wireless communication systems.

[...] Read more.
Machine Learning Algorithms for Detecting DDoS Attacks in Intrusion Detection Systems

By Dandugudum Mahesh T. Sampath Kumar

DOI: https://doi.org/10.5815/ijwmt.2024.05.05, Pub. Date: 8 Oct. 2024

In today's interconnected world, the threat of intrusion activities continues to rise, making it imperative to deploy effective security measures such as Intrusion Detection Systems (IDS). These systems play a vital role in monitoring network and system activities to identify unauthorised or malicious behaviour. The focus of this research is on evaluating the efficiency of different IDS in detecting anomalies in network traffic, specifically targeting Denial of Service (DDoS) attacks that exploit server vulnerabilities using IP addresses. The study utilises the CIC-DDoS 2019 dataset to analyse the performance of various IDS, particularly Network Intrusion Detection Systems (NIDSs), in predicting DDoS attacks accurately. To combat the diverse range of DDoS threats, a collective classifier is introduced, which combines four top-performing algorithms to enhance detection capabilities. By transforming the problem into a multilabel classification issue, the researchers aim to address the complexity of DDoS attacks effectively. Several machine learning (ML) and artificial intelligence (AI) algorithms are employed in the study, including Random Forest Classifier, Decision Tree Classifier, Support Vector Machine (SVM), Naïve Bayes, Multi-Layer Perceptron, Long Short-Term Memory (LSTM), and XGBoost Classifier. Evaluating the performance and computational efficiency of these algorithms is crucial to determining the most effective approach to detecting DDoS attacks. The results of the research highlight the effectiveness of the Random Forest Classifier and Multi-Layer Perceptron in accurately detecting DDoS attacks, as evidenced by their high accuracy rates on the test dataset. These findings underscore the importance of leveraging advanced ML algorithms to enhance the security of networks and systems against evolving cybersecurity threats. In conclusion, the study emphasises the significance of deploying robust IDS equipped with sophisticated ML algorithms to safeguard against intrusion activities like DDoS attacks. By continuously evaluating and improving the performance of these systems, organisations can enhance their cybersecurity posture and mitigate the risks posed by malicious actors in the digital landscape.

[...] Read more.
Smart Locker: IOT based Intelligent Locker with Password Protection and Face Detection Approach

By Niaz Mostakim Ratna R Sarkar Md. Anowar Hossain

DOI: https://doi.org/10.5815/ijwmt.2019.03.01, Pub. Date: 8 May 2019

In today’s world, security becomes a very important issue. We are always concerned about the security of our valuables. In this paper, we propose an IOT based intelligent smart locker with OTP and face detection approach, which provides security, authenticity and user-friendly mechanism. This smart locker will be organized at banks, offices, homes and other places to ensure security. In order to use this locker firstly the user have to login. User has to send an unlock request code (OTP) and after getting a feedback Email with OTP, he/she will be able to unlock the locker to access his/her valuables. We also introduce face detection approach to our proposed smart locker to ensure security and authenticity.

[...] Read more.
Quantum Computers’ threat on Current Cryptographic Measures and Possible Solutions

By Tohfa Niraula Aditi Pokharel Ashmita Phuyal Pratistha Palikhel Manish Pokharel

DOI: https://doi.org/10.5815/ijwmt.2022.05.02, Pub. Date: 8 Oct. 2022

Cryptography is a requirement for confidentiality and authentic communication, and it is an indispensable technology used to protect data security. Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. Quantum computers have the potential to become a pre-eminent threat to all secure communication because their performance exceeds that of conventional computers. Consequently, quantum computers are capable of iterating through a large number of keys to search for secret keys or quickly calculate cryptographic keys, thereby endangering cloud security measures. This paper’s main target is to summarize the vulnerability of current cryptographic measures in front of a quantum computer. The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum future.

[...] Read more.
Performance Evaluation of Slotted Star-Shaped Dual-band Patch Antenna for Satellite Communication and 5G Services

By Md. Najmul Hossain Al Amin Islam Jungpil Shin Md. Abdur Rahim Md. Humaun Kabir

DOI: https://doi.org/10.5815/ijwmt.2023.03.05, Pub. Date: 8 Jun. 2023

The advancement of wireless communication technology is growing very fast. For next-generation communication systems (like 5G mobile services), wider bandwidth, high gain, and small-size antennas are very much needed. Moreover, it is expected that the next-generation mobile system will also support satellite technology. Therefore, this paper proposes a slotted star-shaped dual-band patch antenna that can be used for the integrated services of satellite communication and 5G mobile services whose overall dimension is 15×14×1.6 mm3. The proposed antenna operates from 18.764 GHz to 19.775 GHz for K-band satellite communication and 27.122 GHz to 29.283 GHz for 5G (mmWave) mobile services. The resonance frequencies of the proposed antenna are 19.28 GHz and 28.07 GHz having bandwidths of 1.011 GHz and 2.161 GHz, respectively. Moreover, the proposed dual-band patch antenna has a maximum radiation efficiency of 76.178% and a maximum gain of 7.596 dB.

[...] Read more.
Design of Dual Band Microstrip Patch Antenna for 5G Communication Operating at 28 GHz and 46 GHz

By Anurag Nayak Shreya Dutta Sudip Mandal

DOI: https://doi.org/10.5815/ijwmt.2023.02.05, Pub. Date: 8 Apr. 2023

The design of suitable compact antenna for 5G applications with superior return loss and bandwidth is still a fascinating task to the researchers. In this paper, the authors have designed a dual band microstrip patch antenna for 5G communications at 28 GHz and 46 GHz using CST studio. Rectangular patch antenna with double slots is considered to serve the purpose. The performance of the proposed patch antenna is very satisfactory in terms of return loss, VSWR, bandwidth and directivity. The values of S11 are well below -39dB and values of VSWR are very close to 1 for both resonance frequencies. The bandwidths for both cases are greater than 1.8 GHz which is an essential characteristic of 5G patch antennas for high speed connectivity and efficiency. Directivities are above 6 dB which are very suitable for the present problem. The simulation results are also compared with existing dual band 5G patch antennas and it has been observed that proposed antenna has outperformed the existing patch antennas that worked in 28GHz and 46GHz frequency range. The main advantage of this patch antenna is that it’s simple structure and good return loss, bandwidth and gain.

[...] Read more.
A Compact, Tri-Band and 9-Shape Reconfigurable Antenna for WiFi, WiMAX and WLAN Applications

By Izaz Ali Shah Shahzeb Hayat Ihtesham Khan Imtiaz. Alam Sadiq Ullah Adeel Afridi

DOI: https://doi.org/10.5815/ijwmt.2016.05.05, Pub. Date: 8 Sep. 2016

This paper introduces a novel 9-shaped multiband frequency reconfigurable monopole antenna for wireless applications, using 1.6 mm thicker FR4 substrate and a truncated metallic ground surface. The designed antenna performs in single and dual frequency modes depending on switching states. The antenna works in a single band (WiMAX at 3.5 GHz) when the switch is in the OFF state. The dual band frequency mode (Wi-Fi at 2.45 GHz and WLAN at 5.2 GHz) is obtained when the switch is turned ON. The directivities are: 2.13 dBi, 2.77 dBi and 3.99 dBi and efficiencies: 86%, 93.5% and 84.4% are attained at frequencies 2.45 GHz, 3.5 GHz and 5.2 GHz respectively. The proposed antenna has VSWR< 1.5 for all the three frequencies. The scattering and far-field parameters of the designed antenna are analyzed using computer simulation technology CST 2014. The performance of the proposed antenna is analyzed on the basis of VSWR, efficiency, gain, radiation pattern and return loss.

[...] Read more.
Adversarial Machine Learning Attacks and Defenses in Network Intrusion Detection Systems

By Amir F. Mukeri Dwarkoba P. Gaikwad

DOI: https://doi.org/10.5815/ijwmt.2022.01.02, Pub. Date: 8 Feb. 2022

Machine learning is now being used for applications ranging from healthcare to network security. However, machine learning models can be easily fooled into making mistakes using adversarial machine learning attacks. In this article, we focus on the evasion attacks against Network Intrusion Detection System (NIDS) and specifically on designing novel adversarial attacks and defenses using adversarial training. We propose white box attacks against intrusion detection systems. Under these attacks, the detection accuracy of model suffered significantly. Also, we propose a defense mechanism against adversarial attacks using adversarial sample augmented training. The biggest advantage of proposed defense is that it doesn’t require any modification to deep neural network architecture or any additional hyperparameter tuning. The gain in accuracy using very small adversarial samples for training deep neural network was however found to be significant.

[...] Read more.
Investigating Coupling Interactions in Split-Ring Resonator Dimers

By Akaa Agbaeze Eteng Ngozi Peggy Udeze

DOI: https://doi.org/10.5815/ijwmt.2023.02.01, Pub. Date: 8 Apr. 2023

Topological wireless power transfer (TWPT) arrays provide directional power transfer, which are robust to external disturbances. Often realized as a chains of dimers, the ability to adjust the coupling between constituent resonator elements is an important means of establishing necessary conditions for power transfer. This paper explores the coupling interactions that are possible within dimers consisting of paired split-ring resonators (SRRs) in close proximity. Transfer efficiencies and through impedances are computationally studied for various rotational orientations of edge-and broadside-coupled SRRs. The obtained results reveal that relative rotational orientation can be employed as a sensitive design parameter to provide a variety of high- and low-coupling options within and between SRR dimers, with different power transfer efficiency implications.

[...] Read more.
Smart Home Security Using Facial Authentication and Mobile Application

By Khandaker Mohammad Mohi Uddin Shohelee Afrin Shahela Naimur Rahman Rafid Mostafiz Md. Mahbubur Rahman

DOI: https://doi.org/10.5815/ijwmt.2022.02.04, Pub. Date: 8 Apr. 2022

In this fast-paced technological world, individuals want to access all their electronic equipment remotely, which requires devices to connect over a network via the Internet. However, it raises quite a lot of critical security concerns. This paper presented a home automation security system that employs the Internet of Things (IoT) for remote access to one's home through an Android application, as well as Artificial Intelligence (AI) to ensure the home's security. Face recognition is utilized to control door entry in a highly efficient security system. In the event of a technical failure, an additional security PIN is set up that is only accessible by the owner. Although a home automation system may be used for various tasks, the cost is prohibitive for many customers. Hence, the objective of this paper is to provide a budget and user-friendly system, ensuring access to the application and home attributes by using multi-modal security. Using Haar Cascade and LBPH the system achieved 92.86% accuracy while recognizing face.

[...] Read more.
SDN Interfaces: Protocols, Taxonomy and Challenges

By Suhail Ahmad Ajaz Hussain Mir

DOI: https://doi.org/10.5815/ijwmt.2022.02.02, Pub. Date: 8 Apr. 2022

The ever-increasing demands of Internet services like video on demand, big data applications, IoE and multi-tenant data centers have compelled the network industry to change its conventional non-evolving network architecture. Software Defined Network (SDN) has emerged as a promising network architecture which provides necessary abstractions and novel APIs to facilitate network innovations and simplifies network resource management by breaking the conventional network into multiple planes. All these SDN planes interact through open interfaces or APIs which are commonly categorized into southbound, northbound and west/eastbound interfaces. In this manuscript, we have identified and emphasized various communication protocols used at south and northbound interfaces. We have provided a taxonomy of south and northbound communication protocols based on their dependence, capabilities and properties. The pros and cons associated with each communication mechanism are highlighted and the numerous research challenges and open issues involved at these two interfaces are elucidated. In addition to it, we have proposed the necessary abstractions and extensions required in communication protocols at these two interfaces to simplify real-time monitoring and virtualization in next generation networks.

[...] Read more.
Methodologies, Requirements and Challenges of Cybersecurity Frameworks: A Review

By Alaa Dhahi Khaleefah Haider M. Al-Mashhadi

DOI: https://doi.org/10.5815/ijwmt.2023.01.01, Pub. Date: 8 Feb. 2023

As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software through numerous fields and communities may now be processed through value chains networks. Despite the integration of all data networks, computing models, and distributed software that offers a broader cloud computing, the security solution is have a serious important impact and missing or weak, and more work is needed to strengthen security requirements such as mutual entity trustworthiness, Access controls and identity management, as well as data protection, are all aspects of detecting and preventing attacks or threats. Various international organizations, academic universities and institutions, and organizations have been working diligently to establish cybersecurity frameworks (CSF) in order to combat cybersecurity threats by (CSFs). This paper describes CSFs from the perspectives of standard organizations such as ISO CSF and NIST CSF, as well as several proposed frameworks from researchers, and discusses briefly their characteristics and features. The common ideas described in this study could be helpful for creating a CSF model in general.

[...] Read more.
Full-Wave Numerical Analysis of Dual-Band E-Patch Antenna and Reactive Loading Technique to Ascertain the Impedance Driving Point Function

By Fubara Edmund Alfred-Abam Pam Paul Gyang Fiyinfoluwa P. Olubodun

DOI: https://doi.org/10.5815/ijwmt.2023.03.03, Pub. Date: 8 Jun. 2023

This paper encompasses the numerical analysis involved with the Electromagnetic (EM) full-wave simulation tool Advanced Design System (ADS) which uses the Method of Moment (MOM) and Finite Element Method (FEM). MOM is utilized to solve Maxwell’s equations which are transformed into integral equations before discretization and boundary conditions are applied while FEM computes the electrical behavior of the high frequency EM wave distribution, and then analyze the antenna parameters. The main objective is to investigate the effect of reactive loading on the microstrip patch surface which is used to control the behavior of the impedance bandwidth and obtain dual-band frequency operation. The study further examines how the perturbed patch antenna design targets the operating frequencies of 2.4 GHz and 5.8 GHz for possible range and speed. The proposed method provides insight into the analysis of the mathematical model employed in attaining the Driving Point Impedance Function (DPF) of the E-patch microstrip patch antenna. This approach was done to quantify the reduction in reflections for improved Radio Frequency (RF) network output.

[...] Read more.
Quantum Computers’ threat on Current Cryptographic Measures and Possible Solutions

By Tohfa Niraula Aditi Pokharel Ashmita Phuyal Pratistha Palikhel Manish Pokharel

DOI: https://doi.org/10.5815/ijwmt.2022.05.02, Pub. Date: 8 Oct. 2022

Cryptography is a requirement for confidentiality and authentic communication, and it is an indispensable technology used to protect data security. Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. Quantum computers have the potential to become a pre-eminent threat to all secure communication because their performance exceeds that of conventional computers. Consequently, quantum computers are capable of iterating through a large number of keys to search for secret keys or quickly calculate cryptographic keys, thereby endangering cloud security measures. This paper’s main target is to summarize the vulnerability of current cryptographic measures in front of a quantum computer. The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum future.

[...] Read more.
A Systematic Review of Privacy Preservation Models in Wireless Networks

By Namrata J. Patel Ashish Jadhav

DOI: https://doi.org/10.5815/ijwmt.2023.02.02, Pub. Date: 8 Apr. 2023

Privacy preservation in wireless networks is a multidomain task, including encryption, hashing, secure routing, obfuscation, and third-party data sharing. To design a privacy preservation model for wireless networks, it is recommended that data privacy, location privacy, temporal privacy, node privacy, and route privacy be incorporated. However, incorporating these models into any wireless network is computationally complex. Moreover, it affects the quality of services (QoS) parameters like end-to-end delay, throughput, energy consumption, and packet delivery ratio. Therefore, network designers are expected to use the most optimum privacy models that should minimally affect these QoS metrics. To do this, designers opt for standard privacy models for securing wireless networks without considering their interconnectivity and interface-ability constraints. Due to this, network security increases, but overall, network QoS is reduced. To reduce the probability of such scenarios, this text analyses and reviews various state-of-the-art models for incorporating privacy preservation in wireless networks without compromising their QoS performance. These models are compared on privacy strength, end-to-end delay, energy consumption, and network throughput. The comparison will assist network designers and researchers to select the best models for their given deployments, thereby assisting in privacy improvement while maintaining high QoS performance.Moreover, this text also recommends various methods to work together to improve their performance. This text also recommends various proven machine learning architectures that can be contemplated & explored by networks to enhance their privacy performance. The paper intends to provide a brief survey of different types of Privacy models and their comparison, which can benefit the readers in choosing a privacy model for their use.

[...] Read more.
Design of Dual Band Microstrip Patch Antenna for 5G Communication Operating at 28 GHz and 46 GHz

By Anurag Nayak Shreya Dutta Sudip Mandal

DOI: https://doi.org/10.5815/ijwmt.2023.02.05, Pub. Date: 8 Apr. 2023

The design of suitable compact antenna for 5G applications with superior return loss and bandwidth is still a fascinating task to the researchers. In this paper, the authors have designed a dual band microstrip patch antenna for 5G communications at 28 GHz and 46 GHz using CST studio. Rectangular patch antenna with double slots is considered to serve the purpose. The performance of the proposed patch antenna is very satisfactory in terms of return loss, VSWR, bandwidth and directivity. The values of S11 are well below -39dB and values of VSWR are very close to 1 for both resonance frequencies. The bandwidths for both cases are greater than 1.8 GHz which is an essential characteristic of 5G patch antennas for high speed connectivity and efficiency. Directivities are above 6 dB which are very suitable for the present problem. The simulation results are also compared with existing dual band 5G patch antennas and it has been observed that proposed antenna has outperformed the existing patch antennas that worked in 28GHz and 46GHz frequency range. The main advantage of this patch antenna is that it’s simple structure and good return loss, bandwidth and gain.

[...] Read more.
Design of Microstrip Patch Antenna Array

By Mohd Asaduddin Shaik Seif Shah Mohd Asim Siddiqui

DOI: https://doi.org/10.5815/ijwmt.2023.03.04, Pub. Date: 8 Jun. 2023

Throughout the years there has been a crisis for low gain and efficiency in Microstrip patch antennas. Therefore, the microstrip patch antenna was designed for better gain, directivity and efficiency using array configuration of microstrip patch antenna with low dielectric constant at 10.3GHZ resonant frequency. The proposed design is of a triangular shaped patch array and a substrate RT duroid-5880 of dielectric constant 2.2. The results after simulation shows a good return loss, bandwidth around 950Mhz-1Ghz, directivity of 11.4db in a particular direction, gain of 11.4 dB with 99% radiation effect. The design proposed is helpful for applications like military defence and communication purposes.

[...] Read more.
Performance Evaluation of Slotted Star-Shaped Dual-band Patch Antenna for Satellite Communication and 5G Services

By Md. Najmul Hossain Al Amin Islam Jungpil Shin Md. Abdur Rahim Md. Humaun Kabir

DOI: https://doi.org/10.5815/ijwmt.2023.03.05, Pub. Date: 8 Jun. 2023

The advancement of wireless communication technology is growing very fast. For next-generation communication systems (like 5G mobile services), wider bandwidth, high gain, and small-size antennas are very much needed. Moreover, it is expected that the next-generation mobile system will also support satellite technology. Therefore, this paper proposes a slotted star-shaped dual-band patch antenna that can be used for the integrated services of satellite communication and 5G mobile services whose overall dimension is 15×14×1.6 mm3. The proposed antenna operates from 18.764 GHz to 19.775 GHz for K-band satellite communication and 27.122 GHz to 29.283 GHz for 5G (mmWave) mobile services. The resonance frequencies of the proposed antenna are 19.28 GHz and 28.07 GHz having bandwidths of 1.011 GHz and 2.161 GHz, respectively. Moreover, the proposed dual-band patch antenna has a maximum radiation efficiency of 76.178% and a maximum gain of 7.596 dB.

[...] Read more.
Design of the E-Patch Dual-Band Microstrip Antenna with Low Reflections for WLAN Application

By Fubara Edmund Alfred-Abam Pam Paul Gyang

DOI: https://doi.org/10.5815/ijwmt.2023.01.02, Pub. Date: 8 Feb. 2023

Antennas are either massive or miniaturized structures useful for the transmission and reception of signals associated with Electromagnetic (EM) radiation. Although Microstrip Patch Antennas (MSA) are advantageous they exhibit several drawbacks which may impair a faster communication throughput. They mostly display narrow impedance bandwidth amidst other grave issues. This study presents some approaches such as transmission line analysis and modeling for investigating the complexities associated with the MSA configurations given the shortcomings of narrow impedance bandwidth. in other to achieve the associated input impedance for the dual-band E-patch microstrip antenna. It also investigated the fabrication of the E-patch MSA which targeted the operating frequencies of 2.4 GHz and 5.8 GHz for possible range and speed. The fabricated prototype was tested using a high-frequency communication instrument known as the Vector Network Analyzer (VNA) to obtain the return loss and Voltage Standing Wave Ratio (VSWR). This method was done to quantify the reduction of reflections for enhanced Radio Frequency (RF) network output. This work helps to mitigate the challenges encountered when designing and developing microstrip patch antennas having a relatively small size in different configurations. 

[...] Read more.
Design of an IoT-Enabled Solar Tracking System For Smart Farms

By JD Motha M.W.P Maduranga NT Jayatilaka

DOI: https://doi.org/10.5815/ijwmt.2022.06.01, Pub. Date: 8 Dec. 2022

This paper presents a novel IoT system to eliminate the need for human intervention for solar panel maintenance purposes in smart farms. For the convenience of the consumer, a wireless sensing system could be implemented to automate these functions. This would eliminate the cost of any additional labor charges for panel maintenance as the system implemented would automatically calculate the position as per the current time of the day and adjust the panel's position accordingly to harvest the most amount of sun rays into the PV panel. Unlike the conventional tracking method where the panel is rotated hourly, we propose a fixed set of Sun Altitude and Azimuth angle ranges that are hardcoded to each panel position so that throughout the year whenever these angles fall out of range it jumps to the next position. The system results in a straightforward method by retrieving the current date/time from the RTC module and calculating the respective Sun Altitude and Azimuth angle to determine the position to adjust the position of the panel accordingly, thus producing effective power outputs and strong sun tracking results.

[...] Read more.
Performance Analysis of HWMP Protocol in Wireless Mesh Network

By Jyoti Mishra Awadhesh Kumar Akash Raghuvanshi

DOI: https://doi.org/10.5815/ijwmt.2023.02.04, Pub. Date: 8 Apr. 2023

Wireless Mesh Networks (WMNs) play a vital role in next-generation wireless networking, with applications ranging from last-mile wireless internet, transportation systems enterprise, enterprise networks, home networking, and wireless community networks are all examples of wireless community networks.Individual vendors created several proprietary mesh systems, but IEEE organized the IEEE 802.11s task force to design a meshed networking exposition to assure interoperability.In this paper, we evaluate the Quality of service parameters such as throughput, delay, PDR and jitter of mesh protocol.We simulated the HWMP protocol's performance,the present work is an attempt to address the problem related to wireless mesh networks by minimizing the delay and maximizing the throughput of the network.

[...] Read more.
Privacy Enhancing for Fog Computing based - IoT

By Samaa Y. Tarabay Ibrahim Yasser Ahmed S. Samrah Abeer T. Khalil

DOI: https://doi.org/10.5815/ijwmt.2023.03.01, Pub. Date: 8 Jun. 2023

With the massive inflation of newly developed technologies, recourse to data has become a necessity in light of the current inflation and excessive need dominating the world and developed societies. According to the control of millions of smart devices and sensors connected to an interconnected and controlled automated system within installed scales due to the services provided by IOT devices through the created fog layer that connects the cloud centers and those devices, in addition, very large amounts of that data including public and private are passed through the connection of Internet of Things devices to each other. Smart and advanced networks as one of the fog computing applications play a prominent and accurate role in the infrastructure for reliable and sound data transmission. Accordingly, the process of data aggregation is an important and common matter in the world of fog-enhancing Internet of Things, so preserving the privacy of that data is a matter of concern, and based on this principle, we propose in this paper a model for data aggregation that maintains privacy using a foggy computing environment called PPFDA (privacy preserving based- fog computing data aggregation). We use in our scheme DF homomorphic cryptosystem as it consider one of the aggregation models that ensures the privacy purpose. The theoretical results and analyzes show that our design is ensuring the privacy of data during collection using an algorithm of DF. The results confirm that the proposed scheme achieves security and privacy purposes in modern network systems for the Internet of things based in fog computing. In addition, it contributes significantly to the efficient performance of storage operations.

[...] Read more.