IJWMT Vol. 13, No. 5, Oct. 2023
Cover page and Table of Contents: PDF (size: 674KB)
REGULAR PAPERS
The fifth generation (5G) wireless technology has a significant impact on individuals' lives and work, and this impact is expected to increase in the future. The Orthogonal Frequency Division Multiplexing (OFDM) method, which is currently used in fourth generation (4G) technology, has limitations in meeting certain criteria such as data rates and speed for the latest technology due to issues such as sideband leakages, high Peak-to-Average Power Ratio (PAPR), and poor spectrum utilization. Additionally, the increasing demand for Internet of Things (IoT) and user-centric processing makes the OFDM method impractical. As a result, alternative technologies are being explored to meet these needs. Filter Bank Multicarrier (FBMC) and Universal Filtered Multicarrier (UFMC) are potential candidates for 5G technology. This paper focuses on the evolution of FBMC from OFDM, and then compares the performance of FBMC and UFMC by analyzing various modulation schemes such as Quadrature Amplitude Modulation (QAM), Phase Shift Keying (PSK), PAPR, and Bit Error Rate (BER) through Additive White Gaussian Noise (AWGN) and Rayleigh fading channels. A theoretical BER model is also established to validate the simulated BER results. In this paper BER is analyzed in terms mathematical and simulation based approaches. To validate this simulation based method, it can be compared with the theoretical BER results to verify the accuracy of this simulation. Result portays that, the theoretical results and the simulated results are quite close through the Additive White Gaussian Noise (AWGN) channel.
[...] Read more.The blockchain technology has been widely adopted for various applications due to its decentralization, transparency, and security features. Consensus algorithms, such as Proof of Work (PoW) and Proof of Stake (PoS), are fundamental components of blockchain technology, ensuring the integrity and validity of the blockchain network. However, the current consensus algorithms face challenges such as scalability, energy consumption, and security threats. To address these challenges, a new secure network for streamlined and high-performance consensus algorithm based on blockchain technology has been proposed. This new network incorporates the advantages of PoW and PoS, resulting in a hybrid consensus algorithm that is more efficient and secure than the existing algorithms. Additionally, the new network utilizes a dynamic sharding mechanism to improve scalability, reducing the overall processing time of transactions. The simulation results help identify potential vulnerabilities and inefficiencies in the consensus algorithm. Optimal combinations of block interval and propagation delay are determined based on specific use cases, balancing high throughput with security and consensus stability. The study also validates the security of Proof-of-Work (PoW) by comparing the fraction of generated blocks with the expected blocks based on miners' hashing power. This study establishes a foundation for future improvements in consensus algorithms, contributing to their evolution and facilitating the implementation of blockchain applications in various domains such as finance, healthcare, supply chain management, and more. The proposed solution aims to provide a more robust and efficient blockchain platform that can handle a higher volume of transactions while maintaining its security features.
[...] Read more.Mobile agent is a piece of computer code that organically goes from one host to the another in a consistent or inconsistent environment to distribute data among users. An autonomous mobile agent is an operational programme that may migrate from one computer to machine in different networks under its own direction. Numerous health care procedures use the mobile agent concept. An agent can choose to either follow a predetermined course on the network or determine its own path using information gathered from the network. Security concerns are the main issue with mobile agents. Agent servers that provide the agents with a setting for prosecution are vulnerable to attack by cunning agents. In the same way agent could be carrying sensitive information like credit card details, national level security message, passwords and attackers can access these files by acting as a middle man. In this paper, optimized approach is provided to encrypt the data carried by mobile agent with Advanced Encryption Standard (AES) algorithm and secure key to be utilized by the AES Encryption algorithm is generated with the help of Hopfield Neural Network (HNN). To validate our approach, the comparison is done and found that the time taken to generate the key using HNN is 1101ms for 1000 iterations which is lesser than the existing models that are Recurrent Neural Networks and Multilayer Perceptron Network models. To add an additional level of security, data is encoded using hash maps which make the data not easily readable even after decrypting the information. In this way it is ensured that, when the confidential data is transmitted between the sender and the receiver, no one can regenerate the message as there is no exchange of key involved in the process.
[...] Read more.The millimeter wave (mmWave) band has gained significant attention due to its potential to cater to the rapidly increasing wireless data rates. Due to the reduced wavelength in mmWave communications, it is possible to implement large antenna arrays at both the transmitter and the receiver. Designing small antennas in the mmWave range presents many challenges, which is the main aim of this paper. The aim of this work is to proposed an efficient design of a dual-band mmWave antenna, with the dimension of 26.5mm×7.0mm×0.254mm, for future cellular communication systems using a substrate integrated waveguide (SIW). The elements of the proposed antenna consist of SIW cavity with one longer longitudinal slot and another shorter engraved slot in one of the conducting planes (1×2) for 28 GHz and 38 GHz, respectively. The substrate duroid 5880/Rogers are used with a loss tangent and dielectric constant of 0.003 and 2.2, respectively. The CST Microwave Studio, an industry-standard software, was utilized to conduct the simulation results. The proposed antenna's performance was evaluated by analyzing its gain, radiation pattern, and return loss at the frequencies of 28 GHz and 38 GHz. Furthermore, it is compared with other relative works. The single antenna element was able to attain an impedance bandwidth (S11< -10 dB) of 1.32 GHz and 3.1 GHz, with a satisfactory gain of 6.1 dBi and 5.81 dBi at 28 GHz and 38 GHz, respectively. The results indicate that the designed antenna can attain consistent and adjustable dual-frequency performance, making it a viable option for future cellular communication systems.
[...] Read more.Cloud computing is a cutting-edge system that's widely considered the future of data processing, making cloud computing one of the widely used platforms worldwide. Cloud computing raises problems around privacy, security, anonymity, and availability. Because of this, it is crucial that all data transfers be encrypted. The overwhelming majority of files stored on the cloud are of little to no significance while the data of certain users may be crucial. To solve the problems around security, privacy, anonymity, and availability, so we propose a novel method for protecting the confidentiality and security of data while it is being processed by a cloud platform. The primary objective of this study is to enhance the cloud security with RC6 and 3DES algorithms while attained low cost encryption, and explore variety of information safety strategies. Inside the proposed system, RC6 and 3DES algorithms have been used to enhance data security and privacy. The 3DES has been used to data with a high level of sensitivity to encrypt the key of RC6 and this method is significant improve over the status quo since it increases data security while reduce the amount of time needed for sending and receiving data. Consequently, several metrics, such as encryption time, false positive rate, and P-value, have been determined by analyzing the data. According to the findings, the suggested system attained less encryption time in different file size by securely encrypting data in a short amount of time and it gives outperformance as compared to other methods.
[...] Read more.