International Journal of Wireless and Microwave Technologies (IJWMT)

ISSN: 2076-1449 (Print)

ISSN: 2076-9539 (Online)

DOI: https://doi.org/10.5815/ijwmt

Website: https://www.mecs-press.org/ijwmt

Published By: MECS Press

Frequency: 6 issues per year

Number(s) Available: 83

(IJWMT) in Google Scholar Citations / h5-index

IJWMT is committed to bridge the theory and practice of wireless and microwave technologies. From innovative ideas to specific algorithms and full system implementations, IJWMT publishes original, peer-reviewed, and high quality articles in the areas of wireless and microwave technologies. IJWMT is a well-indexed scholarly journal and is indispensable reading and references for people working at the cutting edge of wireless and microwave technology applications.

 

IJWMT has been abstracted or indexed by several world class databases: Google Scholar, Microsoft Academic Search, Baidu Wenku, Open Access Articles, CNKI, GetInfo, WorldCat, OneSearch, ZB MED, CrossRef, JournalTOCs, etc..

Latest Issue
Most Viewed
Most Downloaded

IJWMT Vol. 15, No. 6, Dec. 2025

REGULAR PAPERS

Anomaly Detection in IoT Based Satellite Networks: NidaDeepMix

By Nida Canpolat Sengul Dogan Mehmet Karakose Turker Tuncer Musa Yenilmez

DOI: https://doi.org/10.5815/ijwmt.2025.06.01, Pub. Date: 8 Dec. 2025

IOT based satellite networks are one of the modern cyber attack topics. This technology has important application areas such as data collection, monitoring and control without the need for close access. Especially the increasing use of IOT devices and their recent integration with satellite networks have made these devices the target of attacks. The fact that IOT devices have more than one type and require low processing power makes them vulnerable to attacks. The use of IOT devices together with satellite networks increases the complexity of this situation and the size of cyber attacks. This situation has made it necessary to increase the studies on preventing and detecting cyber attacks on IOT based networks. For this purpose, in this article, we propose a new deep learning architecture (NidaDeepMix) that provides high accuracy in order to detect cyber attacks on IOT based satellite networks. The designed layer structure and parameters of the NidaDeepMix architecture are adjusted to effectively cope with complex and difficult situations. The NidaDeepMix architecture has been tested on two separate comprehensive datasets, CSE-CIC-IDS-2018 and BCCC-CIRA-CIC-DoHBrw-2020. As a result of the training, a serious accuracy rate of %99.99 was achieved for the CSE-CIC-IDS-2018 dataset and %99.98 for the BCCC-CIRA-CIC-DoHBrw-2020 dataset. Considering these high accuracy rates, it has been demonstrated that the proposed architecture is quite effective in classifying attacks. These rates obtained on different datasets reveal the generalization success of the model. At the same time the model has also addressed the issue of cyber attacks on IOT based satellite networks with an innovative approach. In this context, a new and effective architecture has been provided to the literature for detecting attacks on IOT based satellite networks. It is envisaged that the proposed method NidaDeepMix will be an important reference model in important issues such as cyber attacks and anomaly detection in the future.

[...] Read more.
Securing Drone Communications: A Vulnerability Analysis of MAVLink

By Anuhya Murki Mahati A. Kalale Shriya Anil P. Santhi Thilagam

DOI: https://doi.org/10.5815/ijwmt.2025.06.02, Pub. Date: 8 Dec. 2025

Unmanned Aerial Vehicles (UAVs) are increasingly being integrated into a wide range of industries and ap- plications, including but not limited to surveillance, logistics, environmental monitoring, infrastructure inspection, and disaster management. The growing deployment of UAVs in both civilian and defence sectors highlights their versatil- ity and operational efficiency. However, one of the core enablers of UAV functionality is their dependence on wireless communication systems and network protocols to facilitate control, telemetry, and coordination with ground control sta- tions or other UAVs. This reliance on open and often unsecured communication channels exposes UAVs to a variety of significant security threats. This paper focuses on performing a comprehensive vulnerability analysis of the MAVLink protocol, which is currently the most extensively adopted communication protocol for UAVs. We analyse key security weaknesses inherent in the MAVLink protocol’s design, as well as additional vulnerabilities that may arise from specific implementations of the protocol. These vulnerabilities can enable a wide range of potential attacks, including spoofing, message injection, replay attacks, and unauthorised access. In addition, we assess the effectiveness of existing security mechanisms that have been proposed or implemented, such as encryption techniques, authentication frameworks, and intrusion detection systems. By systematically highlighting these vulnerabilities and their real-world implications, this study aims to offer meaningful insights into improving MAVLink protocol security and fostering more resilient and secure UAV communication systems.

[...] Read more.
Empowering Next-Gen Networks: Unleashing the Potential of SWIPT-Enabled Energy Harvesting in Collaborative Cognitive Radio-NOMA Networks

By Huu Q. Tran Lam Hoang Kham

DOI: https://doi.org/10.5815/ijwmt.2025.06.03, Pub. Date: 8 Dec. 2025

The convergence of Non-Orthogonal Multiple Access (NOMA) and Cognitive Radio (CR) with Simultaneous Wireless Information and Power Transfer (SWIPT) offers a transformative approach to spectrum and energy efficiency. This paper analyzes CR–NOMA with SWIPT-enabled energy harvesting (EH), focusing on outage probability (OP) and throughput. We derive explicit models under Rayleigh fading with interference-temperature constraints and validate by simulations. Results show that proper power allocation and time-switching ratios enhance user fairness while respecting primary-network interference. These insights guide robust and energyefficient designs for next-generation systems.

[...] Read more.
Cybersecurity in Philippine Aviation: A Multi-Method Evaluation of Vulnerabilities and Mitigation Strategies Through Document Analysis, Case Study, and Risk Modeling

By Arthur Dela Pena

DOI: https://doi.org/10.5815/ijwmt.2025.06.04, Pub. Date: 8 Dec. 2025

The digitalization of aviation has heightened exposure to cyber risk, yet Philippine aviation governance and practice remain fragmented. This study evaluates sectoral vulnerabilities and feasible mitigations using a multi-method design: (i) document analysis of CAAP circulars, DICT’s National Cybersecurity Plan 2022, and international guidance (ICAO, IATA, NIST, ISO/IEC 27001); (ii) case studies (Cathay Pacific breach; London Heathrow USB mishandling) chosen for analytic transferability to Philippine operations; and (iii) risk modeling via a likelihood–impact matrix with a transparent 1–5 rubric adapted from ICAO SMM, NIST SP 800-30, and DICT, scored independently by two researchers with consensus reconciliation. I integrate results through a SWOT–TOWS synthesis and propose an AI/ML feasibility roadmap tailored to on-prem/air-gapped constraints. Findings reveal high-priority risks, including unauthorized ATC access, reservation-system data breaches, and airport-network ransomware (ris score = 20), driven by monitoring gaps, legacy systems, and uneven policy enforcement. Moderately ranked threats (weak framework implementation; phishing) and under-analyzed insider risk reflect systemic and human-factor weaknesses, compounded by underreporting and limited inter-agency coordination. The study’s novel contribution is a localization map that operationalizes global frameworks for Philippine conditions: phased NIST CSF adoption, tiered ISO/IEC 27001 pathways, and ICAO-aligned CAAP–DICT coordination with centralized incident reporting; plus a staged, low-cost AI/ML roadmap with KPI tracking (MTTD/MTTR, precision/recall). Limitations include the absence of primary stakeholder data and local incident/cost series; we outline a quantitative extension using operator surveys and Expected Annual Loss modeling to strengthen future empirical grounding. The results inform regulators, airlines, and airports on risk-based prioritization and practical governance upgrades to enhance national aviation cyber resilience.

[...] Read more.
Ensemble Learning-Based Intrusion Detection System for Modbus-Enabled Industrial Networks

By Dadaso T. Mane Vijay H. Kalmani Sayali Aundhakar Pranita Patil Swati Patil Tejal Yadav

DOI: https://doi.org/10.5815/ijwmt.2025.06.05, Pub. Date: 8 Dec. 2025

Industrial Control Systems (ICS) and Modbus-enabled networks are facing escalating threats from sophisticated cyber-attacks, while current Intrusion Detection Systems (IDS) struggle to identify intricate and adaptive attacks. This study envisions an ensemble learning-based IDS for Modbus-enabled industrial networks using a real-like Modbus 2023 dataset for industrial networks. The proposed IDS combines four base classifiers, namely K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Random Forest (RF), and Adaptive Boosting (AdaBoost), using the stack ensemble framework, where Logistic Regression acts as the meta-classifier. Preprocessing involved PCAP capture and attack log synchronization, feature normalization, and one-hot encoding for balanced and accurate model training. Experimental evaluation demonstrated that the ensemble model has a 99.78% detection accuracy while outperforming the base individual models in terms of precision, recall, and F1-score. The results indicate the efficiency of ensemble learning for enhanced accuracy detection and false-positive reduction for Modbus networks. Future research will consider real-time testing, feature elimination, and explainable AI for higher operational deployment and scalability. 

[...] Read more.
Smart Locker: IOT based Intelligent Locker with Password Protection and Face Detection Approach

By Niaz Mostakim Ratna R Sarkar Md. Anowar Hossain

DOI: https://doi.org/10.5815/ijwmt.2019.03.01, Pub. Date: 8 May 2019

In today’s world, security becomes a very important issue. We are always concerned about the security of our valuables. In this paper, we propose an IOT based intelligent smart locker with OTP and face detection approach, which provides security, authenticity and user-friendly mechanism. This smart locker will be organized at banks, offices, homes and other places to ensure security. In order to use this locker firstly the user have to login. User has to send an unlock request code (OTP) and after getting a feedback Email with OTP, he/she will be able to unlock the locker to access his/her valuables. We also introduce face detection approach to our proposed smart locker to ensure security and authenticity.

[...] Read more.
Smart Home Security Using Facial Authentication and Mobile Application

By Khandaker Mohammad Mohi Uddin Shohelee Afrin Shahela Naimur Rahman Rafid Mostafiz Md. Mahbubur Rahman

DOI: https://doi.org/10.5815/ijwmt.2022.02.04, Pub. Date: 8 Apr. 2022

In this fast-paced technological world, individuals want to access all their electronic equipment remotely, which requires devices to connect over a network via the Internet. However, it raises quite a lot of critical security concerns. This paper presented a home automation security system that employs the Internet of Things (IoT) for remote access to one's home through an Android application, as well as Artificial Intelligence (AI) to ensure the home's security. Face recognition is utilized to control door entry in a highly efficient security system. In the event of a technical failure, an additional security PIN is set up that is only accessible by the owner. Although a home automation system may be used for various tasks, the cost is prohibitive for many customers. Hence, the objective of this paper is to provide a budget and user-friendly system, ensuring access to the application and home attributes by using multi-modal security. Using Haar Cascade and LBPH the system achieved 92.86% accuracy while recognizing face.

[...] Read more.
Design of Dual Band Microstrip Patch Antenna for 5G Communication Operating at 28 GHz and 46 GHz

By Anurag Nayak Shreya Dutta Sudip Mandal

DOI: https://doi.org/10.5815/ijwmt.2023.02.05, Pub. Date: 8 Apr. 2023

The design of suitable compact antenna for 5G applications with superior return loss and bandwidth is still a fascinating task to the researchers. In this paper, the authors have designed a dual band microstrip patch antenna for 5G communications at 28 GHz and 46 GHz using CST studio. Rectangular patch antenna with double slots is considered to serve the purpose. The performance of the proposed patch antenna is very satisfactory in terms of return loss, VSWR, bandwidth and directivity. The values of S11 are well below -39dB and values of VSWR are very close to 1 for both resonance frequencies. The bandwidths for both cases are greater than 1.8 GHz which is an essential characteristic of 5G patch antennas for high speed connectivity and efficiency. Directivities are above 6 dB which are very suitable for the present problem. The simulation results are also compared with existing dual band 5G patch antennas and it has been observed that proposed antenna has outperformed the existing patch antennas that worked in 28GHz and 46GHz frequency range. The main advantage of this patch antenna is that it’s simple structure and good return loss, bandwidth and gain.

[...] Read more.
Methodologies, Requirements and Challenges of Cybersecurity Frameworks: A Review

By Alaa Dhahi Khaleefah Haider M. Al-Mashhadi

DOI: https://doi.org/10.5815/ijwmt.2023.01.01, Pub. Date: 8 Feb. 2023

As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software through numerous fields and communities may now be processed through value chains networks. Despite the integration of all data networks, computing models, and distributed software that offers a broader cloud computing, the security solution is have a serious important impact and missing or weak, and more work is needed to strengthen security requirements such as mutual entity trustworthiness, Access controls and identity management, as well as data protection, are all aspects of detecting and preventing attacks or threats. Various international organizations, academic universities and institutions, and organizations have been working diligently to establish cybersecurity frameworks (CSF) in order to combat cybersecurity threats by (CSFs). This paper describes CSFs from the perspectives of standard organizations such as ISO CSF and NIST CSF, as well as several proposed frameworks from researchers, and discusses briefly their characteristics and features. The common ideas described in this study could be helpful for creating a CSF model in general.

[...] Read more.
Quantum Computers’ threat on Current Cryptographic Measures and Possible Solutions

By Tohfa Niraula Aditi Pokharel Ashmita Phuyal Pratistha Palikhel Manish Pokharel

DOI: https://doi.org/10.5815/ijwmt.2022.05.02, Pub. Date: 8 Oct. 2022

Cryptography is a requirement for confidentiality and authentic communication, and it is an indispensable technology used to protect data security. Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. Quantum computers have the potential to become a pre-eminent threat to all secure communication because their performance exceeds that of conventional computers. Consequently, quantum computers are capable of iterating through a large number of keys to search for secret keys or quickly calculate cryptographic keys, thereby endangering cloud security measures. This paper’s main target is to summarize the vulnerability of current cryptographic measures in front of a quantum computer. The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum future.

[...] Read more.
A Compact, Tri-Band and 9-Shape Reconfigurable Antenna for WiFi, WiMAX and WLAN Applications

By Izaz Ali Shah Shahzeb Hayat Ihtesham Khan Imtiaz. Alam Sadiq Ullah Adeel Afridi

DOI: https://doi.org/10.5815/ijwmt.2016.05.05, Pub. Date: 8 Sep. 2016

This paper introduces a novel 9-shaped multiband frequency reconfigurable monopole antenna for wireless applications, using 1.6 mm thicker FR4 substrate and a truncated metallic ground surface. The designed antenna performs in single and dual frequency modes depending on switching states. The antenna works in a single band (WiMAX at 3.5 GHz) when the switch is in the OFF state. The dual band frequency mode (Wi-Fi at 2.45 GHz and WLAN at 5.2 GHz) is obtained when the switch is turned ON. The directivities are: 2.13 dBi, 2.77 dBi and 3.99 dBi and efficiencies: 86%, 93.5% and 84.4% are attained at frequencies 2.45 GHz, 3.5 GHz and 5.2 GHz respectively. The proposed antenna has VSWR< 1.5 for all the three frequencies. The scattering and far-field parameters of the designed antenna are analyzed using computer simulation technology CST 2014. The performance of the proposed antenna is analyzed on the basis of VSWR, efficiency, gain, radiation pattern and return loss.

[...] Read more.
Performance Evaluation of Slotted Star-Shaped Dual-band Patch Antenna for Satellite Communication and 5G Services

By Md. Najmul Hossain Al Amin Islam Jungpil Shin Md. Abdur Rahim Md. Humaun Kabir

DOI: https://doi.org/10.5815/ijwmt.2023.03.05, Pub. Date: 8 Jun. 2023

The advancement of wireless communication technology is growing very fast. For next-generation communication systems (like 5G mobile services), wider bandwidth, high gain, and small-size antennas are very much needed. Moreover, it is expected that the next-generation mobile system will also support satellite technology. Therefore, this paper proposes a slotted star-shaped dual-band patch antenna that can be used for the integrated services of satellite communication and 5G mobile services whose overall dimension is 15×14×1.6 mm3. The proposed antenna operates from 18.764 GHz to 19.775 GHz for K-band satellite communication and 27.122 GHz to 29.283 GHz for 5G (mmWave) mobile services. The resonance frequencies of the proposed antenna are 19.28 GHz and 28.07 GHz having bandwidths of 1.011 GHz and 2.161 GHz, respectively. Moreover, the proposed dual-band patch antenna has a maximum radiation efficiency of 76.178% and a maximum gain of 7.596 dB.

[...] Read more.
Cloud Forensics: Challenges and Blockchain Based Solutions

By Omi Akter Arnisha Akther Md Ashraf Uddin Manowarul Islam

DOI: https://doi.org/10.5815/ijwmt.2020.05.01, Pub. Date: 8 Oct. 2020

With the advancement in digital forensics, digital forensics has been evolved in Cloud computing. A common process of digital forensics mainly includes five steps: defining problem scenario, collection of the related data, investigation of the crime scenes, analysis of evidences and case documentation. The conduction of digital forensics in cloud results in several challenges, security, and privacy issues. In this paper, several digital forensics approaches in the context of IoT and cloud have been presented. The review focused on zone-based approach for IoT digital forensics where the forensics process is divided into three zones. Digital forensics in cloud provides the facilities of large data storage, computational capabilities and identification of criminal activities required for investigating forensics. We have presented a brief study on several issues and challenges raised in each phase of Cloud forensics process. The solution approaches as well as advancement prospects of cloud forensics have been described in the light of Blockchain technology. These studies will broaden the way to new researchers for better understanding and devising new ideas for combating the challenges. 

[...] Read more.
A Metric for Evaluating Security Models based on Implementation of Public Key Infrastructure

By Sigsbert Rwiza Mussa Kissaka Kosmas Kapis

DOI: https://doi.org/10.5815/ijwmt.2020.06.04, Pub. Date: 8 Dec. 2020

International security evaluation metrics are too general and not focused on evaluating security models implemented using Public Key Infrastructure (PKI). This study was conducted to develop the metric for evaluating security models based on implementation of PKI by using insights from literature. Literature review was done based on inclusion and exclusion criteria. The developed metric was tested using ranking attributes and ranking scales. The results reveal that the developed metric is applicable for evaluating security models based on implementation of PKI. This is verified by the tabular results indicating evaluation of selected security models based on implementation of PKI by using ranking attributes and ranking scales. This study contributes to the body of knowledge a metric for evaluating security models based on implementation of PKI. 

[...] Read more.
SDN Interfaces: Protocols, Taxonomy and Challenges

By Suhail Ahmad Ajaz Hussain Mir

DOI: https://doi.org/10.5815/ijwmt.2022.02.02, Pub. Date: 8 Apr. 2022

The ever-increasing demands of Internet services like video on demand, big data applications, IoE and multi-tenant data centers have compelled the network industry to change its conventional non-evolving network architecture. Software Defined Network (SDN) has emerged as a promising network architecture which provides necessary abstractions and novel APIs to facilitate network innovations and simplifies network resource management by breaking the conventional network into multiple planes. All these SDN planes interact through open interfaces or APIs which are commonly categorized into southbound, northbound and west/eastbound interfaces. In this manuscript, we have identified and emphasized various communication protocols used at south and northbound interfaces. We have provided a taxonomy of south and northbound communication protocols based on their dependence, capabilities and properties. The pros and cons associated with each communication mechanism are highlighted and the numerous research challenges and open issues involved at these two interfaces are elucidated. In addition to it, we have proposed the necessary abstractions and extensions required in communication protocols at these two interfaces to simplify real-time monitoring and virtualization in next generation networks.

[...] Read more.
Smart Locker: IOT based Intelligent Locker with Password Protection and Face Detection Approach

By Niaz Mostakim Ratna R Sarkar Md. Anowar Hossain

DOI: https://doi.org/10.5815/ijwmt.2019.03.01, Pub. Date: 8 May 2019

In today’s world, security becomes a very important issue. We are always concerned about the security of our valuables. In this paper, we propose an IOT based intelligent smart locker with OTP and face detection approach, which provides security, authenticity and user-friendly mechanism. This smart locker will be organized at banks, offices, homes and other places to ensure security. In order to use this locker firstly the user have to login. User has to send an unlock request code (OTP) and after getting a feedback Email with OTP, he/she will be able to unlock the locker to access his/her valuables. We also introduce face detection approach to our proposed smart locker to ensure security and authenticity.

[...] Read more.
Methodologies, Requirements and Challenges of Cybersecurity Frameworks: A Review

By Alaa Dhahi Khaleefah Haider M. Al-Mashhadi

DOI: https://doi.org/10.5815/ijwmt.2023.01.01, Pub. Date: 8 Feb. 2023

As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software through numerous fields and communities may now be processed through value chains networks. Despite the integration of all data networks, computing models, and distributed software that offers a broader cloud computing, the security solution is have a serious important impact and missing or weak, and more work is needed to strengthen security requirements such as mutual entity trustworthiness, Access controls and identity management, as well as data protection, are all aspects of detecting and preventing attacks or threats. Various international organizations, academic universities and institutions, and organizations have been working diligently to establish cybersecurity frameworks (CSF) in order to combat cybersecurity threats by (CSFs). This paper describes CSFs from the perspectives of standard organizations such as ISO CSF and NIST CSF, as well as several proposed frameworks from researchers, and discusses briefly their characteristics and features. The common ideas described in this study could be helpful for creating a CSF model in general.

[...] Read more.
Design of Dual Band Microstrip Patch Antenna for 5G Communication Operating at 28 GHz and 46 GHz

By Anurag Nayak Shreya Dutta Sudip Mandal

DOI: https://doi.org/10.5815/ijwmt.2023.02.05, Pub. Date: 8 Apr. 2023

The design of suitable compact antenna for 5G applications with superior return loss and bandwidth is still a fascinating task to the researchers. In this paper, the authors have designed a dual band microstrip patch antenna for 5G communications at 28 GHz and 46 GHz using CST studio. Rectangular patch antenna with double slots is considered to serve the purpose. The performance of the proposed patch antenna is very satisfactory in terms of return loss, VSWR, bandwidth and directivity. The values of S11 are well below -39dB and values of VSWR are very close to 1 for both resonance frequencies. The bandwidths for both cases are greater than 1.8 GHz which is an essential characteristic of 5G patch antennas for high speed connectivity and efficiency. Directivities are above 6 dB which are very suitable for the present problem. The simulation results are also compared with existing dual band 5G patch antennas and it has been observed that proposed antenna has outperformed the existing patch antennas that worked in 28GHz and 46GHz frequency range. The main advantage of this patch antenna is that it’s simple structure and good return loss, bandwidth and gain.

[...] Read more.
Quantum Computers’ threat on Current Cryptographic Measures and Possible Solutions

By Tohfa Niraula Aditi Pokharel Ashmita Phuyal Pratistha Palikhel Manish Pokharel

DOI: https://doi.org/10.5815/ijwmt.2022.05.02, Pub. Date: 8 Oct. 2022

Cryptography is a requirement for confidentiality and authentic communication, and it is an indispensable technology used to protect data security. Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. Quantum computers have the potential to become a pre-eminent threat to all secure communication because their performance exceeds that of conventional computers. Consequently, quantum computers are capable of iterating through a large number of keys to search for secret keys or quickly calculate cryptographic keys, thereby endangering cloud security measures. This paper’s main target is to summarize the vulnerability of current cryptographic measures in front of a quantum computer. The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum future.

[...] Read more.
Design of Microstrip Patch Antenna Array

By Mohd Asaduddin Shaik Seif Shah Mohd Asim Siddiqui

DOI: https://doi.org/10.5815/ijwmt.2023.03.04, Pub. Date: 8 Jun. 2023

Throughout the years there has been a crisis for low gain and efficiency in Microstrip patch antennas. Therefore, the microstrip patch antenna was designed for better gain, directivity and efficiency using array configuration of microstrip patch antenna with low dielectric constant at 10.3GHZ resonant frequency. The proposed design is of a triangular shaped patch array and a substrate RT duroid-5880 of dielectric constant 2.2. The results after simulation shows a good return loss, bandwidth around 950Mhz-1Ghz, directivity of 11.4db in a particular direction, gain of 11.4 dB with 99% radiation effect. The design proposed is helpful for applications like military defence and communication purposes.

[...] Read more.
Smart Home Security Using Facial Authentication and Mobile Application

By Khandaker Mohammad Mohi Uddin Shohelee Afrin Shahela Naimur Rahman Rafid Mostafiz Md. Mahbubur Rahman

DOI: https://doi.org/10.5815/ijwmt.2022.02.04, Pub. Date: 8 Apr. 2022

In this fast-paced technological world, individuals want to access all their electronic equipment remotely, which requires devices to connect over a network via the Internet. However, it raises quite a lot of critical security concerns. This paper presented a home automation security system that employs the Internet of Things (IoT) for remote access to one's home through an Android application, as well as Artificial Intelligence (AI) to ensure the home's security. Face recognition is utilized to control door entry in a highly efficient security system. In the event of a technical failure, an additional security PIN is set up that is only accessible by the owner. Although a home automation system may be used for various tasks, the cost is prohibitive for many customers. Hence, the objective of this paper is to provide a budget and user-friendly system, ensuring access to the application and home attributes by using multi-modal security. Using Haar Cascade and LBPH the system achieved 92.86% accuracy while recognizing face.

[...] Read more.
A Systematic Review of Privacy Preservation Models in Wireless Networks

By Namrata J. Patel Ashish Jadhav

DOI: https://doi.org/10.5815/ijwmt.2023.02.02, Pub. Date: 8 Apr. 2023

Privacy preservation in wireless networks is a multidomain task, including encryption, hashing, secure routing, obfuscation, and third-party data sharing. To design a privacy preservation model for wireless networks, it is recommended that data privacy, location privacy, temporal privacy, node privacy, and route privacy be incorporated. However, incorporating these models into any wireless network is computationally complex. Moreover, it affects the quality of services (QoS) parameters like end-to-end delay, throughput, energy consumption, and packet delivery ratio. Therefore, network designers are expected to use the most optimum privacy models that should minimally affect these QoS metrics. To do this, designers opt for standard privacy models for securing wireless networks without considering their interconnectivity and interface-ability constraints. Due to this, network security increases, but overall, network QoS is reduced. To reduce the probability of such scenarios, this text analyses and reviews various state-of-the-art models for incorporating privacy preservation in wireless networks without compromising their QoS performance. These models are compared on privacy strength, end-to-end delay, energy consumption, and network throughput. The comparison will assist network designers and researchers to select the best models for their given deployments, thereby assisting in privacy improvement while maintaining high QoS performance.Moreover, this text also recommends various methods to work together to improve their performance. This text also recommends various proven machine learning architectures that can be contemplated & explored by networks to enhance their privacy performance. The paper intends to provide a brief survey of different types of Privacy models and their comparison, which can benefit the readers in choosing a privacy model for their use.

[...] Read more.
Full-Wave Numerical Analysis of Dual-Band E-Patch Antenna and Reactive Loading Technique to Ascertain the Impedance Driving Point Function

By Fubara Edmund Alfred-Abam Pam Paul Gyang Fiyinfoluwa P. Olubodun

DOI: https://doi.org/10.5815/ijwmt.2023.03.03, Pub. Date: 8 Jun. 2023

This paper encompasses the numerical analysis involved with the Electromagnetic (EM) full-wave simulation tool Advanced Design System (ADS) which uses the Method of Moment (MOM) and Finite Element Method (FEM). MOM is utilized to solve Maxwell’s equations which are transformed into integral equations before discretization and boundary conditions are applied while FEM computes the electrical behavior of the high frequency EM wave distribution, and then analyze the antenna parameters. The main objective is to investigate the effect of reactive loading on the microstrip patch surface which is used to control the behavior of the impedance bandwidth and obtain dual-band frequency operation. The study further examines how the perturbed patch antenna design targets the operating frequencies of 2.4 GHz and 5.8 GHz for possible range and speed. The proposed method provides insight into the analysis of the mathematical model employed in attaining the Driving Point Impedance Function (DPF) of the E-patch microstrip patch antenna. This approach was done to quantify the reduction in reflections for improved Radio Frequency (RF) network output.

[...] Read more.
Performance Analysis of IoT Cloud-based Platforms using Quality of Service Metrics

By Supreme Ayewoh Okoh Elizabeth N. Onwuka Suleiman Zubairu Bala Alhaji Salihu Peter Y. Dibal

DOI: https://doi.org/10.5815/ijwmt.2023.01.05, Pub. Date: 8 Feb. 2023

There are several IoT platforms providing a variety of services for different applications. Finding the optimal fit between application and platform is challenging since it is hard to evaluate the effects of minor platform changes. Several websites offer reviews based on user ratings to guide potential users in their selection. Unfortunately, review data are subjective and sometimes conflicting – indicating that they are not objective enough for a fair judgment. Scientific papers are known to be the reliable sources of authentic information based on evidence-based research. However, literature revealed that though a lot of work has been done on theoretical comparative analysis of IoT platforms based on their features, functions, architectures, security, communication protocols, analytics, scalability, etc., empirical studies based on measurable metrics such as response time, throughput, and technical efficiency, that objectively characterize user experience seem to be lacking. In an attempt to fill this gap, this study used web analytic tools to gather data on the performance of some selected IoT cloud platforms. Descriptive and inferential statistical models were used to analyze the gathered data to provide a technical ground for the performance evaluation of the selected IoT platforms. Results showed that the platforms performed differently in the key performance metrics (KPM) used. No platform emerged best in all the KPMs. Users' choice will therefore be based on metrics that are most relevant to their applications. It is believed that this work will provide companies and other users with quantitative evidence to corroborate social media data and thereby give a better insight into the performance of IoT platforms. It will also help vendors to improve on their quality of service (QoS).

[...] Read more.
Design of the E-Patch Dual-Band Microstrip Antenna with Low Reflections for WLAN Application

By Fubara Edmund Alfred-Abam Pam Paul Gyang

DOI: https://doi.org/10.5815/ijwmt.2023.01.02, Pub. Date: 8 Feb. 2023

Antennas are either massive or miniaturized structures useful for the transmission and reception of signals associated with Electromagnetic (EM) radiation. Although Microstrip Patch Antennas (MSA) are advantageous they exhibit several drawbacks which may impair a faster communication throughput. They mostly display narrow impedance bandwidth amidst other grave issues. This study presents some approaches such as transmission line analysis and modeling for investigating the complexities associated with the MSA configurations given the shortcomings of narrow impedance bandwidth. in other to achieve the associated input impedance for the dual-band E-patch microstrip antenna. It also investigated the fabrication of the E-patch MSA which targeted the operating frequencies of 2.4 GHz and 5.8 GHz for possible range and speed. The fabricated prototype was tested using a high-frequency communication instrument known as the Vector Network Analyzer (VNA) to obtain the return loss and Voltage Standing Wave Ratio (VSWR). This method was done to quantify the reduction of reflections for enhanced Radio Frequency (RF) network output. This work helps to mitigate the challenges encountered when designing and developing microstrip patch antennas having a relatively small size in different configurations. 

[...] Read more.