ISSN: 2076-1449 (Print)
ISSN: 2076-9539 (Online)
DOI: https://doi.org/10.5815/ijwmt
Website: https://www.mecs-press.org/ijwmt
Published By: MECS Press
Frequency: 6 issues per year
Number(s) Available: 85
IJWMT is committed to bridge the theory and practice of wireless and microwave technologies. From innovative ideas to specific algorithms and full system implementations, IJWMT publishes original, peer-reviewed, and high quality articles in the areas of wireless and microwave technologies. IJWMT is a well-indexed scholarly journal and is indispensable reading and references for people working at the cutting edge of wireless and microwave technology applications.
IJWMT has been abstracted or indexed by several world class databases: Scopus, Google Scholar, Microsoft Academic Search, Baidu Wenku, Open Access Articles, CNKI, GetInfo, WorldCat, OneSearch, ZB MED, CrossRef, JournalTOCs, etc..
IJWMT Vol. 16, No. 2, Apr. 2026
REGULAR PAPERS
The article proposes a conceptually new approach to assessing cybersecurity in modern communication networks, which is based on taking into account specialized determinants — sociotechnical parameters that reflect the structural and functional complexity of network interactions. Such determinants include the centrality of nodes, the level of mutual support, the intensity of information exchange, the degree of community connectivity, user popularity, and other non-trivial characteristics that traditional protection mechanisms based on static models ignore. The central idea of the study is to formalize the dynamic stability of the cybersecurity system by building a nonlinear mathematical model that takes into account the nonlinear relationships between these determinants and the general state of network security. Methodologically, the problem is reduced to the formulation of a system of ordinary differential equations that describes the evolution of the system state under the influence of external and internal disturbances, in particular, cyberattacks. For the analytical study of stability, the method of exceptions and solution of the corresponding homogeneous characteristic equation was used, which allows for to identification the conditions of asymptotic stability. Numerical modeling was performed in the MATLAB/Multisim environment, where phase portraits were synthesized, which clearly demonstrate the stable behavior of the system even in the maximum load mode and in the presence of large-scale attacks. The obtained quantitative results confirm that the proposed model adequately reproduces the dynamics of cyber defense and provides the ability to predict the state of the system under conditions of variable network parameters. The key scientific contribution is the development of methodological principles that combine the theory of nonlinear dynamical systems, graph theory, and sociotechnical analysis to form an adaptive, predictive architecture of cyber defense, focused on complex, evolutionary communication networks.
[...] Read more.This paper presents a Causal Observability Framework designed to enhance the reliability and performance of cloud-native distributed systems through structured integration with the DevOps pipeline. The framework unifies three interdependent components: real-time telemetry collection, dual-domain causal tracing, and probabilistic causal inference. The causal tracing layer combines a time-domain vector autoregressive Granger causality model with a discrete Fourier transform frequency-domain extension. The causal inference layer employs Bayesian network propagation, updated online via the Expectation-Maximisation algorithm, to compute posterior downstream failure probabilities from upstream anomaly observations. Validation was conducted through a controlled, three-replicate experimental study on a seven-service AI-powered recommendation application deployed across a dual-provider six-node Kubernetes cluster (AWS EKS and GCP GKE) under three traffic profiles ranging from 50 to 500 requests per second. Against a conventional threshold-based monitoring baseline, the proposed framework achieved: a 35% reduction in incident response time (70 minutes to 45 minutes), a 40% reduction in mean time to recovery (50 minutes to 30 minutes), a 1.5 percentage-point improvement in system availability (98.0% to 99.5%), a 61% reduction in false-positive alert rate (18% to 7%), and a 63% improvement in root-cause localisation accuracy (54% to 88%). All five improvements were statistically significant at p < 0.05 via paired t-test. A quantified nine-minute early-warning lead time over conventional detection was demonstrated in the fault-injection scenario. Seven formal equations underpin the methodology, spanning Granger vector autoregression, F-test inference, AIC-based lag selection, normalised causality scoring, frequency-domain spectral causality, Bayesian posterior propagation, and expected detection lead time.
[...] Read more.The recent information and technology developments have impacted data utilization and showed the importance of storing different data types for various purposes. The huge amount of data exchanged between systems through the web, networks, and data storage systems are prone to third-party attacks and demands an effective data security system irrespective of the application. Researchers and developers have secured data using different steganography and cryptography techniques. Steganography uses different mediums to hide sensitive data such as images, videos, text, and audio. This review study discussed the importance of recent trends in steganography and cryptography systems in data security. Various methods and techniques of steganography and their hybrid systems, along with cryptography, have produced efficient results for data security. These methods and techniques are thoroughly reviewed to understand the development of a secure system based on steganography. The image-based steganography systems are widely used in several studies rather than video and audio-based steganographic systems. This paper aims to review different techniques practiced in steganography secure systems and specifically focused on Advanced Encryption Systems, Elliptic Curve Cryptography, and other hybrid systems since they are primarily used among developers and researchers in data security. Overall, developing an efficient security system based on steganography should be resilient to different types of third-party attacks and consider data integrity and data confidentiality to prevent loss of information.
[...] Read more.In this manuscript, A compact geometrical configuration and simplified structure of a monopole antenna is given which is functional over an UWB frequency range (3.1GHz to 10.6GHz). The focus of the study is to design a compact and low-cost antenna that can provide an extended impedance bandwidth while maintaining stable and reliable radiation performance suitable for current wireless applications. The proposed design incorporates modifications to both the radiating patch and the ground plane to enhance impedance matching and improve overall radiation performance. Full-wave electromagnetic simulations are conducted to analyse these improvements, and a prototype is fabricated to validate the design experimentally. The measured results closely correspond with the simulated response, confirming wideband operation, consistent radiation patterns, and satisfactory gain levels required for UWB communication. The Proposed antenna design outperforms previous research due to its small size, wide bandwidth and high gain making it an excellent option for UWB systems. Because of its compact footprint, dependable wideband response, and simple fabrication process, the antenna is well suitable for portable and sensing-based UWB applications.
[...] Read more.This study explores the rising threat of spear phishing attacks enabled by artificial intelligence (AI) tools like ChatGPT, combined with public data platforms such as Numberbook. By leveraging these technologies, attackers can create highly personalized and convincing phishing messages, drastically improving their success rates compared to traditional methods. This research investigates how AI-generated content enhances the effectiveness of phishing campaigns and proposes a defense framework to combat these advanced threats. The study adopts a multi-faceted approach to cybersecurity, encompassing AI-driven detection models, regulatory measures to limit data exploitation, and comprehensive user education. Survey results indicate that most respondents recognize the effectiveness of AI detection models in identifying phishing attempts. However, the findings also highlight significant gaps in data protection regulations and user awareness programs, which remain critical vulnerabilities. By presenting empirical evidence and practical solutions, this research contributes to the field of cybersecurity, emphasizing the need for advanced detection technologies, stricter regulatory oversight, and enhanced public awareness. The insights offered are pivotal for organizations aiming to fortify defenses against increasingly sophisticated phishing attacks, ensuring a proactive and resilient approach to emerging cyber threats.
[...] Read more.This paper presents the automated design and optimization of a compact circular microstrip patch antenna for C-band applications using Genetic Algorithm (GA) and Particle Swarm Optimization (PSO). Microstrip patch antennas inherently suffer from narrow impedance bandwidth, making systematic optimization essential for wideband wireless applications. The antenna is implemented on an FR4 substrate (24 × 24 mm2, εr = 4.4, h = 1.6 mm) and optimized through ANSYS HFSS using the PyAEDT Python interface. Three key design parameters were tuned to enhance impedance bandwidth and minimize return loss GA achieved the best performance among the considered optimization methods, with an optimized bandwidth of 3.74 GHz and a minimum S11 of –37 dB, while the optimized PSO method reduced computation time by approximately 49% compared to manual tuning and 31% compared to GA. The final optimized design exhibits consistent gain performance (2.3–2.8 dB) and stable radiation patterns across the operational band, confirming reliable C-band operation. The results demonstrate that metaheuristic optimization integrated with HFSS automation provides a powerful and efficient antenna design framework, which can be extended toward hybrid algorithms and intelligent machine-learning-assisted antenna prediction models.
[...] Read more.Wireless Sensor Networks have emerged as a key technology enabling real time data collection and monitoring across various domains, including environmental monitoring, industrial control, healthcare, and security applications. However, despite their growing relevance, energy efficiency remains a fundamental design challenge due to the limited power supply of sensor nodes, which directly impacts overall network lifetime and reliability. This paper proposes an Adaptive Energy-Aware Clustering Protocol (EACP) designed to improve energy efficiency and extend the operational lifetime of homogeneous WSNs. The proposed protocol integrates three main mechanisms: Residual Energy-based Cluster Head Selection, to ensure balanced energy distribution; Mobility-Aware Cluster Head Reassignment, to maintain stable communication under node mobility; and Base Station Proximity Based Direct Transmission, which allows nodes near the BS to bypass CHs, thereby minimizing redundant energy use. These mechanisms allow the network to dynamically adapt to changing energy conditions and communication distances. The protocol was evaluated through extensive MATLAB simulations and compared with benchmark protocols including LEACH, HAC, and HSA. Simulation results demonstrate that the proposed EACP significantly improves network performance. Specifically, it achieves 50% to 94% improvement in network lifetime, reduces energy consumption by approximately 20% to 25%, and increases throughput by more than 2.5 times compared to the benchmark protocols. These results demonstrate that EACP offers a scalable, energy-efficient communication strategy well suited for large scale WSNs deployments.
[...] Read more.This paper introduces Attribute-Adaptive Noise Injection (AANI), a novel approach to enhance differential privacy in Cyber-Physical Systems (CPS). AANI addresses the privacy-utility trade-off by dynamically adjusting noise injection based on individual data attribute sensitivity, correlation, and utility needs. This tailored approach allows for fine-grained privacy control, adapting to the diverse data generated by CPS components. The paper outlines AANI's framework, proposes efficient algorithms for attribute-specific noise calculation, and demonstrates its effectiveness through simulations. Results show AANI outperforms traditional differential privacy methods by improving both privacy protection and data utility in CPS.
[...] Read more.The solution of the modal equation of a planar optical waveguide is a cumbersome job and usually incident angle of successful modes is determined by a graphical solution. In this research work, we applied two computational intelligence methods: Particle Swarm Optimization (PSO) and Genetic algorithm (GA) in a segment-wise approach to solving the modal equation of the tangent function. The motivation for employing Computational Intelligence (CI) lies in its ability to optimize functions without requiring high-level mathematics or complex statistical models, as opposed to traditional analytical methods. This strategic use of computational intelligence significantly reduces the overall computational cost, more nature inspired and probabilistic, providing an efficient alternative. Particularly for functions with complex solutions, the utilization of computational intelligence or soft computing methods becomes imperative to obtain an approximate solution compared to classical numerical optimization methods like Newton-Raphson, bisection etc. that generally deterministic and aim to find the exact optimal solution. In terms of using probability (a core component of chosen algorithm’s searching mechanism) we can incorporate distributions that will enhance the performance. Therefore, while classical root-finding methods are computationally simpler for isolated cases, the use of PSO and GA is motivated by their global search capability, robustness to initialization, and ease of automation, which are advantageous in generalized or large-scale modal solution frameworks. The outcomes derived from both methods (PSO and GA) are meticulously compared with the results obtained through the traditional graphical solution. We have found accuracy of 99.95% for PSO and 99.87% for GA. Notably, the findings reveal a close correlation between the computational intelligence approaches and the graphical method offering a promising avenue for advancing the field with a more computationally feasible approach.
[...] Read more.Unregulated accessibility to the latest deepfake technologies presents escalating, unprecedented threats to the personal security, public trust, and democratic integrity, owing to the ever-increasing sophistication and realism of these forgeries. The biggest challenge is the inability of human verification to ascertain the original from the forgeries. Therefore, this research aims to establish an initial framework of detection and verification. The Chromatic Gradient Anomaly Network (ChrGAN) is an architecture that will be built and tested to capture changes of the various components of a video over time in order to reveal patterns of inconsistency between the spatiotemporal levels of a video and the changes of its chromatic components. One of the most important contributions of this research is the analysis of the second order derivatives (in this case, the Chromatic Gradient Fields) of the Spatiotemporal Chromatic Energy Distributions, leaving the synthesis boundary of the temporally sparse flickers and the physically implausible discontinuities of the blend exemplified by the gap. The results for the CrGAN show the highest level of diagnostic confidence, reporting a detection rate of 97.9%, and most importantly a level of pixel-wise localized mapping of the region detected that is statistically differentiated from the other detection models for a state of the art performance measurement in a machine learning model for the detection only. In conclusion, this study validates how targeting the second-order spatiotemporal inconsistencies using chromatic gradients, not only acts as an efficient detection mechanism, but also as an interpretable tool in the combat against digital deception by identifying the how and where of video forgery.
[...] Read more.This paper presents an analytical and simulation-based treatment of the far-field radiation characteristics of a Multiple Log-Periodic Dipole Array (MLPA) antenna using Green’s function–based magnetic vector potential formulations. The study consolidates established electromagnetic theory by explicitly combining log-periodic element scaling, cumulative spatial phase delays, and array-level superposition into a single, transparent analytical workflow. The scalar free-space Green’s function is employed to derive the magnetic vector potential, from which far-field electric field expressions are obtained under standard approximations. Radiation characteristics such as half-power beamwidth, peak directivity, and sidelobe levels are extracted from MATLAB-based simulations and compared with representative theoretical LPDA performance ranges reported in the literature. The results demonstrate consistency with expected broadband LPDA behavior and serve primarily to illustrate the applicability of Green’s function methods to hierarchically structured log-periodic arrays. The work is intended as a reproducible analytical reference and pedagogical baseline for MLPA modeling, rather than as a replacement for full-wave numerical solvers or experimental validation.
[...] Read more.SQL injection is a hacking attack where malicious code is inserted into database queries through user inputs like search boxes, login forms, or URL parameters. These attacks pose a significant threat to web applications and ERP systems, making early detection crucial. Traditional detection methods, such as rule-based and signature-based approaches, rely on known SQL injection patterns. However, they often fail to identify novel, obfuscated, or zero-day attacks, highlighting the need for more adaptive and intelligent detection mechanisms. This research proposes FusionNetSQL, a fusion-based deep learning model that combines Convolutional Neural Networks, Long Short-Term Memory networks, and Transformers to detect SQL injection attacks. By integrating these architectures, FusionNet-SQL gains a comprehensive understanding of SQL queries, enabling it to differentiate between legitimate interactions and malicious injections. The CNN captures local patterns, the LSTM models sequential dependencies, and the Transformer enhances global context understanding. The model achieves high performance, with 98.02% accuracy, 99.39% precision, 96.79% recall, 98.07% F1-score, and 98.07% AUC-ROC. With its robust performance and adaptability, FusionNet-SQL offers a powerful solution for securing web applications and ERP systems against SQL injection attacks. Its ability to detect both straightforward and sophisticated attacks makes it well-suited for real-world deployment, reinforcing database security and protecting critical data. This research marks a significant step forward in combating evolving cybersecurity threats.
[...] Read more.Wireless Sensor Networks (WSNs) are fundamental to security and surveillance applications such as military defense, disaster management, and intrusion monitoring. The performance of these networks depends largely on the efficiency of routing protocols. This paper examines the Ad hoc On-Demand Distance Vector (AODV) routing protocol in multi-hop WSN environments for target tracking, evaluating critical metrics including Packet Delivery Ratio (PDR), End-to-End Delay, Energy Consumption, and Network Lifetime. Simulation results illustrate the impact of node depletion due to transmission loss, affecting network stability and robustness in target detection. In-network detection in WSNs presents trade-offs between real-time data transmission, energy efficiency, and trajectory lifespan. Inefficient routing optimization may result in increased latency, packet loss, and premature node failure, ultimately reducing localization accuracy. While AODV’s reactive path-based approach offers manageable overhead, its performance degrades under increased energy consumption and route rediscovery delays. This study systematically evaluates AODV’s strengths and limitations in time-sensitive detection scenarios. Findings indicate that AODV ensures reliable data transmission in early network stages but suffers significant performance deterioration as node energy declines, impacting coverage and responsiveness. To enhance AODV’s target tracking capabilities, this paper proposes adaptive energy-saving techniques and hybrid routing schemes. These strategies contribute to ongoing research aimed at optimizing routing protocols to balance accuracy and node longevity for real-time WSN applications.
[...] Read more.Distributed Denial-of-Service (DDoS) attacks continue to pose a significant threat to digital infrastructures, often resulting in degraded service availability and financial losses. Traditional detection systems, which depend on static rule sets, struggle to adapt to evolving traffic patterns, leading to increased false positives and undetected attacks. This paper presents a real-time, machine learning-based framework for DDoS detection and mitigation. The framework incorporates supervised learning algorithms, including Random Forest, XGBoost, and Multi-Layer Perceptron (MLP), trained on the CIC-DDoS2019 dataset using carefully selected network traffic features to enhance detection accuracy. The system architecture integrates Scapy for traffic capture, Apache Kafka for message queuing, and Flask with Plotly for dynamic monitoring. Evaluation results demonstrate superior performance compared to legacy methods across precision, recall, F1-score, false positive rate (FPR), and false negative rate (FNR). Additionally, adaptive models such as Passive-Aggressive and Stochastic Gradient Descent (SGD) enhance robustness against evolving attack vectors. The proposed solution delivers an effective and scalable real-time defense mechanism suitable for banking, cloud, and enterprise systems. However, the system’s performance remains influenced by the characteristics of the training dataset and may introduce computational overhead during high-throughput traffic analysis. Future work will explore improved computational efficiency and responsiveness to rare or emerging DDoS patterns.
[...] Read more.Currently, valuable information requires security because cyber threats have escalated. The CIA Triad is one of the core concepts in information security which defines three main objectives of any security program: Confidentiality, Integrity, and Availability. Each component of the triad covers a different aspect to ensure proper protection and management of information. Confidentiality ensures that sensitive details are only obtained by authorized personnel or corporations. Maintaining integrity involves ensuring data accuracy and reliability by preventing unauthorized changes. Availability guarantees that information and related systems can be used as needed. This paper presents an innovative hybrid form of security system aiming at selecting the best cryptographic and steganographic techniques. Additionally, the Huffman encoding scheme is employed to increase the embedding capacity of the proposed mechanism. Thus, cryptography and steganography are taken as measures in the field of communication and information security. Cryptography and steganography are two different but connected areas within the broader information security domain. Both methods share some common features in securing information although they differ in their functions and performance characteristics. In this paper, an integrated method that combines Cryptography, compression, steganography, and the InterPlanetary File System has been presented as a basis for information security. Consequently, this system is implemented by using a Python Tkinter module that makes it possible to be used in real-life situations without much difficulty. This application enables its users to encrypt messages, compress them, and hide them inside other files like they were of no significance at all. The interface design ensures that users can move around different functions easily without demanding technological expertise or knowledge. A flexible framework is offered through which sensitive data can be secured against various digital landscapes subjecting to current threats in data security. In general, this paper demonstrates how cryptography, compression, LSB steganography, and IPFS may be combined thus showing the practicality and benefits of such a unified approach for safeguarding valuable digital records. The novelty of this work lies in the unified implementation of ECC-based key exchange, AES-GCM encryption, Huffman compression, LSB steganography, and IPFS decentralized storage in a real-world deployable GUI framework. Unlike prior studies that address these methods separately, this system integrates them into a streamlined pipeline that enhances embedding efficiency, encryption robustness, and secure data retrieval over decentralized platforms. The holistic approach and practical usability make it distinct from existing security models. In general, this paper demonstrates how cryptography, compression, LSB steganography, and IPFS may be combined, thus showing the practicality and benefits of such a unified approach for safeguarding valuable digital records.
[...] Read more.In today’s world, security becomes a very important issue. We are always concerned about the security of our valuables. In this paper, we propose an IOT based intelligent smart locker with OTP and face detection approach, which provides security, authenticity and user-friendly mechanism. This smart locker will be organized at banks, offices, homes and other places to ensure security. In order to use this locker firstly the user have to login. User has to send an unlock request code (OTP) and after getting a feedback Email with OTP, he/she will be able to unlock the locker to access his/her valuables. We also introduce face detection approach to our proposed smart locker to ensure security and authenticity.
[...] Read more.In this fast-paced technological world, individuals want to access all their electronic equipment remotely, which requires devices to connect over a network via the Internet. However, it raises quite a lot of critical security concerns. This paper presented a home automation security system that employs the Internet of Things (IoT) for remote access to one's home through an Android application, as well as Artificial Intelligence (AI) to ensure the home's security. Face recognition is utilized to control door entry in a highly efficient security system. In the event of a technical failure, an additional security PIN is set up that is only accessible by the owner. Although a home automation system may be used for various tasks, the cost is prohibitive for many customers. Hence, the objective of this paper is to provide a budget and user-friendly system, ensuring access to the application and home attributes by using multi-modal security. Using Haar Cascade and LBPH the system achieved 92.86% accuracy while recognizing face.
[...] Read more.The design of suitable compact antenna for 5G applications with superior return loss and bandwidth is still a fascinating task to the researchers. In this paper, the authors have designed a dual band microstrip patch antenna for 5G communications at 28 GHz and 46 GHz using CST studio. Rectangular patch antenna with double slots is considered to serve the purpose. The performance of the proposed patch antenna is very satisfactory in terms of return loss, VSWR, bandwidth and directivity. The values of S11 are well below -39dB and values of VSWR are very close to 1 for both resonance frequencies. The bandwidths for both cases are greater than 1.8 GHz which is an essential characteristic of 5G patch antennas for high speed connectivity and efficiency. Directivities are above 6 dB which are very suitable for the present problem. The simulation results are also compared with existing dual band 5G patch antennas and it has been observed that proposed antenna has outperformed the existing patch antennas that worked in 28GHz and 46GHz frequency range. The main advantage of this patch antenna is that it’s simple structure and good return loss, bandwidth and gain.
[...] Read more.Cryptography is a requirement for confidentiality and authentic communication, and it is an indispensable technology used to protect data security. Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. Quantum computers have the potential to become a pre-eminent threat to all secure communication because their performance exceeds that of conventional computers. Consequently, quantum computers are capable of iterating through a large number of keys to search for secret keys or quickly calculate cryptographic keys, thereby endangering cloud security measures. This paper’s main target is to summarize the vulnerability of current cryptographic measures in front of a quantum computer. The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum future.
[...] Read more.As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software through numerous fields and communities may now be processed through value chains networks. Despite the integration of all data networks, computing models, and distributed software that offers a broader cloud computing, the security solution is have a serious important impact and missing or weak, and more work is needed to strengthen security requirements such as mutual entity trustworthiness, Access controls and identity management, as well as data protection, are all aspects of detecting and preventing attacks or threats. Various international organizations, academic universities and institutions, and organizations have been working diligently to establish cybersecurity frameworks (CSF) in order to combat cybersecurity threats by (CSFs). This paper describes CSFs from the perspectives of standard organizations such as ISO CSF and NIST CSF, as well as several proposed frameworks from researchers, and discusses briefly their characteristics and features. The common ideas described in this study could be helpful for creating a CSF model in general.
[...] Read more.This paper introduces a novel 9-shaped multiband frequency reconfigurable monopole antenna for wireless applications, using 1.6 mm thicker FR4 substrate and a truncated metallic ground surface. The designed antenna performs in single and dual frequency modes depending on switching states. The antenna works in a single band (WiMAX at 3.5 GHz) when the switch is in the OFF state. The dual band frequency mode (Wi-Fi at 2.45 GHz and WLAN at 5.2 GHz) is obtained when the switch is turned ON. The directivities are: 2.13 dBi, 2.77 dBi and 3.99 dBi and efficiencies: 86%, 93.5% and 84.4% are attained at frequencies 2.45 GHz, 3.5 GHz and 5.2 GHz respectively. The proposed antenna has VSWR< 1.5 for all the three frequencies. The scattering and far-field parameters of the designed antenna are analyzed using computer simulation technology CST 2014. The performance of the proposed antenna is analyzed on the basis of VSWR, efficiency, gain, radiation pattern and return loss.
[...] Read more.The advancement of wireless communication technology is growing very fast. For next-generation communication systems (like 5G mobile services), wider bandwidth, high gain, and small-size antennas are very much needed. Moreover, it is expected that the next-generation mobile system will also support satellite technology. Therefore, this paper proposes a slotted star-shaped dual-band patch antenna that can be used for the integrated services of satellite communication and 5G mobile services whose overall dimension is 15×14×1.6 mm3. The proposed antenna operates from 18.764 GHz to 19.775 GHz for K-band satellite communication and 27.122 GHz to 29.283 GHz for 5G (mmWave) mobile services. The resonance frequencies of the proposed antenna are 19.28 GHz and 28.07 GHz having bandwidths of 1.011 GHz and 2.161 GHz, respectively. Moreover, the proposed dual-band patch antenna has a maximum radiation efficiency of 76.178% and a maximum gain of 7.596 dB.
[...] Read more.With the advancement in digital forensics, digital forensics has been evolved in Cloud computing. A common process of digital forensics mainly includes five steps: defining problem scenario, collection of the related data, investigation of the crime scenes, analysis of evidences and case documentation. The conduction of digital forensics in cloud results in several challenges, security, and privacy issues. In this paper, several digital forensics approaches in the context of IoT and cloud have been presented. The review focused on zone-based approach for IoT digital forensics where the forensics process is divided into three zones. Digital forensics in cloud provides the facilities of large data storage, computational capabilities and identification of criminal activities required for investigating forensics. We have presented a brief study on several issues and challenges raised in each phase of Cloud forensics process. The solution approaches as well as advancement prospects of cloud forensics have been described in the light of Blockchain technology. These studies will broaden the way to new researchers for better understanding and devising new ideas for combating the challenges.
[...] Read more.The Internet of Things (IoT) driven Industrial Revolution 4.0 (IR4.0) and this is impacting every sector of the global economy. With IoT devices, everything is computerized. Today's digital forensics is no longer limited to computers, mobiles, or networks. The current digital forensics landscape demands a significantly different approach. The traditional digital forensics frameworks no longer meet the current requirements. Therefore, in this paper, we propose a novel framework called “Multi-level Artifact of Interest Digital Forensics Framework for IoT” (MAoIDFF-IoT). The keynote "Multi-level" aims to cover all levels of the IoT architecture. Our novel IoT digital forensics framework focuses on the Artifact of Interest (AoI). Additionally, it proposes the action/detection matrix. It encompasses the advantages of the previous frameworks while introducing new features specifically designed to make the framework suitable for current and future IoT investigation scenarios. The MAoIDFF-IoT framework is designed to face the challenges of IoT forensic analysis and address the diverse architecture of IoT environments. Our proposed framework was evaluated through real scenario experiments. The evaluation of the experimental results reveals the superiority of our framework over existing frameworks in terms of usability, inclusivity, focus on the (AoI), and acceleration of the investigation process.
[...] Read more.The ever-increasing demands of Internet services like video on demand, big data applications, IoE and multi-tenant data centers have compelled the network industry to change its conventional non-evolving network architecture. Software Defined Network (SDN) has emerged as a promising network architecture which provides necessary abstractions and novel APIs to facilitate network innovations and simplifies network resource management by breaking the conventional network into multiple planes. All these SDN planes interact through open interfaces or APIs which are commonly categorized into southbound, northbound and west/eastbound interfaces. In this manuscript, we have identified and emphasized various communication protocols used at south and northbound interfaces. We have provided a taxonomy of south and northbound communication protocols based on their dependence, capabilities and properties. The pros and cons associated with each communication mechanism are highlighted and the numerous research challenges and open issues involved at these two interfaces are elucidated. In addition to it, we have proposed the necessary abstractions and extensions required in communication protocols at these two interfaces to simplify real-time monitoring and virtualization in next generation networks.
[...] Read more.In today’s world, security becomes a very important issue. We are always concerned about the security of our valuables. In this paper, we propose an IOT based intelligent smart locker with OTP and face detection approach, which provides security, authenticity and user-friendly mechanism. This smart locker will be organized at banks, offices, homes and other places to ensure security. In order to use this locker firstly the user have to login. User has to send an unlock request code (OTP) and after getting a feedback Email with OTP, he/she will be able to unlock the locker to access his/her valuables. We also introduce face detection approach to our proposed smart locker to ensure security and authenticity.
[...] Read more.As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software through numerous fields and communities may now be processed through value chains networks. Despite the integration of all data networks, computing models, and distributed software that offers a broader cloud computing, the security solution is have a serious important impact and missing or weak, and more work is needed to strengthen security requirements such as mutual entity trustworthiness, Access controls and identity management, as well as data protection, are all aspects of detecting and preventing attacks or threats. Various international organizations, academic universities and institutions, and organizations have been working diligently to establish cybersecurity frameworks (CSF) in order to combat cybersecurity threats by (CSFs). This paper describes CSFs from the perspectives of standard organizations such as ISO CSF and NIST CSF, as well as several proposed frameworks from researchers, and discusses briefly their characteristics and features. The common ideas described in this study could be helpful for creating a CSF model in general.
[...] Read more.The design of suitable compact antenna for 5G applications with superior return loss and bandwidth is still a fascinating task to the researchers. In this paper, the authors have designed a dual band microstrip patch antenna for 5G communications at 28 GHz and 46 GHz using CST studio. Rectangular patch antenna with double slots is considered to serve the purpose. The performance of the proposed patch antenna is very satisfactory in terms of return loss, VSWR, bandwidth and directivity. The values of S11 are well below -39dB and values of VSWR are very close to 1 for both resonance frequencies. The bandwidths for both cases are greater than 1.8 GHz which is an essential characteristic of 5G patch antennas for high speed connectivity and efficiency. Directivities are above 6 dB which are very suitable for the present problem. The simulation results are also compared with existing dual band 5G patch antennas and it has been observed that proposed antenna has outperformed the existing patch antennas that worked in 28GHz and 46GHz frequency range. The main advantage of this patch antenna is that it’s simple structure and good return loss, bandwidth and gain.
[...] Read more.Throughout the years there has been a crisis for low gain and efficiency in Microstrip patch antennas. Therefore, the microstrip patch antenna was designed for better gain, directivity and efficiency using array configuration of microstrip patch antenna with low dielectric constant at 10.3GHZ resonant frequency. The proposed design is of a triangular shaped patch array and a substrate RT duroid-5880 of dielectric constant 2.2. The results after simulation shows a good return loss, bandwidth around 950Mhz-1Ghz, directivity of 11.4db in a particular direction, gain of 11.4 dB with 99% radiation effect. The design proposed is helpful for applications like military defence and communication purposes.
[...] Read more.Cryptography is a requirement for confidentiality and authentic communication, and it is an indispensable technology used to protect data security. Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. Quantum computers have the potential to become a pre-eminent threat to all secure communication because their performance exceeds that of conventional computers. Consequently, quantum computers are capable of iterating through a large number of keys to search for secret keys or quickly calculate cryptographic keys, thereby endangering cloud security measures. This paper’s main target is to summarize the vulnerability of current cryptographic measures in front of a quantum computer. The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum future.
[...] Read more.In this fast-paced technological world, individuals want to access all their electronic equipment remotely, which requires devices to connect over a network via the Internet. However, it raises quite a lot of critical security concerns. This paper presented a home automation security system that employs the Internet of Things (IoT) for remote access to one's home through an Android application, as well as Artificial Intelligence (AI) to ensure the home's security. Face recognition is utilized to control door entry in a highly efficient security system. In the event of a technical failure, an additional security PIN is set up that is only accessible by the owner. Although a home automation system may be used for various tasks, the cost is prohibitive for many customers. Hence, the objective of this paper is to provide a budget and user-friendly system, ensuring access to the application and home attributes by using multi-modal security. Using Haar Cascade and LBPH the system achieved 92.86% accuracy while recognizing face.
[...] Read more.The advancement of wireless communication technology is growing very fast. For next-generation communication systems (like 5G mobile services), wider bandwidth, high gain, and small-size antennas are very much needed. Moreover, it is expected that the next-generation mobile system will also support satellite technology. Therefore, this paper proposes a slotted star-shaped dual-band patch antenna that can be used for the integrated services of satellite communication and 5G mobile services whose overall dimension is 15×14×1.6 mm3. The proposed antenna operates from 18.764 GHz to 19.775 GHz for K-band satellite communication and 27.122 GHz to 29.283 GHz for 5G (mmWave) mobile services. The resonance frequencies of the proposed antenna are 19.28 GHz and 28.07 GHz having bandwidths of 1.011 GHz and 2.161 GHz, respectively. Moreover, the proposed dual-band patch antenna has a maximum radiation efficiency of 76.178% and a maximum gain of 7.596 dB.
[...] Read more.There are several IoT platforms providing a variety of services for different applications. Finding the optimal fit between application and platform is challenging since it is hard to evaluate the effects of minor platform changes. Several websites offer reviews based on user ratings to guide potential users in their selection. Unfortunately, review data are subjective and sometimes conflicting – indicating that they are not objective enough for a fair judgment. Scientific papers are known to be the reliable sources of authentic information based on evidence-based research. However, literature revealed that though a lot of work has been done on theoretical comparative analysis of IoT platforms based on their features, functions, architectures, security, communication protocols, analytics, scalability, etc., empirical studies based on measurable metrics such as response time, throughput, and technical efficiency, that objectively characterize user experience seem to be lacking. In an attempt to fill this gap, this study used web analytic tools to gather data on the performance of some selected IoT cloud platforms. Descriptive and inferential statistical models were used to analyze the gathered data to provide a technical ground for the performance evaluation of the selected IoT platforms. Results showed that the platforms performed differently in the key performance metrics (KPM) used. No platform emerged best in all the KPMs. Users' choice will therefore be based on metrics that are most relevant to their applications. It is believed that this work will provide companies and other users with quantitative evidence to corroborate social media data and thereby give a better insight into the performance of IoT platforms. It will also help vendors to improve on their quality of service (QoS).
[...] Read more.Privacy preservation in wireless networks is a multidomain task, including encryption, hashing, secure routing, obfuscation, and third-party data sharing. To design a privacy preservation model for wireless networks, it is recommended that data privacy, location privacy, temporal privacy, node privacy, and route privacy be incorporated. However, incorporating these models into any wireless network is computationally complex. Moreover, it affects the quality of services (QoS) parameters like end-to-end delay, throughput, energy consumption, and packet delivery ratio. Therefore, network designers are expected to use the most optimum privacy models that should minimally affect these QoS metrics. To do this, designers opt for standard privacy models for securing wireless networks without considering their interconnectivity and interface-ability constraints. Due to this, network security increases, but overall, network QoS is reduced. To reduce the probability of such scenarios, this text analyses and reviews various state-of-the-art models for incorporating privacy preservation in wireless networks without compromising their QoS performance. These models are compared on privacy strength, end-to-end delay, energy consumption, and network throughput. The comparison will assist network designers and researchers to select the best models for their given deployments, thereby assisting in privacy improvement while maintaining high QoS performance.Moreover, this text also recommends various methods to work together to improve their performance. This text also recommends various proven machine learning architectures that can be contemplated & explored by networks to enhance their privacy performance. The paper intends to provide a brief survey of different types of Privacy models and their comparison, which can benefit the readers in choosing a privacy model for their use.
[...] Read more.This paper encompasses the numerical analysis involved with the Electromagnetic (EM) full-wave simulation tool Advanced Design System (ADS) which uses the Method of Moment (MOM) and Finite Element Method (FEM). MOM is utilized to solve Maxwell’s equations which are transformed into integral equations before discretization and boundary conditions are applied while FEM computes the electrical behavior of the high frequency EM wave distribution, and then analyze the antenna parameters. The main objective is to investigate the effect of reactive loading on the microstrip patch surface which is used to control the behavior of the impedance bandwidth and obtain dual-band frequency operation. The study further examines how the perturbed patch antenna design targets the operating frequencies of 2.4 GHz and 5.8 GHz for possible range and speed. The proposed method provides insight into the analysis of the mathematical model employed in attaining the Driving Point Impedance Function (DPF) of the E-patch microstrip patch antenna. This approach was done to quantify the reduction in reflections for improved Radio Frequency (RF) network output.
[...] Read more.