ISSN: 2076-1449 (Print)
ISSN: 2076-9539 (Online)
DOI: https://doi.org/10.5815/ijwmt
Website: https://www.mecs-press.org/ijwmt
Published By: MECS Press
Frequency: 6 issues per year
Number(s) Available: 80
IJWMT is committed to bridge the theory and practice of wireless and microwave technologies. From innovative ideas to specific algorithms and full system implementations, IJWMT publishes original, peer-reviewed, and high quality articles in the areas of wireless and microwave technologies. IJWMT is a well-indexed scholarly journal and is indispensable reading and references for people working at the cutting edge of wireless and microwave technology applications.
IJWMT has been abstracted or indexed by several world class databases: Google Scholar, Microsoft Academic Search, Baidu Wenku, Open Access Articles, CNKI, GetInfo, WorldCat, OneSearch, ZB MED, CrossRef, JournalTOCs, etc..
IJWMT Vol. 15, No. 3, Jun. 2025
REGULAR PAPERS
Microwave antennas play a crucial role in satellite communication and radar systems, while millimeter-wave antennas are indispensable for advancing high-speed telecommunications and radar technologies, especially with the emergence of 5G networks. This research focuses on the development and evaluation of two distinct Multiple Input Multiple Output (MIMO) antennas tailored for Ultra-Wideband (UWB) and millimeter-wave network applications using High Frequency Solution Setup (HFSS) software. The Hexagonal MIMO antenna, measuring 40 x 36 x 1.6 mm³, and the Dual Band Notched MIMO antenna, measuring 35 x 23 x 1.6 mm³, both utilize double-port MIMO technology and operate at frequencies of 7.5 GHz and 30 GHz. Performance parameters including Gain, Directivity, Radiation Efficiency, Return loss, Reflection Coefficient, and Beam Area are examined, with a comparative analysis conducted at both frequencies. The findings reveal the consistent superiority of the Dual Band Notched MIMO antenna, exhibiting higher gain and directivity across both frequencies. Specifically, at 7.5 GHz, gains of 24.97 dB and 33.17 dB, directivities of 6.05 dB and 5.10 dB, radiation efficiencies of 18.9 dB and 28.07 dB, beam areas of 4.94 sq. deg and 5.89 sq. deg, reflection coefficients below -12 dB, and return loss values exceeding 12 dB are observed for the Hexagonal and Dual Band antennas, respectively, while at 30 GHz, gains are 32.49 dB and 24.92 dB, directivities are 6.79 dB and 7.9 dB, radiation efficiencies are 16.41 dB and 24.57 dB, beam areas are 4.20 sq. deg and 3.07 sq. deg, and reflection coefficients and return loss values show similar trends for Dual Band and Hexagonal antennas, respectively. This study provides valuable insights for optimizing MIMO antenna designs to enhance performance in UWB and millimeter-wave network applications.
[...] Read more.The use of millimeter-wave (mmWave) and full-dimensional multiple-input multiple-output (FD-MIMO) antenna systems for 3D wireless communication is being exploited for enhanced network capacity improvement in the ongoing fifth-generation (5G) deployment. For adequate assessment of competing air interface, random access channelization, and beam alignment procedure in mmWave systems, adequate channel estimation and channel models for different use scenarios are necessary. Conventional pilot-based channel estimation methods are remarkably time-consuming as the number of users or antennas tends toward large numbers. Channel reconstruction has been identified as one of the solutions to the above problem. In this work, a ray-tracing study was conducted using a Wireless Insite ray tracing engine to predict measured statistics for large-scale channel parameters (LSPs). Other LSP such as the shadow fading (SF) were generated using algorithm 1. Algorithm 2 was used to generate the small-scale channel parameters (SSP). The LSPs and SSPs were used as input in algorithm 3 to generate the channel coefficients used for the channel reconstruction in the MATLAB LTE toolbox. The results provided an accurate reconstructed downlink channel state information (CSI) for FDD-based mmWave massive-MIMO system in both the line-of sight (LOS) and non-line of sight scenarios. The results provide an opportunity to adapt the transmitted signal to the CSI and thereby optimize the received signal for spatial multiplexing or to achieve low bit error rates in wireless communication.
[...] Read more.Phishing attacks are a common and serious issue in our digital age, short uniform resource locators are frequently used in these attacks to trick unwary visitors into visiting malicious websites. Short uniform resource locators are often used to hide a link's true destination, making it harder for visitors to establish whether a link is legitimate or phishing. Due to this, individuals and organizations attempting to protect themselves from phishing attempts have a significant problem. This research introduces a novel system that integrates machine learning algorithms with a blacklist approach to enhance phishing detection. The system's objective is to support transparency protect user privacy, and increase the precision and efficiency of identifying phishing attacks hidden behind Short URLs, thereby granting users real-time protection against phishing attacks. The findings demonstrate that the proposed system is highly effective. Many machine learning algorithms were used and compared, Gradient Boosting emerged as the best algorithm among those tested, with an excellent accuracy rate of 97.1%. This algorithm outperformed other algorithms in distinguishing between legitimate and phishing uniform resource locators, demonstrating its strong capabilities in the face of the growing threat landscape of phishing attacks via short uniform resource locators. By addressing gaps in prior research, particularly in detecting phishing using short URLs, this study provides a valuable contribution to cybersecurity.
[...] Read more.User and entity behaviour analytics (UEBA) solutions are becoming more and more popular for detecting anomalies since they establish baseline models of typical user behaviour and highlight deviations from them. Modelling normal user behavior and identifying any new behavior that deviates from the normal model user i.e., an attack, which is the main concept of Anomaly Detection (AD) techniques. In this work, a comprehensive review of various AD techniques based on user behavior is presented. Accordingly, this survey is concerted on various techniques employed for AD based on user behavior. Among various research articles, 50 research articles based on AD are considered and categorized based on different parameters, like techniques, publication year, performance metrics, utilized tools, and so on. At last, the research gaps and challenges of this method are illustrated in such a way that a goal for emerging an efficient technique for allowing the effective AD technique is defined.
[...] Read more.Internet of Things (IoT) is the current trends in tracking the variation of process variables in plant operations. The security threats and security issues continues to rise due to the wide usage of internet. The hybrid cryptography is proposed that involves symmetric AES, asymmetric RSA and hash functions all together enhance the security. The key length of this proposed symmetric AES encryption is 128-bit, RSA public key encryption is 1024-bit and 128-bit message digest is generated from the hash algorithm. It offers low latency in executing the proposed encoding and decoding algorithm. It is developed and verified in real-time environment using embedded system with internet of things. It assures data security and allows only authorized parties to monitor the plant parameters through the wireless networks. It preserves the intruders from gathering and modifying the sensitive plant information. It is suitable for protecting the plant parameters over the wide range of industrial applications.
[...] Read more.In today’s world, security becomes a very important issue. We are always concerned about the security of our valuables. In this paper, we propose an IOT based intelligent smart locker with OTP and face detection approach, which provides security, authenticity and user-friendly mechanism. This smart locker will be organized at banks, offices, homes and other places to ensure security. In order to use this locker firstly the user have to login. User has to send an unlock request code (OTP) and after getting a feedback Email with OTP, he/she will be able to unlock the locker to access his/her valuables. We also introduce face detection approach to our proposed smart locker to ensure security and authenticity.
[...] Read more.The design of suitable compact antenna for 5G applications with superior return loss and bandwidth is still a fascinating task to the researchers. In this paper, the authors have designed a dual band microstrip patch antenna for 5G communications at 28 GHz and 46 GHz using CST studio. Rectangular patch antenna with double slots is considered to serve the purpose. The performance of the proposed patch antenna is very satisfactory in terms of return loss, VSWR, bandwidth and directivity. The values of S11 are well below -39dB and values of VSWR are very close to 1 for both resonance frequencies. The bandwidths for both cases are greater than 1.8 GHz which is an essential characteristic of 5G patch antennas for high speed connectivity and efficiency. Directivities are above 6 dB which are very suitable for the present problem. The simulation results are also compared with existing dual band 5G patch antennas and it has been observed that proposed antenna has outperformed the existing patch antennas that worked in 28GHz and 46GHz frequency range. The main advantage of this patch antenna is that it’s simple structure and good return loss, bandwidth and gain.
[...] Read more.In this fast-paced technological world, individuals want to access all their electronic equipment remotely, which requires devices to connect over a network via the Internet. However, it raises quite a lot of critical security concerns. This paper presented a home automation security system that employs the Internet of Things (IoT) for remote access to one's home through an Android application, as well as Artificial Intelligence (AI) to ensure the home's security. Face recognition is utilized to control door entry in a highly efficient security system. In the event of a technical failure, an additional security PIN is set up that is only accessible by the owner. Although a home automation system may be used for various tasks, the cost is prohibitive for many customers. Hence, the objective of this paper is to provide a budget and user-friendly system, ensuring access to the application and home attributes by using multi-modal security. Using Haar Cascade and LBPH the system achieved 92.86% accuracy while recognizing face.
[...] Read more.As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software through numerous fields and communities may now be processed through value chains networks. Despite the integration of all data networks, computing models, and distributed software that offers a broader cloud computing, the security solution is have a serious important impact and missing or weak, and more work is needed to strengthen security requirements such as mutual entity trustworthiness, Access controls and identity management, as well as data protection, are all aspects of detecting and preventing attacks or threats. Various international organizations, academic universities and institutions, and organizations have been working diligently to establish cybersecurity frameworks (CSF) in order to combat cybersecurity threats by (CSFs). This paper describes CSFs from the perspectives of standard organizations such as ISO CSF and NIST CSF, as well as several proposed frameworks from researchers, and discusses briefly their characteristics and features. The common ideas described in this study could be helpful for creating a CSF model in general.
[...] Read more.Cryptography is a requirement for confidentiality and authentic communication, and it is an indispensable technology used to protect data security. Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. Quantum computers have the potential to become a pre-eminent threat to all secure communication because their performance exceeds that of conventional computers. Consequently, quantum computers are capable of iterating through a large number of keys to search for secret keys or quickly calculate cryptographic keys, thereby endangering cloud security measures. This paper’s main target is to summarize the vulnerability of current cryptographic measures in front of a quantum computer. The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum future.
[...] Read more.This paper introduces a novel 9-shaped multiband frequency reconfigurable monopole antenna for wireless applications, using 1.6 mm thicker FR4 substrate and a truncated metallic ground surface. The designed antenna performs in single and dual frequency modes depending on switching states. The antenna works in a single band (WiMAX at 3.5 GHz) when the switch is in the OFF state. The dual band frequency mode (Wi-Fi at 2.45 GHz and WLAN at 5.2 GHz) is obtained when the switch is turned ON. The directivities are: 2.13 dBi, 2.77 dBi and 3.99 dBi and efficiencies: 86%, 93.5% and 84.4% are attained at frequencies 2.45 GHz, 3.5 GHz and 5.2 GHz respectively. The proposed antenna has VSWR< 1.5 for all the three frequencies. The scattering and far-field parameters of the designed antenna are analyzed using computer simulation technology CST 2014. The performance of the proposed antenna is analyzed on the basis of VSWR, efficiency, gain, radiation pattern and return loss.
[...] Read more.The advancement of wireless communication technology is growing very fast. For next-generation communication systems (like 5G mobile services), wider bandwidth, high gain, and small-size antennas are very much needed. Moreover, it is expected that the next-generation mobile system will also support satellite technology. Therefore, this paper proposes a slotted star-shaped dual-band patch antenna that can be used for the integrated services of satellite communication and 5G mobile services whose overall dimension is 15×14×1.6 mm3. The proposed antenna operates from 18.764 GHz to 19.775 GHz for K-band satellite communication and 27.122 GHz to 29.283 GHz for 5G (mmWave) mobile services. The resonance frequencies of the proposed antenna are 19.28 GHz and 28.07 GHz having bandwidths of 1.011 GHz and 2.161 GHz, respectively. Moreover, the proposed dual-band patch antenna has a maximum radiation efficiency of 76.178% and a maximum gain of 7.596 dB.
[...] Read more.The ever-increasing demands of Internet services like video on demand, big data applications, IoE and multi-tenant data centers have compelled the network industry to change its conventional non-evolving network architecture. Software Defined Network (SDN) has emerged as a promising network architecture which provides necessary abstractions and novel APIs to facilitate network innovations and simplifies network resource management by breaking the conventional network into multiple planes. All these SDN planes interact through open interfaces or APIs which are commonly categorized into southbound, northbound and west/eastbound interfaces. In this manuscript, we have identified and emphasized various communication protocols used at south and northbound interfaces. We have provided a taxonomy of south and northbound communication protocols based on their dependence, capabilities and properties. The pros and cons associated with each communication mechanism are highlighted and the numerous research challenges and open issues involved at these two interfaces are elucidated. In addition to it, we have proposed the necessary abstractions and extensions required in communication protocols at these two interfaces to simplify real-time monitoring and virtualization in next generation networks.
[...] Read more.Machine learning is now being used for applications ranging from healthcare to network security. However, machine learning models can be easily fooled into making mistakes using adversarial machine learning attacks. In this article, we focus on the evasion attacks against Network Intrusion Detection System (NIDS) and specifically on designing novel adversarial attacks and defenses using adversarial training. We propose white box attacks against intrusion detection systems. Under these attacks, the detection accuracy of model suffered significantly. Also, we propose a defense mechanism against adversarial attacks using adversarial sample augmented training. The biggest advantage of proposed defense is that it doesn’t require any modification to deep neural network architecture or any additional hyperparameter tuning. The gain in accuracy using very small adversarial samples for training deep neural network was however found to be significant.
[...] Read more.With the advancement in digital forensics, digital forensics has been evolved in Cloud computing. A common process of digital forensics mainly includes five steps: defining problem scenario, collection of the related data, investigation of the crime scenes, analysis of evidences and case documentation. The conduction of digital forensics in cloud results in several challenges, security, and privacy issues. In this paper, several digital forensics approaches in the context of IoT and cloud have been presented. The review focused on zone-based approach for IoT digital forensics where the forensics process is divided into three zones. Digital forensics in cloud provides the facilities of large data storage, computational capabilities and identification of criminal activities required for investigating forensics. We have presented a brief study on several issues and challenges raised in each phase of Cloud forensics process. The solution approaches as well as advancement prospects of cloud forensics have been described in the light of Blockchain technology. These studies will broaden the way to new researchers for better understanding and devising new ideas for combating the challenges.
[...] Read more.The design of suitable compact antenna for 5G applications with superior return loss and bandwidth is still a fascinating task to the researchers. In this paper, the authors have designed a dual band microstrip patch antenna for 5G communications at 28 GHz and 46 GHz using CST studio. Rectangular patch antenna with double slots is considered to serve the purpose. The performance of the proposed patch antenna is very satisfactory in terms of return loss, VSWR, bandwidth and directivity. The values of S11 are well below -39dB and values of VSWR are very close to 1 for both resonance frequencies. The bandwidths for both cases are greater than 1.8 GHz which is an essential characteristic of 5G patch antennas for high speed connectivity and efficiency. Directivities are above 6 dB which are very suitable for the present problem. The simulation results are also compared with existing dual band 5G patch antennas and it has been observed that proposed antenna has outperformed the existing patch antennas that worked in 28GHz and 46GHz frequency range. The main advantage of this patch antenna is that it’s simple structure and good return loss, bandwidth and gain.
[...] Read more.In today’s world, security becomes a very important issue. We are always concerned about the security of our valuables. In this paper, we propose an IOT based intelligent smart locker with OTP and face detection approach, which provides security, authenticity and user-friendly mechanism. This smart locker will be organized at banks, offices, homes and other places to ensure security. In order to use this locker firstly the user have to login. User has to send an unlock request code (OTP) and after getting a feedback Email with OTP, he/she will be able to unlock the locker to access his/her valuables. We also introduce face detection approach to our proposed smart locker to ensure security and authenticity.
[...] Read more.Cryptography is a requirement for confidentiality and authentic communication, and it is an indispensable technology used to protect data security. Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. Quantum computers have the potential to become a pre-eminent threat to all secure communication because their performance exceeds that of conventional computers. Consequently, quantum computers are capable of iterating through a large number of keys to search for secret keys or quickly calculate cryptographic keys, thereby endangering cloud security measures. This paper’s main target is to summarize the vulnerability of current cryptographic measures in front of a quantum computer. The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum future.
[...] Read more.As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software through numerous fields and communities may now be processed through value chains networks. Despite the integration of all data networks, computing models, and distributed software that offers a broader cloud computing, the security solution is have a serious important impact and missing or weak, and more work is needed to strengthen security requirements such as mutual entity trustworthiness, Access controls and identity management, as well as data protection, are all aspects of detecting and preventing attacks or threats. Various international organizations, academic universities and institutions, and organizations have been working diligently to establish cybersecurity frameworks (CSF) in order to combat cybersecurity threats by (CSFs). This paper describes CSFs from the perspectives of standard organizations such as ISO CSF and NIST CSF, as well as several proposed frameworks from researchers, and discusses briefly their characteristics and features. The common ideas described in this study could be helpful for creating a CSF model in general.
[...] Read more.This paper encompasses the numerical analysis involved with the Electromagnetic (EM) full-wave simulation tool Advanced Design System (ADS) which uses the Method of Moment (MOM) and Finite Element Method (FEM). MOM is utilized to solve Maxwell’s equations which are transformed into integral equations before discretization and boundary conditions are applied while FEM computes the electrical behavior of the high frequency EM wave distribution, and then analyze the antenna parameters. The main objective is to investigate the effect of reactive loading on the microstrip patch surface which is used to control the behavior of the impedance bandwidth and obtain dual-band frequency operation. The study further examines how the perturbed patch antenna design targets the operating frequencies of 2.4 GHz and 5.8 GHz for possible range and speed. The proposed method provides insight into the analysis of the mathematical model employed in attaining the Driving Point Impedance Function (DPF) of the E-patch microstrip patch antenna. This approach was done to quantify the reduction in reflections for improved Radio Frequency (RF) network output.
[...] Read more.Privacy preservation in wireless networks is a multidomain task, including encryption, hashing, secure routing, obfuscation, and third-party data sharing. To design a privacy preservation model for wireless networks, it is recommended that data privacy, location privacy, temporal privacy, node privacy, and route privacy be incorporated. However, incorporating these models into any wireless network is computationally complex. Moreover, it affects the quality of services (QoS) parameters like end-to-end delay, throughput, energy consumption, and packet delivery ratio. Therefore, network designers are expected to use the most optimum privacy models that should minimally affect these QoS metrics. To do this, designers opt for standard privacy models for securing wireless networks without considering their interconnectivity and interface-ability constraints. Due to this, network security increases, but overall, network QoS is reduced. To reduce the probability of such scenarios, this text analyses and reviews various state-of-the-art models for incorporating privacy preservation in wireless networks without compromising their QoS performance. These models are compared on privacy strength, end-to-end delay, energy consumption, and network throughput. The comparison will assist network designers and researchers to select the best models for their given deployments, thereby assisting in privacy improvement while maintaining high QoS performance.Moreover, this text also recommends various methods to work together to improve their performance. This text also recommends various proven machine learning architectures that can be contemplated & explored by networks to enhance their privacy performance. The paper intends to provide a brief survey of different types of Privacy models and their comparison, which can benefit the readers in choosing a privacy model for their use.
[...] Read more.Antennas are either massive or miniaturized structures useful for the transmission and reception of signals associated with Electromagnetic (EM) radiation. Although Microstrip Patch Antennas (MSA) are advantageous they exhibit several drawbacks which may impair a faster communication throughput. They mostly display narrow impedance bandwidth amidst other grave issues. This study presents some approaches such as transmission line analysis and modeling for investigating the complexities associated with the MSA configurations given the shortcomings of narrow impedance bandwidth. in other to achieve the associated input impedance for the dual-band E-patch microstrip antenna. It also investigated the fabrication of the E-patch MSA which targeted the operating frequencies of 2.4 GHz and 5.8 GHz for possible range and speed. The fabricated prototype was tested using a high-frequency communication instrument known as the Vector Network Analyzer (VNA) to obtain the return loss and Voltage Standing Wave Ratio (VSWR). This method was done to quantify the reduction of reflections for enhanced Radio Frequency (RF) network output. This work helps to mitigate the challenges encountered when designing and developing microstrip patch antennas having a relatively small size in different configurations.
[...] Read more.Throughout the years there has been a crisis for low gain and efficiency in Microstrip patch antennas. Therefore, the microstrip patch antenna was designed for better gain, directivity and efficiency using array configuration of microstrip patch antenna with low dielectric constant at 10.3GHZ resonant frequency. The proposed design is of a triangular shaped patch array and a substrate RT duroid-5880 of dielectric constant 2.2. The results after simulation shows a good return loss, bandwidth around 950Mhz-1Ghz, directivity of 11.4db in a particular direction, gain of 11.4 dB with 99% radiation effect. The design proposed is helpful for applications like military defence and communication purposes.
[...] Read more.SQL injection attack is a major threat to web application security. It has been rated as one of the most dangerous vulnerabilities for a web-based application. Based on the Open Web Application Security Project (OWASP), it is measured as one of the top ten. Many types of research have been made to face this attack either by preventing the threat or at least detecting it. We aim in this paper to give an overview of the SQL injection (SQLI) attack and classify these attacks and prevention and detection tools. We introduce the most current techniques and tools that are used to prevent and detect SQLI and highlight their strengths and weaknesses.
[...] Read more.The advancement of wireless communication technology is growing very fast. For next-generation communication systems (like 5G mobile services), wider bandwidth, high gain, and small-size antennas are very much needed. Moreover, it is expected that the next-generation mobile system will also support satellite technology. Therefore, this paper proposes a slotted star-shaped dual-band patch antenna that can be used for the integrated services of satellite communication and 5G mobile services whose overall dimension is 15×14×1.6 mm3. The proposed antenna operates from 18.764 GHz to 19.775 GHz for K-band satellite communication and 27.122 GHz to 29.283 GHz for 5G (mmWave) mobile services. The resonance frequencies of the proposed antenna are 19.28 GHz and 28.07 GHz having bandwidths of 1.011 GHz and 2.161 GHz, respectively. Moreover, the proposed dual-band patch antenna has a maximum radiation efficiency of 76.178% and a maximum gain of 7.596 dB.
[...] Read more.