International Journal of Wireless and Microwave Technologies (IJWMT)

IJWMT Vol. 12, No. 5, Oct. 2022

Cover page and Table of Contents: PDF (size: 738KB)

Table Of Contents

REGULAR PAPERS

Load Balancing Mechanism for Edge-Cloud-Based Priorities Containers

By Wael Hadeed Dhuha Basheer Abdullah

DOI: https://doi.org/10.5815/ijwmt.2022.05.01, Pub. Date: 8 Oct. 2022

Considering edge devices have limited resources, it's critical to keep track of their current resource usage and device resource allocation algorithms that send containers to edge and cloud nodes according to their priority. To minimize the strain on edge devices and enable the running of mission-critical applications, edge containers may need to be transferred to a cloud platform. In this paper, we suggested a mechanism for prioritizing container balance between the edge and cloud while attempting to assign delay-sensitive containers to edge nodes. We assess the performance of Docker container management systems on resource-constrained computers and offer ways for reducing administration and migration overhead based on the workload type, to bring load balance to the systems. The proposed algorithm gives flexibility to get the best possible ways to achieve load balancing. The Tensorflow’s object discovery API was used, accessed with Flask, Python's micro-web framework. Docker container management technology was used in the implementation of this application.

[...] Read more.
Quantum Computers’ threat on Current Cryptographic Measures and Possible Solutions

By Tohfa Niraula Aditi Pokharel Ashmita Phuyal Pratistha Palikhel Manish Pokharel

DOI: https://doi.org/10.5815/ijwmt.2022.05.02, Pub. Date: 8 Oct. 2022

Cryptography is a requirement for confidentiality and authentic communication, and it is an indispensable technology used to protect data security. Quantum computing is a hypothetical model, still in tentative analysis but is rapidly gaining traction among scientific communities. Quantum computers have the potential to become a pre-eminent threat to all secure communication because their performance exceeds that of conventional computers. Consequently, quantum computers are capable of iterating through a large number of keys to search for secret keys or quickly calculate cryptographic keys, thereby endangering cloud security measures. This paper’s main target is to summarize the vulnerability of current cryptographic measures in front of a quantum computer. The paper also aims to cover the fundamental concept of potential quantum-resilient cryptographic techniques and explain how they can be a solution to complete secure key distribution in a post-quantum future.

[...] Read more.
Trust Modelling and Management for IoT Healthcare

By Abdul Rauf Riaz Ahmed Shaikh Asadullah Shah

DOI: https://doi.org/10.5815/ijwmt.2022.05.03, Pub. Date: 8 Oct. 2022

The IoT wave is on rise and it is considered as the biggest world changing computing ecosystem after the invention of Internet where the meaning of lifestyle is expected to be changed. IoT is now diffusing pervasively in most areas of life like smart home, smart cities, smart irrigation, smart healthcare etc. The concerned industry is trying to reap maximum benefits from this regime without putting extra efforts or investing much to make the related infrastructure secure and trustworthy. IoT end device, a.k.a smart object, is one component of this ecosystem, responsible to interact with the physical environment and gather the data, along with communication technologies, processing capabilities like fog or cloud computing and applications to interact with the device (s). It is possibility that such devices can be faulty, compromised or misbehaving because of internal or external factors like hardware malfunctioning or cyber-attacks. In this situation the data gathered and transferred by such devices can be disaster and challenging in decision making specifically in an area where the human life is involved like IoT healthcare. We have proposed a mathematical model to estimate the trust of such devices. Trust on IoT devices and gathered data from such trusted devices will boost the confidence of end users on this new computing regime; especially in healthcare environment. The estimated trust status (trusted, uncertain, and untrustworthy) will be saved in a database or CSV file with a timestamp to be used as reputation by healthcare applications. Patients are assigned their SOI based on their specific diagnoses and procedures performed during their medical encounter. Similarly, for a patient with heart diseases or having hypertension can be considered in extreme category with a value of γ = 1 if there is some deviation of readings. 

[...] Read more.
Design and Analysis of an Elliptical Edge with Pentagon Slot Patch Antenna for 5G Applications

By Pendli Pradeep K. Jaya Sankar P. Chandra Sekhar

DOI: https://doi.org/10.5815/ijwmt.2022.05.04, Pub. Date: 8 Oct. 2022

This paper presents a design of modified rectangular patch antenna with a pentagon slot and elliptical-shaped strip at the edge of the antenna for Sub-6G band 5G wireless applications. The proposed antenna excited using a 50-ohm coaxial cable transmission line. The overall dimensions of the substrate are 49.72 x 43.02 x 1.7 mm3 used on a Rogers RTDuroid 5880(TM) with relative permittivity of ∈r=2.2. The proposed antenna is simulated using Ansys HFSS Software at a resonant frequency of 3.2 GHz. The experimental and simulated results are matched well. The measured return loss value of the antenna is -20 dB at 3.2 GHz frequency, which can cover an impedance bandwidth of 150MHz. The proposed antenna provides a stable radiation pattern, radiation efficiency is 96%, and peak gain is 4.6 dBi. This antenna finds applications for WiMAX wireless broadband communication, radar, and commercial Wireless LAN in S-band.

[...] Read more.
Error Detection and Correction in Wireless Sensor Networks Using Enhanced Reverse Conversion Algorithm in Healthcare Delivery System

By Prince Modey Dominic Asamoah Stephen Opoku Oppong Emmanuel Kwesi Baah

DOI: https://doi.org/10.5815/ijwmt.2022.05.05, Pub. Date: 8 Oct. 2022

Wireless Sensor Network (WSN) is a group of sensors connected within a geographical area to communicate with each other through wireless media. Although WSN is very important in data collection in the world today, error may occur at any stage of data processing and transmission within WSNs due to its architecture. This study presents error detection and correction in WSNs using a proposed ‘pair wise’ Residue Number System (RNS) reverse converter in a health care delivery system. The proposed RNS reverse converter required (10n+3)_FAbit hardware resources for its implementation making it suitable for sensors. The proposed scheme outperformed Weighted Function and Base Extension algorithms and Field Programmable Analog Arrays using Kalman-filter algorithm schemes in terms of its hardware requirements.

[...] Read more.
Attacks on Cyber Physical System: Comprehensive Review and Challenges

By Maloth Sagar Vanmathi C.

DOI: https://doi.org/10.5815/ijwmt.2022.05.06, Pub. Date: 8 Oct. 2022

CPS is often comprised of several networked systems that could really observe as well as modify real-world objects and operations. They're analogous with IoT systems, and that therefore CPS concentrates mostly on interplay of mechanical, communications, as well as compute operations. As a result of their connection with IoT, a truly innovative CPS element, the “Internet of Cyber-Physical Things (IoCPT)”, has been established. The speedy pace and substantial development of CPS does have a consequence upon several parts of people's lives and permits a plethora of services and applications, including such e-Health, home automation, and e-Commerce. Interlinking the physical and virtual realms, on the other hand, poses additional security risks. As a necessary consequence, CPS cyber-security increasingly piqued the interest of both academics as well as corporations. In this research work, a literature review has been undergone in terms of cyber security in cyber physical systems. All the literature papers on cyber security have been collected from standard journals like IEEE, Springer and Elsevier. The collected papers are analyzed in diverse aspects like application, dataset used, technique utilized, tool and performance recorded. Finally, the research gaps identified is manifested to guide the future researchers on intrusion detection in CPS.

[...] Read more.