i-manager's Journal on Wireless Communication Networks (JWCN)


Volume 6 Issue 1 April - June 2017

Research Paper

Ultra Wide Band Microstrip Patch Antenna in Medical Applications

Anjan Kumar Kundu* , Debajyoti Chatterjee**
* Assistant Professor, Institute of Radio Physics and Electronics, University of Calcutta, West Bengal, India.
** Research Fellow, Institute of Radio Physics and Electronics, University of Calcutta, West Bengal, India.
Kundu, A.K., and Chatterjee, D. (2017). Ultra Wide Band Microstrip Patch Antenna in Medical Applications. i-manager’s Journal on Wireless Communication Networks, 6(1), 1-6. https://doi.org/10.26634/jwcn.6.1.13769

Abstract

Ultra Wide Band (UWB) wireless communication provides a very different approach to wireless technologies compared to conventional narrow band systems. UWB has many potential applications to be researched. One of the promising application areas is in medicine. Federal Communications Commission (FCC) regulate that the frequency for the UWB technique is from 3.1 GHz to 10.6 GHz [1], [10]. The goal of this work is to design and analysis the Microstrip Patch Antenna, which covers the Ultra Wide Band 3.1 GHz to 10.6 GHz. The authors have used aperture coupling feeding method in the antenna design and surveyed the reflection co-efficient amount of the antenna. This is a simulation based study. The design and simulation of the antenna is carried out using CST microwave Studio simulation software.

Research Paper

Secure Data Communication in I-Leach Protocol in Wireless Sensor Networks

D. Raghavaraju*
Assistant Professor, Department of Computers and Systems Engineering, SVIT, Anantapur, India.
Raghavaraju, D. (2017). Secure Data Communication in I-Leach Protocol in Wireless Sensor Networks. i-manager’s Journal on Wireless Communication Networks, 6(1), 7-11. https://doi.org/10.26634/jwcn.6.1.13770

Abstract

Around 70% of the aggregate vitality is scattered for information transmission in the greater part of the Wireless Sensor Network (WSN) applications. Another basic issue is security in wireless networks and various security plans are created to give administrations of security. In any case, these calculations have their own shortcomings, for example, helpless against picked plaintext assault, and computational multifaceted nature Routing of energy efficiency and Communication of data security in WSN. This paper proposes Improved LEACH/ILEACH protocol which increases network lifetime and it will improve the quality of QoS. Along the network lifetime, they propose a secure way to aggregate the data in ILEACH. The experimental results show that the proposed technique is giving better results in terms of energy consumption than existing techniques.

Research Paper

Security Enhancement in Bluetooth Hybrid Ring Topology (BLU-HRT) using Elliptic Curve Cryptography

Tatavarthy* , J. Rajendra Prasad**, R. Kiran Kumar***
* Assistant Professor, Department of Computer Applications, PVP Siddhartha Institute of Technology, Vijayawada, India.
** Professor, Department of Information Technology, PVP Siddhartha Institute of Technology, Vijayawada, Andhra Pradesh, India.
*** Assistant Professor, Department of Computer Science, Krishna University, Machilipatnam, India.
Sri, T.S., Prasad, J.R., and Kumar, R.K. (2017). Security Enhancement in Bluetooth Hybrid Ring Topology (BLU-HRT) using Elliptic Curve Cryptography. i-manager’s Journal on Wireless Communication Networks, 6(1), 12-21. https://doi.org/10.26634/jwcn.6.1.13771

Abstract

Scatternet development and its routing are significant issues for the upcoming Bluetooth technologies. Likewise, security is also one of the significant issues. The security in the Bluetooth Scatternet construction is foremost aspect to assure the usage of Bluetooth network. BlueHRT (Bluetooth Hybrid Ring Topology) is a scatternet that works on the uneven dissemination of devices. The BlueHRT is a composition of ring of trees and it is envisioned to amalgamate the advantages of both BlueRing and BlueTree and instantaneously conflicts its restrictions. So as to overwhelm this issue of Un-Authentication and provide Confidentiality on the data packets of Scatternet Topology, this paper introduced the novel security enhancement to the existing Bluetooth Hybrid Ring Topology at the time of routing the data between one nodes to other node by means of Elliptic Curve Cryptography technique. ECC is a technique in public-key cryptography depending on the arithmetic procedure of elliptic curves over the limited areas. The experimental results showed that this suggested approach has better performance in terms of packet delivery fraction, Communication Overhead, and percentage of packets dropped that moved over malicious node compared with the existing BlueHRT technique.

Research Paper

Performance Analysis of MIMO-STBC with Orthogonal Uncorrelated Channel

Hemlata Sinha* , M. R. Meshram**, G. R. Sinha***
* PhD Scholar, Swami Vivekanand Technical University, Bhilai, Chhattisgarh, India.
** Associate Professor, Department of Electronics and Telecommunication Engineering, Government Engineering College, Chhattisgarh, India.
*** Adjunct Professor, IIIT Bangalore (deputed to MIIT Mandalay).
Sinha, H., Meshram, M. R., and Sinha, G. R. (2017). Performance Analysis of MIMO-STBC with Orthogonal Uncorrelated Channel. i-manager’s Journal on Wireless Communication Networks, 6(1), 22-30. https://doi.org/10.26634/jwcn.6.1.13772

Abstract

In this paper, the authors have proposed a method to maintain the orthogonal property between the communication channels. This design is implemented with arbitrary number of transmit and receive antenna system with Space Time Block Coding (STBC) technique which provided space diversity. Due to space diversity and un-correlated channels, i.e. the interference in the channel between transmitter and receiver never occurs. Such systems are utilized to improve the Bit Error Rate (BER) performance of wireless communication systems and counter the destructive effects of channel attenuation and alternative distortion phenomena thus improve the performance of the wireless system which is evaluated through simulation.

Research Paper

Data Discovery and Circulation Protocol in Wireless Sensor Networks

Pilaka Anusha* , Kaki Leela Prasad**
*-** Assistant Professor, Department of Information Technology, Vignan's Institute of Information Technology, Visakhapatnam, India.
Anusha, P., and Prasad, K.L. (2017). Data Discovery and Circulation Protocol in Wireless Sensor Networks. i-manager’s Journal on Wireless Communication Networks, 6(1), 31-40. https://doi.org/10.26634/jwcn.6.1.13773

Abstract

A data discovery and circulation protocol for Wireless Sensor Networks (WSNs) play a major role for updating the configuration parameters of the sensor nodes and a distributing commands to the Sensor nodes. Circulation protocols are capable of self organizing as the WSN are deployed in critical zones and rural areas where the manual reprogramming of nodes are complicated to configure. All existing data discovery and circulation protocols have two shortfalls one which is that the, existing protocols are based on the centralized manner, i.e. data items can only be circulated by the base station. Such approach is not sufficient for emergent multiuser Wireless Sensor Networks. Secondly, those existing protocols were designed with a lack of proper security and hence adversaries can easily launch attacks to attack the network suddenly. This paper proposes the more secured and distributed Data Discovery and Circulation protocol named DiDcip. This protocol allows the network owner to authorize the various network users with different privileges to circulate Data items to the Sensor node efficiently and directly. This protocol enables more security for the Data.