Work place: Department of Telecommunication Engineering, Federal University of Technology Minna, Nigeria
E-mail: okoh@ieee.org
Website: https://orcid.org/0000-0001-6354-0424
Research Interests: Educational Technology, Medicine & Healthcare, Network Engineering, Combinatorial Optimization, Network Security, Information Security, Neural Networks, Wireless Networks
Biography
Supreme A. Okoh holds a B.Eng. degree in Telecommunication Engineering from the Federal University of Technology (FUT) Minna, Nigeria with first class honors. He is currently rounding off his M.Eng. degree in Communications Engineering at the same university, and an M.Ed. degree in Advanced Teaching at University of the People, Pasadena California, USA. He is a recipient of various awards such as Total Petroleum scholarship award, best graduating student award from his department, University of the People prestigious scholarship award, etc. He is a Certified Internet Webmaster (CIW), Cisco Certified Network Associate (CCNA) and a Huawei Certified ICT Associate (HCIA). He is a member of IEEE Communications and Computer Societies, IEOM Society International, Michigan USA, and the Nigerian Society of Engineers (NSE). He is a reviewer with IEEE Access, PLOS One Journal and IEOM international conferences. His research interests include biosignal processing, healthcare engineering, neural networks, optimization techniques, network security and educational psychology.
By Samuel A. Adebo Elizabeth N. Onwuka Abraham U. Usman Supreme Ayewoh Okoh Okwudili Onyishi
DOI: https://doi.org/10.5815/ijwmt.2023.03.02, Pub. Date: 8 Jun. 2023
The primary aim of a cognitive radio (CR) system is to optimize spectrum usage by exploiting the existing spectrum holes. Nevertheless, the success of cognitive radio technology is significantly threatened by the primary user emulation attack (PUEA). A rogue secondary user (SU) known as the primary user emulator (PUE) impersonates a legitimate primary user (PU) in a PUEA, thereby preventing other SUs from accessing the spectrum holes. Which leads to the decrease in quality of service (QoS), connection undependability, degraded throughput, energy depletion, and the network experiences a deterioration in its overall performance. In order to alleviate the impact of PUEA on Cognitive Radio Networks (CRNs), it is necessary to detect and isolate the threat agent (PUE) from the network. In this paper, a method for finding and isolating the PUE is proposed. MATLAB simulation results showed that the presence of PUE caused a significant decrease in the throughput of SUs, from to . The throughput was highest at a false alarm (FA) probability of 0.0, indicating no PUE, and decreased as the FA probability increased. At a FA probability of 1, the throughput reached zero, indicating complete takeover of the spectrum by PUE. By isolating the PUE from the network, the other SUs can access the spectrum holes, leading to increased QoS, connection reliability, improved throughput, and efficient energy usage. The presented technique is an important step towards enhancing the security and reliability of CRNs.
[...] Read more.By Supreme Ayewoh Okoh Elizabeth N. Onwuka Suleiman Zubairu Bala Alhaji Salihu Peter Y. Dibal
DOI: https://doi.org/10.5815/ijwmt.2023.01.05, Pub. Date: 8 Feb. 2023
There are several IoT platforms providing a variety of services for different applications. Finding the optimal fit between application and platform is challenging since it is hard to evaluate the effects of minor platform changes. Several websites offer reviews based on user ratings to guide potential users in their selection. Unfortunately, review data are subjective and sometimes conflicting – indicating that they are not objective enough for a fair judgment. Scientific papers are known to be the reliable sources of authentic information based on evidence-based research. However, literature revealed that though a lot of work has been done on theoretical comparative analysis of IoT platforms based on their features, functions, architectures, security, communication protocols, analytics, scalability, etc., empirical studies based on measurable metrics such as response time, throughput, and technical efficiency, that objectively characterize user experience seem to be lacking. In an attempt to fill this gap, this study used web analytic tools to gather data on the performance of some selected IoT cloud platforms. Descriptive and inferential statistical models were used to analyze the gathered data to provide a technical ground for the performance evaluation of the selected IoT platforms. Results showed that the platforms performed differently in the key performance metrics (KPM) used. No platform emerged best in all the KPMs. Users' choice will therefore be based on metrics that are most relevant to their applications. It is believed that this work will provide companies and other users with quantitative evidence to corroborate social media data and thereby give a better insight into the performance of IoT platforms. It will also help vendors to improve on their quality of service (QoS).
[...] Read more.By Katfun Philemon Dawar Abraham U. Usman Bala Alhaji Salihu Michael David Supreme Ayewoh Okoh Adegbenga Ajiboye
DOI: https://doi.org/10.5815/ijwmt.2022.06.02, Pub. Date: 8 Dec. 2022
When interference is reduced, the benefits of using a macrocell and femtocell heterogeneous network (Macro-Femto) heterogeneous network (HetNet) can be increased to their full potential. In this study, Enhanced Active Power Control (EAPC), Active Power Control (APC), and Power Control (PC1) interference mitigation strategies are applied, and their performances in uplink and downlink transmission of 5G Non-Stand-Alone (NSA) architecture are compared. According to the findings of a MATLAB simulation, the EAPC technique utilized a lower amount of transmit power for the Macro User Equipment (MUE), the Home User Equipment (HUE), and the femtocell logical node (Hen-gNB), in comparison to the APC and PC1 techniques. While PC1 approach required less en-gNB transmission power. The MUE, HUE, hen-gNB, and en-gNB throughput of the EAPC approach was much higher. This work will enable wireless system designers and network engineers know the appropriate technique to utilize to achieve desired Quality of Service (QoS) while conserving network resources.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals