International Journal of Wireless and Microwave Technologies (IJWMT)

IJWMT Vol. 10, No. 6, Dec. 2020

Cover page and Table of Contents: PDF (size: 671KB)

Table Of Contents

REGULAR PAPERS

A Comparative Study of Data Collection Routing Protocols for Water Meter Reading Devices Network

By Vu Chien Thang

DOI: https://doi.org/10.5815/ijwmt.2020.06.01, Pub. Date: 8 Dec. 2020

This paper presents a comparative study of data collection routing protocols for the network of water meter reading devices. Water meters added with smart reading devices that could read the amount of water consumption and send it to the server via radio. Smart reading devices use a limited battery power source, therefore, it is necessary to employ energy-efficient data collection routing protocols to the network of water meter reading devices to increase network lifetime. CTP and RPL are two data collection protocols, which focused on research and evaluation in this paper. Simulation results in different channel quality conditions show that the RPL protocol achieves better energy efficiency than the CTP-0 and CTP-31 protocols. Although the successful data delivery ratio of RPL protocol is lower than that of CTP-31 protocol, data collected periodically in the network, so the loss of several data packets is acceptable.

[...] Read more.
Mobile Backhaul in Release 8 and Beyond: Benefits, Challenges, Market Status and Impact Analysis

By TadeleAbera Firew Dereje Biruk Larago

DOI: https://doi.org/10.5815/ijwmt.2020.06.02, Pub. Date: 8 Dec. 2020

The significantly increasing mobile capacity demand, the use of advanced techniques like enhanced multiple input multiple output to boost throughput, very high data rate, reliability, very low latency, long battery life, mobility, and to enable internet of things in 4G and 5G technologies, aggravate extreme backhaul requirements with respect to capacity, latency, availability, energy, and on the top of this, cost efficiency. However, it is challenging to get a complete one backhaul technology that can solve all problems of backhaul especially massive introduction of small cells in mind. To overcome various backhaul problems there are many backhaul solutions i.e. the use of diversified backhaul under different use cases provides cost efficient backhaul solution. This paper presents benefits, implementation challenges, and use cases of mobile backhaul in release 8 and beyond. It also presents coverage and capacity analysis using excel based dimensioning tool for a given sample area. Lastly the paper shows economic benefits of diversified backhaul for small and macro cells and high-level implementation strategy for the considered area.

[...] Read more.
Virobot the Artificial Assistant Nurse for Health Monitoring, Telemedicine and Sterilization through the Internet

By Punith Kumar M B D Manikant Amaresh Savadatti

DOI: https://doi.org/10.5815/ijwmt.2020.06.03, Pub. Date: 8 Dec. 2020

We all know that during pandemic like corona or generally in hospitals, the front-line workers such as doctors, nurses, compounder in hospitals are nearest to the patients. They all need to look after the patients without caring about themselves and hence doctors, nurses, workers have a high chance of getting contacted to the disease. And few of the medical personnel fearing for the disease and their health, they are not ready to work in the hospital. Hence to tackle this problem we have come up with a solution i.e., Virobot- The artificial nurse. The result of this project is a robot that is designed to act as a medical assistant robot which can be controlled by nurses or doctors from a distance using their smart phone or it can just use autonomous navigation to reach the patients and give them required medicines, monitor patients health and stream all the patient information wirelessly through the internet to your palm(mobile). And, it has built-in UV sterilizer lights, which sterilizes the hospital wherever it travels. Not only it can carry lightweight packages and sterilize the hospital, It can be used as a telecommunication robot ad establish communication between doctor and patient since it is a built-in FPV camera and a Bluetooth speaker. The best thing is all these features are connected to the internet hence the doctor can get data from the robot from anywhere around the world.

[...] Read more.
A Metric for Evaluating Security Models based on Implementation of Public Key Infrastructure

By Sigsbert Rwiza Mussa Kissaka Kosmas Kapis

DOI: https://doi.org/10.5815/ijwmt.2020.06.04, Pub. Date: 8 Dec. 2020

International security evaluation metrics are too general and not focused on evaluating security models implemented using Public Key Infrastructure (PKI). This study was conducted to develop the metric for evaluating security models based on implementation of PKI by using insights from literature. Literature review was done based on inclusion and exclusion criteria. The developed metric was tested using ranking attributes and ranking scales. The results reveal that the developed metric is applicable for evaluating security models based on implementation of PKI. This is verified by the tabular results indicating evaluation of selected security models based on implementation of PKI by using ranking attributes and ranking scales. This study contributes to the body of knowledge a metric for evaluating security models based on implementation of PKI. 

[...] Read more.
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges, State of the Art Methods and Future Directions

By Rida Qayyum

DOI: https://doi.org/10.5815/ijwmt.2020.06.05, Pub. Date: 8 Dec. 2020

With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.

[...] Read more.