https://computers.journalspub.info/index.php?journal=JWNS&page=issue&op=feedInternational Journal of Wireless Network Security2023-03-21T12:22:23+00:00Nikitanikita@stmjournals.comOpen Journal Systems<p align="center"><strong>International Journal of Wireless Network Security (IJWNS)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>Click <a href="/index.php?journal=JWNS&page=about&op=editorialTeam">here</a> for complete Editorial Board</strong></p><p align="center"><strong> </strong></p><p align="left"> </p><p align="left"> <strong>International Journal of Wireless Network Security (IJWNS)</strong> is a journal focused towards the rapid publication of fundamental research papers on all areas of wireless network security. It's a biannual journal, started in 2015.<strong></strong></p><p align="center"> </p><p><strong>Journal DOI No: 10.37628/</strong><strong>IJWNS<strong> </strong></strong></p><p><strong>Readership:</strong> Graduates, Postgraduates, Research Scholars, in Institutions, and IT Companies</p><p><strong>Indexing: </strong>The Journal is indexed in Google Scholar</p><p><strong>Focus and Scope</strong></p><ul><li>Wireless threats</li><li>Signal-hiding</li><li>Wireless vulnerabilities, threats and countermeasures</li><li>Wireless network attacks</li><li>Securing wireless transmissions</li><li>Securing wireless access points</li><li>Network auditing</li><li>Wireless intrusion prevention system</li><li>Wireless public key infrastructure</li><li>Electromagnetic shielding</li></ul><p><strong>Submission of Paper: </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration. </p><p>Papers are accepted for editorial consideration through email <strong>info@journalspub.com or nikita@stmjournals.com</strong></p><p><strong>Abbreviation:</strong> IJWNS<strong></strong></p><p><strong>Frequency</strong>: Two issues per year</p><p><a href="https://journalspub.com/editorial-board/IJWNS/"><strong>Editorial Board</strong></a></p><p><a href="https://journalspub.com/for-author/"><strong>Instructions to Authors</strong></a></p><p> </p>https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=868Smart Street Lighting System Based on IoT2023-03-18T10:26:20+00:00Latika Devjani2021pcecslatika094@poornima.orgPrakash Sirvi2021pcecsprakash120@poornima.orgNeeraj Bairva2021pcecsneeraj112@poornima.orgKumari Vaishno2021pcecskumari086@poornima.orgHarshita Virwaniharshita.virwani@poornima.org<p>Currently, we have a manual system on streetlight. In the manual system, there is electric power wastage up to some extent level. An integrated smart city infrastructure based on smart technology can offer value-added services for sustainable urbanism. Through a web application, users can create a schedule for turning off the lights at dark (night) to save energy. It has three key meanings: (1) Economic benefit, (2) Social benefit, and (3) Environmental benefit. The Smart Lighting System is a smart street lighting system that overcomes the disadvantages of manual street lighting systems. A controller and a series of sensors make it a smart lighting system. The system uses a variety of sensors, including light sensors, motion sensors, and temperature sensors, to collect data about the environment and adjust the lighting accordingly. The data collected by the sensors is then analyzed by the central management system, which can identify the patterns and make adjustments to optimize energy usage. The system also includes features such as dimming, adaptive lighting, and real-time monitoring to further enhance energy savings and reduce maintenance costs. Additionally, the system can be connected to other smart city technologies, like public safety networks and traffic control systems.</p>2023-03-16T00:00:00+00:00Copyright (c) 2023 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=869A Pragmatic Approach on Adoption of EDA to Make Intelligent Business Decisions2023-03-21T12:22:23+00:00Jay C. Thakkar20se02ml046@ppsu.ac.inVikas S. Chomalvikas.chomal@ppsu.ac.in<p>Today, corporations and their leaders have goals beyond just efficiency. The managers of numerous departments, including marketing, finance, supply chain management, information technology, and customer relationship management, have been recognizing the importance of data-driven insights in generating quantifiable business results. However, linking the data to improved business performance has never been easy for human resource departments. The aim of the study is to assess the value of Business Intelligence (BI) and Exploratory Data Analysis (EDA) in relation to how firms manage their workforces and how that affects performance. It would also identify the important organizational areas where BI and EDA are used as well as the effect on employee performance. It would also provide some insight into the several organizations’ rising interest in EDA and the numerous technologies they employ to offer value to the company. The study also focuses on python based open source EDA tools such as AutoViz, Pandas-profiling and SweetViz that are useful for getting detailed information in a much more user-friendly style. Further, this research work also studies the impact of EDA and BI on corporate data analysis and visualization results are examined. It demonstrates the BI approaches that have been put into use by many companies in order to make better strategic decisions on the people's side of the business.</p>2023-03-13T00:00:00+00:00Copyright (c) 2023 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=861Adaptability of Opportunistic Routing Protocols in Underwater Wireless Sensor Networks: A Review2023-03-18T10:26:20+00:00Mukul Joshikapil.4110@cgc.edu.inKapil Mehtakapil.4110@cgc.edu.inSanjay Charayakapil.4110@cgc.edu.in<p>Due to the Underwater Sensor Network (UWSN), which at present is a study area of consideration in academia and industry, communication technology has made great strides in recent years. Many researchers and corporations are working to improve UWSN systems' existing technology in order to build a variety of application areas. However, UWSNs have a number of restrictions and obstacles, including high interference as well as noise, long proliferation times, small bandwidth, changeable network architecture, and sensor node battery life. Routing protocol development is one solution to these issues. This work provides a study of routing strategies for UWSNs. Furthermore, the present privacy mechanisms of Internet of Things (IoT) may not immediately adapt to UWSN surroundings due to its size. As a result, the objective is to give a thorough analysis of contemporary UWSN system developments, applications, communication technologies, obstacles, security risks, and privacy concerns. In addition, this study discusses how to avoid or deal with technological problems and security assaults in the UWSN context.</p>2022-12-30T00:00:00+00:00Copyright (c) 2023 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=81Intelligent Traffic Management of the ABR/UBR Service for TCP/IP in Fair Rate ATM Networks2022-10-28T11:31:51+00:00P. Rajanprajan1968@gmail.comA. L. Selvakumarprajan1968@gmail.comAbstract A Central issue in congestion control for available bit rate service ATM networks is the comparison of the fair rate for every connection at each switching node in the network. The objective is to determine the fair rate for all the connections in a distributed network under dynamic changes in the changes in the absence of centralized knowledge about the network and without the synchronization of different network components. The problem of fair rate allocation specifying the requirements of a fair rate allocation algorithm and providing a survey of various proposed fair rate allocation strategies in the content of ABR service. Design of congestion control mechanism for multimedia streaming over the mobile network is challenging. Streaming applications require a smooth transmission rate which the internet is unable to provide whenever there is congestion in the network. The standard TCP congestion control mechanism is not able to handle to special properties of a shared wireless multichip channel well. The frequent changes of the network topology and the shared nature of the wireless channel post significant changes. We propose a router assigned approach where router provides explicit feedback which allows quick increase of throughput. Keywords: congestion control, quality of service2022-10-28T11:14:08+00:00Copyright (c) 2022 https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=855A Survey on Energy Efficient Routing Pathway for WSN Application2023-03-18T10:26:20+00:00Garima Yadavgarima.yadav.1007@gmail.comAnita Yadavgarima.yadav.1007@gmail.com<p>Routing is a difficult area of research in wireless sensor networks (WSN), where packets are forwarded to the base station through a number of nodes. It is important to distribute the network packets in an energy-efficient way. To extend the life of the network, it also takes into account the battery's remaining power. Current energy-efficient routing options are presented, along with surveys, but still, systematic literature reviews (SLR) are required to pinpoint the real issues. This study uses SLR for energy efficiency routing at the initial stage with 40 papers. After filtering, 20 papers are shortlisted based on quality assessment and ensuring relevance and energy efficiency, selection criteria are met. In the beginning, we present literature with threshold scheme: Power-efficient, hybrid energy-efficient distribution, low energy adaptive mechanisms, and sensitive, adaptive periodic threshold-sensitive technologies. The results of a systematic review show that the most fundamental problem in WSN is not actually energy consumption. Researchers and practitioners have taken not ice of it, and it can help to increase energy efficiency. It further explains the shortcomings of the current methods, which render them unsuitable for WSN routing that is energy-efficient.</p>2022-10-27T00:00:00+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=850Routing Protocols Based on WSN with Class Room Route Protocol2023-03-18T10:26:20+00:00Neeraj *neeraj.bhardwaj789@gmail.comKanica Jangidneeraj.bhardwaj789@gmail.com<p>The wireless sensor community (WSN) is increasingly being used wirelessly in the mines due to the bendy configuration and strong flexibility. However, due to the Wi-Fi nature of the mine, WSN is facing a series of difficult situations. In this study, the milestones were set when the route contracts used within the mine were the hierarchical route. This study begins by discussing the concept of a classroom route protocol, and summarizes the key issues; then, with regard to gift issues, as well as long data transfer delays, unequal power and the rapid life cycle of society, I talk about the benefits of Wi-Fi and the barriers of algorithms to develop a variety of hierarchical protocols in combining methods from the idea of developing a collection of head selection method and control list collection. Finally, I summarize the concerns of the nerve network protocol used in mine and issue end-to-end instructions.</p>2022-09-30T00:00:00+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=815Security issues for Wireless Sensor Network2022-08-05T05:18:41+00:00Rishabh .rishuupandey13@gmail.com<p>WSN have been used to gather information from the real world, whether it be data or information. It is one of the most important technological advancements in the next decades and has presented researchers with a variety of unusual difficulties. It places several sensor nodes across the monitoring area. Although it has a number of drawbacks, such as limited memory, low capabilities, vulnerability to physical capture, and usage of unsecure wireless communication routes. Additionally, wireless communication technology faces a number of other security risks. In order to protect the WSN, this study aims to explore security-related problems, challenges, and offer some solutions to counter these dangers to the security. We first provide an overview of the limitations, security needs, and threats in WSNs, as well as the necessary countermeasures. The numerous security concerns and dangers in WSNs are examined in this research. Additionally, it provides a brief introduction of some of the protocols used to ensure network security</p>2022-08-05T05:06:57+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=816Real-time Attendance using Machine Learning and Face Detection Technique2022-08-05T05:18:41+00:00Prashik Tantarpaleprashik.tantarpale15@comp.sce.edu.inRishikesh Puririshikesh.puri17@comp.sce.edu.inRavindra PawarRavindra.pawar18@comp.sce.edu.inBhagyashri Sonawalebhagyashree@comp.sce.edu.inIf attendance is managed manually, it may be quite stressful on the instructors. Smart and automated attendance management systems are being used to address this issue. But with this system, authentication is a crucial problem. The smart attendance system often uses biometrics to operate. Face recognition is one of the biometric approaches used to improve and enhance this system. Recognizing individuals by their faces in photos and video streams is commonplace, from social media to phone cameras. A face recognition system is designed to match with human faces using computer images. Your brain is built to accomplish all of this naturally and instantaneously as a human. In reality, humans are overly adept at detecting faces, and as a result, they perceive faces in common items. This kind of generality is not possible for computers. Face recognition has been used in computer vision for a long time and has advanced significantly over time. This approach has a variety of uses, including user identification and verification. This Face attendance project uses face recognition for recording attendance accurately and more efficiently using HOG and neural network that puts 128 unique measurements to a particular face, to compare the package uses one of the most common machine learning methods linear SVM classifier, and registers attendance.2022-08-05T05:05:00+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=814Fake Currency Identification System Using CNN2022-08-05T05:18:41+00:00Viraj Mahesh Sawantvirajsawant0@gmail.comRaj Dilip Tupevirajsawant0@gmail.comAmeya Sonu Tawadevirajsawant0@gmail.comShatabdi Madhav Bhaleraovirajsawant0@gmail.com<p>Fake Currency is a detrimental issue worldwide. It affects every countries economy in a linear manner. Huge Amounts of loss could occur if the fake distribution of such currency takes place. In today’s times, this is a global issue. In this system we are going to develop a fake currency detection system to discover the paper forged currency to check whether it is original or not. Identifying the fake currency is very difficult since it is made from such intricate details. One of the best methods to spot fake currency is by using software that is user-friendly and effective. In our project, we will identify Indian banknotes using a webcam’s real-time image. In this setup, a novel Complication Neural Network technique to the identification of counterfeit money notes using their photographs is studied. This approach is based on Deep Learning, which has recently had great success in image bracket challenges. The first false notes gradually increased the delicateness of the planned mechanism. The fake currency may be a severe problem for the entire world, affecting the economies of almost every nation. One of the ways through which fake currency can be found out is through camera lenses or computer web-cams. Our project with CNN methodology will help overcome this issue by scanning the notes details and analyzing the key elements through which we can tell the authenticity of the note, the use of counterfeit currency is one of the biggest problems most nations face globally. The inauthentic currency hard to trace or recognize due to their use is extremely advance technology. Most of the technologies currently in use were created using image processing techniques to identify counterfeit money. So, as part of this ground plan, we are creating a system that can identify counterfeit money using convolution neural networks (CNN).</p>2022-08-01T05:01:00+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=805Performance Assessment and Analysis of Enhanced Routing Protocols for Wireless Sensor Network2022-08-05T05:18:41+00:00Amit Kumar Jainamitjain.2102@poornima.orgGarima Mathurdrg.mathur@poornima.org<strong><strong></strong></strong><p>Temperature and humidity are among the physical and environmental characteristics that can be measured by separate sensors in wireless sensor systems. The sensors' data is fed onto a dish. Wireless Sensor Networks have grown in prominence as a result of their extraordinary capacity to link the vertical world with the physical world. A tedious task is growing more and more difficult because those devices rely on battery power and might be used in harsh situations... When it comes to these networks, it is imperative to improve their energy efficiency. These sensor nodes are typically used in remote locations where it is challenging to maintain a stable electricity supply. A large number of battery sensors are now under control, and their power consumption is minimised. Nodes will become battery hogs if an energy-efficient optimization mechanism is adopted. Common approaches to increasing WSN energy efficiency. Of these, ILEACH has proven to be the most effective. Meta heuristics are used to improve the wireless sensor network's performance. A hierarchy of cluster heads is used to extend the WSN's lifespan. In terms of cluster head formation, throughput, and network life, our Improved LEACH outperforms LEACH. A quick evaluation of LEACH, ILEACH, and the Improved suggested LEACH based on figure of merits criteria is completed at the end of the research process.</p>2022-07-27T09:58:18+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=806Enforcing Digital Security Framework in Indian Economy: The National Cyber Security Policy of India 20132022-08-05T05:18:41+00:00Dev Agrawal19jgls-dev.a@jgu.edu.in<p>Rapid technological advancements and growing reliance on the internet have produced an environment of uncertainty and vulnerability, making it impossible for any government to manage the pervasive cyberspace phenomena. Every government must now confront this challenge with reasonably extensive and aggressive security programmes. Almost every government has released a National Cyber Security Strategy (NCSS) aimed at bolstering cyber defences, establishing a cyber deterrent posture, and developing cyber capabilities. In the context of cyberspace, deterrence, international engagement, incident response, resiliency, and recovery are all included in the broad category of activities and policies referred to as "cyber security strategy/policy." This category also includes all computer network operations, information assurance, law enforcement, diplomatic, military, and intelligence missions. The National Cyber Security Strategy (NCSS) is the nation's readiness strategy for providing coordinated actions and strategic measures aimed at securing and protecting the country's online presence, protecting vital information infrastructure, and establishing and fostering a trusted online community. In Basic sense, a cyber security policy or strategy should prioritise protecting cyberspace, protecting e-government services, more effectively combating cybercrime, updating the law, fostering international cooperation and communication, raising awareness, and ensuring that specialised education is available to combat the growing threat of cyber intrusions.</p>2022-07-27T09:58:18+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=756Advancements in Cyber Security for Autonomous Vehicles2022-03-21T11:32:11+00:00P. Uma Maheshwarimahisanju15@gmail.comSunkireddy Bhargavimahisanju15@gmail.comSunkireddy Umaranimahisanju15@gmail.com<p>There is also a pace alongside the fast extension potential threat areas within the Internet of Vehicles with its proliferation of associated electronics, through Internet of Things technology modules including smartphones through automobiles tethered to the web. The automobile sector has experienced remarkable expansion in the last years, as internet integrated smart gadgets have become essential components of vehicle networks. Increasing growth of car technology, such as Smart as well as Driverless Automobiles or hybrid automobiles, is among them. Threats on the Vehicle automobile networks would cause the Controller System to fail, as well as stops, power steer, as well as door locking difficulties, all of which potentially prove catastrophic in networked as well as automated automobiles. In order to reduce such dangers, a simple methodology for detecting automotive vehicle assaults is required. The effective architecture of a Network Security is built throughout this work to identify abnormalities throughout the automotive infrastructure. The system transmission technique, i.e., Monitoring System Infrastructure information created inside an actual setting, was employed in current research. The rigorous classification of vessel parts was carried out, as well as thorough examination of important operations provided around harbors. Current study reveals how higher degrees of incorporation of modern supporting innovations are fueling this explosive growth of cyberattacks. The pattern toward more network interconnection, on the other hand, is persuasive, delivering considerable commercial advantage by allowing automated vessel management, increased use of intelligent harbors, a decrease in workforce, as well as a major boost in energy utilization as well as quality of operations. The actual behaviour with barriers surrounding the automobile can be recognized as well as anticipated via object surveillance, while open area is found as a result. It's indeed feasible to categorize a region wherein drive is feasible as well as a region where drive isn't really feasible inside the open region, but a pathway is produced based upon its assessment outcome.</p>2022-03-21T11:10:21+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=755Analysis of Wireless Sensor Networks Through Secure Routing Protocols Using Directed Diffusion Methods2022-03-21T11:32:11+00:00E. N. Ganeshenganesh50@gmail.com<p>The point of this paper is to talk about secure directing in Remote Sensor systems. I have made an endeavor to display an examination on the security of Coordinated Dissemination, a convention utilized for steering in remote sensor systems. Beside this the paper too examines the different assaults conceivable on this directing convention and the conceivable counter-measures to anticipate theses assaults. In this paper data centric internet-based protocol called Diffusion methods for secure routing is described. This protocol is novel routing protocol and is provided to remove possible threats and attacks in routing structure and hence it is taken to analyze in terms of security issues. This protocol is implanted in wireless sensor nodes and the network taken is wireless sensor networks. Interest dissemination procedure is used, and three types of attacks are studied here: denial of service attacks, routing information modification and spoofing, and data dropping or selective forwarding. External attacks may be mitigated by link layer encryption, but compromised nodes within the network would be the most difficult to prevent. We conclude the drooping the data and when required and modifying or spoofing the will give the solution of the problem mentioned. Direct Diffusion (DD) is a routing protocol that allows communication between sink and source nodes in networks with random and mesh topologies. This routing protocol takes a data-centric approach, with intermediate nodes aggregating data and sending it to a sink node. The solution provided is useful for further analysis of extended WSN networks.</p>2022-03-21T09:38:53+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=732Cyber Security Methodologies and Cyber Education Techniques in Modern Day: A Review2022-03-21T11:32:11+00:00Anil Kumaranilkumar@poornima.orgVishrut Joshianilkumar@poornima.org<p>We live in a world where technology is increasing exponentially. Increased traffic on the web goes hand in hand with progression in technology. Life on internet is not safe and cybercrime is a major threat to humanity. Cybersecurity plays a major role in securing the cyberspace. We need to define structures and methodologies to safeguard our interests. There are various defined methodologies to create a better environment on the internet and decrease cybercrime. Also, the need of the hour is to educate professionals on how to prevent and handle cybercrime. This paper focuses on reviewing the methodologies used to implement security and educate techies and organization on how to make the web a better place and spread awareness for cyber-threats and their remedies.</p>2022-02-04T06:56:22+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=731A Wireless Sensor Network Intrusion Detection System with Parameters and Distributed Trust2022-03-21T11:32:11+00:00B. M. Rajeshrajenlight@gmail.comAntony Selvadoss Thanamanirajenlight@gmail.comB. Chithrarajenlight@gmail.comA. Finny Belwinrajenlight@gmail.comA. Linda Sherinrajenlight@gmail.com<p>Wireless sensor networks (WSN) are a significant part of today's communication frameworks, and the faith detecting steering convention is used to increase security in WSN. Already, a Trust Sensing based Secure Routing Mechanism (TSSRM) has been developed, which will reduce overhead steering and increase the system's unchanging quality of data transmission. In any case, changing the rules in Control Panel can disable the security tools for this technique. To structure a distributed intrusion detection system for WSN, this could offer a swap approach for the examination of trust degree and omnipresent directing. Notwithstanding that, to manage outside aggressors, attacks by bargained or malevolent hubs, the trust executive framework is generally prescribed by a few specialists in the region of the remote sensor organize. As a result, a parameterized and disbursed trust-primarily based totally intrusion detection system (PDTB-IDS) with a stable conversation shape and a trust-theboard framework for far off sensor structures is defined on this paper. The important commitment is to separate different metrics and trust variables that influence trust in WSN. These factors include vitality, unshakable quality, information, and so on. Following that, direct trust, recommendation trust, and circuit trust from those components are identified, and the sensor hub's overall trust estimation is calculated by adding the separate trust esteems together. By comparing trust derived from the suggested technique, the trust model may determine whether or not a given node is malicious. The numerical evaluation of the research work is done using the NS2 simulation environment, which demonstrates that the suggested method outperforms the current TSSRM method.</p>2022-02-04T06:55:25+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=721Study of Security to Block Chain under Wireless Sensor Network (WSN)2022-03-21T11:32:11+00:00Mohd Younus Darimunisdar@gmail.comTejbir Singhimunisdar@gmail.comSecurity is key part of any type of wireless network. Wireless sensor network (WSN) is an example of wireless network. As we know that security is a limitation of wireless network, so work on security for WSN for data transmission. In WSN, every node connected without any arrangement and self configuring on network. The probability of attacks is more on WSN when transfer the data from source to destination. If discuss on transmission, focus on block chain technology. In this technology, transfer the currency from main party to another sub party, so protection is important to this transaction. This reasons proposed to review on security and block chain under wireless sensor network. In this review, focus on different eight parameters of security for protection to various attack on wireless sensor network (WSN). This review paper proposed by using various article and analysis based paper which work on security and block chain under wireless sensor network.2021-10-27T11:37:29+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=707Vulnerability2021-08-21T06:49:26+00:00Pashwa Danddhavalchudasama16@gmail.comDhaval Chudasamadhavalchudasama16@gmail.com<p>The term cyber safety is frequently used interchangeably with the term data security. This paper argues that, even though there's a vast overlap between cyber security and statistics security, these two concepts aren't totally analogous. Furthermore, the paper posits that cyber safety is going beyond the limits of conventional information security to consist of not only the safety of information resources, but also that of other assets, including the person him/herself. In information safety, reference to the human factor generally relates to the role(s) of humans in the security system. In cyber safety this factor has a further measurement, particularly, the humans as potential objectives of cyber assaults or even unknowingly taking part in a cyber-attack. This extra measurement has moral implications for society as an entire, since the protection of sure prone companies, as an instance youngster, might be visible as a societal obligation.</p>2021-07-13T07:12:45+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=672Design and Performance Assessment of Energy Efficient Routing Protocol using Improved LEACH2021-08-21T06:49:26+00:00Pratiksha Mishrasharmapratiksha55@gmail.comSatish Kumar Alariasatish.alaria@gmail.com<p align="center"><strong>A wireless sensor network (WSN) is a wireless network composed of a base station (BS) and multiple micro sensor nodes. The battery used by the micro sensor node cannot be charged during the network lifetime. Therefore, extending the lifetime of WSN is a major issue. There are some energy-saving hierarchical routing protocols specifically designed for WSN, such as sensor protocol for information negotiation (SPIN), low-energy adaptive cluster hierarchy (LEACH) and LEACH centralized (LEACHC). In this paper, propose improvements to LEACH routing protocol to reduce energy consumption and extend network life. LEACH Distance Energy (LEACH-DE) not only selects the cluster head node by considering that the remaining energy of the node is greater than the average remaining energy level of the nodes in the network, but also selects the cluster head node parameters based on the geometric distance between the candidate node and the BS. The simulation results show that the algorithm proposed in this paper is superior to LEACH and LEACH-C in terms of energy saving and extending the lifetime of wireless sensor networks.</strong></p>2021-07-13T04:51:31+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=709Education Degree Fraud Detection and Student Certificate Verification using Blockchain Technology2021-08-21T06:49:26+00:00Nisha Shashikant Jagtapjagtapnisha185@gmail.comShivani Shahaji Jadhavjadhavshivani695@gmail.comParimal Ganesh Sawantparimalsawant0@gmail.comPragati PejlekarPragati.pejlekar@it.sce.edu.in<p>To verify the genuineness of an educational degree and certificates and to avoid the fraudulent activities by corrupted officers we tend to propose a system that employs a digital signature scheme and timestamps using blockchain technology. Because the range of universities and tertiary education students, the quantity of radiates is continually increasing. thanks to this certification method of those degree certificates generates heaps of latest job opportunities. The abrupt changes within the technology and development of latest technologies like blockchain is booming, the implementation of blockchain exploitation blockcerts software provides us an answer of plausible business models. During this paper, the price of the service has been balanced between graduates and leader on the main stakeholders of that service using two financial models. A signal check of certificates for college students is finished at low value and a simple check of the believability of the certificate is finished from and trustable supply whereas recruiting by the leader.</p>2021-07-12T10:46:22+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=708IOT: Research Challenges and Applications2021-08-21T06:49:26+00:00Anand Singhanandsingh7777@gmail.comManeesh Raomaneeshraobhu123@gmail.comIn this paper, we come along to highlight the concept of Internet of Things (IoT) in general, as well as reviewing the main challenges of the IoT environment by focusing on the recent research directions in this topic. Recently, IoT has emergence as a new technology that is used to express a modern wireless telecommunication network, and it can be defined as an marbles and interoperability joint interconnected in a dynamic global infrastructure network, also it contrive to implement the connectivity concept of anything from anywhere at any time . Indeed, the IoT environment possesses a large capriciousness of challenges has a broad impact on their performance, which may be categorized into various ways, mainly, are: i) General challenges: such as transmission, heterogeneity, virtualization and security; ii) Interesting difficulties, for example, remote sensor organization (WSN, Radio Frequency Identification, lastly Quality of administration (QoS) that is considered as a typical factor between both general and exceptional difficulties. Likewise, this paper features the primary utilizations of the IoT.2021-07-12T10:35:38+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=699Ensemble-based Semi-supervised Learning Approach for DoS Detection Using Feature Selection Algorithm2021-08-21T06:49:26+00:00Md. Mehedi Rahman Ranafaysal.ku.cse@gmail.comJosli Shubho Biswasfaysal.ku.cse@gmail.comJabed Al Faysalfaysal.ku.cse@gmail.com<p>Interconnected systems such as database servers, web-servers are now under threats from network attackers. A single attack on a computer or network system can lead to significant damage. Denial of Service (DoS) is a severe form of network attack that is used against an information system in order to block legitimate users from accessing the infected system. In a DoS attack, the attacker usually generates enormous packets by a large number of compromised computers and can easily force victims out of service within a short period of time. Therefore, an ensemble semi-supervised learning approach is proposed in this paper using different classification techniques. These techniques are Random Forest, Decision Tree and Extreme Gradient Boosting. To evaluate the detection performance of the proposed approach, extensive experiments have been conducted on the benchmark datasets such as KDD'99, NSL-KDD, and UNSW-NB15. Besides, the proposed approach has been compared with other machine learning techniques to validate based on the same datasets.</p>2021-06-26T05:12:00+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=668Green Internet of Things: A Research Direction on G-IoT Based Energy Efficient Smart City2021-03-05T10:16:04+00:00Sharmila Smcasharmi2007@gmail.comKanagaraj A.mcasharmi2007@gmail.comFinny Belwin A.mcasharmi2007@gmail.comLinda Sherin Amcasharmi2007@gmail.comAntony Selvadoss Thanamanimcasharmi2007@gmail.com<div><p align="center"><strong><em>ABSTRACT</em></strong><em></em></p><p><em>Smart cities are becoming important innovation and economic development hubs and thus need special attention and concentration. Sustainable, effective, and smart solutions for transport, governance, the climate, quality of life, and so on are needed for the drastic increase in urbanization over the past few years. The Internet of Things (IoT) is a forum for global communication between millions of internet-connected electronic devices. Wireless and wired sensors, home appliances such as televisions, refrigerators, etc., Radio Frequency Identification (RFID), etc. were included in these devices and electronic appliances. The Internet of Things has many advanced and pervasive smart city applications. The energy demand for IoT applications is growing, while the number and specifications of IoT devices continue to rise. Smart city strategies must also have the potential to use resources effectively and manage the associated challenges. Energy management is seen as a crucial framework for the implementation in smart cities of complex energy systems. Smart cities have been fitted with numerous electronic devices on the basis of the Internet of Things (IoT), thereby being smarter than ever, due to the increasing advances in advanced metering and digital technologies. The goal of this article is to provide a thorough overview of the challenges and management of energy in smart cities. In addition, the IoT technologies for smart cities and the key components and features of a smart city are listed in this survey.</em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords</em></strong><em>: Green IoT, smart city, Internet of Things, big data, security, privacy, data center, sensors</em></p></div>2021-03-05T10:15:15+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=645A Wireless Sensor Networks for Intelligent Building Energy Efficient Based on Multi-communication Standards using IoT2021-03-05T10:16:04+00:00R. Kaliyappanlinz15sherin@gmail.comDr.A. Linda Sherinlinz15sherin@gmail.comDr. A. Finny Belwinlinz15sherin@gmail.comDr. Antony Selvadoss Thanamanilinz15sherin@gmail.com<div><p align="center"><strong><em>ABSTRACT</em></strong><em></em></p><p><em>This research concentrate on developing efficient energy utilization models and answers for home and places of business supported current sensing and wireless networking technologies. Accessibility of smallest effort sensing and process modules even as these days created effective wireless correspondence conventions for building robotization applications offer the essential sanctionative instruments to the applying domain of sensible buildings. Energy utilization mechanization could be a compelling use of detector technology as a result of the all comprehensive demand for energy use improvement in homes and places of business. to create up an energy utilization models and optimization algorithms to reduce energy use gave by the networked sensors, consumer orders, and framework settings, current rating info once accessible, and input info accessible from the network. This analysis paper implements the most effective optimization model for WSN in sensible buildings.</em><em></em></p><p><em> </em></p><p><strong><em>Keywords: </em></strong><em>Wireless sensor, energy efficient, sensible buildings, WSN</em></p></div>2021-03-05T10:06:06+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=667A Compact Slotted Patch Antenna with Enhanced Gain Antenna for Satellite Application2021-03-05T10:16:04+00:00Divya *divyaattri89@gmail.comJyoti *divyaattri89@gmail.com<div><p align="center"><strong><em>ABSTRACT</em></strong></p><p><em>A compact patch antenna is designed using high frequency structure software. The rectangular shaped antenna slotted T shape slots in the antenna. The proposed antenna is designed on FR-4 substrate with dialectic constant 4.4. After analyzing, the return losses and gain of antenna is calculated. The proposed antenna is analyzed at two frequency 29 GHz and 31.5 GHz. The calculated result for return loss of multiband patch antenna is -33.59 dB and -26.2588 and gain of patch is 7.5705 dB and 8.7085 dB respectively.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> Microstrip antenna, miniaturized, automotive radar systems</em></p></div>2021-03-05T10:01:26+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=666Event Log Management and Monitoring2021-03-05T10:16:04+00:00Ritesh Dhanaremoryani.kajal@gmail.comKajal Moryanimoryani.kajal@gmail.comRaudat Jadliwalamoryani.kajal@gmail.comSuman Gurnanimoryani.kajal@gmail.com<div><p><strong><em>ABSTRACT</em></strong></p><p><em>Servers and other network devices are used widely leading to generation of huge amount of data per second. Hence the need for gathering, analyzing, managing, and monitoring this data is crucial. This paper casts light upon the need of event logging in various areas of activity such as social media, cloud computing, software and hardware security, goods, and service procurement etc. The proposed paper deals with different ways of collecting, examining, and using the data to maintain security, protect the credentials and monitor the sequence of events. </em><em>In networking, SIEM or Security Information and event management software play a vital role in providing enterprise level security by capturing, analyzing, and reporting activities. In SIEM, certain acts have been enforced to look whether the monitoring, recording, and reporting of data meets the compliance or not. Multiple acts such as PCI DSS, HIPAA and FISMA have been enforced. These log activities can also be used by organizations to measure the customer behavior. </em><strong><em>However, SIEM is mostly implemented by enterprise-level organizations capable of achieving continuous improvement. </em></strong><em>The maturity model shows how capable an organization is by judging how good it is at self-improvement.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong> <em>Event logging, security, events, logging, log management, SIEM, social media, cloud, goods, procurement, acts, tools, log security, HIPPA, FISMA and PCIDSS</em></p></div>2021-03-05T09:54:46+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=665Green IoT Based Smart Agriculture: A Systematic Literature Review2021-03-05T10:16:04+00:00Sharmila Smcasharmi2007@gmail.comKanagaraj Amcasharmi2007@gmail.comFinny Belwin Amcasharmi2007@gmail.comLinda Sherin Amcasharmi2007@gmail.comAntony Selvadoss Thanamanimcasharmi2007@gmail.com<div><p align="center"><strong><em>ABSTRACT</em></strong></p><p><em>With the growth of the global population, one of the major problems is the availability of food to all inhabitants of the planet. It is important to overcome these challenges through the implementation of creative options to enhance soil capacity and the protection of environmental resources. Humidity, temperature, weather, crop diseases and water management in smart farming as well as predictive behavior against parameter changes can be of great help to overcome these challenges. The Internet of Things (IoT) is an emerging technology with great potential to play its miraculous function in almost every area and to conquer it. The growth of intelligent IoT-based Smart Farming in developing countries is getting its space day by day. The Internet of Things (IoT) is a promising technology that offers successful and efficient solutions for multi-domain modernization. To automatically manage and track agricultural farms with minimal human intervention, IoT-based solutions are being created. In India, agriculture is practiced on a large scale, and its contribution to the Indian economy is also greatest. In order to boost yields and cost-effectiveness, it is necessary to increase the efficiency of agricultural and farming processes with emerging technologies called the Internet of Things (IoT). In particular, IoT can make processes in the agricultural and agricultural industries more effective by reducing human interference by automation. This paper addresses several facets of the innovations involved in agriculture in the Green IoT domain. Green IoT based agriculture reduces more energy consumption.</em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords</em></strong><em>: Green IoT, Internet of Things, wireless sensor network, data analytics, smart farming, sensor, security, agriculture</em></p></div>2021-03-05T09:46:46+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=624Age Estimation from Face Image Using Two Direction 2DPCA2021-03-05T10:16:04+00:00Varsha Sonier.vrsasoni91@gmail.comDr.Preeti Raier.vrsasoni91@gmail.com<div><p align="center"><strong><em>ABSTRACT</em></strong></p><p><em>Biometric systems are helpful for security purposes, which we used for the identification and verification. Many researches are done for this system that uses different modules of detection such as feature extraction and classification. In recent studies, a lot of work proposed in this idea of face detection in the field of image processing, the previous researchers developed some age classification and its detection or estimation system which uses frontal database for age classification. Likewise, we have introduced an idea in which face image is considered in illumination, noise, and expression for further, which wasn’t summoned in previous details of work. The motivational idea come from the objective and observations of work is to develop the system that classifies age from the face image of having illumination, noise, and expression.</em></p></div><div><p><strong><em>Keywords: </em></strong><em>Biometrics, face image, recognition, FG-NET database, classification</em></p></div>2021-03-05T09:35:38+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=646A Four-Layer Wireless Sensor Network Framework for IoT Applications2021-03-05T10:16:04+00:00R. Kaliyappancdtrkaliyappan@gmail.comDr.A. Linda Sherincdtrkaliyappan@gmail.comDr. A. Finny Belwincdtrkaliyappan@gmail.comDr. Antony Selvadoss Thanamanicdtrkaliyappan@gmail.com<div><p align="center"><strong><em>ABSTRACT</em></strong></p><p><em>With the advancement of Internet-of-Things (IoT) innovations, a wide scope of Wireless Sensor Networks (WSNs) will be received in an assortment of use conditions. Given the way that the vast majority of these WSNs are obliged by restrictions in energy assets, handling ability, stockpiling limit, and correspondence range, their arrangement should fulfill the continuous limitations dependent on the sort of utilizations. This paper proposes a constant IoT-based WSN with configurable hubs with various sensors. The hubs can gather information from the general climate, and present it on the cloud for all-inclusive availability by the clients. With this framework, clients can without much of a stretch access and investigate different information, for example, temperature, dampness, movement recognition, illuminance, CO gas, air quality, and so forth and make vital moves upon that data. The feasibility of proposed WSN IoT system has been confirmed through continuous equipment execution.</em></p><div><p><strong><em>Keywords:</em></strong><em> IoT, WSN, Energy resources, Storage capacity, Gas, Air </em></p></div></div>2021-03-05T09:29:59+00:00Copyright (c) 2021 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=573Modelling and Performance Analysis of a perforated Capacitive Shunt RF MEMS Switch2020-06-23T10:41:57+00:00Girija Sravani K.koushikguha2009@gmail.comPrathyusha D.koushikguha2009@gmail.comKoushik Guhakoushikguha2009@gmail.comSrinivasa Rao K.koushikguha2009@gmail.com<p>In this paper, we reported the concept of L-shaped beam of a switch along with perforations. The concept is involving in electromechnical, electromagnetic, switching and stress analysis to reduce the pull-in-voltage and increases the high isolation. By changing the beam materials, dielectric materials, beam thickness, dielectric thickness and thickness between the dielectric layer and beam are used to impact on spring constant and pull-in-voltage. The Simulated and analytical values of proposed switch is validated by using FEM tool. The calculated pull-in-voltage of L-shaped beam is 2.28 V. The analysis of proposed switch is observed that L- shaped beam shows as high isolation of -47 dB over 26.5 GHz frequency.</p><p>Keywords: pull-in-voltage, spring constant, switching time analysis, stress, isolation.</p><p>Cite this Article: Girija Sravani K., Prathyusha D., Koushik Guha, Srinivasa Rao K. Modelling and Performance Analysis of a Perforated Capacitive Shunt RF MEMS Switch. International Journal of Wireless Network Security. 2020; 6(1): 25–34p.</p>2020-06-23T10:40:43+00:00Copyright (c) 2020 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=572Advanced AQM Blue Algorithm in Wireless Network2020-06-23T10:41:12+00:00Uma R. Pujeriumaresearch81@gmail.com<p>When the number of packets increases beyond the network capacity leads to congestion in the computer network. Congestion effects the QOS parameters severely by decreasing throughput and increasing packet loss and delay, thus degrading the overall network performance. Active queue management algorithm is router based mechanism for early detection of congestion in the computer network. The basic idea of AQM is to sense and detect congestion in advance and to inform the sender to reduce its sending rate there by reducing the number of packets sent in the network to control the congestion in the CN. AQM algorithm is congestion control algorithm which increases throughput, link utilization and decreases the delay and packet loss. RED (Random Early Detection) provides the mechanism for congestion avoidance. The technique has several drawbacks and one among them is inability to deal with busty traffic. The major drawback of Blue algorithm is that it detect the congestion by analyzing and observing the queue length, queue length may little information about the severity of the congestion and detection of number of competing connections. The proposed algorithm called AdvancedBlue which is the modification of Blue AQM algorithm uses idle link, packet loss to detect congestion decouples the congestion measure with performance measure and stabilizes the performance measure against the target independently of number of users. AdvancedBlue AQM is simulated in wireless network using NS2 simulator. Wireless network is quite different from the wired network. The nodes have no wired links to other nodes and base station. So any barrier that is between the sender and the receiver could influence the transmission power and bring packet loss. The proposed AQM showed a better performance in wired network and was more complicated in wireless network. The proposed algorithm when compared with existing DropTail algorithm in wireless network showed better performance with respect to throughput and delay but had more packet loss.</p><p>Keywords: AQM, AdvancedBlue, Blue, CN, DropTail, NS2, QOS, RED</p><p>Cite this Article: Uma R. Pujeri. Advanced AQM Blue Algorithm in Wireless Network. International Journal of Wireless Network Security. 2020; 6(1): 16–24p.</p>2020-06-23T10:06:54+00:00Copyright (c) 2020 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=556Security Solutions in IoT-An Analysis2020-06-23T10:41:12+00:00Kapil Mehtakapil.4110@cgc.edu.inYogesh Chhabrakapil.4110@cgc.edu.in<p>The increasing demand of Internet computing through physical devices transforms the living style of people in every manner. This is only possible with the computing intelligence of physical devices or objects connected with each other irrespective of their nature of homogeneity or heterogeneity connected through the Internet called IoT (Internet of Things). The connectivity of such intelligent devices lead to various security challenges that may lead to various security problems in the network. Security in the widespread manner revolves around privacy, trust, identification and access control during communication between various devices. So, according to the taxonomy of IoT framework, various Security Algorithms are available to deal with the security concerns of users using IoT enabled devices. In this paper, different research challenges and important secure solution algorithms are discussed and analyzed to prevent attacks or cover various security measures. The most likely measures are well approved by various research scholars working in this area. This paper is a holistic overview of the available solutions or the research status of different key technology algorithms for IoT Security.</p><p>Keywords: Internet of Things; Computing Intelligence; Security; Privacy; algorithms</p><p>Cite this Article: Kapil Mehta, Yogesh Chhabra. Security Solutions in IoT-An Analysis. International Journal of Wireless Network Security. 2020; 6(1): 10–15p.</p>2020-06-23T10:01:49+00:00Copyright (c) 2020 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=570Network Security: Captive Portal2020-07-22T09:54:52+00:00Rasolofoniaina Samoelina Tahina180511201724@paruluniversity.ac.inGarima Pathakgarima.pathak42076@paruluniversity.ac.in<p>Nowadays, to handle efficacy the numbers of people who uses the networks and to secure the access of this network, the enterprises or organisations installs a way to manage their actions. This way is called Captive portal. A Captive portal is an application responsible for controlling and managing the access of users to public and private networks in an automate way. In the proposed work, Captive portal is installed into Linux Debian and developed with PHP. Linux Debian will be a web server, database server and will have the necessary table routine. The entries are verified in the database, if the entries are valid, the user gets the internet access for certain period of time. If the entries are invalid access gets denied.</p><p>Keywords: Captive Portal, IPTABLE, DHCP, LAMP, LINUX, NAT</p><p>Cite this Article: Rasolofoniaina Samoelina Tahina, Garima Pathak. Network Security: Captive Portal. International Journal of Wireless Network Security. 2020; 6(1): 7–9p.</p>2020-06-23T09:42:11+00:00Copyright (c) 2020 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=574Design of Current Starved Mode based Ring Voltage Controlled Oscillator in 180 nm Technology2020-06-23T10:41:12+00:00Deep Shekhard.shekhar91@gmail.comAshish Ramand.shekhar91@gmail.com<p>This paper belongs to current starved based single ended ring voltage-controlled oscillator (RVCO) for Phase locked loop (PLL) and other applications. The designed circuit was simulated using SCL PDK 180 nm technology in cadence virtuoso. Designed circuit provides stable oscillation frequency and simulated at supply voltages of 1.8 V for different control voltages of 1.8 V, 1.5 V and 1 V. With respect to the supply voltages tuning range was obtained in the range of 1.09GHz to 3.22 GHz. And phase of the designed ring VCO is - 83 dBc/Hz, -84 dBc/Hz and -90 dBc/Hz with respect to the supply voltages of 1.8 V, 1.5 V and 1 V respectively. The power dissipation of designed VCO at 1.8 V was found to be 0.695 mW.</p><p>Keywords: Phase locked loop, voltage-controlled oscillator (VCO), oscillation frequency, phase noise, power dissipation etc.</p><p>Cite this Article: Deep Shekhar, Ashish Raman. Design of Current Starved Mode based Ring Voltage Controlled Oscillator in 180 nm Technology. International Journal of Wireless Network Security. 2020; 6(1): 1–6p.</p>2020-06-23T09:32:28+00:00Copyright (c) 2020 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=509Wireless Sensor Network Clustering Approaches for Improved Clustering Method2020-02-12T11:31:33+00:00Kamini Mishrakaminimishra632@gmail.comHarendra Singhharendra.cse07@gmail.comRachana Dubeyhodcslncte@lnct.ac.in<p>This paper portrays the idea of energy gaps in sensor networks, their impacts on system lifetime and different techniques to evade them. The life expectancy of sensor networks completes in brief length because of the nearness of battery consumption. A relative investigation of strength and weakness of different techniques for battling energy openings issue. This paper analysis various existing approaches introduce to improve lifetime of WSN. On basis of this study, this work proposes sleep awake scheduling algorithm for sensor network to improve overall lifetime of network.</p><p>Keywords: wireless sensor networks (WSNs), sleep awake, receive signal strength, clustering, power optimization</p><p>Cite this Article: Kamini Mishra, Harendra Singh, Rachana Dubey. Wireless Sensor Network Clustering Approaches for Improved Clustering Method. International Journal of Wireless Network Security. 2019; 5(2): 37–47p.</p>2020-02-12T11:30:57+00:00Copyright (c) 2020 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=528Standard on-chip Communication Protocol AMBA APB2020-02-12T11:31:18+00:00Rajiv Kumar Singhrajivsingh.aec2006@gmail.comRajni Guptarajivsingh.aec2006@gmail.com<p>This design deals on standard on-chip communication protocol of AMBA APB. Today the VLSI design focuses on very complex functionality, less time-to-market and with high performance. The three main constraints in design of any digital circuit are area, speed and power. Recently most of the embedded systems use MPSOCs (multi processors system on chip) architectures. The architecture is primarily based on reusability in SoC as duplicating computing units on the same chip. It also focuses primarily on communication and synchronization between theses processors to meet the performance requirement of the complete system. The work involved is of AMBA APB protocol for communication between master (bridge) and slave. During this research paper, we main focus on the standardization of communication protocol because it ensures the easily integration of multiple cores from same or different vendors on the same SoC. The advanced microcontroller bus architecture (AMBA) is de-facto standard on-chip bus in system-on-chip (SoC) designs. APB is low bandwidth and low performance bus used to communicate the peripherals like UART, keypad, timer and other segment equipment’s to the bus architecture.</p><p>Keywords: multiprocessor system on chip (MPSoC), Verilog, AMBA, APB bridge, communication protocol</p><p>Cite this Article: Rajiv Kumar Singh, Rajni Gupta. Standard on-chip Communication Protocol AMBA APB. International Journal of Wireless Network Security. 2019; 5(2): 30–36p.</p>2020-02-12T11:23:35+00:00Copyright (c) 2020 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=526Predictive Modeling through Classification using Optimized Linear Regression using Machine Learning2020-02-12T11:31:18+00:00Priyanka Vermaroshni180393@gmail.comAshish Chaturvediroshni180393@gmail.comDr. Rachna Dubeyroshni180393@gmail.com<p>In this work, our main focus is on regression which is one of the most important methods in expert learning algorithm. Regression is a numerical access that is used to find the relationship between variables. It is basically used to find the final results from the given dataset. In this work, we will discuss the regression algorithms which are available in machine learning algorithm and propose one algorithm that will have less train error and test error as related to other available possible algorithm. The accuracy measure will be in the form of train and test error.</p><p>Keywords: classification, data mining, linear regression, machine learning techniques, python</p><p>Cite this Article: Priyanka Verma, Ashish Chaturvedi, Rachna Dubey. Predictive Modeling through Classification using Optimized Linear Regression using Machine Learning. International Journal of Wireless Network Security. 2019; 5(2): 22–29p.</p>2020-02-12T11:21:13+00:00Copyright (c) 2020 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=525IOT Security and Data Privacy2020-02-12T11:31:18+00:00Aarushi Aryaaarushiarya25@gmail.com<p>As we move towards implementing smart cities, security and privacy issues concerning data management arise. The number of connected things (such as smart phones, activity trackers and sensors) are going to enormously increase, which will increase in collection, analyzing and storage of user data. This paper compares different architectures of data management in an Internet of Things (abbreviated as IoT) environment. It discusses the implications of these architectures on privacy issues.</p><p>Keywords: smart city, security and privacy issues, IOT security, data privacy, IOT</p><p>Cite this Article: Aarushi Arya. IOT Security and Data Privacy. International Journal of Wireless Network Security. 2019; 5(2): 15–21p.</p>2020-02-12T11:18:52+00:00Copyright (c) 2020 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=524A New Logical Architecture of Wallace Tree Encoder, with Reduced Computations as well as Auto-detection of Bubble Error in Flash ADC2020-02-12T11:31:18+00:00Anirban Royroyanirban36@gmail.comSatish Kumarsknits0@gmail.comK.L. Baishnabklbaishnab@gmail.com<p>Speed is the major bottleneck of any flash ADC (analog-to-digital converter), which arises out from the nature computation that one ADC has to undergo at its different phases. In flash ADC one major component is the conversion of thermometer code to binary code. With the increase of operating frequency, error may occur in thermal to binary conversion, which is termed as bubble error. A new logical structure is proposed herewith, which reduces the number of computations by 40% with inherent ability of auto-detection and compensation of 1st order bubble error as well a certain type of 2nd order bubble errors.</p><p>Keywords: flash ADC, bubble error correction, Wallace tree encoder, full adder, k-map</p><p>Cite this Article: Anirban Roy, Satish Kumar, K.L. Baishnab. A New Logical Architecture of Wallace Tree Encoder, with Reduced Computations as well as Auto-detection of Bubble Error in Flash ADC. International Journal of Wireless Network Security. 2019; 5(2): 1–14p.</p>2020-02-12T11:16:27+00:00Copyright (c) 2020 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=490Robotic Surgery Mechanism: A Literature Review2019-08-06T04:00:54+00:00Anuj Moreanujmore2009@gmail.comShubham Murgundeanujmore2009@gmail.comAbstract- Robotic surgery has been around for over 20 years and has been a revolutionary steps in improving surgical techniques. The use of robotic mechanism in medical aspect has become critical feature in last 10 years. With the efficient and more use of robotic surgery, allows to provide smaller, more efficient and cheap equipment which eventually allows researchers to reach desired goals. Robotic surgery mechanism now, reached globally in multiple International Hospitals successfully. Main objective of this paper is to enlighten a review of the latest robotic surgical technology. Also comparison between Robotic surgical technologies. Keywords-Robotic Surgery, Medical Robotics, Surgical Robots, Robots, Surgery and Surgical Advances. Cite this Article: Anuj More, Shubham Murgunde. Robotic Surgery Mechanism: A Literature Review. International Journal of Wireless Network Security. 2019; 5(1): 33–37p.2019-08-06T03:41:11+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=482Robot – A Smart technique to Manage Waste2019-08-06T03:59:54+00:00Sonal Vinod Guptagsonal248@gmail.comArpita Jaingsonal248@gmail.comAbstract— Now-a-days, the management of waste from its gathering to dumping and interruption has turned out to be one of the best testing and difficult assignment for city partnerships, all around the world. To make this monotonous activity easy, another idea of Smart Dustbin has been thought about for Smart structures, medical clinics, schools and railway stations. The Smart city worker thought is a headway of customary trash specialist by suspending it to end up brilliant instilling sensors and some type of rationales. This keen gatherer is a progressive thought of use of line following refuse vehicle and post fixed waste part on predesigned locomotive way. The fixed bin utilizes ultrasonic sensors for dimension of trash location and updates the contemporary dimension of the canister to the rubbish vehicle, utilizing RF Module. This is accordingly a completely robotized framework, making little commitment towards the topic of Clean India Green India. Keywords— Waste Collecting Robots; IR Sensor; Ultrasonic Sensor; Arduino; RF Module Cite this Article: Sonal Vinod Gupta, Arpita Jain. Robot – A Smart technique to Manage Waste. International Journal of Wireless Network Security. 2019; 5(1): 27–32p.2019-08-06T03:41:07+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=481Emerging IT Trends: - Future is IT2019-08-06T03:58:00+00:00Viraj Vijay Sawantvvsvvs71524@gmail.comAbstract- Developing advancements are advances that are seen as equipped for changing business as usual. These innovations are commonly new however incorporate more established advances that are yet disputable and moderately undeveloped in possibilities, for example, preimplantation hereditary analysis and quality treatment which date to 1989 and 1990 individually. Emerging Technologies are portrayed by radical oddity, generally quick development, soundness, conspicuous effect, and vulnerability and vagueness. At the end of the day, a rising innovation can be characterized as "a fundamentally novel and moderately quickly developing innovation described by a specific level of intelligibility persevering after some time and with the possibility to apply a significant effect on the financial domain(s) which is seen as far as the synthesis of on-screen characters, establishments and examples of cooperations among those, alongside the related information generation forms. Its most conspicuous effect, be that as it may, lies later thus in the rise stage is still to some degree unsure and equivocal". Rising innovations incorporate an assortment of innovations, for example, instructive innovation. Keywords—artificial intelligence, nanotechnology, growth of IT. Cite this Article: Viraj Vijay Sawant. Emerging IT Trends: - Future is IT. International Journal of Wireless Network Security. 2019; 5(1): 23–26p.2019-08-06T03:41:04+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=480A Review on Snort Analyzer and it’s Implementation2019-08-06T03:55:57+00:00Akshay Mistrymistryakshay16@gmail.comAshish Mishramistryakshay16@gmail.comAbstract- The purpose of this article is to develop the circulation of cars on the basis of alcohol consumption by compressing the network for the production of alcohol under the carbon dioxide. Driving under the influence (DUI) of alcohol is a widespread phenomenon in the world where it is known as a major cause of deadly accidents. The purpose of the article is to create vehicle accident prevention by method of alcohol detection in an order to reduce accidents that are caused due to driving under influence of alcohol that also reduces the traffic. The alcohol sensor i.e. Car Snort Analyzer is used to detect the alcohol content in human breath. An ignition interlock system, which will produce spark plugs, is build up as a prototype to act like the ignition starter over the vehicle’s engine. The ignition interlock system will operate based on the level of Blood Alcohol Content (BAC) from human breaths detected by alcohol sensor. The hugemotivationfor thearticle is “Identification or Detection of Drunk driving”. Now days, alcohol consumption of the driver or the person who is driving the vehicle are the reasons to the accidents. Hence drunken driving is a significantcause across the world in different countries that leads to accidents. Alcohol Detection System inside a car isaarticle designed to ensure the safety of the people seating in the car. This article should be a Standard Feature inside the vehicle. Keyword: Blood Alcohol Content (BAC), Driving Under Influence (DUI), Ignition Interlock Device (IID) and Snort Analyzer Cite this Article: Akshay Mistry, Ashish Mishra. A Review on Snort Analyzer and its Implementation. International Journal of Wireless Network Security. 2019; 5(1): 1–5p.2019-08-06T03:40:59+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=460Design of Low Power 9T SRAM Cell Using DG FINFET at Different Nanometer Regime2019-08-06T03:57:07+00:00Ummul Qura Ansariummalquraansari57@gmail.comDr. Kamal Prakash Pandeyummalquraansari57@gmail.comAbstract According to this paper, we are represented 9T SRAMcells exploitassorted nanometer expertise. This paper compares the performance of 9T SRAM cell technologies, which include performance parameters such as the Average write delay and write power product delay, study manners of all SRAM cells are observed. Therefore, the 9TSRAMcells at 90nm technology constantly devourshort Average power; get betterstudysolidity as contrast to the 9T SRAM cells at 180nm technology. The objective of this paper is to diminish thelow power, develop the read behavior of the dissimilar SRAM cell formation applytempoimplement at 90nm and 180nm expertise. DG FINFET techniques have been employedto reduce the power consumed by the SRAM cell. The results show that the DG FINFET based SRAM cell is the best performerin terms of power consumption. This paper defines the utilize of Double Gate FINFET technology give low outflow and elevated performance operation by exploit maximum speed and short threshold voltage transistors for logic cell. Key Words: CMOS, 9T SRAM cell, Low Power, Average write delay, write power product delay, Cadence. Cite this Article: Ummul Qura Ansari, Kamal Prakash Pandey. Design of Low Power 9T SRAM Cell Using DG FINFET at Different Nanometer Regime. International Journal of Wireless Network Security. 2019; 5(1): 6–22p.2019-04-08T23:18:52+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=427Mapping Patents on the use of Communications in Connection with the Human Body2019-04-17T00:13:56+00:00Shabib-Ahmed Shaikhshabib@urdip.res.inAlok Khodeshabib@urdip.res.inMahima Khareshabib@urdip.res.inAbstract: The conductive nature of human body plays a vital role in transferring data / signals via means of the human body. This has enabled human body networks for better communication using minimal energy. The advent of mechatronics as a technological domain has also boosted the research of making Human Body for communication. As patent is a techno-legal document, it represents technological information that can be analysed and studied to gain various insights of technological advancements. This paper highlights the study of Human Body as means of communication based on patent data. Keywords: Patents, Body Area Network, Human Body Communication, Intra body Communication, Near Field Communication, Wireless Communication.2019-03-07T05:02:59+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=426Survey on Power Quality Improvement2019-03-07T05:04:18+00:00Kapil Agrawalkapil.agrawal1731@gmail.comShilpi Tomarkapil.agrawal1731@gmail.comAbstract Power quality is vital role recently due to the impact on electricity suppliers, equipment manufactures and customers. Power quality is described as the variation of current, voltage and frequency in a power system. It refers to a wide variety of electromagnetic [EMI] phenomena that characterize the current and voltage at a given time and at a given location in the power system. Currently, there are so many industries using technology for manufacturing and process unit. This technology requires high quality and reliability of power supply system. The industries like equipments of manufacturing unit, semiconductor, computer, are very sensitive to the changes of quality in power supply. Power Quality (PQ) problems encompass a wide range of disturbances network such as impulse transient, voltage, harmonics distortion, sags/swells, flicker, and interruptions. Voltage swells/sags can occur more frequently than other Power quality phenomenon. These voltage swells/sags are the most undesired power quality problems in the power distribution network. The objective and scope of this paper is study of power quality (PQ) occurrence in distribution systems. Keywords- Custom power, Distribution Static Compensator (DSTATCOM), Unified Power Quality compensator (UPQC), Dynamic Voltage Restorer (DVR), Power Quality (PQ).2019-03-07T05:00:29+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=425Performance of Wireless Power Transfer via High Frequency Resonating Coil2019-03-07T05:04:18+00:00Ramesh Walakerameshwalake12345@gmail.comM. P. Yanagimathrameshwalake12345@gmail.comSidram Melavankirameshwalake12345@gmail.comPavadeppa Chandaragirameshwalake12345@gmail.comShrinidhi Patilrameshwalake12345@gmail.comABSTRACT The main aim of this paper is to give an overview of recent researches and development in the field of wireless power transmission. The methods applied for wireless power transmission like Induction, Electromagnetic transmission, Electrodynamic induction, Radio, Microwave and Electrostatic Induction. This paper focuses on the latest technologies, merits and demerits in this field. Day by day new technologies are making our life simpler. Wireless power transmission could be one of the next technologies that bring the future nearer. In this paper, it has been discussed that it is possible to charge low power devices wirelessly via inductive coupling. It minimizes the complexity that arises for the use of conventional wire system. In addition, the paper also opens up new possibilities of wireless systems in our other daily life uses. Keywords: World Resources Institute (WRI), Wireless Power Transfer Systems (WPTSs), Power Factor Correction (PFC).2019-03-07T04:55:45+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=419Design and Analysis of Waveguide Diplexer for 5G Communication2019-03-07T05:08:43+00:00Sohni Singhcgccoe.appsc.sohni@gmail.comJoginder Singhcgccoe.appsc.sohni@gmail.comDeepika Dhimancgccoe.appsc.sohni@gmail.comRavdeep Singhcgccoe.appsc.sohni@gmail.comAbstract Diplexers circuits are recurrently used for mobile communications for 5G and satellite communication and used to separate the high power wide-band of transmission band from the error prone reception frequency range. Various telecommunication services like navigation system or television systems are based on satellite communication. for speed considerations, and in order to manage IoT devices diplexer devices are used. Diplexer is improvement over the microwave filters. This paper presents the analysis of simulated WR-28 waveguide that is used for Ka-Band. The cut off frequency in dominant mode is 29 GHz. The design is simulated over a frequency ranging from 20 to 50 GHz. Keywords: 5G Mobile Network; IoT Devices; Network Frequency Spectrum; Waveguide Diplexer; S Parameter2019-01-16T22:01:59+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=403An improved Data Transmission approach for Mobile Sink using CH in WSN2019-03-07T05:04:18+00:00Deepa Singhdeepasingh0611@gmail.comIn wireless sensor networks, the sensor nodes find the route towards the sink to transmit data. It is highly dynamic network and additionally it has limited energy, storage, and processing capability. Every sensor network node is utilized to gather information is exchanged to the client through system and furthermore control some physical procedures. Here, the cluster formation is performed to transmit the data and it reduces the energy consumption of node. It is implemented on MATLAB and the result show that the proposed work is improved than existing work.2018-10-30T21:53:42+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=372IMPLEMENTATION OF DATA ENCRYPTION STANDARD ALGORITHM USING VERILOG2018-09-23T23:55:17+00:00Pramod. Patilpatil.pramod080@gmail.comAshwini. R. Patilashwinirpatil07@gmail.comThe data encryption standard is a symmetric key algorithm for the encryption of electric data. It is called as symmetric because same algorithm and key are used for encryption and decryption. DES is a block cipher, it encrypts data in 64 bit blocks. 64 bit blocks of plaintext goes in one end of the algorithm and 64 bit block of cipher text comes out other end. The key length is 56 bits. To accomplish encryption , most secret key algorithm use two main techniques known as substitution and permutation .Substitution is a simply a mapping of one value to another. Whereas permutation is a reordering of bit position for each of the inputs. These techniques are used number of times in iteration called rounds. S-boxes are used basically non-linear substitution table, where either the output is smaller than the input. It will be implemented by using the tool Xilinx 13.1.Simulator used is ISE .Language used for this implementation is Verilog.2018-09-23T23:54:30+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=379A Review Paper on Information Security and Cryptography2018-09-23T23:55:17+00:00Y. Durga Tejaswiyagnapudurgatejaswi4@gmail.comT. Sahithisahithisriguptha@gmail.comSecurity is a state of being secure free from danger. Information security is a practice of defending digital information from unauthorized access. Information security's main objective is to balance the protection of data- availability, integrity and confidentiality by focusing on policy implementation and without effecting the productivity of the organization. Information Security is a multidisciplinary area and proficient field concerned with the development and growth of security techniques to locate information within the systems properly. In Information Systems, threat free data is created, processed, stored, transmitted and destroyed. Threats are considered as a sign of danger to the secured information. Certain security aims are defined to the respective categories. Set of security objectives should be brush up every so often to confirm its suitability, conformity, adequacy and uniformity with the growing situation. At this time, the set of security objectives consist of availability, confidentiality, authenticity, audit-ability, trustworthiness, accountability, non-repudiation, integrity and privacy.2018-09-23T23:51:49+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=377AES Security Algorithm Implement on FSR Protocol under Black Hole Attack using FPGA (XILINX)2018-09-23T23:55:17+00:00vinay bhattvinay10191@gmail.comDr. Sanjay Kumarsanjayuktech@gmail.comSecurity is a main component of wireless network and mobile ad hoc network (MANET). In this research work investigate the security of FSR protocol on MANET inside wireless network during black hole attack. In this investigation, AES security technique in cryptography used for protection on FSR protocol during black hole attack inside wireless network.2018-09-14T03:44:42+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=371Security of OLSR Protocol by DES Algorithm in Black Hole Attack using FPGA (Xilinx)2018-09-23T23:55:17+00:00vinay bhattvinay10191@gmail.comAttack is a mostly problem in MANET, because mobile node is independently worked on network. Cryptography security techniques used on mobile ad hoc network for security under various routing attack. in this research work, used DES (Data Encryption Standard) for security to OLSR protocol under black hole attack. OLSR is a proactive routing, unicast and flat routing protocol based on link state routing protocol.2018-08-17T02:23:15+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=367An Improved Method for the Removal of Malicious in Mobile Ad Hoc Network2018-09-23T23:55:17+00:00Sukanya KargaiyanSukanya.kargaiyan@gmail.comNeelam JoshiNeelam.joshi151907@gmail.comA MANET is a self-configuring ad hoc network that is probably very precious for battlefield verbal change. In wireless conversation network is running with many routing protocols and MAC Protocols. Intrusion detection and prevention device is intended for stop the entrance in the MANET. A few attackers attack on MANET to adjust packets and break the connections sooner or later of communiqué. Wormhole attack is one of the active internal attacks in which or additional attacker nodes tunnel the traffic from one place to some other area inside the network. Every hub in the system goes about as a number notwithstanding a switch and, advances movement to different nodes. MANETs might be establishment quick and requiring little to no effort in contrast with foundation systems which might be wired or remote. Wormhole nodes fake a route that is shorter than the original one inside the network means it create phantasm for the valid node so that they consider that the route is shorter than the unique one. But it isn't important that the path via wormhole nodes can be shorter. By the proposed work, it can be illustrated that the performance of the network improved in the form of various parameters.2018-08-09T21:31:12+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=314Analysis of Security attacks and Solutions in Vehicular Ad-Hoc Network2018-02-16T03:31:35+00:00Shiv Shankarp.shivshankarpatel@gmail.comVehicular Ad hoc Networks (VANETs) have emerged recently as one of the most attractive topics for researchers and automotive industries due to their tremendous potential to improve traffic safety, efficiency and other added services. However, VANETs are themselves vulnerable against attacks that can directly lead to the corruption of networks and then possibly provoke big losses of time, money, and even lives. This paper presents a survey of VANETs attacks and solutions in carefully considering other similar works as well as updating new attacks and categorizing them into different classes.2018-02-16T03:29:46+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=3135G Wireless Systems2018-02-16T03:31:35+00:00Kashish .tanejakashish4@gmail.com5th Generation technologies will change the way how most high-bandwidth users access their phones. With 5th Generation, people will experience a new level of call volume and data transmission never experienced before. 5th Generation technology is offering services in many different fields like Documentation, supporting e- transactions (online Payments, online transactions) etc. Many of the users are becoming more and more aware of the mobile phone technology, they will look for a decent package all together, including all the updated features a cellular phone can have. Therefore the search for new technology is always the main aim of the leading cell phone giants to out innovate their competitors. The 5th Generation design is based on user-friendly mobile environment with many wireless and mobile technologies on the ground.2018-02-16T03:19:03+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=285VIBRANT RECONSTRUCTION IN POLY-HOP SWITCHED ETHERNET NETWORKS2018-02-16T03:31:35+00:00C A KANNADASANcakmscb.ed@gmail.comThe FTT-SE protocol provides adaptive concurrent communication on Ethernet networks. To promise a continued concurrent behavior, FTT-SE integrates admission control with a quality-of-service mechanism, which screens all adaptation and reconstruction requests, accepting only those that do not compromise the system timeliness. The adaptability and reconfigurability have been deeply studied in the case of single switch FTT- SE architectures, whereas the extension of that for the poly- hop FTT-SE architecture was not yet investigated. Therefore, in this paper we study the challenges of enabling vibrant reconstruction in poly-hop FTT-SE networks, we put forward two methods (one centralized and one distributed) and we present a qualitative evaluation between them.2017-12-12T01:38:32+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=287Challenges in Mobile Ad-hoc Networks2018-02-16T03:31:35+00:00Anandhi Girigiri_anandhi@hotmail.comIn the recent years, mobile networking via smart phones and mobile telephones is broadly recognized as an infrastructure based networking. Many mobile devices support a variety of communication interfaces that are suitable for ad-hoc communication. For example, WIFI and Bluetooth can be used for ad-hoc networking. One key reason, why are these networking devices hardly used in ad-hoc mode by mobile applications, is that limitations in the reliability of network access. Despite all technical issues the consideration of social aspects and commercial aspects is a major point for any success of MANET technology for mobile applications. Mobile Adhoc networks are such type of networks which does not have any centralized authentication and the nodes communicate with each other. MANET is a kind of Ad Hoc network with mobile, wireless nodes. Due to its special characteristics like dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s self-configuration and self-maintenance capabilities. In MANET security plays a vital role for safe communication. The focus is given on security of Mobile Adhoc Networks. MANET is open network which is available for the malicious and trustworthy users to communicate. The MANET has to design a robust solution which deals with such type of malicious attackers so that a health network transmission takes place between trustworthy nodes. The Mobile Adhoc Networks are the network which works in separation along with the wired infrastructure. This elasticity of MANET is its biggest strength but it is also a big vulnerability for security issues. In the current paper, we will discuss the active and passive attacks including black hole attacks, spoofing, warm hole, flooding and traffic monitoring, traffic analysis and eavesdropping respectively. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. We argue a message centric approach to ad-hoc networking, which trusts on simple store and forward mechanism to spread data asynchronously in the network. We will also discuss the active and passive attacks including black hole attacks, spoofing, warm hole, flooding and traffic monitoring, traffic analysis and eavesdropping respectively.2017-12-12T01:30:41+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=270Reduction in Energy Consumption by Hybrid Techniques in Wireless Sensor Network2018-02-16T03:31:35+00:00Ashwani Kumar Patelashwanie.patel@gmail.comDr. Sarita Singh Bhadauriasaritamits61@yahoo.co.inWireless Sensor Network is the most distinctive network which contains various sensor nodes and at least one base station for the interaction of nodes. There are various crucial issues like energy preservation and security during the transmission of data. In the existing work, the energy of every node has been taken into consideration for clustering and pick cluster head on the idea of energy. This is not very optimal technique to select CH. Ant Colony Optimization used which calculates results by taking previous values and it makes them not suitable and also time consuming. In this paper, initially we place base station in middle and enable it to communicate with each sensor nodes. Clustering is performed using K-means clustering which grouping nodes into cluster and select cluster head of each cluster. AMO is used for the optimal path selection from one cluster head to another cluster heads until the data has reached to the base station. But we also encrypt the data by applying RSA algorithm to protect it from the unauthorized nodes. This method improves the security and increase the efficiency of the network.2017-09-04T23:16:37+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=265Dynamic Host Configuration Protocol Service2017-08-03T23:49:21+00:00Neel Kishorbhai Jotaninkj.jotani@gmail.comToday the efficient protocol for connectivity to internet is dynamic host configuration protocol. DHCP is far efficient than other protocols. But there are still some improvement needed by which this DHCP works more efficiently. DHCP works with two routing tables static and dynamic we cannot do anything with static part because it is already efficient as it contains IP’s of web servers which is permanently used and it is active all time. But when we talk about dynamic part than we still improve it in Time management.2017-08-03T23:38:15+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=227Energy Aware Routing Protocol in Wireless Sensor Networks2017-08-03T23:49:21+00:00S.B. Gopalsbg.ece@ebet.edu.inR Saranpriyasbg.ece@ebet.edu.inC Shalinisbg.ece@ebet.edu.inB Meganathansbg.ece@ebet.edu.inA WSN comprises spatially distributed autonomous devices using sensors to screen physical or environmental condition. Each node is able to perform sensing and processing the information. Routing protocol in WSN are application specific. Based on the network structure, energy aware routing protocol is used to improve energy efficiency and also to improve our network lifetime. In TEEN protocol, a hierarchical routing protocol based on clustering approach. In this protocol, if the threshold value is not reached, the node will not communicate to the user and the user will not get any data from the networks. Hence in this project, Variable Threshold Sensitive Energy Efficient Routing Protocol (VTEEN) is used to propose the user fixed threshold values, which depends on the environmental conditions with low cost and low power. In order to efficiently transmit the data from source to destination. This protocol is implemented using CASTALIA simulator.2017-05-17T23:49:59+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=226An Energy Efficient Routing Protocol for Wireless Sensor Networks2017-08-03T23:49:21+00:00K Arasikumarumaa2013@gmail.comS.B. Gopalkumarumaa2013@gmail.comK Nandhininandhiniebet95@gmail.comB Rashikarashika248@gmail.comWireless sensor networks are the spatially discrete sensor to show physical or environmental conditions to pass their data through the network to the main location. There are many hierarchical routing protocol available. The routing is based on total available capacity. In BCDCP, fixed nodes are used and the base station has abundant energy levels. Choose two most separated nodes to form potential cluster heads. The data of the nodes will be fusioned and send to the base station. In this project work Mobile-Base station Controlled Dynamic Clustering Protocol (M-BCDCP) mobile nodes are used for transmitting the data from source to destination which enhances the throughput and network lifetime using MIXIM SIMULATOR.2017-05-17T23:32:57+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=225Low Cost E-Auditing System2017-08-03T23:49:21+00:00K Saranyasaranya17113@gmail.comR Raj Kumarjustin.raju0041@gmail.comB Jamunasaranya17113@gmail.comT Gowtheeswaransaranya17113@gmail.comN Dheepaksaranya17113@gmail.comIn all organizations at the end of each year auditing will be conducted for knowing the financial value of the organization as well as to track the asset. Generally, we are using manual auditing that takes more time and requires more man power. This paper proposes and implements a low-cost asset tracking system using radio frequency identification device inlay, radio frequency identification device antenna and reader. It implements e-auditing scheme to save time and it is more reliable and easy to track the target object. In this scheme, each equipment is embedded with a Radio frequency identification device inlay which is monitored using radio frequency identification device antenna along with host computer. The radio frequency identification device inlay is used for auditing and to bring out the age of the asset. The radio frequency identification device antenna is used for scanning the Radio frequency identification device inlay within distance of 6 m. The audited details are posted to the host computer using reader and here the details of unavailable equipment will be notified to the Administrator. And so the Administrator’s auditing becomes easier, simpler and even at a low cost. Since all these devices are available at a low cost this solution can be made at a sum of very low cost. Initially this solution is projected for asset2017-05-17T23:17:10+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=224Enhanced Architecture for Cold Start Product Recommendation Using Microblogging Information2017-08-03T23:49:21+00:00Suganya Suganyakssakunthan@gmail.comArun Arunkssakunthan@gmail.comThis paper presents an enhanced web application, using web services for interconnecting three various servers like, social network, E-commerce application and news channels. By Using Artificial Neural Network (ANN) and Text categorization the recommended products will be classified. Also enhanced microblogging information has been implemented for efficient client server process. In added with three tier architecture has been used. I propose a novel solution for cross-site cold-start product recommendation, which aims to recommend products from e-commerce websites to users at social networking sites in “cold-start” situations, a problem which has rarely been explored before. A major challenge is how to leverage knowledge extracted from social networking sites for cross-site cold-start product recommendation. I propose to use the linked users across social networking sites and e-commerce websites (users who have social networking accounts and have made purchases on e-commerce websites) as a bridge to map users’ social networking features to another feature representation for product recommendation. In specific, we suggest learning both users’ and products’ feature representations (called user embeddings and product embeddings, respectively) from data collected from e-commerce websites using recurrent neural networks and then apply a modified gradient boosting trees method to transform users’ social networking features into user embeddings. We then develop a feature-based matrix factorization approach which can leverage the learnt user embeddings for cold-start product recommendation.2017-05-17T21:51:30+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=223Improved Network Intrusion Detection and Prevention2017-08-03T23:49:21+00:00A Dhivyabharathiakdhivyabharathi06@gmail.comD Kalaiselvikselvikannan@gmail.comIn this stage of gigabit Ethernet and broadband internet, network security has been the top priority for most of the researchers. Technology advancements have advantages as well as disadvantages. Most of the communication of present world, the e-world, takes place online, through the internet. Thus, the framework of network invasions and attacks to hack into servers also came into existence. Internet security is a fashionable and fast-moving field; the attacks that are catching the headlines can change significantly from one year to the next. Regardless of whether they’re directly applicable to the work you do, network-based attacks are so high-profile that they are likely to have some impact, even if you only use hacker stories to get your client to allocate increased budgets to counter the more serious threats.2017-05-17T21:31:31+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=188An Empirical Evaluation of a New Comparison Sort Algorithm2016-12-22T02:23:28+00:00Brijender Kahanwala.etherwn@gmail.comMost of the present day applications are database oriented like telephone directory, list of students, list of employees in an organization, and hospital databases etc. The users of these applications would like the data in some specified order (ascending or descending) that may be arithmetical or lexicographical. The sorting algorithms sort the data stored in database on its primary key or any other key value. This paper presents a new comparison sorting algorithm that is easy to implement and well efficient. We have introduced, analyzed, implemented and compared this new algorithm with bubble sort, insertion sort, selection sort. The results show that the new one algorithm is much better than the bubble sort and insertion sort.2016-12-22T02:22:58+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=186Evolution of Wireless Communication from First Generation to Fourth Generation2016-12-22T02:23:28+00:00Ms Chitrikachitrika.s1994@gmail.comIn today’s time all are very familiar to wireless communication system. Most of the people used a number of mobile radio communications system in daily life. Wireless communication is enjoying its growth period in history, due to enabling technologies which permit widespread deployment. This paper contains the discussion of the evolution of the mobile communication systems from GSM to LTE (2G to 4G) and the trends in the mobile communication industry. Evolution of wireless access technologies is approximately reach its fourth generation (4G). The first generation (1G) has analog mobile phone systems while the second generation (2G) has introduced capacity and coverage. This is followed by the third generation (3G) with more speed than (2G).The Fourth generation (4G) will provide access to wide range of telecommunication services, the better the technology, the more user friendly it becomes. This is what 4G brings to us than 3G. 4G provides us 3 times faster speed than 3G technology.2016-12-15T02:51:53+00:00Copyright (c) https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=122Comparative Studies among 3G, 4G & 5G in wireless communication2022-10-28T11:44:53+00:00Tejas Dhobletejusdhoble@gmail.comThis paper gives the information about the comparative study of 3G, 4G & 5G wireless communication technologies. The third generation 3G was very much popular in era of 2000 to 2015. It provides the better download speed about 2-100Mbps, low cost robust etc. But it has some disadvantages. To overcome the drawbacks of 3G, the fourth generation 4G comes in picture, which is very popular now a days. But the 4G technology is struggling to meet their performances goal. The fifth generation development initiative is based on 4G to overcome its shortcoming. The comparison between 3G & 4G technology in relation to its speed, bandwidth, architecture and switching design basis is studied , and discovered that their performance are still unable to eliminate problems like poor coverage, poor speed, poor quality of service & flexibility. To overcome all those problems, 5G technology model is proposed.2016-07-04T01:27:59+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=121Wireless Sensor Network and Challenges in the Internet2022-10-28T11:44:53+00:00Sona Chahalsona@celnet.inRemote sensor systems (WSNs) are increasing more effect in our everyday lives. They are finding an extensive variety of uses in different areas, including security frameworks, Industrial control and plant robotization, lighting and HVAC control, in-home utility checking frameworks, observing scaffolds, railroads and movement lights. In future, WSNs are relied upon to be coordinated into the "Web of Things", where sensor hubs join the Internet progressively, and use it to work together and achieve their undertakings. Nonetheless, when WSNs turn into a part of the Internet, we should deliberately explore and dissect the issues required with this joining. The Internet of Things is another worldview where keen installed gadgets and frameworks are associated with the Internet. In this paper, we endorse best way to deal with coordinate WSNs into the Internet and blueprint an arrangement of difficulties confronted by the WSNs in the Internet of Things.2016-07-04T01:22:09+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=120Comparison of Wi-Fi Vs Li-Fi2022-10-28T11:44:53+00:00Manisha Dhobleagnihotri.manisha7@gmail.comTechnology is growing very rapidly and makes things very easy for human life. Due to the innovation of wireless technology in the field of communication, we can connect to every person of the world within a few seconds. Wi-Fi technology is more popular all over the world. Devices which can use Wi-Fi technology include PC, video-game consoles, digital cameras, smart-phones, tablets and digital audio players. But this technology has limited scope. To eliminate the limits of Wi-Fi technology, Li-Fi (Light- Fidelity) technology comes in picture due to their fastest speed of data transfer & high density. Wi-Fi is good for general wireless coverage within buildings, industries, complexes whereas Li-Fi is ideal for high density wireless data coverage in large area and solving radio frequency interference problems. Wi-Fi has already achieved extremely intense speed in lab. Li-Fi provides the better bandwidth, better efficiency & availability and more secure than the Wi-Fi communication. In future Li-Fi technology has used in every sectors.2016-07-04T01:17:04+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=119Review Insight: Wired Vs Wireless Network2022-10-28T11:44:53+00:00Nitin Singhcraziestnick@gmail.comIn present scenario wireless network transpire as viral everywhere for the communication among all. Both of these have their own drawbacks as well as advantages to robust communication in all aspect. Wired and wireless network have different-different authentications like reliability, hardware, software etc. With this review I would like to compare wired and wireless network on different parameters.2016-07-03T22:10:41+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=92Introduction of AD-HOC Network and Proposed Protocol Named “AODV”2022-10-28T11:44:53+00:00Neelam Chauhanneelamchauhan.chauhan770@gmail.comTechnologies are evolving every day, people need much ease to share their data while communicating but it must be more secure and reliable so MANET is one of new technology being proposed in this paper where that can be deployed to any organization, disaster prone area and during emergency operation so as to get connect with each other, this technique is being adopted by people and it has positive point as it does not need any kind of infrastructure and any central control. Further, described different types of protocols with their advantages and disadvantages as it will define which protocol is to be adopted by this technology. As AODV protocol finds to be best because it works on demand basics and will help in consuming energy of nodes as nodes keep on changing their position as to form MANET. To increase the applicability and sustainability of MANET in the future communication , proposing AODV routing protocol that will constructs a stable, a reliable, and the shortest route between nodes of network with the minimum level of remaining energy to increase the operational lifetime of MANET. It also introduces a recovery scheme that reduces the network control overhead significantly to increase the reliability of the network.2016-05-22T23:44:26+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=80Retransmission Scheme for Voice, Data and Video Using Voice Cell Jitter and Delay in ATM Networks2022-10-28T11:31:51+00:00P. Rajanprajan1968@gmail.comA. L. Selvakumarprajan1968@gmail.comAbstract Multimedia is characterized by busty traffic and of fen stringent real time constraint multimedia traffic requires quality of service guarantees. This gives rise to traffic management issues in order to obtain high network utilization and QoS guarantee to the multimedia stream. The aim of this article is to prevent an overview of the traffic management issues and their possible solutions for retransmission of multimedia over asynchronous transfer mode networks. Keywords: integration of video, voice and data integration2015-10-28T00:00:00+00:00Copyright (c) 2022 https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=851A Comprehensive Methodology for Data Security and Privacy in Cloud Computing Systems2022-10-28T11:31:51+00:00Abid Hussain Waniabid.ku@gmail.comCloud computing encompasses computing with a pool of virtualized computer resources. A cloud provides for self-recovering highly-scalable programming models, workloads to recover from hardware/software failures and rebalance allocations, can host different workloads and allows workloads to be deployed/scaled-out on-demand by rapid provisioning of virtual or physical machines. The idea is to move desktop computing to a service-oriented platform using server clusters and huge databases at data centers. Cloud computing has become a standard method of software operation for many businesses. However, challenges are being faced by both research and professional cloud computing communities on optimized architectures, quality reliability, data security and privacy fronts. Services offered in cloud computing face the overwhelming challenges to ensure the proper physical, logical and personnel security controls, especially when considering the fact that cloud computing moves the application software and databases to the large data centers and in doing so the management of the data and services may not be fully trustworthy. In this paper, the main focus is given to highlight and investigate the data storage from perspective of threats and attacks and potential solution strategies. The paper also proposes an effective and flexible distributed scheme with two salient features, i.e., achieving the integration of storage correctness insurance and data error localization.2015-10-28T00:00:00+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=72Evaluation of MPLS Framework Congestion Control for Planning and Optimization in ATM Networks2022-10-28T11:31:51+00:00P. Rajanprajan1968@gmail.comA. L. Selvakumarprajan1968@gmail.comAbstract Recent Advances in MPLS have led to development of real-time applications. Many routing protocols have been specifically designed for these applications where real-time guarantee is an essential design issue. Real-time MPLS is an existing area of research. The common objective is trying to provide timeless guarantee for resource constrained MPLS. MPLS is emerging as a flexible technology that can transport voice, IPV4, IPV6 layer 2 services and even PDH and SDH/SONET circuit over a single packet infrastructure in a new attempt to solve the old problem of new network convergence. MPLS traffic emerging QOS support and fast restoration capabilities can be used to provide each service with strict service level arguments in a cost efficient way several standardization and industry organization are contributing to this goal. Keywords: ATM, congestion control, MPLS2015-10-19T00:00:00+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=36Fast Recovery and Privacy Preservation Against Global Eavesdropper in Ethernet Network2022-10-28T10:45:57+00:00J. Hemalathaddhams@yahoo.inDhamothiran *ddhams@yahoo.inAbstract Fast-recovery from link failures may be a well-studied topic in informatics networks using fast-recovery in LAN networks is sophisticated because the forwarding relies on destination Macintosh addresses, that don't have the class-conscious nature the same as those exhibited in Layer three within the sort of IP-prefixes. Moreover, switches use backward learning to populate the forwarding table entries. Thus, any quick recovery mechanism in LAN networks should be supported planless spanning trees. Develop a chic technique to cypher the protection graphs at a node such every link connected to the node is removed in a minimum of one in all the protection graphs, and each protection graph is two-edge connected. The highlight of our approach is that prove that each node needs at the most 3 protection graphs, therefore 3 protection addresses. Once a tunneled packet encounters multiple link failures connected to constant next-hop node. Conclude that the next-hop node has unsuccessful. The packet is then forwarded to the first destination from the last smart node within the protection graph on a path that doesn't contain the unsuccessful node. Keywords: LAN, RTF, STF2015-07-31T00:00:00+00:00Copyright (c) 2022 https://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=44Enhanced Security for Autonomous Mobile Mesh Networks Using Crypto Algorithm2022-10-28T10:45:57+00:00A. Renupriyavimal.anandavs@gmail.comS. Vimal Anandvimal.anandavs@gmail.comAbstract Mobile unintended networks (MANETs) area unit, ideal for things wherever a set infrastructure is unobtainable or unworkable. Today’s MANETs, however, could suffer from network partitioning. This limitation makes MANETs unsuitable for applications like crisis management and field communications, during which team members may ought to add teams scattered within the application parcel. In such applications, intergroup communication is crucial to the team collaboration. To deal with this weakness we introduce during this paper a brand new category of ad-hoc network referred to as autonomous mobile mesh network (AMMNET). Not like typical mesh networks, the mobile mesh nodes of associate in nursing AMMNET area unit capable of following the mesh shoppers within the application parcel, and organizing themselves into an appropriate topology to confirm sensible property for each intra- and intergroup communications. Here we propose a distributed consumer trailing answer to subsume the dynamic nature of consumer quality, and gift techniques for dynamic topology adaptation in accordance with the quality pattern of the shoppers. Our simulation results indicate that AMMNET is powerful against network partitioning and capable of providing high relay outturn for the mobile shoppers. Keywords: Mobile mesh network, communication, security, Crypto Algorithm2015-07-29T00:00:00+00:00Copyright (c) 2022 International Journal of Wireless Network Securityhttps://computers.journalspub.info/index.php?journal=JWNS&page=article&op=view&path%5B%5D=3Security for Wireless Network: A Challenging Task2022-10-28T10:45:57+00:00Ankit Saxenaankit.saxena5@yahoo.comSwapnesh Taterhankit.saxena5@yahoo.comWe mainly consider the security issue points of Wi-Fi network that how the hacker can hack our Wi-Fi network which can be risky to us. What types of attack are there in the Wi-Fi networks? We also provide some basic idea about the algorithm that is used in encrypting the data for Wi-Fi network. We mainly focus over all these issues and we provide some basic point by which we can easily secure our Wi-Fi network and by these precautions we can be secure from hackers. Keywords: WLAN, WMAN, wormhole, hacker2015-06-05T00:00:00+00:00Copyright (c) 2022 International Journal of Wireless Network Security