https://www.i-scholar.in/index.php/CiiTWC/issue/feed Wireless Communication 2021-02-07T14:46:53+00:00 Dr. V. Sivaraj editor@ciitresearch.org Open Journal Systems <p>The Aim of Journal on Wireless Communication is a forum for presenting new advances and research results in the fields of Wireless Communication. The scope of the journal covers all theoretical and practical aspects of the Wireless Communication, from basic research to development of application.</p><p> </p><p>The scope of the journal includes developing technologies in Antenna systems and design, Channel Modeling and Propagation, Coding for Wireless Systems, Multiuser and Multiple Access Schemes, Optical Wireless Communications, Resource Allocation over Wireless Networks, Security, Authentication and Cryptography for Wireless Networks, Signal Processing Techniques and Tools, Software and Cognitive Radio, Wireless Traffic and Routing Ad-hoc networks, and Wireless system architectures and applications.</p> https://www.i-scholar.in/index.php/CiiTWC/article/view/207218 Intrusion Detection in Wireless Sensor Network Based on Mutual Authentication and Access Control based on ECC 2021-02-07T14:45:47+00:00 B. Vijaya Nirmala bvijayanirmalacse@gmail.com Dr. S. Jeyanthi sk.jeya@gmail.com <p class="Abstract">Mobile Ad-hoc network, a wireless network mechanism that sounds enormous in recent years. Its increasing growth and popularity maximize the research and development’s attention towards wireless networks. It forms a network with one another and transfers files by forwarding to the nearby nodes still its reaches the destination.  However, the technology is improved the two most critical challenge still exists are intrusion detection and packet duplication. It will lead to privacy breach and packet duplication will leverage the overall system performance. In this work, several existing works were analyzed and explained the effectiveness of proposed scheme implementation towards de-duplication. We propose the combination of the Misuse Based Detection (MBD) method and Mutual Authentication and Access Control based on the ECC algorithm for overcoming the above-mentioned issues. With the collected information, a threshold value is created and the compare operator implements the threshold value operations. By which the MBD will identify the duplicate packets in the network and the implementation of Mutual Authentication and Access Control based on the ECC algorithm enhance the security level. <em></em></p> 2021-01-01T00:00:00+00:00 https://www.i-scholar.in/index.php/CiiTWC/article/view/207219 Security in Wireless Sensor Networks: Issues and Challenges 2021-02-07T14:46:53+00:00 A. P. Thangamuthu a.p.thangamuthu@gmail.com <p class="Abstract">Wireless Sensor Networks (WSNs) have made it easier for people to live in various fields: medical engineering, agriculture. Together with computing power and wireless networking, sensing technology makes it lucrative for its potential abundance of use. Since the many uses of such systems have been used, lightweight, inexpensive, disposable and self-contained computers, known as sensor nodes or "motes" are created. WSNs are commonly used in applications for monitoring, tracking and control. These include: centralized management, system heterogeneity, protocol routing, versatility of node, privacy of information and restricted computing capacity [1]. WSN covers a wide geographical area; the question of routing protocols, scalability and security should therefore be addressed. In the traditional networking technique there are major benefits due to the low cost and cooperative design of Wireless Networks (WNs). The networks with wireless sensors have more advantages over wired networks. Although wireless networks have various advantages, they are vulnerable to security problems. Due to the broader application, safety has become an important issue for wireless sensor networks.</p> 2021-01-01T00:00:00+00:00