Review of Computer Engineering Research

Published by: Conscientia Beam
Online ISSN: 2410-9142
Print ISSN: 2412-4281
Quick Submission    Login/Submit/Track

No. 4

Path Loss Measurement and Modeling for Lagos State G.S.M Environments

Pages: 69-81
Find References

Finding References


Path Loss Measurement and Modeling for Lagos State G.S.M Environments

Search :
Google Scholor
Search :
Microsoft Academic Search
Cite

DOI: 10.18488/journal.76/2016.3.4/76.4.69.81

Citation: 1

Shoewu, O , Salau, N.O , Ogunlewe, A.O , Oborkhale, L.I

Export to    BibTeX   |   EndNote   |   RIS

  1. J. Isabona, C. C. Konyeha, B. C. Chinule, and G. P. Isaiah, "Radio field strength propagation data and pathloss calculation methods in UMTS network," Advances in Physics Theories and Applications, vol. 21, pp. 54 - 68, 2013.
  2. A. Goldsmith, Wireless communication. New York: Cambridge University Press, 2005.
  3. O. Shoewu, S. O. Olatinwo, and D. D. Olatinwo, "Comparative analysis of path loss in metropolitan domain in Nigeria using Okumura-Hata model," European Journal of Scientific Research, vol. 4, pp. 5 -15, 2016.
  4. R. Mardeni and T. S. Priya, "Optimized COST 231 hata models for WiMAX pathloss prediction in suburban and open urban environments," Modern Applied Science, vol. 4, pp.75, 2010. View at Google Scholar | View at Publisher
  5. L. Akinyemi, N. Makanjuola, O. Shoewu, and F. Edeko, "Evaluation and analysis of 3G network in Lagos metropolis Nigeria," International Transaction of Electrical and Computer Engineers System, vol. 2, pp. 81-87, 2014. View at Google Scholar 
  6. S. Ajose and A. L. Imoize, "Propagation measurements and modelling at 1800 MHz in Lagos Nigeria," International Journal of Wireless and Mobile Computing, vol. 6, pp. 165-174, 2013. View at Google Scholar | View at Publisher
  7. I. U. Nochiri, C. C. Osuagwu, and K. C. Okafor, "Empirical analysis on the GSM network KPIs using real-time methodology for a novel network integration," Progress in Science and Engineering Research Journal, vol. 13, pp. 092-107, 2014.
  8. O. Shoewu and F. O. Edeko, "Propagation loss determination in cluster based GSM base stations in Lagos environs," International Transaction of Electrical and Computer Engineers System, vol. 2, pp. 28 - 33, 2014. View at Google Scholar 
  9. S. T. Rappaport, Wireless communications principles and practice, 2nd ed. U.S.A: University of Texas, 2002.
  10. S. J. Seybold, Wireless communication principles and practice, 2nd ed. U.S.A: Prentice Hall, 2005.
  11. T. Syahfrizal, "Using of the Okumura-Hata propagation model for pathloss determination in Tarakan," in Proceedings of the 3rd International Conference on Radar, Antenna, Microwave, Electronics and Telecommunications (ICRAMET), 2014, pp. 77-79.
Shoewu, O , Salau, N.O , Ogunlewe, A.O , Oborkhale, L.I (2016). Path Loss Measurement and Modeling for Lagos State G.S.M Environments. Review of Computer Engineering Research, 3(4): 69-81. DOI: 10.18488/journal.76/2016.3.4/76.4.69.81
This paper presents path loss measurement and modeling for Lagos state dense-urban (DU), urban (UR), sub-urban (SU) and non-urban (NU) G.S.M environments. It was carried out with data collection through drive testing using TEMS software in the chosen environments Lagos-Island(DU), Surulere (UR), Lekki-Oniru (SU), Agbede-Ikorodu (NU), over a distance of 0.5-10Km from Base station (BS) to Mobile station (MS) with measurement taken at 0.5Km intervals for a period of 52 weeks. Relative parameters like Rxlev, RSSI, Path loss were measured in all areas of investigation under 2G and 3G frequencies of operation and twelve (12) different sites location were covered and analysed. COST 231-Hata model was used as reference model for path loss calculation of field data, this was further adjusted to develop optimized models (tagged OMODEEN models) for path loss prediction in all environments of study, which shows results within 6dB acceptable range, hence recommended for modeling in these environs and other similar G.S.M  environments.
Contribution/ Originality
This study is one of very few studies which have investigated path loss in classified environment. Effort was geared towards four chosen environment in Lagos metropolitan terrain. A new model known as OMODEEN was developed and can be used for specific environs. MATLAB was used to develop graphical representation of the model.

Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador

Pages: 65-68
Find References

Finding References


Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador

Search :
Google Scholor
Search :
Microsoft Academic Search
Cite

DOI: 10.18488/journal.76/2016.3.4/76.4.65.68

Citation: 3

Moises Toapanta , Enrique Mafla , Jose Orizaga

Export to    BibTeX   |   EndNote   |   RIS

  1. P. D. Student, S. Moisés, T. Toapanta, P. D. Luis, and E. Mafla, "Security analysis of civil registry database of ecuador," in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). “Special Section Computer Science/Networking”. IEEE Catalog, Chennai – India, 2016, pp. 1024–1029.
  2. T. J. O. Moisés and E. Mafla., "Analysis to define management of identities access control of security processes for the registration civil from Ecuador," in 2016 IEEE International Smart Cities Conference (ISC2) - IEEE ISC2 2016- Privacy and Security Track. IEEE Catalog, Trento – Italy, 2016, pp. 122-125.
  3. R. O. S. De, H. Del, P. Barrezueta, D. E. L. E. Y. Organica, D. E. G. D. E. La, and I. Y. Datos, "Ley orgánica de gestión de la identidad y datos civiles," Quito- Ecuador, 2016.
  4. M. Toapanta, E. Mafla, and J. Orizaga, "Conceptual model for identity management to mitigate the database security of the registry civil of Ecuador," in Materials Today: Proceedings Tracks “Computer Science/Networking”. ISSN 2214-7853. Indexed in Scopus (Elsevier) and the CPCI (Thomson Reuters, Web of Science). Impact SJR, United Kingdom, 2016.
  5. C. M. Quispe and P. D. E. Red, "Protocolos de comunicación utilizados en cloud computing," Revista de Información, Tecnología y Sociedad2012.
  6. W. Tim, "Image reduction operators based on non-monotonic averaging functions," IEEE Xplore, 2013.
  7. A. Han, "Biometric-Kerberos authentication scheme for secure mobile computing services," presented at the Image and Signal Processing (CISP), 2013 6th International Congress on, 2013.
  8. J. Feng and X. Coll, "Analysis, implementation and extensions of RADIUS protocol," presented at the Networking and Digital Society, 2009. ICNDS ’09. International Conference on, 2009.
  9. D. Wei, Y. Liu, X. Yu, and X. Li, "Research of mobile IPv6 application based on diameter protocol," presented at the Computer and Computational Sciences, 2006. IMSCCS ’06. First International Multi-Symposiums, 2008.
  10. G. K. Lee and J. Y. Choi, "Formal verification of PAP and EAP-MD5 protocols in wireless networks," presented at the Advanced Information Networking and Applications, 2004. AINA 2004. 18th International Conference, 2004.
  11. J. R. Arana, A. V. Leandro, and P. Oscar, "Implementation of network access control by using authentication, authorization and accounting protocols," Ingeniería y Competitividad, vol. 15, pp. 127-137, 2013.
  12. R. Carrillo, "Redalyc. La consumer protection in electronic payment transactions," Electron. Stud. Teleprocessing, vol. 6, pp. 33-49, 2007.
  13. V. Neumann, C. L. Gomes, C. Unsihuay-Vila, K. V. Fonseca, and P. R. Torres, "Parameterization of IPsec framework for security in the smart grid interoperability," presented at the Innovative Smart Grid Technologies Latin America (ISGT LATAM), 2015 IEEE PES, 2015.
  14. A. Fritz and J. F. Paris, "Maille authorization - A distributed, redundant authorization protocol," in Performance, Computing, and Communications Conference, 2006. IPCCC 2006. 25th IEEE International Date of Conference, 2006.
Moises Toapanta , Enrique Mafla , Jose Orizaga (2016). Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador. Review of Computer Engineering Research, 3(4): 65-68. DOI: 10.18488/journal.76/2016.3.4/76.4.65.68
Different security protocols were analyzed are used for a centralized database with distributed architecture. The goal is identify adequate security protocols to mitigate the security of information through identity of a model without relying on technological infrastructures. In this phase the suitable security protocols for a model of identity authentication, authorization and auditing (AAA) was analyzed. Deductive method is used in exploratory research to analyze security protocols more used among the main mentioned: Feret, Kerberos, Radius, Dnssec, Ipsec, Pgp, Secure Rpc, Set, Ssl, Tls, Maille, Eap, Pap, Map, Diameter, Peap, among others. It turned out that security protocols should be adopted on a model of identity for a centralized data base. It was concluded that protocols and security algorithms must have a direct relation to the identity model; allowing mitigate the vulnerabilities and risks considering To mitigate the threats and risks of information with confidentiality, integrity and availability. The technological infrastructure should not influence the implementation of different security protocols.
Contribution/ Originality
This paper provides the first analysis to adopt appropriate security protocols for an identity model with authentication, authorization and auditing without relying on specific technological infrastructure for Ecuador's civil registry; in a distributed architecture database. Different civil registries of the world with similar characteristics can refer this research project.