Browsing by Author "Adeniran, T.C."
Now showing 1 - 7 of 7
Results Per Page
Sort Options
Item A Collaborative Authentication Scheme For Intrusion Detection In Wireless Sensor Networks.(International Journal of Information Processing and Communication, 2014) Onidare, S.O; Ayeni, A.A.; Ayeni, O.B.; Adeniran, T.C.Virtually all applications of WSN are critical infrastructures, yet they are characterized by low resource, making them a good and attractive target for network attackers. This necessitate the need for having an energy and resource optimizing security technology or mechanism that will ensure that WSN deployed for such infrastructures are secured at least to a degree from intrusion by malicious entities. Intrusion detection scheme (IDS) in wireless sensor networks (WSN) follows two main approaches namely; single sensing and multiple sensing. This paper presents an algorithm for a collaborative multiple sensor schemes that use the authentication of neighbour nodes and high level sensory data to detect a possible intrusion in a WSN. Besides using a collaborative multiple sensor schemes, the mechanism of the algorithm also incorporates a second layer of authentication which serves to increase the reliability and ruggedness of the proposed IDS. A simple demonstration of how the algorithm works was done through MATLAB simulation. Furthermore, a discussion of the effectiveness of the algorithm for several typical security attacks/threats against WSN was presented.Item Comparative Study of Routing Protocol Performance in Mobile Ad hoc Network(Faculty of Communication and Information Sciences, University of Ilorin, Kwara , Nigeria., 2019-05) sowande, Olugbenga; Salami, Ramat; Adebowale, Q.R.; Faruk, Nasir; Olawoyin, Lukmon, A; Adeniran, T.C.; Oloyede, A.AOver the decades amazing progress has been observed in the world of wireless and mobile communication that ushers in the era in which laptops, smartphones and sensors have become pervasive, inexpensive and rapidly available. Due to the high mobility and dynamic nature of the network finding an effective and efficient routing protocol for a particular scenario is often a challenge. This paper basically focuses on the comparative study of the performance of the routing protocols (Ad hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing(OLSR)) using OPNET (Optimized Network Engineering Tool). Four scenarios were created, and each scenario with different nodes and run on three application services (HTTP, FTP and Video conferencing). The performance of the protocols was compared based on certain metrics (Throughput, end-to-end Delay, Load). The simulation results show that the AODV on the average performed better than OLSR and DSR, but OLSR will be preferred for real-time application and higher number of connected nodes in a MANET system.Item Design and Implementation of A Secured Automated Library Using RFID(International Journal of Information Processing and Communication, 2018-12) Adeniran, T.C.; Zubairu, J.H.; Onidare, S.OFor many years, libraries were operated manually which made the job of the Librarian tedious and slow. However, in recent years, modern life has increased the demand for reliable communication systems and internet technologies. Activity such as e-learning has forced the global educational institution to adopt an automated library, the Radio Frequency Identification (RFID) system was introduced and also, the need for tracking and identification of library resources. In this paper, an RFID-based detection system was used. It involves the use of radio frequency and microchip technology, alongside other components to identify books leaving the library efficiently. The RFID tag used is the passive read/write tag in the 13.56 MHz unlicensed Radio Frequency band, due to its affordability and ease of implementation. This paper seeks to enlighten library users, such as administrators about the importance of RFID technology in the improvement of library management. The proposed system consists of the antitheft security gate, used to detect, if a library book has been properly checked out and a database (middleware) to know which book or material was taken or is about to leave. The result showed that within the acceptable range of 40 mm, the RFID reader works efficiently in theft detection. This range can extend for large-scale deployment.Item DESIGN OF A GPS- BASED ACADEMIC PERSONNEL CLOCKING SYSTEM(NIGERIAN JOURNAL OF TECHNOLOGY (NIJOTECH), 2019-04) Adeniran, T.C.; Anyaegbu, A.O.; Olawoyin, L.A.; Ajagbe, A.O.Ensuring optimal productivity in the workplace is a major concern for employers of labour; hence the proposition of clocking solutions for employees in a bid to track their presence and punctuality at their duty posts. However, the peculiarity of the academic environment makes general methods of clocking unsuitable for lecturers. This paper presents design and implementation of a GPS-based clocking solution for academic personnel using a web Appand an Android client. The web App; written in NodeJS and hosted on Heroku, in conjunction with the database (Mongo DB), registers and holds the schedule details of the lecturers. The android client which is installed on lecturers’ mobiles, works in synergy with the web App to accomplish clocking. This concept is reliant on GPS, thus, the lecturers’ mobiles require a clear view of the sky for successful clocking. The aspect of security can be improved upon with a few tweaks in the applications’ program codes. In all, the system utilizes existing and readily available resources to achieve clocking of academic personnel.Item ENHANCED WCDMA POWER CONTROL MECHANISM USING KALMAN FILTERING AND LINEAR QUADRATIC GAUSSIAN APPROACH(ABACUS, 2016-09) Ayeni, A.A.; Onidare, S.O.; Babatola, A.; Adeniran, T.C.A good power control algorithm is very essential in a Wideband Code Division Multiple Access (WCDMA) system. This is to prevent Near - Far effect or Multi - Access Interference (MAI) and its associated effects, which include degradation of channel capacity and signal quality, as well as significant drain of the user equipment (UE) battery power. To solve these problems, there is the need for an effective and efficient power control mechanism to compensate for the fading fluctuations in the transmit power level of the mobile stations (MS) such that the signal power from multiple UE's (Near or far) is made equal at the Base Station. The conventional power control algorithm, based on SIR, may lead to positive feedback or power escalation when the far away MS increases its transmit power to compensate for the interference from the near MS. This paper proposes a method, based on predicting the state of the transmission channels to develop an improved power control mechanism in WCDMA systems. The proposed method uses Kalman filtering and Linear Quadratic Gaussian (LQG) control for channel prediction. Some conventional methods of power control in WCDMA such as Fixed Step size method, Quantized Step size method and Ideal Method are examined. The proposed method is then compared with the conventional methods using MATLAB. Analysis of the simulations show that the proposed method recovers faster from deep fades and provides a more steady performance than the conventional methods.Item Experimental Determination of Path Loss Exponent For GSM 900 and 1800 Bands in Ilorin Metropolis(ABACUS, 2016-09) Ayeni, A.A; Onidare, S.O.; Quadri, A.R.; Adeniran, T.C.The path loss exponent of an environment describes the propagation behaviour of the environment. This paper determines the path loss exponent of the GSM 900 MHz and 1800 MHz bands in Ilorin, Kwara state of Nigeria. A comprehensive signal strength measurement campaign, using an Agilent spectrum analyzer, was carried out in 12 different routes representing, virtually, the entire metropolis of Ilorin. In computing the path loss exponent, a different approach from the more frequently used linear regression approach, was used. The experimental data reveal a lot of findings, chief amongst which is the strong influence of the terrain profile on the path loss of the environment. Consequently, the path loss exponent obtained, especially for the GSM 900, is lower than the expected value as reported in the literatures.Item Performance Analysis of Empirical Propagation Models for Fixed Wireless Application(International Journal of Information Processing and Communication, 2018) Adebowale, Q.R.; Adeniran, T.C.; Sowande, O.A.; Imam-Fulani, Y.O.; Onidare, S.O.; Sikiru, I.A.In this study, an efficacy assessment was carried out on 5 most widely used empirical propagation models by using MATLAB simulator to compare these models for FWA in both urban and suburban environment. Simulations were carried out at two different frequencies of 2.5 GHz and 3.5 GHz with a transmitter height of 30 m and varying distance from 250 m to 10 km. Three different receiver antenna heights of 3 m, 6 m, & 10 m were considered. The results indicated that, Ericsson model has the least prediction of 145 dB to 147 dB at 10 m and 6 m receivers’ antenna height respectively, operating on 2.5 GHz frequency in urban environment. Apparently, COST 231 Hata indicated the highest predicted path loss at 10 m and 6 m with predictions of 160 dB and 162 dB respectively in urban environment while the SUI model revealed the least variation of propagation loss of 136 dB to 138 dB. Similarly, the study revealed that Ericsson model has the lowest predicted path loss (150 dB to 153 dB) in an urban environment at 3.5 GHz. The study concluded that no specific model predicted the least path loss for both urban and suburban environment with the varying receiver antenna heights.