Feham Mohammed


2 Half Mode Substrate Integrated Wave Guide of Band Pass Filter Based to Defected Ground Structure Cells

Authors: Damou Mehdi, Feham Mohammed, Nouri Keltoum, Khazini Mohammed, Bouazza Tayb Habibi Chawki


The Half mode SIW filter is treated by two softwares (HFSS (High Frequency Structure Simulator) and CST (Computer Simulation Technology)). The filter HMSIW has a very simple structure and a very compact size. The simulated results by CST are presented and compared with the results simulated by a high-frequency structure simulator. Good agreement between the simulated CST and simulated results by HFSS is observed. By cascading two of them according to design requirement, a X-band bandpass filter is designed and simulated to meet compact size, low insertion loss, good return loss as well as second harmonic suppression. As an example, we designed the proposed HMSIW filter at X band by HFSS. The filter has a pass-band from 7.3 GHz to 9.8 GHz, and its relative operating fraction bandwidth is 29.5 %. There are one transmission zeros are located at 14.4 GHz.

Keywords: filter, substrate integrated waveguide, HMSIW, defected ground structures (DGS), simulation BPF

Procedia PDF Downloads 229
1 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed


Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: Wireless Sensor Networks, Homomorphic Encryption, Elliptic Curve Cryptography, secure data aggregation

Procedia PDF Downloads 161