Boyce Sigweni
Botswana International University of Science and Technology

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Systematic literature survey: applications of LoRa communication Lone Godfrey Future Kolobe; Caspar K. Lebekwe; Boyce Sigweni
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 3: June 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (170.683 KB) | DOI: 10.11591/ijece.v10i3.pp3176-3183

Abstract

LoRa is a communication scheme that is part of the low power wide are network (LPWAN) technology using ISM bands. It has seen extensive documentation and use in research and industry due to its long coverage ranges of up-to 20Km or more with less than 14dB transmit power. Moreover, some applications report theoretical battery lives of upto 10years for field deployed modules utilising the scheme in WSN applications. Additionally, the scheme is very resilient to losses from noise, as well bursts of interference through its FEC. Our objective is to systematically review the empirical evidence of the use-cases of LoRa in rural landscapes, metrics and the relevant validation schemes. In addition the research is evaluated based on (i) mathematical function of the scheme (bandwidth use, spreading factor, symbol rate, chip rate and nominal bit rate) (ii) use-cases (iii) test-beds, metrics of evaluation and (iv) validation methods. A systematic literature review of published, refereed primary studies on LoRa applications was conducted. Using articles from 2010-2019. We identified 21 relevant primary studies. These reported a range of different assessments of LoRa. 10 out of 21 reported on novel use cases. As an actionable conclusion, the authors conclude that more work is needed in terms of field testing, as no articles could be found on performance/deployment in Botswana or South Africa despite the existence of LoRa networks in both countries. Thus researchers in the region can research propagation models performance, energy efficiency of the scheme and MAC layer as well as the channel access challenges for the region.
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power Line Communication Boyce Sigweni; Mmoloki Mangwala; Joseph Chuma
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (608.177 KB) | DOI: 10.11591/ijece.v9i4.pp2281-2295

Abstract

This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authentica- tion to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last mile network, deliver load management messages to smart meters. However, there is need to address the security concerns for load management messages delivered over power line communications. The ubiquitous nature of the power line communication infrastructure exposes load management systems (LMS) deployed over it to a security risk. Ordinarily, PLC network does not em- ploy any security measures on which the smart meters and data concentrators can depend on. Therefore, the need to provide a secure mechanism for communication of load man- agement system messages over a PLC network. In LMS, source authentication is of highest priority because we need to respond only to messages from an authenticated source. This is achieved by investigating suitable robust authentication protocols. In this paper we present modifications to Timed Efficient Stream Loss-tolerant Authentication for secure authentica- tion to secure messages for load management over PLC. We demonstrate that PLC can be used to securely and effectively deliver Load Management messages to smart meters, with minimal overhead. 
Case-based reasoning system for prediction of fuel consumption by haulage trucks in open-pit mines Gomolemo Tadubana; Boyce Sigweni; Raymond Suglo
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 4: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i4.pp3129-3136

Abstract

The shovel-truck system is commonly used in open-pit mining operations. Truck haulage cost constitutes about 26% of open-pit mining costs as the trucks are mostly powered by diesel whose cost is escalating annually. Therefore, reducing fuel consumption could lead to a significant decrease in overall mining costs. Various methods have been proposed to improve fuel efficiency in open-pit mines. Case-based reasoning (CBR) can be used to estimate fuel consumption by haulage trucks. In this work, CBR methods namely case-based reasoning using forward sequential selection (CBR-FSS), traditional CBR, and Naïve techniques were used to predict fuel consumption by trucks operating at Orapa Mine. The results show that the CBR method can be used to predict fuel consumption by trucks in open-pit mines; the predicted values of fuel consumption using the CBR-FSS technique gave much lower absolute residual values, higher standardised accuracy values, and effect sizes than those of other prediction techniques on all the datasets used. The system will enable mine planners to know the fuel consumed per trip and allow them to take mitigation measures on trucks with high fuel consumption.
Authentication schemes in wireless internet of things sensor networks: a survey and comparison Pendukeni Phalaagae; Adamu Murtala Zungeru; Boyce Sigweni; Selvaraj Rajalakshmi
Indonesian Journal of Electrical Engineering and Computer Science Vol 33, No 3: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v33.i3.pp1876-1888

Abstract

The proliferation of wireless sensor networks (WSNs) fuels internet of things (IoT's) rapid global development, connecting diverse devices. IoT transforms devices into intelligent entities delivering exceptional services. This work addresses IoT authentication gaps through a comprehensive survey, analyzing recent works and exploring techniques in various applications. It includes a comparative analysis of authentication schemes, evaluating Bi-Phase authentication scheme (BAS) in WSNs. BAS outperforms sensor protocol for information via negotiation (SPIN), broadcast session key protocol (BROSK), and localized encryption and authentication protocol (LEAP), resulting in lower energy consumption and higher efficiency. With energy efficiency at 60 Kb/J for 25 nodes, BAS focuses on power optimization and lightweight security measures, reducing energy consumption, maximizing efficiency, and extending WSN lifespan. The evaluation, conducted using MATLAB/Simulink, demonstrates BAS's superiority, achieving 10 J, 12 J, 14 J, and 15 J energy consumption for 25 nodes during simulation, showcasing its effectiveness and future potential in advancing IoT authentication.