https://ausjournal.com/index.php/j/issue/feed Australian Journal of Wireless Technologies, Mobility and Security 2026-01-31T05:41:55+00:00 Dr Pritam Gajkumar Shah editor@ausjournal.com Open Journal Systems <p>The <em>Australian Journal of Wireless Technologies, Mobility and Security</em> is a peer-reviewed academic journal dedicated to advancing research and innovation in the rapidly evolving fields of wireless communication, mobile systems, and cybersecurity. The journal covers a wide array of topics including 5G and beyond, IoT networks, wireless security protocols, and emerging trends in mobile computing. It serves as a platform for scholars, researchers, and industry professionals to publish cutting-edge findings that contribute to both academic and practical advancements. The editorial team is led by <strong>Dr. Pritam Shah</strong>, Editor-in-Chief, and a diverse panel of associate editors and reviewers from leading international institutions, each bringing expertise across telecommunications, cyber security, and mobile network technologies.</p> <p><strong>Open Access Statement</strong></p> <p>This journal operates under an open access policy. All published articles are freely accessible to readers worldwide and may be used, shared, or adapted for non-commercial purposes, provided appropriate credit is given to the original authors.</p> https://ausjournal.com/index.php/j/article/view/65 ARP Poisoning and Man-in-the-Middle (MITM) Attacks 2026-01-22T00:11:01+00:00 Pritam Gajkumar Shah wsnpgs@gmail.com <p>Address Resolution Protocol (ARP) poisoning is a common network-based attack technique that enables Man-in-the-Middle (MITM) attacks within local area networks. By exploiting the stateless nature of ARP, an attacker can intercept, monitor, and potentially alter network information between communicating hosts. This paper provides an empirical overview of ARP poisoning and MITM attacks, discusses their impact on network security, illustrates observations using packet capture screenshots, and outlines practical prevention and mitigation strategies suitable for academic and enterprise environments</p> 2026-01-22T00:00:00+00:00 Copyright (c) 2026 Australian Journal of Wireless Technologies, Mobility and Security https://ausjournal.com/index.php/j/article/view/66 The Role of Innovation in Accelerating Australia’s IT Sector 2026-01-22T00:24:30+00:00 Jagdish Singh Jagadishsinghthakuri729@gmail.com <p>Australia’s information technology (IT) sector has expanded rapidly over the past decade, driven by a confluence of technological, economic, and policy catalysts. This paper examines how innovation—spanning digital infrastructure, cloud adoption, data‑driven services, artificial intelligence (AI), and cybersecurity—has acted as the principal accelerator of this growth. We synthesize sectoral trends and propose a simple innovation‑readiness framework linking capability, collaboration, and commercialization to outcomes such as productivity, export potential, and job creation. Using illustrative cases from fintech, health tech, and resources technology, we highlight mechanisms by which R&amp;D activity, open innovation with universities, and public incentives amplify private investment and firm performance. We also discuss constraints, including talent shortages and uneven diffusion to SMEs, and outline practical interventions for industry, government, and education providers. The paper concludes with actionable recommendations to sustain Australia’s IT momentum while ensuring inclusive and resilient growth</p> 2026-01-22T00:00:00+00:00 Copyright (c) 2026 Australian Journal of Wireless Technologies, Mobility and Security https://ausjournal.com/index.php/j/article/view/71 Bitcoin as a Decentralized Financial System: A Comprehensive Survey 2026-01-22T00:34:14+00:00 Rijan Lama rijan153lama@gmail.com <p>Bitcoin is the first decentralized cryptocurrency, introduced to enable peer-to-peer electronic transactions without reliance on central authorities. Since its inception, Bitcoin has evolved from a niche technological experiment into a globally recognized digital asset with significant economic, technical, and social implications. This survey provides a comprehensive overview of Bitcoin by examining its blockchain architecture, economic model, security mechanisms, adoption trends, and regulatory considerations. Prior research highlights Bitcoin’s role as both a technological innovation and an alternative monetary system (Nakamoto, 2008; Antonopoulos, 2017).</p> 2026-01-22T00:00:00+00:00 Copyright (c) 2026 Australian Journal of Wireless Technologies, Mobility and Security https://ausjournal.com/index.php/j/article/view/70 Precautionary Measures for the Use of Public Wi Fi 2026-01-22T00:33:27+00:00 Rishab Karki karkirishab47@gmail.com <p>Public Wi‑Fi networks in cafés, airports, and libraries lack robust security controls, exposing users to eavesdropping and data theft <strong>(National Institute of Standards and Technology, 2020)</strong>. Despite 66.5% expressing concern, 23.5% forgo protective measures, yet 43% check email and 20% make purchases on public Wi‑Fi <strong>(Panda Security, 2025; Zimperium, 2025).</strong></p> 2026-01-22T00:00:00+00:00 Copyright (c) 2026 Australian Journal of Wireless Technologies, Mobility and Security https://ausjournal.com/index.php/j/article/view/73 Quantum Physics: Fundamental Principles, Technologies, and Emerging Applications 2026-01-22T00:35:23+00:00 Rijash Bhandari mesinaldo052@gmal.com <p>Quantum physics emerged in the early twentieth century to explain phenomena unexplained by classical mechanics. Key developments include the Schrödinger equation, the Heisenberg uncertainty principle, and quantum measurement theory. These principles form the basis of advanced technologies such as quantum computers, secure quantum communication systems, high-precision sensors, and novel quantum materials. Despite rapid progress, challenges such as decoherence, scalability, and error correction remain active areas of research.</p> 2026-01-22T00:00:00+00:00 Copyright (c) 2026 Australian Journal of Wireless Technologies, Mobility and Security https://ausjournal.com/index.php/j/article/view/74 Network Resilience 2026-01-22T00:50:29+00:00 Bhumika Poudel poudelbhumika77@gmail.com Bhumika Poudel poudelbhumika77@gmail.com <p>Network resilience refers to the ability of a communication network to maintain acceptable levels of service in the presence of faults, cyberattacks, natural disasters, or unexpected operational disruptions. As societies become increasingly dependent on digital connectivity, resilient network infrastructures are critical for economic stability, public safety, and organizational continuity. This paper explores the concept of network resilience, its core principles, and the technical and strategic mechanisms used to enhance resilience in modern communication systems. The discussion also justifies the importance of network resilience by examining the consequences of network failures and the growing threat landscape. The study concludes that resilience is not merely a technical requirement but a strategic necessity for sustainable digital transformation.</p> 2026-01-22T00:00:00+00:00 Copyright (c) 2026 Australian Journal of Wireless Technologies, Mobility and Security https://ausjournal.com/index.php/j/article/view/75 Edge computing 2026-01-22T00:50:44+00:00 Apekshya Bishwakarma apekshyashasankar@gmail.com <p>Edge computing has emerged as a critical computing paradigm that addresses the limitations of centralized cloud computing, particularly for latency-sensitive and data-intensive applications. By enabling data processing closer to the source, edge computing reduces network latency, minimizes bandwidth consumption, and improves privacy and system reliability. This literature review explores the concept of edge computing, its architectural characteristics, applications, benefits, and challenges. By synthesizing prior studies, the review highlights current research trends and identifies gaps that justify further investigation into edge computing technologies (Bonomi et al., 2014; Satyanarayanan, 2017; Shi et al., 2016).</p> <p><em>Keywords: </em>Edge computing, cloud computing, Internet of Things (IoT), latency, distributed systems, fog computing</p> 2026-01-22T00:00:00+00:00 Copyright (c) 2026 Australian Journal of Wireless Technologies, Mobility and Security https://ausjournal.com/index.php/j/article/view/76 Network Architecture in an AI‑Driven Australia 2026-01-22T00:50:49+00:00 Safal Adhikari adhikarisafal89@gmail.com <p>Network architecture is the quietly decisive layer that allows Australia’s public services, universities and businesses to deploy artificial intelligence (AI) safely and at scale. As AI moves from pilots to production, networks must evolve from best‑effort connectivity to assured experience: low‑latency fabrics for training and inference, pervasive telemetry to power closed‑loop operations, and policy‑driven automation to maintain security and resilience. Australian strategies—spanning national cyber uplift, trustworthy AI assurance and digital‑government delivery—set clear expectations for secure, observable and automated architectures (Department of Home Affairs, 2023; Department of Finance, 2024; Digital Transformation Agency, 2025). Open standards and industry guidance (e.g., IETF telemetry and ETSI zero‑touch) offer practical blueprints for operators (IETF, 2022; ETSI, n.d.). This paper summarises why network architecture matters in an AI era, the architectural priorities that consistently succeed, and a compact career roadmap for Bachelor’s/Master’s graduates in Australia.</p> 2026-01-22T00:00:00+00:00 Copyright (c) 2026 Australian Journal of Wireless Technologies, Mobility and Security https://ausjournal.com/index.php/j/article/view/53 Blockchain-Enabled Intrusion Detection in 5G-Driven IoT Networks: A Decentralized Approach to Threat Mitigation 2025-05-10T04:35:08+00:00 Purnendu Ghoshal purnendughoshal2016@gmail.com <p>The rapid evolution of 5G technology, coupled with the proliferation of Internet of Things (IoT) devices, has transformed global digital infrastructure, enabling low-latency, high-throughput communication across diverse domains. However, this expanded attack surface introduces significant cybersecurity risks, making conventional centralized Intrusion Detection Systems (IDS) inadequate in addressing threats such as spoofing, data manipulation, and distributed denial-of-service (DDoS) attacks. This paper explores the integration of blockchain technology with IDS to develop a decentralized, tamper-proof framework for intrusion detection in 5G-enabled IoT networks. Leveraging blockchain’s characteristics—immutability, transparency, and distributed consensus—we examine how threat data can be securely shared across nodes, ensuring faster detection, resilience, and trust among devices. The study surveys existing models, identifies challenges such as resource overhead and scalability, and proposes an optimized architecture that balances detection accuracy with operational efficiency. Results demonstrate that blockchain-enabled IDS can significantly enhance network integrity and response agility, offering a promising direction for next-generation IoT cybersecurity systems.</p> 2026-01-23T00:00:00+00:00 Copyright (c) 2026 Australian Journal of Wireless Technologies, Mobility and Security https://ausjournal.com/index.php/j/article/view/83 AI-Driven Therapeutic Evolution of Statins: From Natural Origins to Best-in-Class Synthetic Derivatives 2026-01-31T05:41:55+00:00 Megha DESAI meghs2nims@yahoo.com <p>Statins represent a cornerstone in cardiovascular pharmacotherapy due to their proven efficacy in reducing low-density lipoprotein cholesterol (LDL-C) and mitigating atherosclerotic cardiovascular disease (ASCVD) risk. This paper reinterprets the therapeutic evolution of statins through an AI-driven lens, highlighting how data analytics, molecular modeling, and predictive pharmacology enhance understanding of statin development from natural fungal metabolites to high-potency synthetic derivatives. Artificial intelligence enables comparative evaluation of pharmacokinetics, safety profiles, and clinical outcomes, supporting precision medicine and optimized statin selection. This systematic synthesis integrates historical evidence with modern AI-informed insights to advance lipid management strategies.</p> 2026-01-31T00:00:00+00:00 Copyright (c) 2026 Australian Journal of Wireless Technologies, Mobility and Security