• Title/Summary/Keyword: Data transmission algorithm

Search Result 1,122, Processing Time 0.028 seconds

A ROI Image Encryption Algorithm Based on Cellular Automata in Real-Time Data Transmission Environment (실시간 데이터 전송 환경에서의 셀룰러 오토마타 기반의 ROI 이미지 암호 알고리즘)

  • Un-Sook Choi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1117-1124
    • /
    • 2023
  • The security of information, including image content, is an essential part of today's communications technology and is critical to secure transmission. In this paper, a new ROI-based image encryption algorithm is proposed that can quickly encrypt images with a security level suitable for environments that require real-time data transmission for images containing sensitive information such as ID cards. The proposed algorithm is based on one dimensional 5-neighbor cellular automata, which can be implemented in hardware and performed hardware-friendly operations. Various experiments and analyses are performed to verify whether the proposed encryption algorithm is safe from various brute-force attacks.

A Study on CSMA/CA for IEEE 802.11 WLAN Environment

  • Moon Il-Young;Cho Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.2
    • /
    • pp.71-74
    • /
    • 2006
  • A basic access method about IEEE 802.11 MAC layer protocol using IEEE 802.11 wireless LANs is the DCF thatis based on the CSMA/CA. But, cause of IEEE 802.11 MAC layer uses original backoff algorithm (exponential backoff method), when collision occurred, the size of contention windows increases the double size Also, a time of packet transmission delay increases and efficienty is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs a proposed enhanced backoff algorithm. It is considered the transmission time of transmission control protocol (TCP) packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (A WGN) and Rician fading channel. From the results, a proposed enhanced backoff algorithm produces a better performance improvement than an original backoff in wireless LAN environment. Also, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between packet size and the transmission time, allowing for an inference of the optimal packet size in the TCP layer.

A Study on CSMA/CA for WLAN Environment

  • Moon Il-Young;Cho Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.530-533
    • /
    • 2006
  • Recently, a basic access method about IEEE 802.11 MAC layer protocol using IEEE 802.11 wireless LANs is the DCF thatis based on the CSMA/CA. But, cause of IEEE 802.11 MAC layer uses original backoff algorithm (exponential backoff method), when collision occurred, the size of contention windows increases the double size. Also, a time of packet transmission delay increases and efficiency is decreased by original backoff scheme. In this paper, we have analyzed TCP packet transmission time of IEEE 802.11 MAC DCF protocol for wireless LANs a proposed enhanced backoff algorithm. It is considered the transmission time of transmission control protocol (TCP) packet on the orthogonal frequency division multiplexing (OFDM) in additive white gaussian noise (AWGN) and Rician fading channel. From the results, a proposed enhanced backoff algorithm produces a better performance improvement than an original backoff in wireless LAN environment. Also, in OFDM/quadrature phase shift keying channel (QPSK), we can achieve that the transmission time in wireless channel decreases as the TCP packet size increases and based on the data collected, we can infer the correlation between packet size and the transmission time, allowing for an inference of the optimal packet size in the TCP layer.

  • PDF

An Energy Efficient Routing Protocol using Transmission Range and Direction for Sensor Networks (센서 네트워크에서 전송범위와 전송방향을 이용한 에너지 효율적인 라우팅 프로토콜)

  • Lee, Hyun-Jun;Lee, Young-Han;Lee, Kyung-Oh
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.81-88
    • /
    • 2010
  • Sensors in sensor networks are operated by their embedded batteries and they can not work any more if the batteries run out. The data collected by sensors should be transferred to a sink node through the efficient routes. Many energy efficient routing algorithms were proposed. However, the previous algorithms consume more energy since they did not consider the transmission range and direction. In this paper we propose an algorithm TDRP(Transmission range and Direction Routing Protocol) that considers the transmission range and direction for the efficient data transmission. Since TDRP does not produce clusters or grids but four quadrants and send data to the nodes in one quadrant in the direction of the sink node, it has less network overhead. Furthermore since the proposed algorithm sends data to the smaller number of nodes compared to the previous algorithms, the energy efficiency is better than other algorithms in communication node fields that are located in packet transmit directions.

Energy Efficient Transmit and Receive Strategy for Green Communications

  • Oh, Changyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.4
    • /
    • pp.25-30
    • /
    • 2016
  • We consider energy efficient transmit and receive strategy for a delay sensitive data. More specifically, we investigate an energy optimum scheduling characteristics for the 2 user interference channel where each user interferes to each other. First, we determine the optimum transmission rate region each individual user may have for optimum transmission. Next, we consider the optimum transmission region of two users together. Shortest path algorithm can be used for further reduction of search space. Eventually, we can reduce computational complexity. We then examine the performance of the optimum transmission strategy for various system environments.

Applying a sensor energy supply communication scheme to big data opportunistic networks

  • CHEN, Zhigang;WU, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2029-2046
    • /
    • 2016
  • Energy consumption is an important index in mobile ad hoc networks. Data packet transmission increases among nodes, particularly in big data communication. However, nodes may be unable to transmit data packets because of energy over-consumption. Consequently, information may be lost and network communication may block. While opportunistic network is a kind of mobile ad hoc networks, researchers do not focus on energy consumption in opportunistic network communication. This study proposed an effective sensor energy supply scheme that can be applied in opportunistic networks. This scheme considers nodes sensor requests and communication model. In this scheme, nodes do not only accomplish energy supply in communication, but also extend communication time in opportunistic networks. Compared with the Spray and Wait algorithm and the Binary Spray and Wait algorithm in simulations, the proposed scheme extends communication time, increases data packet transmission, and accomplishes energy supply among nodes.

Probability Inference Heuristic based Non-Periodic Transmission for the Wireless Sensor Network (무선센서네트워크를 위한 확률추론 휴리스틱기반 비주기적 전송)

  • Kim, Gang-Seok;Lee, Dong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.9
    • /
    • pp.1689-1695
    • /
    • 2008
  • The development of low-power wireless communication and low-cost multi-functional smart sensor has enabled the sensor network that can perceive the status information in remote distance. Sensor nodes are sending the collected data to the node in the base station through temporary communication path using the low-cost RF communication module. Sensor nodes get the energy supply from small batteries, however, they are installed in the locations that are not easy to replace batteries, in general, so it is necessary to minimize the average power consumption of the sensor nodes. It is known that the RF modules used for wireless communication are consuming 20-60% of the total power for sensor nodes. This study suggests the probability inference heuristic based non-periodic transmission to send the collected information to the base station node, when the calculated value by probability is bigger than an optional random value, adapting real-time to the variation characteristics of sensing datain order to improve the energy consumption used in the transmission of sensed data. In this transmission method suggested, transmitting is decided after evaluation of the data sensed by the probability inference heuristic algorithm and the directly sensed data, and the coefficient that is needed for its algorithm is decided through the reappearance rate of the algorithm verification data.

A Study on Digital Fault Locator for Transmission Line (송전선로용 디지털 고장점 표정장치에 관한 연구)

  • Lee, Kyung-Min;Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.64 no.4
    • /
    • pp.291-296
    • /
    • 2015
  • Transmission line is exposed to a large area, and then faults are likely to occur than the other component of power system. When a fault occurs on a transmission line, fault locator helps fast recovery of power supply on power system. This paper deals with the design of a digital fault locator for improvement accuracy of the fault distance estimation and a fault occurrence position for transmission line. The algorithm of a fault locator uses a DC offset removal filter and DFT filter. The algorithm utilizes a fault data of GPS time synchronized. The computed fault information is transmitted to the other side substation through communication. The digital fault locator includes MPU module, ADPU module, SIU module, and a power module. The MMI firmware and software of the fault locator was implemented.

Data Dissemination in Wireless Sensor Networks with Instantly Decodable Network Coding

  • Gou, Liang;Zhang, Gengxin;Bian, Dongming;Zhang, Wei;Xie, Zhidong
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.846-856
    • /
    • 2016
  • Wireless sensor networks (WSNs) are widely applied in monitoring and control of environment parameters. It is sometimes necessary to disseminate data through wireless links after they are deployed in order to adjust configuration parameters of sensors or distribute management commands and queries to sensors. Several approaches have been proposed recently for data dissemination in WSNs. However, none of these approaches achieves both high efficiency and low complexity simultaneously. To address this problem, cluster-tree based network architecture, which divides a WSN into hierarchies and clusters is proposed. Upon this architecture, data is delivered from base station to all sensors in clusters hierarchy by hierarchy. In each cluster, father broadcasts data to all his children with instantly decodable network coding (IDNC), and a novel scheme targeting to maximize total transmission gain (MTTG) is proposed. This scheme employs a new packet scheduling algorithm to select IDNC packets, which uses weight status feedback matrix (WSFM) directly. Analysis and simulation results indicate that the transmission efficiency approximate to the best existing approach maximum weight clique, but with much lower computational overhead. Hence, the energy efficiency achieves both in data transmission and processing.

A Study on Conditional Access System for Data Confidential using Smart-Card (스마트 카드를 이용한 자료 유출 제한 시스템에 대한 연구)

  • 김신홍;이광제
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.125-131
    • /
    • 2000
  • In this paper, we proposed conditional access algorithm for data confidential using smart card. This algorithm is constructed smart card and E-mail gateway for restricting of user's illegal confidential data transmission. After processing of certification procedure in smart card, each E-mail forwarded to E-mail gateway(EG). The EG selects outgoing E-mail and it is sent to fire-wall E-mail processing program, it is checked attached file in transmission mail and if it is attached file, it writes to database. This time, it can be used evidence data about user's illegal confidential data transmission, because of using registered content and smart card certification data in database. in addition to, we can get psychologically effect of prevention to send illegally, and this system can prevent spam mail in EG, also.

  • PDF