Highly Information and Energy-efficient Monitoring Data Transmission in IoT Networks
DOI:
https://doi.org/10.13052/jmm1550-4646.1741Keywords:
Packet data transmission, information efficiency, packet transmission, energy efficiency of data transmission, data compression-protection operational algorithms, secure information packets with increased information capacity, managed pseudo-random data transmissionAbstract
The components of technologies of increasing information and energy efficiency of IoT monitoring networks subscriber systems with protected transfer functioning of reliable packets of information with the increased information capacity are described. In the places of formation of network flows, i.e. in the places of installation of object and on-board systems the realization of a complex of adaptive filtering algorithms, compression and protection of samples of monitoring signals and video data frames with the subsequent adaptive formation and transmission of highly informative code-signal sequences is offered. It is proposed a signal approach as a basis for inputting and compact coding of signals and video data frames of the reliable samples. The signal approach is proposed, according to which the amplitude-time or amplitude-number parameters of the most informative samples of signals and video signals are determined in the rate of input of monitoring data. These are extremes and points of inflection or points of curve movement change. The obtained data are subject to data compression with controlled information loss and lossless compression-protection. According to the proposed information technology for building effective IoT networks for crypto protection of monitoring data arrays by processors of object and on-board systems, the use of disposable ciphers is proposed, which are the rules and parameters for generating crypto-resistant pseudo-random data arrays of a certain length. These rules and parameters are known only to the subscriber-transmitter and the subscriber-receiver of information packets and are used by network subscribers in the process of data compression with losses and without losses, in the process of crypto-resistant and noise-resistant information packets forming of limited duration with increased information capacity. Energy-efficient data packet transmission is based on a significant reduction in the output streams of protected highly informative monitoring data packets and the implementation by object and on-board systems processors a set of algorithms for processing, encoding, encrypting and transmitting data minimized by computational complexity.
Downloads
References
Gartner: The Internet of Things, Report, accessed on 17 November 2015 from http://www.gartner.com/technology/research/internet-of-things
M. Chiang and T. Zhang, ‘Fog and IoT: An Overview of Research Opportunities’, in IEEE Internet of Things Journal, vol. 3, no. 6, Dec. 2016, pp. 854–864.
S. A. Hinai, A. V. Singh. ‘Internet of things: Architecture, security challenges and solutions’. 2017 International Conference on Infocom Technologies and Unmanned Systems (Trendsand Future Directions) (ICTUS), Dubai, 2017, pp. 1-4.
Z.-K. Zhang, M. C. Y. Cho, and S. Shieh, ‘Emerging Security Threats and Countermeasures in IoT’, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security – ASIA CCS ’15, 2015, pp. 1–6.
W. Dargie W., C. Poellabauer. Fundamentals of wireless sensor networks: theory and practice. John Wiley and Sons, 2010. 330 p.
Z. Shelby, C. Bormann. 6LoWPAN: The Wireless Embedded Internet. WILEY, 2009. 223 p.
www.ti.com
www.st.com
www.nxp.com
www.simcom.com
www.teltonika-networks.com
B. Sklyar. Digital Communication. Theoretical Foundations and Practical Application, 2nd ed.: Moscow: Williams Publishing House, 2003. 1104 p.
Eileen Kuehu, Matthias Prelwitz, Maurus Rohrer, Juergen Sieck, ‘Distributed middleware for applications of the internet of things’, Proc.7-th IEEE Int. Conf. Intel. Data Acquisition and Advanced Comp. Syst.: Techn. and Applicat., IDAACS’2013, Berlin,Germany, September 12–14, 2013, pp. 517–520.
Chen Yang, Weiming Shen, and Xianbin Wang, ‘The internet of things in manufactoring. key issues and potentional applications’, IEEE Trans. Syst. Man Cybern., pp. 6–15, Jan. 2018.
S. K. Sharma and X. Wang, ‘Live Data Analytics With Collaborative Edge and Cloud Processing in Wireless IoT Networks’, in IEEE Access, vol. 5, pp. 4621–4635, 2017.
M. Singh, A. Singh and S. Kim, ‘Blockchain: A game changer for securing IoT data’, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 2018, pp. 51–55. doi: 10.1109/WF-IoT.2018.8355182
M. Ermes, J. Parkka, J. Mantyjarvi, and I. Korhonen, ‘Detection of daily activities and sports with wearable sensors in controlled and uncontrolled conditions’, IEEE Trans. Inf. Technol. Biomed., vol. 12, no. 1, pp. 20–26, 2008.
T. Shah and S. Venkatesan, ‘Authentication of IoT Device and IoT Server Using Secure Vaults’, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, 2018, pp. 819–824. doi: 10.1109/TrustCom/BigDataSE.2018.00117.
B.M. Shevchuk. ‘Theoretical and Algorithmic Foundations of Improving the Efficiency of Packet Data Transmission in High-Speed and Secure Radio Networks’. Cybernetics and Systems Analysis. 2016, January, Vol. 52, Issue 1. pp. 151–159.
B.M. Shevchuk, V.K. Zadiraka, S.V. Fraier. ‘Data transfer optimization in the information efficient sensory, local-regional and microsatellite wireless networks’, in Optimization Methods and Applications. In Honor of Ivan V.Sergienko’s 80th Birthday, Butenko S., Pardalos P.M., ShyloV., (Eds.), Springer, 2017. pp. 465–480.
Dikshita Sarma, Manash Pratim Sarma, Kandarpa Kumar Sarma and Nikos E. Mastorakis. ‘Implementation of Galois Field for Application in Wireless Communication Channels’, MATEC Web of Conferences 210, 03012 (2018), https://doi.org/10.1051/matecconf/201821003012 CSCC 2018.