Secured Data Transmission using Metadata Logger Manipulation Approach

Supriadi, Agusma Wajiansyah, H. Purwadi, R. Malani, Arda Yunianta, A. Pratomo
{"title":"Secured Data Transmission using Metadata Logger Manipulation Approach","authors":"Supriadi, Agusma Wajiansyah, H. Purwadi, R. Malani, Arda Yunianta, A. Pratomo","doi":"10.1109/EIConCIT.2018.8878601","DOIUrl":null,"url":null,"abstract":"The telemetry is an automatic communication process where measurements and other data are collected at a remote point or cannot be accessed (called as a remote station) and transmitted to the receiving equipment (called as host station). This system is a data acquisition system in a large enough area which usually equipped with data loggers in the form of an electronic device that records data over time. Even most data loggers equipped with digital processors or computers. Various environmental conditions can affect the telemetry system, especially in the process of transmitting data from remote stations to the host. In this case, data security during transmission becomes very important. In this study, the discussion focused on how to build data packages in such a way that the data packet is not easy to recognize during the transmission process. The concept of the metadata manipulation approach is used to change the arrangement of the data package based on its address index through the transformation of three-dimensional cube-shaped data to become a metadata log. Data stored in the data logger converted into a three-dimensional data structure in the form of several cube-shapes based on its address index. In a certain way, all cube-shaped data transformed into a metadata log and stored in the metadata logger. This metadata log then transmitted to the host station to be converted back into a data log and stored into the host’s data logger. The results of this study showed that the generated metadata log log has very different content compared to data log. Similarly, the size of their data bytes. The main key to this concept is how to choose a 3-D form representation of data according to data availability and how to change its orientation during the process of forming metadata logs.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIConCIT.2018.8878601","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The telemetry is an automatic communication process where measurements and other data are collected at a remote point or cannot be accessed (called as a remote station) and transmitted to the receiving equipment (called as host station). This system is a data acquisition system in a large enough area which usually equipped with data loggers in the form of an electronic device that records data over time. Even most data loggers equipped with digital processors or computers. Various environmental conditions can affect the telemetry system, especially in the process of transmitting data from remote stations to the host. In this case, data security during transmission becomes very important. In this study, the discussion focused on how to build data packages in such a way that the data packet is not easy to recognize during the transmission process. The concept of the metadata manipulation approach is used to change the arrangement of the data package based on its address index through the transformation of three-dimensional cube-shaped data to become a metadata log. Data stored in the data logger converted into a three-dimensional data structure in the form of several cube-shapes based on its address index. In a certain way, all cube-shaped data transformed into a metadata log and stored in the metadata logger. This metadata log then transmitted to the host station to be converted back into a data log and stored into the host’s data logger. The results of this study showed that the generated metadata log log has very different content compared to data log. Similarly, the size of their data bytes. The main key to this concept is how to choose a 3-D form representation of data according to data availability and how to change its orientation during the process of forming metadata logs.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用元数据记录器操作方法的安全数据传输
遥测是一种自动通信过程,其中测量和其他数据在远程点收集或无法访问(称为远程站)并传输到接收设备(称为主机站)。该系统是一个数据采集系统,在一个足够大的区域,通常配备数据记录仪的形式的电子设备,记录数据随时间的变化。甚至大多数配备数字处理器或计算机的数据记录器。各种环境条件都会影响遥测系统,特别是在将数据从远程站点传输到主机的过程中。在这种情况下,传输过程中的数据安全变得非常重要。在本研究中,重点讨论了如何构建数据包,使数据包在传输过程中不易被识别。元数据操作方法的概念是通过将三维立方体数据转换为元数据日志,根据数据包的地址索引改变数据包的排列。存储在数据记录仪中的数据根据其地址索引转换成若干立方形状的三维数据结构。以某种方式,将所有立方体数据转换为元数据日志并存储在元数据日志记录器中。然后将元数据日志传输到主机站,再转换回数据日志并存储到主机的数据记录器中。研究结果表明,生成的元数据日志与数据日志的内容差异很大。同样,它们的数据字节的大小。这个概念的关键是如何根据数据可用性选择数据的3-D形式表示,以及如何在形成元数据日志的过程中改变其方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Experimental Study on Zoning, Histogram, and Structural Methods to Classify Sundanese Characters from Handwriting Medicine Stock Forecasting Using Least Square Method Sentiment Analysis of Product Reviews using Naive Bayes Algorithm: A Case Study [EIConCIT 2018 Cover Page] Keynote Speech 3 Internet of Things (IoT) Technology For Star Fruit Plantation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1