Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/1256
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tennekoon, R | - |
dc.contributor.author | Wijekoon, J | - |
dc.contributor.author | Harahap, E | - |
dc.contributor.author | Nishi, H | - |
dc.contributor.author | Saito, E | - |
dc.contributor.author | Katsura, S | - |
dc.date.accessioned | 2022-02-18T05:33:12Z | - |
dc.date.available | 2022-02-18T05:33:12Z | - |
dc.date.issued | 2014-03-14 | - |
dc.identifier.citation | R. Tennekoon, J. Wijekoon, E. Harahap, H. Nishi, E. Saito and S. Katsura, "Per hop data encryption protocol for transmission of motion control data over public networks," 2014 IEEE 13th International Workshop on Advanced Motion Control (AMC), 2014, pp. 128-133, doi: 10.1109/AMC.2014.6823269. | en_US |
dc.identifier.issn | 1943-6572 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/1256 | - |
dc.description.abstract | Bilateral controllers are widely used vital technology to perform remote operations and telesurgeries. The nature of the bilateral controller enables control objects, which are geographically far from the operation location. Therefore, the control data has to travel through public networks. As a result, to maintain the effectiveness and the consistency of applications such as teleoperations and telesurgeries, faster data delivery and data integrity are essential. The Service-oriented Router (SoR) was introduced to maintain the rich information on the Internet and to achieve maximum benefit from networks. In particular, the security, privacy and integrity of bilateral communication are not discoursed in spite of its significance brought by its underlying skill information or personal vital information. An SoR can analyze all packet or network stream transactions on its interfaces and store them in high throughput databases. In this paper, we introduce a hop-by-hop routing protocol which provides hop-by-hop data encryption using functions of the SoR. This infrastructure can provide security, privacy and integrity by using these functions. Furthermore, we present the implementations of proposed system in the ns-3 simulator and the test result shows that in a given scenario, the protocol only takes a processing delay of 46.32 μs for the encryption and decryption processes per a packet. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2014 IEEE 13th International Workshop on Advanced Motion Control (AMC);Pages 128-133 | - |
dc.subject | encryption protocol | en_US |
dc.subject | transmission | en_US |
dc.subject | motion control data | en_US |
dc.subject | public networks | en_US |
dc.subject | hop data encryption | en_US |
dc.title | Per hop data encryption protocol for transmission of motion control data over public networks | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/AMC.2014.6823269 | en_US |
Appears in Collections: | Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Per_hop_data_encryption_protocol_for_transmission_of_motion_control_data_over_public_networks.pdf Until 2050-12-31 | 898.09 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.