Security is a major concern of the internet world because the development of the Internet requires the security of data transmission. The security method helps us to store valuable information and send it over an insecure network so that it can not be read by anyone except the intended recipient. Security algorithm uses data randomization method. This method of data information randomization has a low computation time with a large number of bits when compared to other encryption algorithms. In general, the encryption algorithm is used to encrypt data information, but in this research the encryption algorithm is used for synchronization between the sender and the intended recipient. Number of bits on asymmetric key algorithm for synchronization are the 64-bits, 512-bits and 1024-bits. We will prove that security methods can secure data sent with low computational time with large number of bits. In the result will be shown the value of computing time with variable number of bits sent. When data are sent by 50 bytes, encryption time required 2 ms using 1024 bits for synchronization technique asymmetric key algorithm.Â
In wireless communication, the transmitted information data is often intercepted by eavesdropper through fading channels. Since the signal is transmitted by the transmitter through a wireless channel, it is not only the authorized receiver but also the attacker or the eavesdropper can easily capture and store the information signal. This research examines the security methods in wireless communication, where the security method used is subcarrier randomization. In the receiver, the subcarrier position must be restored to its original position. To restore the subcarrier position to its original position there needs to be a synchronization between transmitter and receiver. We use RSA algorithm as synchronization between transmitter and receiver. Subcarrier randomization security method is implemented on Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) system. We perform QoS measurements including delay, throughput and packet loss on MIMO-OFDM systems using security and MIMO-OFDM systems without security. From the results obtained, we can prove that the proposed security method does not degrade the performance of the MIMO-OFDM system. MIMO-OFDM system with security can result in smaller packet loss than the MIMO-OFDM system without security. MIMO-OFDM system with security has the average packet loss 0.145%.
Abstrak Keamanan jaringan nirkabel merupakan salah satu hal terpenting dalam sistem komunikasi. Karena sinyal dikirim dari pengirim melalui saluran nirkabel, tidak hanya penerima yang sah, tetapi juga penyadap dapat menangkap dan menyimpan sinyal informasi dengan mudah. Penelitian ini mengeksplorasi skema keamanan komunikasi nirkabel dimana skema yang digunakan adalah pengacakan subcarrier. Pemancar dan penerima harus disinkronkan untuk mengembalikan subcarrier ke posisi semula. Sistem ini menggunakan algoritma RSA sebagai sinkronisasi. Teknologi keamanan pengacakan subcarrier diimplementasikan pada sistem OFDM. Sistem OFDM diimplementasikan menggunakan perangkat USRP. Hasil yang diperoleh dari penelitian ini membuktikan bahwa teknik keamanan yang digunakan tidak menurunkan kinerja sistem, bahkan dapat mengurangi jumlah kesalahan bit akibat teknik sinkronisasi. Dengan teknik sinkronisasi algoritma RSA, dari jarak pengujian 1 meter, 2 meter, dan 5 meter. Pada jarak 1 meter didapatkan hasil terbaik dengan penurunan error bit dari 19,04% menjadi 0% pada 32-QAM dan penurunan error bit dari 28,57% menjadi 4,76% pada 64-QAM Abstract Wireless network security is one of the essential things in communication systems. Since the signal is sent from the sender through a wireless channel, the legitimate receiver and eavesdropper can easily capture and store signal information. This study explores a wireless communication security scheme where the scheme used is subcarrier randomization. The transmitter and receiver must be synchronized to return the subcarrier to its original position. This system uses the RSA algorithm as synchronization. Subcarrier randomization security is implemented in OFDM system. OFDM system is implemented using USRP. The results from this study prove that security techniques don't reduce system performance, and can even reduce the number of errors due to synchronization techniques with RSA synchronization technique, with 1meter, 2meters, and 5meters experiments. At 1meter distance is the best result with bit error drop from 19.04% to 0% on 32-QAM and a bit error drop from 28.57% to 4.76% on 64-QAM.
The volume of traffic in one day is referred to as the average daily traffic volume. The Average Daily Traffic System (LHR) is also used to detect road damage caused by excessive vehicle loads. In the LHR system, vehicle data is still collected manually, with humans calculating the type and number of vehicles based on observations made and then divided into a time span. As a result, a system with a camera and deep learning data processing is required to automatically calculate the type and number of vehicles. The goal of this research is to develop edge computing systems by improving the system's performance in the calculation and classification of vehicles using the SSD MobileNet V2 model. The results of the MobileNet model scenario 5 have the lowest loss value of the five scenarios. The MobileNet V2 model can better classify vehicle types with a 65 FPS inference process.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.