Optimized Data Transmission Protocol and Bulk Data ...

5 downloads 15547 Views 708KB Size Report
When it is necessary to send data from remote devices to a centralized web server the main method is to carry data manually. This is inefficient and data can be ...
International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 4 Issue 05, May-2015

Optimized Data Transmission Protocol and Bulk Data Analyzation based on Mapping for Low Memory Devices Sandamali G.G.N. #1, Sudheera K.L.K. #2, Sandaruwan W.N.D.C. #3, Dr. N.D. Jayasundere#4 #

Department of Electrical and Information Engineering Faculty of Engineering, University of Ruhuna Galle Sri Lanka

Abstract— Secure Transmission of data from remote electronic devices to centralized web servers with the least amount of resources and handling big Data is a complex process. The integrity of data is questionable when transmitted through public transmission channels due to external attacks. Transmission of RAW data is also difficult at the client side to handle big Data. To minimize these issues related to data transmission, we introduce an optimized data transmission protocol through GPRS (General Packet Radio Service) for low memory electronic devices and a data pre-processing algorithm for location data based custom map areas at the server side.

Keywords— Big Data, Data mining, Data Security, Google Map, GPRS, Wireless Sensor Network

I. INTRODUCTION When it is necessary to send data from remote devices to a centralized web server the main method is to carry data manually. This is inefficient and data can be tampered during the data carry process. Further, this process takes more time to send data since it uses man power. A more efficient method is to transmit data using GSM (Global System for Mobile Communication) technology as messages to the web server. However, this requires a SMS (Short Message Service) gateway service to map SMS data into web data. This process is very costly since it requires paying a monthly subscription fee to the SMS gateway service. Another method is to send data directly to the web server through the internet using GPRS[1] (General Packet Radio Service) technology. When a remote device ends its data collection the data can be uploaded to the web server manually. In this paper we propose a method that can upload this data automatically without any human interaction.

IJERTV4IS050511

II. BACKGROUND AND PROBLEM STATEMENT The system needs to transmit data from a remote device to a centralized web server. The system needs to be cost effective and should transmit data in the least amount of time i.e. when the remote device arrives at its destination, it should pass data to the web server within a few minutes. Since the transmitting devices usually consists of small memory (eg: 2KB in Arduino Uno), the transmission protocol needs to use low amounts of memory. Data should also be protected so that there is no intermediate interaction during transmission. To accomplish this we propose a protocol that optimizes the data transmission process which is particularly suitable for low resource remote electronic devices. If the transmitted RAW data is stored in a data base as it is transmitted, the data base can fill up with a lot of unprocessed data (Big Data). Thus, when a client needs the data analyzed, it will take lot of time for the system as it has to process all the data. Therefore data mining concepts are applied to handle the big data. In this paper we also propose a data mining concept for analysis related to custom data mapping. III. PROPOSED SOLUTION / ANALYSIS Our approach is to set up an optimized protocol by applying CIA (Confidentiality, Integrity, Availability) concept and authentication for the protection of data from external attacks. The suggested protocol uses low memory (less than 1KB of RAM ), so that it can be used even with an Arduino Uno microcontroller. When a remote device starts to send data to a web server first it need to authenticate the remote device. The device waits until an acknowledgment signal is received from the web server. After the remote device gets the authentication acknowledgement signal from the web server it starts data transmission. This is required for integrity of the data to br

www.ijert.org (This work is licensed under a Creative Commons Attribution 4.0 International License.)

376

International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 4 Issue 05, May-2015

protected during the data sending process. In order to avoid tampering or unauthorized access to data from external parties, we also utilize confidentiality protection by encrypting the data. These three concepts have been implemented in this protocol as shown in the block diagram in Fig. 1. We will use a vessel tracking system (VTS) data transmission process as an example to illustrate the protocol.

valid vessel number. If it exists then the web server will start to check the integrity of the message. It will generate the hash number for the decrypted vessel number (VTS001) and compare it with the hash number received from the message as shown in the Fig. 3. If they are the same then the data is not tampered. This ensures the integrity of the data. This process is handled by the Auth.java Servlet at the web server. After successful authentication of the vessel, web server will send the acknowledgment to the remote device using ‗PrintWriter‘ class as ‗ACKAUTHVTS001‘. If the two hashes are not the same then the web server will not send an acknowledgment message as ‗ACKERRORVTS001‘. The acknowledgment messages also will be encrypted using DES encryption algorithm. After the remote device sends the message it will start a timer and if it expires without the acknowledgment, then the remote device will send the initialization message again. The remote device will try this three times and if all three are not successful, it recognizes that there is an issue at the server side and it stops the transmission.

Fig. 1. Simplified block diagram of the suggested data transmission protocol

Fig. 2. Internal architecture of the transmitted message Fig. 3. Integrity checking of block diagram

First the remote device will send its initialization message with vessel number ‗VNo = VTS001‘ as in Fig. 2. This HMAC is the hash number generated from the vessel number (VTS001). MD-5 hashing algorithm[2] is used to generate the hash number. The message is the encrypted version of the vessel number. For encryption we use DES, since it uses a 64Byte key, the RAM usage will be very much less compared to other encryption systems and the security is also relatively served. Triple DES can also be utilized since the key size is only 128 Byte. As the encryption scheme depends on the memory available on the remote device, we suggest DES [3] for very low memory available systems (

Suggest Documents