Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/1256
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTennekoon, R-
dc.contributor.authorWijekoon, J-
dc.contributor.authorHarahap, E-
dc.contributor.authorNishi, H-
dc.contributor.authorSaito, E-
dc.contributor.authorKatsura, S-
dc.date.accessioned2022-02-18T05:33:12Z-
dc.date.available2022-02-18T05:33:12Z-
dc.date.issued2014-03-14-
dc.identifier.citationR. Tennekoon, J. Wijekoon, E. Harahap, H. Nishi, E. Saito and S. Katsura, "Per hop data encryption protocol for transmission of motion control data over public networks," 2014 IEEE 13th International Workshop on Advanced Motion Control (AMC), 2014, pp. 128-133, doi: 10.1109/AMC.2014.6823269.en_US
dc.identifier.issn1943-6572-
dc.identifier.urihttp://rda.sliit.lk/handle/123456789/1256-
dc.description.abstractBilateral controllers are widely used vital technology to perform remote operations and telesurgeries. The nature of the bilateral controller enables control objects, which are geographically far from the operation location. Therefore, the control data has to travel through public networks. As a result, to maintain the effectiveness and the consistency of applications such as teleoperations and telesurgeries, faster data delivery and data integrity are essential. The Service-oriented Router (SoR) was introduced to maintain the rich information on the Internet and to achieve maximum benefit from networks. In particular, the security, privacy and integrity of bilateral communication are not discoursed in spite of its significance brought by its underlying skill information or personal vital information. An SoR can analyze all packet or network stream transactions on its interfaces and store them in high throughput databases. In this paper, we introduce a hop-by-hop routing protocol which provides hop-by-hop data encryption using functions of the SoR. This infrastructure can provide security, privacy and integrity by using these functions. Furthermore, we present the implementations of proposed system in the ns-3 simulator and the test result shows that in a given scenario, the protocol only takes a processing delay of 46.32 μs for the encryption and decryption processes per a packet.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartofseries2014 IEEE 13th International Workshop on Advanced Motion Control (AMC);Pages 128-133-
dc.subjectencryption protocolen_US
dc.subjecttransmissionen_US
dc.subjectmotion control dataen_US
dc.subjectpublic networksen_US
dc.subjecthop data encryptionen_US
dc.titlePer hop data encryption protocol for transmission of motion control data over public networksen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/AMC.2014.6823269en_US
Appears in Collections:Research Papers - Dept of Computer Systems Engineering
Research Papers - IEEE
Research Papers - SLIIT Staff Publications

Files in This Item:
File Description SizeFormat 
Per_hop_data_encryption_protocol_for_transmission_of_motion_control_data_over_public_networks.pdf
  Until 2050-12-31
898.09 kBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.