In the current period, the number of mobile users is rapidly expanding with a complicated network setup with a large amount of network traffic, which results in data overload. Insufficient network bandwidth causes dat...
详细信息
In the current period, the number of mobile users is rapidly expanding with a complicated network setup with a large amount of network traffic, which results in data overload. Insufficient network bandwidth causes data overloading. data overloading can be mitigated by implementing a potential solution to deal with the massive network traffic. Despite the fact that the capabilities of mobile networks are rapidly expanding, the aforementioned issue persists as we move from cellular to advanced wireless networks. To keep up with the ever-increasing number of internet users, offloading techniques have become increasingly popular in mobile computing. As the number of users and the volume of data they generate grows, the network’s capacity is taxed, and this is where offloading techniques come in to help. However, in many situations, authentication is absolutely necessary for the formation of a connection. As a result, the study presents a data offloading method for mobile computing that is both safe and cost-effective, as well as successful in managing network traffic. Individuals’ personal information might also constitute a severe privacy risk to users. Anticipating the legitimacy of the nodes and secret key negotiation helps avoid these dangers. Developing a mutual authentication and secret key exchange system for resource-constrained networks that is secure and private in all ways is a difficult challenge. Integrate key exchange authentication with an efficient data offloading approach to maintain data confidentiality and integrity in the whole network during transmission is the primary goal of the research. This research presents a Unique Tokenized Authentication Technique based data Offloading approach using Key Exchange (UTAT-DO-KE) model is proposed in this research for maintaining data integrity in heterogeneous networks during data communication. In this case, performance analysis can be done to lower the time it takes to authenticate and run the application. W
This paper discusses the use of the substation "device" and "bay" object as the primary vehicle for the communication of the overall "substation" state to the SCADA master rather than via...
详细信息
ISBN:
(纸本)9781424414772
This paper discusses the use of the substation "device" and "bay" object as the primary vehicle for the communication of the overall "substation" state to the SCADA master rather than via the reporting of large numbers of individual (discrete) status and analog points. The reason for changing the method of data reporting is based the need to reduce the quantities of data sent to both the SCADA master station and the control staff during power system disturbances. To facilitate the transmission of bay and substation states to the SCADA master, the telecommunications protocol needs to be modified to support additional data format which must be matched by changes to the SCADA master data base.
This paper discusses the use of the substation "device" and "bay" object as the primary vehicle for the communication of the overall "substation" state to the SCADA master rather than via...
详细信息
This paper discusses the use of the substation "device" and "bay" object as the primary vehicle for the communication of the overall "substation" state to the SCADA master rather than via the reporting of large numbers of individual (discrete) status and analog points. The reason for changing the method of data reporting is based the need to reduce the quantities of data sent to both the SCADA master station and the control staff during power system disturbances. To facilitate the transmission of bay and substation states to the SCADA master, the telecommunications protocol needs to be modified to support additional data format which must be matched by changes to the SCADA master data base.
暂无评论