Smart Data Transfer: An Energy-Conscious Approach for Wireless Networks
Keywords:
OFDM, Encryption, Decryption, Compression, Decompression, AES, RSA, ECC, Energy Optimization.Abstract
Orthogonal Frequency Division Multiplexing (OFDM) is one of the most promising and widely adopted modulation techniques in both wireless and wired communication standards. It efficiently utilizes the available bandwidth by dividing it into multiple orthogonal subcarriers, thereby enhancing data transmission performance and spectral efficiency.This paper focuses on the efficient implementation of an OFDM system, encompassing both the transmitter and receiver, integrated with various encryption and compression algorithms to optimize energy consumption during data transmission. The study aims to identify the most effective combination of encryption and compression techniques that not only ensure data security and integrity but also contribute to energy-efficient communication.Through simulation and comparative analysis, the paper evaluates multiple algorithms to determine the optimal configuration for secure and energy-aware data transfer in OFDM-based communication systems.
Downloads
References
Tirumala Rao Pechetty, Mohith Vemulapalli, “An Implementation of OFDM Transmitter and Receiver on Reconfigurable Platforms”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering , Vol. 2, Issue 11, November 2013
Kehinde Obidairo, Greg. O. Onwodi , “A Book Of National Open University Of Nigeria School Of Science And Technology”, Course Code: Cit654; Course Title: Digital Communications; Course Writer :Greg. O. Onwodi.
Wenjie Hu and Guohong Cao, “Energy Optimization Through Traffic Aggregation in Wireless Networks”,Department of Computer Science and Engineering,The Pennsylvania State University
Nasreen Mev, Brig. R.M. Khaire, “Implementation of OFDM Transmitter and Receiver Using FPGA”,
International Journal of Soft Computing and Engineering (IJSCE),ISSN: 2231-2307, Volume-3, Issue-3, July 2013
R. Housley, “ Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax”, INTERNET DRAFT S/MIME Working Group,Vigil Security, January 2007
Nithya, Dr.E.George ,Dharma Prakash Raj, “ Survey on asymmetric key cryptography algorithms”, Journal of advanced computing and communication technologies,vol no. 2,issue no,1,ISSN-2347-2804.
Evgeny Milanov ,”A Report on:The RSA Algorithm”.,3 June 2009.
Pabitra Kumar Das, Crocmaster ,“A research paper on RSA Encryption part I” , Hackshark , Aug 27, 2012
Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange , “A Report on :New ECC Curve Bumps Speed/Security Baseline”, July 10 2014.
Kristin Lauter, “The Advantages Of Elliptic Curve Cryptography For Wireless Security”,IEEE Wireless Communications , February 2004,1536-1284
International journal of advanced scientific and technical research Issue 3 volume 3, May-June 2013
An article on Hill cipher , Wikipedia February 2012
B. Zhao, Q. Zheng, G. Cao, and S. Addepalli, “Energy-Aware Web Browsing in 3G Based Smartphones,” in IEEE ICDCS, 2013.
Hero Modares, Amirhossein Moravejosharieh, Rosli Salleh, “Wireless Network Security Using Elliptic Curve Cryptography”, 2011First International Conference on Informatics and Computational Intelligence.
Nguyen Toan Van, “Hardware Implementation Of OFDM TransmitterAnd Receiver Using FPGA”
C.K.P.Clarke,” Reed Solomon Error Correction”, Research & Development British Broadcasting corporation July 2002
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.