Smart Data Transfer: An Energy-Conscious Approach for Wireless Networks

Authors

  • Alka Sawlikar, Bireshwar Ganguly, Devashri Kodgire

Keywords:

OFDM, Encryption, Decryption, Compression, Decompression, AES, RSA, ECC, Energy Optimization.

Abstract

Orthogonal Frequency Division Multiplexing (OFDM) is one of the most promising and widely adopted modulation techniques in both wireless and wired communication standards. It efficiently utilizes the available bandwidth by dividing it into multiple orthogonal subcarriers, thereby enhancing data transmission performance and spectral efficiency.This paper focuses on the efficient implementation of an OFDM system, encompassing both the transmitter and receiver, integrated with various encryption and compression algorithms to optimize energy consumption during data transmission. The study aims to identify the most effective combination of encryption and compression techniques that not only ensure data security and integrity but also contribute to energy-efficient communication.Through simulation and comparative analysis, the paper evaluates multiple algorithms to determine the optimal configuration for secure and energy-aware data transfer in OFDM-based communication systems.

Downloads

Download data is not yet available.

References

Tirumala Rao Pechetty, Mohith Vemulapalli, “An Implementation of OFDM Transmitter and Receiver on Reconfigurable Platforms”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering , Vol. 2, Issue 11, November 2013

Kehinde Obidairo, Greg. O. Onwodi , “A Book Of National Open University Of Nigeria School Of Science And Technology”, Course Code: Cit654; Course Title: Digital Communications; Course Writer :Greg. O. Onwodi.

Wenjie Hu and Guohong Cao, “Energy Optimization Through Traffic Aggregation in Wireless Networks”,Department of Computer Science and Engineering,The Pennsylvania State University

Nasreen Mev, Brig. R.M. Khaire, “Implementation of OFDM Transmitter and Receiver Using FPGA”,

International Journal of Soft Computing and Engineering (IJSCE),ISSN: 2231-2307, Volume-3, Issue-3, July 2013

R. Housley, “ Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax”, INTERNET DRAFT S/MIME Working Group,Vigil Security, January 2007

Nithya, Dr.E.George ,Dharma Prakash Raj, “ Survey on asymmetric key cryptography algorithms”, Journal of advanced computing and communication technologies,vol no. 2,issue no,1,ISSN-2347-2804.

Evgeny Milanov ,”A Report on:The RSA Algorithm”.,3 June 2009.

Pabitra Kumar Das, Crocmaster ,“A research paper on RSA Encryption part I” , Hackshark , Aug 27, 2012

Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange , “A Report on :New ECC Curve Bumps Speed/Security Baseline”, July 10 2014.

Kristin Lauter, “The Advantages Of Elliptic Curve Cryptography For Wireless Security”,IEEE Wireless Communications , February 2004,1536-1284

International journal of advanced scientific and technical research Issue 3 volume 3, May-June 2013

An article on Hill cipher , Wikipedia February 2012

B. Zhao, Q. Zheng, G. Cao, and S. Addepalli, “Energy-Aware Web Browsing in 3G Based Smartphones,” in IEEE ICDCS, 2013.

Hero Modares, Amirhossein Moravejosharieh, Rosli Salleh, “Wireless Network Security Using Elliptic Curve Cryptography”, 2011First International Conference on Informatics and Computational Intelligence.

Nguyen Toan Van, “Hardware Implementation Of OFDM TransmitterAnd Receiver Using FPGA”

C.K.P.Clarke,” Reed Solomon Error Correction”, Research & Development British Broadcasting corporation July 2002

Downloads

Published

14.02.2024

How to Cite

Alka Sawlikar. (2024). Smart Data Transfer: An Energy-Conscious Approach for Wireless Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(14s), 753 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7683

Issue

Section

Research Article