13 research outputs found

    Enhancement of Adaptive Forward Error Correction Mechanism for Video Transmission Over Wireless Local Area Network

    Get PDF
    Video transmission over the wireless network faces many challenges. The most critical challenge is related to packet loss. To overcome the problem of packet loss, Forward Error Correction is used by adding extra packets known as redundant packet or parity packet. Currently, FEC mechanisms have been adopted together with Automatic Repeat reQuest (ARQ) mechanism to overcome packet losses and avoid network congestion in various wireless network conditions. The number of FEC packets need to be generated effectively because wireless network usually has varying network conditions. In the current Adaptive FEC mechanism, the FEC packets are decided by the average queue length and average packet retransmission times. The Adaptive FEC mechanisms have been proposed to suit the network condition by generating FEC packets adaptively in the wireless network. However, the current Adaptive FEC mechanism has some major drawbacks such as the reduction of recovery performance which injects too many excessive FEC packets into the network. This is not flexible enough to adapt with varying wireless network condition. Therefore, the enhancement of Adaptive FEC mechanism (AFEC) known as Enhanced Adaptive FEC (EnAFEC) has been proposed. The aim is to improve recovery performance on the current Adaptive FEC mechanism by injecting FEC packets dynamically based on varying wireless network conditions. The EnAFEC mechanism is implemented in the simulation environment using Network Simulator 2 (NS-2). Performance evaluations are also carried out. The EnAFEC was tested with the random uniform error model. The results from experiments and performance analyses showed that EnAFEC mechanism outperformed the other Adaptive FEC mechanism in terms of recovery efficiency. Based on the findings, the optimal amount of FEC generated by EnAFEC mechanism can recover high packet loss and produce good video quality

    Jeev Time: Secure Authentication Using Integrated Face Recognition in Social Media Applications

    Get PDF
    Social media facilitates the sharing of ideas and information through the building of virtual networks. Not all user accounts are secured based on the complexity of passwords. Password-only authentication finds it hard to protect a user account's confidentiality, integrity, and availability. Therefore, the face recognition integrated Jeev Time social media application is designed to authenticate the system securely. To develop this application, Object-Oriented Analysis and Design (OOAD) is used as the methodology. This application is developed using React Native framework (JavaScript) and backed by Google's Firebase database. Meanwhile, face authentication uses Google's Face Detection API and React Native's Face API. With face recognition, the face as biometric login is enforced in the authentication process. Therefore, the development of this application will secure the system users from using a weaker approach during authentication and not victimized by unethical social media users yet experiencing the familiar social media application interface and its core functionalities

    Quantum Cryptography Experiment using Optical Devices

    Get PDF
    The study of quantum cryptography is one of the great interest. A straightforward and reliable quantum experiment is provided in this paper. A half wave plate in linearly polarized light makes up a simplified polarization rotator. The polarization rotates twice as much as the half wave plate's fast axis' angle with the polarization plane when the half wave plate is rotated. Here, an experiment of message sharing is conducted to demonstrate quantum communication between parties. The unitary transformation is performed step by stepusing half-wave plates represented by the Mueller matrix. A simulation created using Python programming has been used to test the proposed protocol's implementation. Python was chosen because it can mathematically imitate the quantum state of superposition

    Implementation and validation of an adaptive FEC machanism for video transmission

    Get PDF
    This research focuses on investigating the FEC mechanism as an error recovery over a wireless network.The existing adaptive FEC mechanism faces a major drawback, which is the reduction of recovery performance by injecting too many excessive FEC packets into the network. Thus, this paper proposes the implementation of an enhanced adaptive FEC (EnAFEC) mechanism for video transmission together with its validation process.There are two propositions in the EnAFEC enhancement, which include block length adaptation and implementation, and suitable smoothing factor value determination.The EnAFEC adjusts the FEC packets based on the wireless network condition so that excessive FEC packets can be reduced.The proposed enhancement is implemented in a simulation environment using the NS-2 network simulation.The simulation results show that EnAFEC generates less FEC packets than the other types of adaptive FEC (EAFEC and Mend FEC).In addition, a validation phase is also conducted to verify that the proposed enhancement is functioning correctly, and represents a real network situation.In the validation phase, the results obtained from the simulation are compared to the outputs of the other adaptive FEC mechanisms.The validation results show that the mechanism is successfully implemented in NS2 since the number of packet loss falls under the overlapping confidence intervals

    A PERFORMANCE STUDY OF ADAPTIVE FEC MECHANISM FOR VIDEO TRANSMISSION OVER 802.11 WLANS

    Get PDF
    Forward Error Correction has been implemented with Automatic Repeat reQuest to overcome packet losses and avoid network congestion in various wireless network conditions. The number of FEC packets is needed to be generated adaptively due to various network states and burst error condition. There are a number of proposed Adaptive FEC mechanisms that can generate FEC packets adaptively for wireless network. However, this current Adaptive FEC, namely Mend FEC mechanism has major drawbacks including injecting excessive number of FEC packets into the network and consequently reducing recovery performance. This paper proposed an enhancement on Mend FEC mechanism, which is called Enhanced Adaptive FEC (EnAFEC) mechanism. The enhancement is aimed to improve recovery performance of the Mend FEC mechanism by generating FEC packets dynamically based on varying wireless network conditions. The proposed enhancement was implemented in simulation environment using the NS2 network simulation. The results show that EnAFEC mechanism outperformed the other Adaptive FEC mechanism in terms of recovery efficiency. This paper also highlights that even minimal amount of FEC packets can recover high packet losses and achieve good video quality at the receiver

    QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator

    Get PDF
    The applications of quantum information science move towards bigger and better dimensions for the next generation technology. In the field of quantum cryptography and quantum computation, the world already witnessed various groundbreaking tangible products and promising results. Quantum cryptography is one of the mature fields of quantum mechanics and the devices are already available in the markets. In order to reach the heights of digital cryptography, the current state of quantum cryptography is still under various researches. However, the complexity of quantum cryptography is high due to combination of hardware and software. The lack of effective simulation tool to design and analyze the quantum cryptography experiments delays the reaching distance of the success. Therefore, in this paper, a framework to achieve an effective single photon based quantum cryptography simulation tool is proposed. The limitations of a commercial photonic simulation tool based experiments are also highlighted. Finally, the ideas for achieving one-stop simulation package for quantum based secure key distribution experiments are discussed. The proposed modules of simulation framework have been analyzed from the programming perspective

    Extension of dynamic source routing protocol in mobile ad hoc network

    Get PDF
    In a large dynamic network, data can be copied anywhere to make it fault tolerant and easy accessed but there must be an efficient protocol to manage the replicas and make sure the data is consistent and high in availability with a low communication cost. In this paper, we introduced a new protocol, named Diagonal Replication in Mesh (DRM) for data replica control protocol for a large dynamic network by using quorum and voting techniques to improve the availability and the communication cost because quorum techniques reduce the number of copies involved in reading or writing data.The protocol of DRM replicates data for large dynamic network by putting the protocol in a logical mesh structure and access consistent data by ensuring the quorum not to have a nonempty intersection quorum.To evaluate our protocol, we developed a simulation model in Java.Our results proved that DRM improves the performance of the response time compare to Three Dimensional Grid structure Protocol (TDGS)

    Secured single stage multiphoton approach for quantum cryptography protocol in free space optic

    Get PDF
    In order to mitigate the problem of low transmission rate and limited communication distance in Quantum Communication (QCs), multiphoton over multi-stages approach has been proven to be a possible alternative to the conventional single photon approach. Multiphoton has the ability to improve the range of distances and key generation rate over multi-stages photon transmission. However, the determination of optimal mean photon numbers and number of stages in multiphoton approach remains a key challenge to make the protocols well utilized during their operations. Following this concern, three problems and their corresponding proposed solutions in this thesis are presented below: Firstly, the existing multiphoton approaches involve multiple photons to travel throughout a number of stage. Furthermore, extra time is required to update the polarization angle of optical device for encoding purposes. These conditions would result in an increase in the total transmission time of the photons to be transmitted over the quantum channel. Accordingly, a Hybrid M-Ary in Braided Single-Stage (HMBSS) approach by utilizing data compression concept is proposed to address these issues. In HMBSS, the sender is able to compress the secret message using Huffman encoding over the braided single-stage operation. This compression mechanism has reduced the number of bits required to represent a string of symbols, thereby reducing the time to encode the photons. The simulation experiments shows that HMBSS achieved promising result by 75.9% and 91.7% total average transmission time decrease as compared to the well-known Multiphoton-BSS, Multiphoton-M-ary and Multiphoton-TSIV. Secondly, providing strong authentication is the main focus in this research which aims to make multiphoton QC secure against variety types of attacks. Current authentication procedure in multiphoton QC requires public agreement to pre-share the authentication key and secret angles before onset of the transmission, therefore increasing the communication cost. As a solution, a Secure Secret Authentication Key (SSAK) is proposed. In SSAK, the quantum handshake scheme is used to share initial secret polarization angle and authentication key which is utilized before quantum communication session. The results of simulation experiments reveal that SSAK significantly outperformed the Three-stage protocol in terms of average covered angle by Eve. The simulation experiments and security analysis of initial authentication and transmission of messages verified that an eavesdropper is unable to disclose any information about the transmitted message or the authentication key. Lastly, most of the proposed QKD protocol employs a single-beam set up to transmit the photons over the free space optic which results in low bit rate and limited distance coverage due to high impact of geometrical loss. To deal with this, a transmission technique of Multiphoton Quantum Communication using multiple beam concept (MQC-MB) is proposed. Comparison is conducted in terms of total loss and received power on different number of beam shows that 4-beam is acceptable to be adapted in MQC-MB. The statistical analysis shows that such approach has reduced the total attenuation by 6dB compared to single-beam setup

    Quantum Cryptography Experiment using Optical Devices

    No full text
    The study of quantum cryptography is one of the great interest. A straightforward and reliable quantum experiment is provided in this paper. A half wave plate in linearly polarized light makes up a simplified polarization rotator. The polarization rotates twice as much as the half wave plate's fast axis' angle with the polarization plane when the half wave plate is rotated. Here, an experiment of message sharing is conducted to demonstrate quantum communication between parties. The unitary transformation is performed step by step using half-wave plates represented by the Mueller matrix. A simulation created using Python programming has been used to test the proposed protocol's implementation. Python was chosen because it can mathematically imitate the quantum state of superposition

    Quantum identity authentication for non-entanglement multiparty communication: A review, state of art and future directions

    No full text
    Authentication is one of the security services that assures the system’s adequate security through identification and verification. Additionally, it guarantees that the communication party is who they claim to be. In politics, the economy, banking, daily life, and other areas, quantum identity authentication is essential to guarantee the security of information in communication. The multiphoton strategy is an improved version of the single-photon approach, with higher transmission rates and longer photon travel distances via the Quantum Communication network. Despite the advantages of multiphoton, enforcing authentication on behalf of numerous participants in the quantum channel remains a problem, since existing multiphoton only considers two parties involved in secret message sharing. The issue of scalability arises here when the number of parties involved in the quantum network increases. Furthermore, an eavesdropper might hide her position among other parties and take advantage of the situation to obtain a certain information. Therefore, we require a protocol, that creates a more secure environment in term of authentication in which multiple parties may freely and openly communicate. This paper further identifies research gaps covering critical aspect on how Quantum Identity Authentication (QIA) can be realized and effectively utilized for multiphoton without entanglement based. These include suggestion of future direction to implement multiphoton in multiparty from current protocol
    corecore