Supriadi, Agusma Wajiansyah, H. Purwadi, R. Malani, Arda Yunianta, A. Pratomo
{"title":"Secured Data Transmission using Metadata Logger Manipulation Approach","authors":"Supriadi, Agusma Wajiansyah, H. Purwadi, R. Malani, Arda Yunianta, A. Pratomo","doi":"10.1109/EIConCIT.2018.8878601","DOIUrl":null,"url":null,"abstract":"The telemetry is an automatic communication process where measurements and other data are collected at a remote point or cannot be accessed (called as a remote station) and transmitted to the receiving equipment (called as host station). This system is a data acquisition system in a large enough area which usually equipped with data loggers in the form of an electronic device that records data over time. Even most data loggers equipped with digital processors or computers. Various environmental conditions can affect the telemetry system, especially in the process of transmitting data from remote stations to the host. In this case, data security during transmission becomes very important. In this study, the discussion focused on how to build data packages in such a way that the data packet is not easy to recognize during the transmission process. The concept of the metadata manipulation approach is used to change the arrangement of the data package based on its address index through the transformation of three-dimensional cube-shaped data to become a metadata log. Data stored in the data logger converted into a three-dimensional data structure in the form of several cube-shapes based on its address index. In a certain way, all cube-shaped data transformed into a metadata log and stored in the metadata logger. This metadata log then transmitted to the host station to be converted back into a data log and stored into the host’s data logger. The results of this study showed that the generated metadata log log has very different content compared to data log. Similarly, the size of their data bytes. The main key to this concept is how to choose a 3-D form representation of data according to data availability and how to change its orientation during the process of forming metadata logs.","PeriodicalId":424909,"journal":{"name":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIConCIT.2018.8878601","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The telemetry is an automatic communication process where measurements and other data are collected at a remote point or cannot be accessed (called as a remote station) and transmitted to the receiving equipment (called as host station). This system is a data acquisition system in a large enough area which usually equipped with data loggers in the form of an electronic device that records data over time. Even most data loggers equipped with digital processors or computers. Various environmental conditions can affect the telemetry system, especially in the process of transmitting data from remote stations to the host. In this case, data security during transmission becomes very important. In this study, the discussion focused on how to build data packages in such a way that the data packet is not easy to recognize during the transmission process. The concept of the metadata manipulation approach is used to change the arrangement of the data package based on its address index through the transformation of three-dimensional cube-shaped data to become a metadata log. Data stored in the data logger converted into a three-dimensional data structure in the form of several cube-shapes based on its address index. In a certain way, all cube-shaped data transformed into a metadata log and stored in the metadata logger. This metadata log then transmitted to the host station to be converted back into a data log and stored into the host’s data logger. The results of this study showed that the generated metadata log log has very different content compared to data log. Similarly, the size of their data bytes. The main key to this concept is how to choose a 3-D form representation of data according to data availability and how to change its orientation during the process of forming metadata logs.