Hashed Data Transfer in SHM Distributed Systems with the Use of Power Line Communication Technology

Article Preview

Abstract:

Structural Health Monitoring of distributed systems is closely connected with data transmission from measurement points to the main server, where measurement data is processed and subjected to expert assessment. Power Line Communication (PLC) technology allows data transmission through existing power network. The greatest advantage of the PLC technology is the possibility of using ubiquitous, electric infrastructure, wherever there is no access to dedicated wired transmission links. However, it should be stressed that the main application of power lines is transmission of electricity while data transmission is a secondary issue. In monitoring systems and distributed measurement systems it is of vital importance that information from measurement points reaches the receiver in the unchanged form. Hash functions rise possibility of proper recognition if transmitted data is an exact mapping of information sent from measurement point. The paper concerns the method of polynomial hash function implementation for PLC systems in the LabVIEW environment.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

154-159

Citation:

Online since:

July 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Gang Li, XiLong CHE, Design and Realization of Communication System Based on Power Line Carrier, Advanced Materials Research, vol. 301-303 (2011), 1765.

DOI: 10.4028/www.scientific.net/amr.301-303.1765

Google Scholar

[2] Min Yu, Cheng Gang Xu, Xin Yu Jin, Yu Zhang, Research on Power Line Carrier Communication Quality Evaluation, Advanced Materials Research, vol. 314-316 (2011), 2221.

DOI: 10.4028/www.scientific.net/amr.314-316.2221

Google Scholar

[3] Min Yu, Xin Yu Jin, Cheng Gang Xu, Yu Zhang, Power Line Carrier Detection System Based on Virtual Instrument, Advanced Materials Research, vol. 314-316 (2011), 2205.

DOI: 10.4028/www.scientific.net/amr.314-316.2205

Google Scholar

[4] Hai Ting Tian, Rui Ming Yuan et al., Research on Low Voltage Power Line Narrow-Band Communication Simulation Platform, Advanced Materials Research, vol. 168-170 (2010), 251.

DOI: 10.4028/www.scientific.net/amr.168-170.251

Google Scholar

[5] A. Gołaś, I. Czajka, K. Szopa, Securing the measurement data in environmental monitoring systems, Archives of Acoustics, vol. 35 (2010), 462.

Google Scholar

[6] Dong Fang Luo, Xin Ling Wen, Man-Machine Interface of Electric Power Test System Design Based on VI, Key Engineering Materials, vol. 439-440 (2010), 92.

DOI: 10.4028/www.scientific.net/kem.439-440.92

Google Scholar

[7] Tian Yan Du, Dean Zhao, Li Huang, An Implementation of Petri Net Based on Graphical Programming Language, Key Engineering Materials, vol. 464 (2011), 327.

DOI: 10.4028/www.scientific.net/kem.464.327

Google Scholar

[8] A. Chandra, A. Gupta et al., Performance of BFSK over a PLC Channel Corrupted with Background Nakagami Noise, Published in Proc. IEEE ICCS, Singapore, Nov. 2010, pp.730-734.

DOI: 10.1109/iccs.2010.5686469

Google Scholar

[9] J. L. Carter, M. Wegman, Universal classes of hash functions, Journal of Computer and System Sciences, vol. 18 (1978), p.143–154.

DOI: 10.1016/0022-0000(79)90044-8

Google Scholar

[10] K. Khoo and S. -H. Heng, Universal Hash Functions over GF(2n), Proceedings of 2004 IEEE International Symposium on Information Theory — ISIT 2004, p.205, IEEE Press, (2004).

DOI: 10.1109/isit.2004.1365242

Google Scholar

[11] K. Yüksel, J. -P. Kaps, B. Sunar, Universal Hash Functions for Emerging Ultra-Low-Power Networks, Proceeding of The Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Diego, CA, January, (2004).

Google Scholar

[12] J. Black, S. Halevi, H. Krawczyk et al., UMAC: Fast and secure message authentication. In: Wiener M J, ed. CRYPTO99, LNCS 1666. Berlin: Springer, 1999. 216-233.

DOI: 10.1007/3-540-48405-1_14

Google Scholar

[13] J. -P. Kaps, Cryptography for Ultra-Low Power Devices, PhD Dissertation, Worcester Polytechnic Institute, May (2006).

Google Scholar