Affiliation:
1. Network and Information Administration, China West Normal University, Nanchong, 637009, China
Abstract
In order to improve the secure transmission capability of wireless transmission network communication data, a network communication data encryption design is required. An encryption and secure transmission method of wireless transmission network communication data based on wireless channel feature detection is proposed. The ECC (Elliptic Curves Cryptography) algorithm analyzes by monitoring single-channel and multi-channel samples separately. The ciphertext protocol for data secure transmission is constructed, the Hash dynamic transmission protocol is used for data access control, the data dynamic symmetric key, the key construction and arithmetic coding design are constructed. Combined with the ellipse linear mapping method, the data is encrypted safely. According to the intensity of the wireless channel feature distribution, the scrambling degree is rearranged for the random scrambling and encryption of the data, and the random linear coding method is used to realize the random scrambling and encryption of the data, so as to realize the secure transmission of network communication data and the secure storage of information. The simulation test results show that using this method to encrypt and transmit wireless transmission network communication data has better security and stronger anti-attack ability, thereby improving the secure transmission performance of network communication data.
Publisher
North Atlantic University Union (NAUN)
Subject
Electrical and Electronic Engineering,Signal Processing
Reference19 articles.
1. Y. C. Zhou, “Application of data encryption technology in computer network communication security,” Communication Power Technology, vol. 36, no. 8, pp. 200-201, 2019.
2. L. Barolli, F. Xhafa, and J. Conesa, “ [Lecture notes on data engineering and communications technologies] advances on broad-band wireless computing, communication and applications Volume 12,” A Light Weight Data Encryption Method for WSN Communication, (Chapter 70), pp. 788-795, 2018.
3. L. Guo, H. Xie, and Y. Li, “Data encryption based blockchain and privacy preserving mechanisms towards big data,” Journal of Visual Communication and Image Representation, vol. 70, no. 8, pp. 102741, 2019.
4. K. L. Tsai, F. Y. Leu, I. You, and S. W. Chang, “Low-power AES data encryption architecture for a LoRaWAN,” IEEE Access, vol. 7, pp. 146348-146357, 2019.
5. V. Riznyk, “Big data process engineering under manifold coordinate systems,” WSEAS Transactions on Information Science and Applications, vol. 18, pp. 7-11, 2021.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献