Mimic Encryption Box for Network Multimedia Data Security

Author:

Zhou Xiabing1,Li Bin2ORCID,Qi Yanrong2,Dong Wanying2

Affiliation:

1. School of Computer Science and Technology, Soochow University, Suzhou 215006, China

2. School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China

Abstract

With the rapid development of the Internet, the security of network multimedia data has attracted increasingly more attention. The moving target defense (MTD) and cyber mimic defense (CMD) approaches provide a new way to solve this problem. To enhance the security of network multimedia data, this paper proposes a mimic encryption box for network multimedia data security. The mimic encryption box can directly access the network where the multimedia device is located, automatically complete the negotiation, provide safe and convenient encryption services, and effectively prevent network attacks. According to the principles of dynamization, diversification, and randomization, the mimic encryption box uses a reconfigurable encryption algorithm to encrypt network data and uses IP address hopping, port number hopping, protocol camouflage, and network channel change to increase the attack threshold. Second, the mimic encryption box has a built-in pseudorandom number generator and key management system, which can generate an initial random key and update the key with the hash value of the data packet to achieve “one packet, one key.” Finally, through the cooperation of the ARM and the FPGA, an access control list can be used to filter illegal data and monitor the working status of the system in real time. If an abnormality is found, the feedback reconstruction mechanism is used to “clean” the FPGA to make it work normally again. The experimental results and analysis show that the mimic encryption box designed in this paper has high network encryption performance and can effectively prevent data leakage. At the same time, it provides a mimic security defense mechanism at multiple levels, which can effectively resist a variety of network attacks and has high security.

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference45 articles.

1. Multimedia Internet of Things: A Comprehensive Survey

2. Multimedia big data security,;P. Chauhan

3. Intensifying multimedia Information security using comprehensive cipher;V. Nikhila

4. On modeling eavesdropping attacks in wireless networks

5. Lightweight and Privacy-Preserving Data Aggregation for Mobile Multimedia Security

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Active Defense Model of Network Attack on Cloud Platform Based on K-means Algorithm;2023 2nd International Conference on Artificial Intelligence and Autonomous Robot Systems (AIARS);2023-07

2. A survey of Bouc-Wen hysteretic models applied to piezo-actuated mechanical systems: Modeling, identification, and control;Journal of Intelligent Material Systems and Structures;2023-03-16

3. Lightweight and High-Performance Data Protection for Edge Network Security;Wireless Communications and Mobile Computing;2022-02-22

4. RSA encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security;The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology;2021-08-21

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3