Affiliation:
1. School of Information Engineering, Suqian University, Suqian 223800, China
Abstract
With the increasing openness and development of network technology, the network based on the wireless sensor network system has increasingly become an important tool for human social life and production, but it also brings some network security problems. Among them, focus is on network privacy disclosure and foreign intrusion and the research of intrusion detection and privacy protection has increasingly become an important topic of network security. This paper deeply studies the wireless sensor network system based on neural network on the basis of traditional privacy protection and intrusion detection system. Firstly, it applies particle swarm optimization algorithm and constructs a wireless sensor network intrusion detection system based on particle swarm optimization algorithm. The system includes important modules such as data extraction, data analysis, data feedback, and auxiliary decision-making. Compared with other algorithms, particle swarm optimization algorithm does not rely on problem information. It mainly uses real numbers to solve, so the algorithm has strong universality. At the same time, its corresponding principle is simple and easy to implement and less parameters need to be adjusted. Compared with other algorithms, particle swarm optimization algorithm has fast convergence speed and little memory requirement for the computer. At the same time, this paper uses the leap of particle swarm optimization algorithm to make it easier to find the global optimal solution. At the corresponding level of wireless sensor network privacy protection, based on the original data aggregation privacy protection scheme, this paper proposes a privacy protection scheme based on polynomial regression and a user privacy protection scheme based on the same state encryption, which further improves the security of privacy protection and facilitates the management of information. To realize the integrity of user privacy information protection, this paper realizes the decryption of data based on the correlation between binary metadata and compares the corresponding decrypted data with aggregated data, so as to complete the integrity of privacy data protection. The experimental results show that the binary metadata correlation decryption method proposed in this paper and the introduction of the corresponding particle swarm optimization algorithm improve the stability of the system by about 10%, the corresponding system security by a positive proportion, and the integrity of private data by about 10%; therefore, the algorithm proposed in this paper has obvious advantages.
Subject
General Mathematics,General Medicine,General Neuroscience,General Computer Science