Research on neural network chaotic encryption algorithm in wireless network security communication

被引:0
|
作者
Chen Liang
Qun Zhang
Jianfeng Ma
Kaiming Li
机构
[1] Air Force Engineering University,Institute of Information and Navigation
[2] Xidian University,School of Cyber Engineering
[3] Shaanxi Key Laboratory of Network and System Security,undefined
关键词
Neural network; Chaotic encryption algorithm; Wireless communication; Communication security;
D O I
暂无
中图分类号
学科分类号
摘要
The rapid development of wireless network brings a lot of convenience to people’s lives, but there are still many problems to be solved in wireless networks. Among them, communication security is the most critical, especially secure transactions on digital currency transactions are even more important. In traditional network communication encryption algorithms such as RSA and ECC, in order to further enhance the reliability of network communication security, the main means is to increase the length of the key, but this brings the complexity and workload of the calculation, and the speed of encryption cannot be realized. Compatible with security, the neural network chaotic encryption algorithm mainly uses the parallelity characteristics of the neural network and the chaotic dynamic characteristics to randomly generate a sequence, which has non-periodic characteristics. Therefore, the wireless network chaotic encryption algorithm is a good wireless communication security encryption algorithm. However, the traditional neural network chaotic encryption algorithm still has some shortcomings in its algorithm’s security performance, encryption speed, encryption efficiency, and anti-deciphering performance. At the same time, the research on neural network chaotic encryption algorithm in wireless communication security is relatively less.
引用
收藏
相关论文
共 50 条
  • [21] Research on Applications of Data Encryption Technology in Security of Computer Network Communication
    Li, Na
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 136 - 139
  • [22] Research on the Application of Data Encryption Technology in Computer Network Communication Security
    Xia, Kuiliang
    Song, Xiaoming
    2020 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND HUMAN-COMPUTER INTERACTION (ICHCI 2020), 2020, : 164 - 167
  • [23] Research on Network Security and Data Encryption
    Duan, Zhongqi
    Xue, Xiaofeng
    INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 531 - +
  • [24] Security in Voip Network Using Neural Network and Encryption Techniques
    Galande, Ashwini
    Londhe, Dattatraya
    Balpande, Mangesh
    INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 223 - 227
  • [25] Research on Weak Fault Detection Algorithm Chaotic Neural Network
    Zhu YuanZhong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 239 - 248
  • [27] Security model and design of network communication system based on data encryption algorithm
    Ma, Xiaoshu
    Liu, Qing
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 83 - 97
  • [28] Network Security: Synchronization in Chaotic Communication Systems
    Kartalopoulos, Stamatios V.
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 565 - 570
  • [29] A combined hash and encryption scheme by chaotic neural network
    Xiao, D
    Liao, XF
    ADVANCES IN NEURAL NETWORKS - ISNN 2004, PT 2, 2004, 3174 : 633 - 638
  • [30] A resource scheduling algorithms for wireless communication networks based on chaotic neural network
    Mo, Fu
    Feng, Mingku
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 182 - 182