Due to the low clustering accuracy of the existing methods, a multi-source data association clustering method based on symmetric encryption algorithm is proposed. The multi-source data acquisition model is established...
详细信息
Due to the low clustering accuracy of the existing methods, a multi-source data association clustering method based on symmetric encryption algorithm is proposed. The multi-source data acquisition model is established, and the baud interval equalization sampling method is adopted to acquire data. The method of data generalization is applied to classify the collected data attributes optimally, which eliminates the fuzzy data. The symmetric encryption algorithm is used to shorten the range of data query. According to the centrosymmetry of data similarity measurement, multi-source data association clustering is realized. The proposed method can realize different types of data clustering, with high clustering accuracy and strong practical application value.
With the diversification of information development, data security is becoming more and more important. Therefore, the research on website information retrieval of Web database based on symmetric encryption algorithm ...
详细信息
With the diversification of information development, data security is becoming more and more important. Therefore, the research on website information retrieval of Web database based on symmetric encryption algorithm is studied. From the security performance of Website information retrieval of Web database, the improved chaotic map encryptionalgorithm is used to enhance the hyper chaos of the key. It is undeniable that digital signature can improve the security of Web database information authentication. Based on this;the Web information retrieval method based on mobile Agent is adopted. This method is a modular structure of multi-agents that is divided and cooperated by five types of Agents. Through the division and cooperation of the user interaction Agent, retrieval management Agent, evaluation screening Agent, preference acquisition Agent, and the network spider Agent, the user's preference is selected. Finally, the effective retrieval of Web information is achieved. The experimental results show that this kind of retrieval method can comprehensively and effectively retrieve the information of various commodities in website of the logistics company, and the retrieval performance is better.
In order to improve the security of remote transmission of multi-channel Internet of things, a new information hiding method based on symmetric encryption algorithm is proposed. This method is mainly based on the symm...
详细信息
In order to improve the security of remote transmission of multi-channel Internet of things, a new information hiding method based on symmetric encryption algorithm is proposed. This method is mainly based on the symmetric encryption algorithm, combined with the symmetric encryption algorithm and LSB least significant bit algorithm. After encrypting the long-distance transmission information of multi-channel IOT, the encrypted image carrier data is embedded into the digital image carrier data according to the LSB least significant bit algorithm, and embedded in the multi-channel The 64 bit image carrier data block of IOT long-distance transmission information is fed back to the multi-channel IOT data block, and the bit width is converted into 8-bit words to realize the final conversion word output. The long-distance transmission information is hidden through the IOT, so as to achieve the purpose of hiding the remote transmission information in the multi-channel Internet of things. Experimental analysis shows that the hidden information consumption of this method is at least 215.68 J, and the text information can still be extracted correctly when the clipping rate reaches 75%.
In order to improve the data collection effect of the wireless sensor network, a data collection system based on symmetric encryption algorithm is designed via health sensor. Upload the received data to the host via R...
详细信息
In order to improve the data collection effect of the wireless sensor network, a data collection system based on symmetric encryption algorithm is designed via health sensor. Upload the received data to the host via RS-232 to get the working mode and clock activity. The data acquisition circuit is designed with MSP430 module. The MapReduce programming model is used to complete data collection, a symmetric encryption algorithm is introduced, and a range data encryption query scheme with privacy protection function is designed. Apply it to the node data of the wireless sensor network to realize the secure data collection of the wireless sensor network. Experimental results show that the system has the advantages of high efficiency, large amount of data collection, and high residual energy of sensor network nodes.
The traditional data-protection method has the advantages of a long average secrecy time and low encryption efficiency in healthcare. This paper proposes an improved method of cloud-computing data-protection technolog...
详细信息
The traditional data-protection method has the advantages of a long average secrecy time and low encryption efficiency in healthcare. This paper proposes an improved method of cloud-computing data-protection technology based on a symmetric encryption algorithm. According to the characteristics of cloud computing, a trusted communication channel for virtual machine monitoring is established on users and servers. The cloud-computing data protection technology with four functional modules of "multi-copy protection," "file access," "integrity verification," and "accountability" is deployed in the channel by using the improved symmetrical encryption differential-algebraic equations algorithm combined with the symmetrical encryptionalgorithms data encryption standard and advanced encryption standard to do the following: bind the identity of cloud-service providers;realize mixed encryption of plaintext segmentation;and add random interference information. These clusters are built on Hadoop to simulate the cloud-computing environment. The experimental results show that the average encryption and decryption times of this method are the best under different data amounts. At the same time, the encryption efficiency and throughput are over 95 %. The protection effect of this method on cloud-computing data is verified.
Data deduplication approach is utilized in cloud storage to decrease the bandwidth of communication and storage space by eliminating the data copies from the cloud service provider (CSP). However, one of the main prob...
详细信息
Data deduplication approach is utilized in cloud storage to decrease the bandwidth of communication and storage space by eliminating the data copies from the cloud service provider (CSP). However, one of the main problems of cloud storage is data deduplication with secure data storage. To overcome this issue, the researchers presented symmetric data storage methods based on an encryptionalgorithm. Nonetheless, the Enhanced symmetric Key encryptionalgorithm (ESKEA) based on secure data storage with data deduplication is proposed in this research to further improve data confidentiality. In this approach, the block-level deduplication of data is performed using the Convergent encryption (CE) algorithm to check the CSP duplicate copies of data. Then, ESKEA algorithm is presented for secure storage of data. In ESKEA, Spider Monkey Optimization algorithm (SMOA) optimally selects the secret key. The results of this work showed that the execution of the proposed ESKEA is more effective than that of the SKEA in terms of upload time and download time.
Wireless Sensor Networks (WSNs) are often deployed in hostile environments and an adversary can potentially capture sensor nodes. This is a typical white-box attack context, i.e., the adversary may have total visibili...
详细信息
ISBN:
(纸本)9781479930838
Wireless Sensor Networks (WSNs) are often deployed in hostile environments and an adversary can potentially capture sensor nodes. This is a typical white-box attack context, i.e., the adversary may have total visibility of the implementation of the build-in cryptosystem and full control over its execution platform -- the sensor nodes. Existing encryptionalgorithms for white-box attack contexts require large memory footprint and hence are not applicable for wireless sensor networks scenarios. As a countermeasure against the threat in this context, a lightweight secure implementation of the symmetric encryption algorithm SMS4 is proposed. The basic idea of our solution is to merge several steps of the round function of SMS4 into table lookups, blended by randomly generated mixing bijections. Its security and efficiency are analyzed. Evaluation shows our solution satisfies the requirement of sensor nodes in terms of limited memory size and low computational costs.
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ...
详细信息
ISBN:
(纸本)9798350391367;9798350391374
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem of identifying unknown loops. The structure of the loop body of encryptionalgorithms is fixed and usually includes nonlinear operations and linear operations. This article converts the loop body in the unknown software into a set of Boolean formulas, and converts the malware into a register data flow through the symbolic executor, thereby converting it into a set of Boolean formulas for execution. Execute known encryptionalgorithms with bit accuracy and establish a Boolean formula input-output relationship library for cryptographic components. The two sets of Boolean formulas are passed through a designed input matrix to achieve the Boolean formula mapping and input variable mapping of the confirmation algorithm, which can effectively judge the encryptionalgorithms in some malware.
In a Massive MIMO system, the base station needs to estimate the channel according to the received pilot signal and obtain the channel state information to design the downlink precoding matrix. The spectrum pattern of...
详细信息
ISBN:
(纸本)9781665487894
In a Massive MIMO system, the base station needs to estimate the channel according to the received pilot signal and obtain the channel state information to design the downlink precoding matrix. The spectrum pattern of pilot signal plays an important role in channel estimation. In this paper, a pilot spectrum based on channel quality is designed. The simulation results show that the performance of the proposed pilot pattern has been effectively improved compared with the traditional pilot pattern. In view of the security problems in the signal transmission process, this paper introduces a symmetric encryption algorithm, and adds a key in the encoding stage of the analog-to-digital conversion part, which effectively improves the security performance of the system.
The electric vehicles nowadays arc managed by networked controllers. Because of the advantages of fast, reliable, simple wiring, and light weight, CAN bus has become one of the most widely used field buses in the worl...
详细信息
ISBN:
(纸本)9789881563903
The electric vehicles nowadays arc managed by networked controllers. Because of the advantages of fast, reliable, simple wiring, and light weight, CAN bus has become one of the most widely used field buses in the world. Most of the networks were designed with little concern about security which has recently motivated researchers to demonstrate various kinds of attacks against the system. This paper proposes an optimization method for encrypting CAN Messages. In addition, a single frame CAN message can only transmit 64-bit valid data, it is often necessary to complete the communication task by sending a multi-frame message with the same ID. The AES algorithm has become the first choice for encrypting multi-frame CAN messages with its extremely high reliability and fast encryption and decryption speed. In this paper, a method of encrypting multi-frame CAN messages based on the AES algorithm is proposed, and on the basis of which a hash value is optimized to ensure the security of data transmitted on the CAN bus.
暂无评论