Skip to main content
Log in

A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In order to solve the problems of low transmission efficiency and high transmission bit error rate in traditional transmission methods, a new secure transmission method of network communication data is designed based on symmetric key encryption algorithm. Based on the analysis of the security key theory, the agentless key publishing protocol is adopted to control the access of network communication data, so as to construct the ciphertext protocol. Then the key construction in the encryption process is completed by bilinear mapping method. On this basis, the encryption and decryption algorithm, dynamic key generation module and Shared key update module are combined to realize the secure transmission of network communication data. The experimental results show that the bit error rate of this method was kept below 1%, the time of transmission was below 80 s, and the VIM value exceeded 0.1, indicating that this method has the advantages of high data transmission efficiency, low bit error rate and safer transmission process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data Availability

There is no data file included in this work.

References

  1. Arhin, K., Wiredu, G. O., et al. (2018). An organizational communication approach to information security. African Journal of Information Systems, 10(04), 1936–1947.

    Google Scholar 

  2. Nia, A. M., Sur-Kolay, S., Raghunathan, A., et al. (2017). Physiological Information Leakage: A New Frontier in Health Information Security [J]. IEEE Transactions on Emerging Topics in Computing, 04(03), 321–334.

    Google Scholar 

  3. Kawanaka, T., Rokugawa, S., & Yamashita, H. (2018). Information sharing and security for a memory channel communication network [J]. Industrial Engineering and Management Systems, 17(19), 444–453.

    Article  Google Scholar 

  4. Chen, J., Zhao, F., & Xing, H. (2020). Research on security of mobile communication information transmission based on heterogeneous network [J]. International Journal of Network Security, 22(01), 145–149.

    Google Scholar 

  5. Shi, L. L., & Li, J. Z. (2019). Research and design of secure data transmission mechanism in heterogeneous network. Microelectronics and Computer, 36(11), 84-88+94.

    Google Scholar 

  6. Wang, W. X. (2018). Data security mix transmission mechanism in body area network. Computer Science, 45(05), 102–107.

    Google Scholar 

  7. Audai, A., & Yazeed, A. (2017). Symmetric volatile shared key encryption: A two-way communication shared key encryption [J]. Mathematics and Computer Science, 29(14), 95–103.

    Google Scholar 

  8. Zhai, F., & Fu, Y. L. (2019). Secure transfer of terminal upgraded files based on dynamic symmetric key encryption. Information Technology, 15(12), 91–94.

    Google Scholar 

  9. Zhou, L., Chen, J., Zhang, Y., et al. (2019). Security analysis and new models on the intelligent symmetric key encryption [J]. Computers and Security, 80(01), 14–24.

    Article  Google Scholar 

  10. Raja, S. P. (2019). Multiscale transform based secured joint efficient medical image compression-encryption using symmetric key cryptogrphy and EBCOT encoding technique [J]. International Journal of Wavelets, Multiresolution and Information Processing, 17(05), 1907–1917.

    Article  Google Scholar 

  11. Nath, A. (2018). Symmetric key encryption algorithm using dna sequence [J]. Ijarcsms, 06(04), 216–227.

    Google Scholar 

  12. Jianyi, S., Xinpeng, C., Xianfei, Z., et al. (2019). Design and implementation of information secure transmission system based on CAPICOM [J]. Electric Engineering, 53(20), 156-158+161.

    Google Scholar 

  13. Xing, L. I., Ji, L., & Ying, L. (2018). Research on information security in electric power automation communication technology [J]. Telecom Power Technology, 35(04), 181–182.

    Google Scholar 

  14. Kynshi, M. J. L., & Jose, D. D. V. (2017). Enhanced content based double encryption algorithm using symmetric key cryptography [J]. Oriental Journal of Computer Science and Technology, 10(02), 345–351.

    Article  Google Scholar 

  15. Gopalakrishnan, S., Appadurai, A., & Seethalakshmi, A. N. (2019). Generalized analytical solutions for secure transmission of signals using a simple communication scheme with numerical and experimental confirmation [J]. Chinese Journal of Physics, 62(15), 72–85.

    MathSciNet  Google Scholar 

  16. Xiaojun, W., Genping, W., Yongzhi, C., et al. (2018). Quantum solution for secure information transmission of wearable devices [J]. International Journal of Distributed Sensor Networks, 14(05), 155–167.

    Google Scholar 

  17. Subandi, A., Meiyanti, R., Sandy, C. L. M., et al. (2017). Three-pass protocol implementation in vigenere cipher classic cryptography algorithm with keystream generator modification [J]. Advances in Science Technology and Engineering Systems, 10(31), 417–429.

    Google Scholar 

  18. Chong, B., & Yongzhong, L. I. (2018). Research on hybrid encryption algorithm based on DES symmetric encryption and CP-ABE attribute encryption [J]. Computer and Digital Engineering, 35(03), 516–523.

    Google Scholar 

  19. Xiao, T., Chong, Z., Mei, Z., et al. (2019). Analysis of information security loopholes and preventive measures of power communication automation [J]. Telecom Power Technology, 36(06), 218–219.

    Google Scholar 

  20. Tang, X., Cai, Y., Yang, W., et al. (2018). Secure transmission of cooperative Zero-Forcing jamming for Two-User SWIPT sensor networks [J]. Sensors, 18(02), 331–343.

    Article  Google Scholar 

  21. Mou, B., Bai, Y., & Patel, V. (2020). Post-local buckling failure of slender and over-design circular CFT columns with high-strength materials. Engineering Structures, 210, 110197. https://doi.org/10.1016/j.engstruct.2020.110197.

    Article  Google Scholar 

  22. Yu, X., Zhang, J., Zhang, J., Niu, J., Zhao, J., Wei, Y., & Yao, B. (2019). Photocatalytic degradation of ciprofloxacin using Zn-doped Cu2O particles: Analysis of degradation pathways and intermediates. Chemical Engineering Journal (Lausanne, Switzerland: 1996), 374, 316–327. https://doi.org/10.1016/j.cej.2019.05.177.

    Article  Google Scholar 

Download references

Funding

There is no funding provided.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wentian Cai.

Ethics declarations

Conflict of interest

There is no conflict of interest.

Code Availability

There is no specific code in this work specified.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cai, W., Yao, H. A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm. Wireless Pers Commun 127, 341–352 (2022). https://doi.org/10.1007/s11277-021-08266-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08266-w

Keywords

Navigation