Abstract
In order to solve the problems of low transmission efficiency and high transmission bit error rate in traditional transmission methods, a new secure transmission method of network communication data is designed based on symmetric key encryption algorithm. Based on the analysis of the security key theory, the agentless key publishing protocol is adopted to control the access of network communication data, so as to construct the ciphertext protocol. Then the key construction in the encryption process is completed by bilinear mapping method. On this basis, the encryption and decryption algorithm, dynamic key generation module and Shared key update module are combined to realize the secure transmission of network communication data. The experimental results show that the bit error rate of this method was kept below 1%, the time of transmission was below 80 s, and the VIM value exceeded 0.1, indicating that this method has the advantages of high data transmission efficiency, low bit error rate and safer transmission process.
Similar content being viewed by others
Data Availability
There is no data file included in this work.
References
Arhin, K., Wiredu, G. O., et al. (2018). An organizational communication approach to information security. African Journal of Information Systems, 10(04), 1936–1947.
Nia, A. M., Sur-Kolay, S., Raghunathan, A., et al. (2017). Physiological Information Leakage: A New Frontier in Health Information Security [J]. IEEE Transactions on Emerging Topics in Computing, 04(03), 321–334.
Kawanaka, T., Rokugawa, S., & Yamashita, H. (2018). Information sharing and security for a memory channel communication network [J]. Industrial Engineering and Management Systems, 17(19), 444–453.
Chen, J., Zhao, F., & Xing, H. (2020). Research on security of mobile communication information transmission based on heterogeneous network [J]. International Journal of Network Security, 22(01), 145–149.
Shi, L. L., & Li, J. Z. (2019). Research and design of secure data transmission mechanism in heterogeneous network. Microelectronics and Computer, 36(11), 84-88+94.
Wang, W. X. (2018). Data security mix transmission mechanism in body area network. Computer Science, 45(05), 102–107.
Audai, A., & Yazeed, A. (2017). Symmetric volatile shared key encryption: A two-way communication shared key encryption [J]. Mathematics and Computer Science, 29(14), 95–103.
Zhai, F., & Fu, Y. L. (2019). Secure transfer of terminal upgraded files based on dynamic symmetric key encryption. Information Technology, 15(12), 91–94.
Zhou, L., Chen, J., Zhang, Y., et al. (2019). Security analysis and new models on the intelligent symmetric key encryption [J]. Computers and Security, 80(01), 14–24.
Raja, S. P. (2019). Multiscale transform based secured joint efficient medical image compression-encryption using symmetric key cryptogrphy and EBCOT encoding technique [J]. International Journal of Wavelets, Multiresolution and Information Processing, 17(05), 1907–1917.
Nath, A. (2018). Symmetric key encryption algorithm using dna sequence [J]. Ijarcsms, 06(04), 216–227.
Jianyi, S., Xinpeng, C., Xianfei, Z., et al. (2019). Design and implementation of information secure transmission system based on CAPICOM [J]. Electric Engineering, 53(20), 156-158+161.
Xing, L. I., Ji, L., & Ying, L. (2018). Research on information security in electric power automation communication technology [J]. Telecom Power Technology, 35(04), 181–182.
Kynshi, M. J. L., & Jose, D. D. V. (2017). Enhanced content based double encryption algorithm using symmetric key cryptography [J]. Oriental Journal of Computer Science and Technology, 10(02), 345–351.
Gopalakrishnan, S., Appadurai, A., & Seethalakshmi, A. N. (2019). Generalized analytical solutions for secure transmission of signals using a simple communication scheme with numerical and experimental confirmation [J]. Chinese Journal of Physics, 62(15), 72–85.
Xiaojun, W., Genping, W., Yongzhi, C., et al. (2018). Quantum solution for secure information transmission of wearable devices [J]. International Journal of Distributed Sensor Networks, 14(05), 155–167.
Subandi, A., Meiyanti, R., Sandy, C. L. M., et al. (2017). Three-pass protocol implementation in vigenere cipher classic cryptography algorithm with keystream generator modification [J]. Advances in Science Technology and Engineering Systems, 10(31), 417–429.
Chong, B., & Yongzhong, L. I. (2018). Research on hybrid encryption algorithm based on DES symmetric encryption and CP-ABE attribute encryption [J]. Computer and Digital Engineering, 35(03), 516–523.
Xiao, T., Chong, Z., Mei, Z., et al. (2019). Analysis of information security loopholes and preventive measures of power communication automation [J]. Telecom Power Technology, 36(06), 218–219.
Tang, X., Cai, Y., Yang, W., et al. (2018). Secure transmission of cooperative Zero-Forcing jamming for Two-User SWIPT sensor networks [J]. Sensors, 18(02), 331–343.
Mou, B., Bai, Y., & Patel, V. (2020). Post-local buckling failure of slender and over-design circular CFT columns with high-strength materials. Engineering Structures, 210, 110197. https://doi.org/10.1016/j.engstruct.2020.110197.
Yu, X., Zhang, J., Zhang, J., Niu, J., Zhao, J., Wei, Y., & Yao, B. (2019). Photocatalytic degradation of ciprofloxacin using Zn-doped Cu2O particles: Analysis of degradation pathways and intermediates. Chemical Engineering Journal (Lausanne, Switzerland: 1996), 374, 316–327. https://doi.org/10.1016/j.cej.2019.05.177.
Funding
There is no funding provided.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
There is no conflict of interest.
Code Availability
There is no specific code in this work specified.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Cai, W., Yao, H. A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm. Wireless Pers Commun 127, 341–352 (2022). https://doi.org/10.1007/s11277-021-08266-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08266-w