Skip to main content
Log in

Encryption Transmission Verification Method of IT Operation and Maintenance Data Based on Fuzzy Clustering Analysis

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In this study, an IT operation and maintenance data encryption transmission verification algorithm based on fuzzy clustering analysis is presented. The key information of IT operation and maintenance data encryption is constructed, the key rearrangement of IT operation and maintenance data is realized through key representation method, the vector quantitative coding design of IT operation and maintenance data is implemented using fuzzy clustering coding method, the coding protocol and encryption transmission verification protocol between IT operation and maintenance data are developed, and the ciphertext control during IT operation and maintenance data encryption is conducted based on fuzzy clustering analysis and quantum evolutionary coding method. The minimum anti attack ability of the method is 0.932, the method has good anti attack ability and high scrambling ability to verify the encryption transmission of it operation and maintenance data, and improves the encryption protection ability of it operation and maintenance data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Amirat Y, Münch A (2019) On the controllability of an advection-diffusion equation with respect to the diffusion parameter: Asymptotic analysis and numerical simulations. Acta Mathematicae Applicatae Sinica, English Serie 35(1):54–110

    Article  MathSciNet  Google Scholar 

  2. Ni XJ, Gole AM, Zhao CY et al (2018) An improved measure of AC system strength for performance analysis of multi-infeed HVdc systems including VSC and LCC converters. IEEE Trans Power Delivery 33(1):169–178

    Article  Google Scholar 

  3. Wang WK, Wang YT (2019) The well-posedness of solution to semilinear pseudo-parabolic equation. Acta Mathematicae Applicatae Sinica, English Serie 35(2):386–400

    Article  MathSciNet  Google Scholar 

  4. Murphy K, Van Ginneken B, Schilham AM et al (2009) A large-scale evaluation of automatic pulmonary nodule detection in chest CT using local image features and k-nearest-neighbour classification. Med Image Anal 13(5):757–770

    Article  Google Scholar 

  5. Lopez T, Fiorina E, Pennazio F et al (2015) Large scale validation of the M5L lung CAD on heterogeneous CT datasets. Med Phys 42(4):1477–1489

    Article  Google Scholar 

  6. Li CF, Zhu GC, Wu XJ et al (2018) False-positive reduction on lung nodules detection in chest radiographs by ensemble of convolutional neural networks. IEEE Access 6(99):16060–16067

    Article  Google Scholar 

  7. Han XQ, Wang F (2012) Research and implementation of show system of its operation and maintenance data. Computer Science 39(2):232–235

    Google Scholar 

  8. Xie HT, Yang DB, Sun NN et al (2019) Automated pulmonary nodule detection in CT images using deep convolutional neural networks. Pattern Recogn 85:109–119

    Article  Google Scholar 

  9. Li W, Cao P, Zhao DZ, et al. Pulmonary nodule classification with deep convolutional neural networks on computed tomography images. Computational and Mathematical Methods in Medicine, 2016: 6215085.

  10. Ding J, Li AX, Hu ZQ, et al. Accurate pulmonary nodule detection in computed tomography images using deep convolutional neural networks. In: Proceedings of the 2017 International Conference on Medical Computing and Computer-assisted Intervention. Berlin: Springer, 2017: 559–567.

  11. Tao W J, Lu Y, Wei X, et al. Software implementation of precision clock synchronization based on PTPd2. Computer Engineering, 2019, 45(3): 47–53, 59.

  12. Li CF, Chen QK (2019) GPU cluster power consumption collection and monitoring system based on sensor. Comput Eng 45(3):65–72

    Google Scholar 

  13. Pan CS, Jia YR, Cai RY et al (2019) Routing strategy for spatial information network based on MPLS. Comput Eng 45(3):85–90

    Google Scholar 

  14. Lee GM, Lee JH. On nonsmooth optimality theorems for robust multiobjective optimization problems. Journal of Nonlinear and Convex Analysis, 2015, 16(10): 2039–2052.

  15. Sun XK, Peng ZY, Guo XL (2016) Some characterizations of robust optimal solutions for uncertain convex optimization problems. Optimization Letters 10(7):1463–1478

    Article  MathSciNet  Google Scholar 

  16. Yang Y, Zhong M, Yao H et al (2018) Internet of things for smart ports: Technologies and challenges. IEEE Instrum Meas Mag 21(1):34–43

    Article  Google Scholar 

  17. Yang A, Li S, Ren C et al (2018) Situational awareness system in the smart campus. IEEE Access 6:63976–63986

    Article  Google Scholar 

  18. Kim YK, Choi K, Kim J et al (2014) PIR-based data integrity verification method in sensor network. Journal of Central South University 21(10):3883–3888

    Article  Google Scholar 

  19. Zhu Z, Gao X, Cao LL et al (2016) Research on the shift strategy of HMCVT based on the physical parameters and shift time. Appl Math Model 40(15):6889–6907

    Article  Google Scholar 

  20. Sathiamoorthy J, Ramakrishnan B (2017) A reliable data transmission in EAACK MANETS using hybrid three-tier competent fuzzy cluster algorithm. Wireless Pers Commun 97(2):1–20

    Google Scholar 

  21. Lee K, Kim J, Park Y et al (2017) Latency of cellular-based V2X: Perspectives on TTI-proportional-latency and TTI-independent-latency. IEEE Access 4(99):1–2

    Article  Google Scholar 

  22. Cao B, Fan S, Zhao J, et al. Quantum-enhanced multiobjective large-scale optimization via parallelism. Swarm Evol Comput, 2020, 57: 100697.

  23. Cao B, Wang X, Zhang W et al (2020) A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Network 34(5):78–83

    Article  Google Scholar 

  24. Abiodun AS, Anisi MH, Ali I et al (2017) Reducing power consumption in wireless body area networks: A novel data segregation and classification technique. IEEE Consumer Electronics Magazine 6(4):38–47

    Article  Google Scholar 

  25. Aldahdooh A, Masala E, Janssens O et al (2018) Improved performance measures for video quality assessment algorithms using training and validation sets. IEEE Trans Multimedia 21(8):2026–2041

    Article  Google Scholar 

  26. Xiong L, Zhang H, Li Y et al (2016) Improved stability and H∞ performance for neutral systems with uncertain Markovian jump. Nonlinear Anal Hybrid Syst 19:13–25

    Article  MathSciNet  Google Scholar 

  27. Zuo C, Li J, Sun J, et al. Transport of intensity equation: A tutorial. Opt Laser Eng, 2020: 106187.

  28. Taylan O, Zytoon MA, Morfeq A et al (2017) Workplace assessment by fuzzy decision tree and topsis methodologies to manage the occupational safety and health performance. Journal of Intelligent and Fuzzy Systems 33(2):1209–1224

    Article  Google Scholar 

  29. Gao W, Zhu L, Guo Y et al (2017) Ontology learning algorithm for similarity measuring and ontology mapping using linear programming. Journal of Intelligent & Fuzzy Systems 33(5):3153–3163

    Article  Google Scholar 

  30. Ding KJ, Kishk AA (2018) 2-D butler matrix and phase-shifter group. IEEE Trans Microw Theory Tech 6(99):1–9

    Google Scholar 

  31. Yan SF, Ma B, Zheng CS, et al. Wear localization and identification under nonlinear condition monitoring data. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2019, 49(2): 359–365.

  32. Marcelino LV, Pinto AL, Marques CA (2020) Scientific specialties in Green Chemistry. Iberoamerican Journal of Science Measurement and Communication 1(1):005

    Article  Google Scholar 

  33. Cao B, Zhao J, Lv Z et al (2020) Multiobjective evolution of fuzzy rough neural network via distributed parallelism for stock prediction. IEEE Trans Fuzzy Syst 28(5):939–952

    Article  Google Scholar 

  34. Li W, Wu T, Wang W et al (2014) Broadband patterned magnetic microwave absorber. J Appl Phys 116(4):44110

    Article  Google Scholar 

  35. Lv Z, Kumar N (2020) Software defined solutions for sensors in 6G/IoE. Comput Commun 153:42–47

    Article  Google Scholar 

  36. Kovalnogov VN, Simos TE, Tsitouras C (2020) Ninth-Order, explicit, two-step methods for second-order inhomogeneous linear IVPs. Mathematical Methods in the Applied Sciences 43:4918–4926

    MathSciNet  MATH  Google Scholar 

  37. Simos TE, Tsitouras C. Explicit, ninth order, two step methods for solving inhomogeneous linear problems x ‘‘(t) = lambda x(t) plus f(t). Applied Numerical Mathematics, 2020.

  38. Do HT, Dang TD, Truong HVA et al (2017) Maximum power point tracking and output power control on pressure coupling wind energy conversion system. IEEE Trans Industr Electron 6(99):1–2

    Google Scholar 

  39. Mou B, Bai Y, Patel V. Post-local buckling failure of slender and over-design circular CFT columns with high-strength materials. Engineering Structures, 2020, 210: 110197.

  40. Shi K, Tang Y, Liu X et al (2017) Secondary delay-partition approach on robust performance analysis for uncertain time-varying Lurie nonlinear control system. Optimal Control Applications and Methods 38(6):1208–1226

    Article  MathSciNet  Google Scholar 

  41. Chen G, Zhang WG, Wang LM (2017) Fuzzy-neural-network-based speed control method and experiment verification for electromagnetic direct drive robot driver. Chin Sci Bull 62(30):3514–3527

    Article  Google Scholar 

  42. Zhang H, Qu S, Li H et al (2020) A moving shadow elimination method based on fusion of multi-feature. IEEE Access 8:63971–63982

    Article  Google Scholar 

  43. Xu W, Qu S, Zhao L, et al. An improved adaptive sliding mode observer for a middle and high-speed rotors tracking. IEEE Transactions on Power Electronics, 2020, 1.

  44. Medvedeva MA, Simos TE, Tsitouras C. Sixth-Order, P-Stable, Numerov-Type methods for use at moderate accuracies. Mathematical Methods in the Applied Sciences, 2021.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongsheng Zhang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, C., Zhang, Y., Xue, Y. et al. Encryption Transmission Verification Method of IT Operation and Maintenance Data Based on Fuzzy Clustering Analysis. Mobile Netw Appl 27, 1386–1396 (2022). https://doi.org/10.1007/s11036-022-01919-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-022-01919-5

Keywords

Navigation