Skip to main content
Log in

Research on the optimization of communication protocol in network security protocol

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

With the rapid development of communication technology, the optimization of communication protocol, as a new generation of intelligent traffic system technology, has attracted more and more attention, in particular, the communication technology in traffic. In the authentication protocol of this paper, the symmetric cipher algorithm ZUC and the asymmetric cryptographic algorithm RSA are used as the cryptographic algorithms of the protocol. RSA is used to decrypt digital signatures for messages. In the current communication scheme, node communication does not have scalability and communication requirements in different scenarios, and a population key negotiation communication protocol was proposed in this paper. Employing the kana and random key parameters of the nodes in the roadside cell group, 3 communication protocols for group broadcasting, group to vehicle communication, and RSU communication between groups were designed. The results show that the protocol can meet the security requirements of network communication. The results show that the communication protocol in this paper is safe and reliable. At last, the communication efficiency of communication protocol is analyzed using communication overhead and average delay. The proposed protocol is an efficient communication protocol and the scheme is superior to other schemes in terms of communication overhead and average delay.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

References

  • Anwar RW (2015) A survey of wireless sensor network security and routing techniques. Res J Appl Sci Eng Technol 9(11):1016–1026

    Article  Google Scholar 

  • Athavale VA (2021) Application of artificial intelligence in magnetic resonance imaging to reduce Gadolinium accumulation in patients with multiple sclerosis: a review. SPR 1(4):416–428

    Article  Google Scholar 

  • Bapat M (2016) Insights to sensor technology and its applications. Int J Adv Trends Comput Sci Eng 167(2):378–468

    Google Scholar 

  • Bitam S, Zeadally S, Mellouk A (2016) Bio-inspired cybersecurity for wireless sensor networks. IEEE Commun Mag 54(6):68–74

    Article  Google Scholar 

  • Curiac DI (2016) Wireless sensor network security enhancement using directional antennas: state of the art and research challenges. Sensors 16(4):488–521

    Article  Google Scholar 

  • Ejaz H, Yousaf MH, Shahid M, Ashiq S, Saharan QM (2021) Role of periodic table elements in advanced energy storage devices. SPR 1(4):220–233

    Article  Google Scholar 

  • He D, Chan S, Guizani M (2017) Cyber security analysis and protection of wireless sensor networks for smart grid monitoring. IEEE Wirel Commun 178(99):2–7

    Google Scholar 

  • Ng F (2015) Wireless sensor network security. Int J Distrib Sens Netw 1(13):140–146

    Google Scholar 

  • Saganowski Ł, Andrysiak T, Kozik R et al (2016) DWT-based anomaly detection method for the cyber security of wireless sensor networks. Secur Commun Netw 9(15):2911–2922

    Article  Google Scholar 

  • Sari A, Karay M (2015) Reactive data security approach and review of data security techniques in wireless networks. Int J Commun Netw Syst Sci 8(13):567–577

    Google Scholar 

Download references

Funding

Natural Science research project of institution of higher education in Anhui Province (Source), Research on the application of cloud computing-based security level protection for data center in higher vocational colleges no. KJ2020A0934.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daoyuan Sun.

Ethics declarations

Conflict of interest

The authors have not disclosed any competing interests.

Additional information

Communicated by Irfan Uddin.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, D. Research on the optimization of communication protocol in network security protocol. Soft Comput 26, 7959–7966 (2022). https://doi.org/10.1007/s00500-022-06855-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-022-06855-w

Keywords

Navigation