Abstract
Due to overlapping coverage areas of nodes, traditional data encryption methods for sensor networks fail to consider the logical correlation between common nodes and transmission paths, resulting in low data capture efficiency, low data communication after encryption, and poor data sensitivity extraction effect. Therefore, this paper proposes an automatic encryption method for sensor network capture data based on symmetric algorithm. Based on the analysis of WSN architecture and sensor node structure, symmetric algorithm encryption flow is designed; The network attack model is established, and the multi-path transmission security is analyzed according to the symmetric algorithm, the probability of successful eavesdropping is calculated, and the sensor network capture data is encrypted accordingly. In order to verify the performance of network capture data encryption, a comparative experiment is designed. The results show that the data recall rate is as high as 99.0%, the data communication volume can reach 6.97 × 104byte, and the extraction accuracy of sensitive information can reach 97.9%. This method can effectively solve the problems existing in traditional methods and lay a foundation for the development of sensor network data encryption.
Similar content being viewed by others
Data Availability
There is no data file included in this work.
Code Availability
There is no specific code in this work specified.
References
Wu, G. F., Tao, R. X., & Yin, Y. S. (2019). Social network information transmission privacy protection simulation in the era of big data. Computer Simulation, 36(04), 107-110+189.
Chu, W. (2019). Application of data encryption technology in computer network security. Journal of Physics: Conference Series, 12(37), 22–49.
Fei, J. (2018). Application of data encryption technology in computer network communication security. Wireless Internet Technology, 15(17), 3–4.
Zhou, Q., Qin, X. L., & Liu, L. (2018). Preserving receiver-location privacy based on Kautz graph in WSNs. Journal of Nanjing University of Science and Technology, 42(02), 94–100.
Zhang, H., Song, J., & Luo, M. J. (2019). Research on data security transmission method of distributed wireless sensor network based on MD5 algorithm. Journal of Suzhou University of Science and Technology (Natural Science Edition), 36(01), 68–74.
Gao, F. (2019). Data encryption algorithm for e-commerce platform based on blockchain technology. Discrete and Continuous Dynamical Systems, 12(4), 1457–1470.
Aljammal, A. H., Bani-Salameh, H., Qawasmeh, A., et al. (2018). A new technique for data encryption based on third party encryption server to maintain the privacy preserving in the cloud environment. International Journal of Business Information Systems, 28(4), 393–403.
Bai, T., Lin, J., Li, G., et al. (2018). A lightweight method of data encryption in BANs using electrocardiogram signal. Future Generation Computer Systems, 92(5), 800–811.
Zhao, Y., & Zhang, Y. (2019). Safety protection of e-commerce logistics information data under the background of big data. International Journal of Network Security, 21(1), 160–165.
Yucai, Z. (2019). Application of data encryption technology in computer network communication security. Telecom Power Technology, 36(08), 200–201.
Li, X. (2020). Application of data encryption technology in computer network communication security. Journal of Physics Conference Series, 15(74), 12–34.
Quang, D. V., Hoan, T. N. K., & Koo, I. (2018). Energy-efficient data encryption scheme for cognitive radio networks. IEEE Sensors Journal, 18(5), 2050–2059.
Young-Hoon, P. (2018). Key management and data re-encryption schemes for secure in-vehicle network. Journal of Intelligent and Fuzzy Systems, 35(5), 1–9.
Yongli, Z., Yuan, C., Wei, W., et al. (2018). Resource allocation in optical networks secured by quantum key distribution. IEEE Communications Magazine, 56(8), 130–137.
Vijayakumar, V., Priyan, M. K., Ushadevi, G., et al. (2019). E-health cloud security using timing enabled proxy re-encryption. Mobile Networks and Applications, 24(3), 1034–1045.
Funding
The research is supported by: The basic scientific research business expenses of Education Department of Heilongjiang Province project number: 1354MSYYB002.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
There is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, M. Automatic Encryption Method of Sensor Network Capture Data Based on Symmetric Algorithm. Wireless Pers Commun 127, 353–367 (2022). https://doi.org/10.1007/s11277-021-08267-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08267-9