Skip to main content
Log in

Automatic Encryption Method of Sensor Network Capture Data Based on Symmetric Algorithm

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Due to overlapping coverage areas of nodes, traditional data encryption methods for sensor networks fail to consider the logical correlation between common nodes and transmission paths, resulting in low data capture efficiency, low data communication after encryption, and poor data sensitivity extraction effect. Therefore, this paper proposes an automatic encryption method for sensor network capture data based on symmetric algorithm. Based on the analysis of WSN architecture and sensor node structure, symmetric algorithm encryption flow is designed; The network attack model is established, and the multi-path transmission security is analyzed according to the symmetric algorithm, the probability of successful eavesdropping is calculated, and the sensor network capture data is encrypted accordingly. In order to verify the performance of network capture data encryption, a comparative experiment is designed. The results show that the data recall rate is as high as 99.0%, the data communication volume can reach 6.97 × 104byte, and the extraction accuracy of sensitive information can reach 97.9%. This method can effectively solve the problems existing in traditional methods and lay a foundation for the development of sensor network data encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availability

There is no data file included in this work.

Code Availability

There is no specific code in this work specified.

References

  1. Wu, G. F., Tao, R. X., & Yin, Y. S. (2019). Social network information transmission privacy protection simulation in the era of big data. Computer Simulation, 36(04), 107-110+189.

    Google Scholar 

  2. Chu, W. (2019). Application of data encryption technology in computer network security. Journal of Physics: Conference Series, 12(37), 22–49.

    Google Scholar 

  3. Fei, J. (2018). Application of data encryption technology in computer network communication security. Wireless Internet Technology, 15(17), 3–4.

    Google Scholar 

  4. Zhou, Q., Qin, X. L., & Liu, L. (2018). Preserving receiver-location privacy based on Kautz graph in WSNs. Journal of Nanjing University of Science and Technology, 42(02), 94–100.

    Google Scholar 

  5. Zhang, H., Song, J., & Luo, M. J. (2019). Research on data security transmission method of distributed wireless sensor network based on MD5 algorithm. Journal of Suzhou University of Science and Technology (Natural Science Edition), 36(01), 68–74.

    Google Scholar 

  6. Gao, F. (2019). Data encryption algorithm for e-commerce platform based on blockchain technology. Discrete and Continuous Dynamical Systems, 12(4), 1457–1470.

    Article  MathSciNet  MATH  Google Scholar 

  7. Aljammal, A. H., Bani-Salameh, H., Qawasmeh, A., et al. (2018). A new technique for data encryption based on third party encryption server to maintain the privacy preserving in the cloud environment. International Journal of Business Information Systems, 28(4), 393–403.

    Article  Google Scholar 

  8. Bai, T., Lin, J., Li, G., et al. (2018). A lightweight method of data encryption in BANs using electrocardiogram signal. Future Generation Computer Systems, 92(5), 800–811.

    Google Scholar 

  9. Zhao, Y., & Zhang, Y. (2019). Safety protection of e-commerce logistics information data under the background of big data. International Journal of Network Security, 21(1), 160–165.

    Google Scholar 

  10. Yucai, Z. (2019). Application of data encryption technology in computer network communication security. Telecom Power Technology, 36(08), 200–201.

    Google Scholar 

  11. Li, X. (2020). Application of data encryption technology in computer network communication security. Journal of Physics Conference Series, 15(74), 12–34.

    Google Scholar 

  12. Quang, D. V., Hoan, T. N. K., & Koo, I. (2018). Energy-efficient data encryption scheme for cognitive radio networks. IEEE Sensors Journal, 18(5), 2050–2059.

    Article  Google Scholar 

  13. Young-Hoon, P. (2018). Key management and data re-encryption schemes for secure in-vehicle network. Journal of Intelligent and Fuzzy Systems, 35(5), 1–9.

    Google Scholar 

  14. Yongli, Z., Yuan, C., Wei, W., et al. (2018). Resource allocation in optical networks secured by quantum key distribution. IEEE Communications Magazine, 56(8), 130–137.

    Article  Google Scholar 

  15. Vijayakumar, V., Priyan, M. K., Ushadevi, G., et al. (2019). E-health cloud security using timing enabled proxy re-encryption. Mobile Networks and Applications, 24(3), 1034–1045.

    Article  Google Scholar 

Download references

Funding

The research is supported by: The basic scientific research business expenses of Education Department of Heilongjiang Province project number: 1354MSYYB002.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Li.

Ethics declarations

Conflict of interest

There is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, M. Automatic Encryption Method of Sensor Network Capture Data Based on Symmetric Algorithm. Wireless Pers Commun 127, 353–367 (2022). https://doi.org/10.1007/s11277-021-08267-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08267-9

Keywords

Navigation