Abstract
The rapid development of wireless network brings a lot of convenience to people’s lives, but there are still many problems to be solved in wireless networks. Among them, communication security is the most critical, especially secure transactions on digital currency transactions are even more important. In traditional network communication encryption algorithms such as RSA and ECC, in order to further enhance the reliability of network communication security, the main means is to increase the length of the key, but this brings the complexity and workload of the calculation, and the speed of encryption cannot be realized. Compatible with security, the neural network chaotic encryption algorithm mainly uses the parallelity characteristics of the neural network and the chaotic dynamic characteristics to randomly generate a sequence, which has non-periodic characteristics. Therefore, the wireless network chaotic encryption algorithm is a good wireless communication security encryption algorithm. However, the traditional neural network chaotic encryption algorithm still has some shortcomings in its algorithm’s security performance, encryption speed, encryption efficiency, and anti-deciphering performance. At the same time, the research on neural network chaotic encryption algorithm in wireless communication security is relatively less.In this paper, the performance defect of the original neural network chaotic encryption algorithm is optimized. A dynamic key encryption and decryption neural network chaos algorithm for wireless communication security is proposed. The algorithm is mainly based on the Aihara neural network model and introduces chaos, mapping, and hybrid coding. At the end of the paper, the algorithms before and after optimization are compared. The experimental results show that the algorithm proposed in this paper has a significant improvement in the encryption and decryption speed and anti-deciphering ability of the key.
Highlights
1 Introduction With the rapid development of communication technology, wireless communication technology has spread widely, but people must bear the risks brought by wireless networks while enjoying the convenience brought by wireless network communication
The corresponding traditional chaotic encryption algorithm mainly includes the parameters and initial conditions of the logistic mapping proposed by Bianoo et al, and the partial key is used to encrypt each character in the information signal by the number of iterations of the mapping, but the number of iterations
1.1 Related work Aiming at the shortcomings of traditional neural network chaotic encryption algorithm, this paper proposes an optimization algorithm based on Aihara network model and chaotic mapping and hybrid coding
Summary
With the rapid development of communication technology, wireless communication technology has spread widely, but people must bear the risks brought by wireless networks while enjoying the convenience brought by wireless network communication. The neural network chaotic encryption algorithm [10,11,12] mainly utilizes the basic features of mixing, strong sensitivity to parameters and initial values in chaos theory. The corresponding traditional chaotic encryption algorithm mainly includes the parameters and initial conditions of the logistic mapping proposed by Bianoo et al, and the partial key is used to encrypt each character in the information signal by the number of iterations of the mapping, but the number of iterations. 1.1 Related work Aiming at the shortcomings of traditional neural network chaotic encryption algorithm, this paper proposes an optimization algorithm based on Aihara network model and chaotic mapping and hybrid coding. The traditional neural network chaotic encryption algorithm is compared with the optimization algorithm proposed in this paper. The fourth section carries out algorithm verification experiments and comparative analysis and draws conclusions
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: EURASIP Journal on Wireless Communications and Networking
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.