Abstract

The rapid development of wireless network brings a lot of convenience to people’s lives, but there are still many problems to be solved in wireless networks. Among them, communication security is the most critical, especially secure transactions on digital currency transactions are even more important. In traditional network communication encryption algorithms such as RSA and ECC, in order to further enhance the reliability of network communication security, the main means is to increase the length of the key, but this brings the complexity and workload of the calculation, and the speed of encryption cannot be realized. Compatible with security, the neural network chaotic encryption algorithm mainly uses the parallelity characteristics of the neural network and the chaotic dynamic characteristics to randomly generate a sequence, which has non-periodic characteristics. Therefore, the wireless network chaotic encryption algorithm is a good wireless communication security encryption algorithm. However, the traditional neural network chaotic encryption algorithm still has some shortcomings in its algorithm’s security performance, encryption speed, encryption efficiency, and anti-deciphering performance. At the same time, the research on neural network chaotic encryption algorithm in wireless communication security is relatively less.In this paper, the performance defect of the original neural network chaotic encryption algorithm is optimized. A dynamic key encryption and decryption neural network chaos algorithm for wireless communication security is proposed. The algorithm is mainly based on the Aihara neural network model and introduces chaos, mapping, and hybrid coding. At the end of the paper, the algorithms before and after optimization are compared. The experimental results show that the algorithm proposed in this paper has a significant improvement in the encryption and decryption speed and anti-deciphering ability of the key.

Highlights

  • 1 Introduction With the rapid development of communication technology, wireless communication technology has spread widely, but people must bear the risks brought by wireless networks while enjoying the convenience brought by wireless network communication

  • The corresponding traditional chaotic encryption algorithm mainly includes the parameters and initial conditions of the logistic mapping proposed by Bianoo et al, and the partial key is used to encrypt each character in the information signal by the number of iterations of the mapping, but the number of iterations

  • 1.1 Related work Aiming at the shortcomings of traditional neural network chaotic encryption algorithm, this paper proposes an optimization algorithm based on Aihara network model and chaotic mapping and hybrid coding

Read more

Summary

Introduction

With the rapid development of communication technology, wireless communication technology has spread widely, but people must bear the risks brought by wireless networks while enjoying the convenience brought by wireless network communication. The neural network chaotic encryption algorithm [10,11,12] mainly utilizes the basic features of mixing, strong sensitivity to parameters and initial values in chaos theory. The corresponding traditional chaotic encryption algorithm mainly includes the parameters and initial conditions of the logistic mapping proposed by Bianoo et al, and the partial key is used to encrypt each character in the information signal by the number of iterations of the mapping, but the number of iterations. 1.1 Related work Aiming at the shortcomings of traditional neural network chaotic encryption algorithm, this paper proposes an optimization algorithm based on Aihara network model and chaotic mapping and hybrid coding. The traditional neural network chaotic encryption algorithm is compared with the optimization algorithm proposed in this paper. The fourth section carries out algorithm verification experiments and comparative analysis and draws conclusions

Methods
Problems with network links
There is a problem with the authentication system
Improve the protection of wireless terminals
Optimized neural network chaotic encryption algorithm
The encryption speed is slow
Weak anti-deciphering ability
Experimental
Results and discussion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call