The Application of National Security Algorithm in Wireless Networks for Industrial Automation Process Automation (WIA-PA) Network Data Security Transmission
DOI:
https://doi.org/10.13052/jcsm2245-1439.1368Keywords:
National security algorithm, Hash encryption algorithm, Identity authentication, WIA-PA, Data securityAbstract
Industrial wireless communication technology is the key to promoting the development of factory intelligence and automation. However, wireless network data security has hindered the development of industrial intelligence. Therefore, to solve the security issues of industrial wireless networks, a network data secure transmission technology based on the national security algorithm is proposed based on industrial wireless network standard protocols. Firstly, to address the vulnerability of network node identity authentication to attacks, the national security algorithm is used to construct a node authentication model. Secondly, a data security transmission model is constructed based on the improved national security algorithm, which can securely transmit industrial wireless networks by encrypting network application layer data. In network node identity authentication, when the step size was 50, the identity authentication average accuracy of the research mode reached over 98.95%, which was better than other models. When the step size was 50, the average accuracy of identity authentication in the research model was over 98.95%, showing the best performance among similar models. In the attack test of illegal client C, when the interaction history data was within 500, the node identity authentication was higher than 99.56%. However, when the interaction history data exceeded 500, the overall performance of the research model was still the best. In the comparison of node code storage and content usage overhead, when the code quantity was 15000, the storage overhead of the research model was 87356 bytes, with more node code storage and lower memory usage. The overall performance of the research model is better. From this, the research method performs the best in both identity recognition accuracy and security in network data security. The research content will provide technical support for the security management and data transmission of industrial wireless technology.
Downloads
References
Shen T, Guo F, Wu C K, Jing CQ. An information transmission scheme based on secure QR code in IoT. International Journal of Wireless and Mobile Computing, 2023, 25(1): 47–57.
Singh A K, Alshehri M, Bhushan S, et al. Secure and energy efficient data transmission model for WSN. Intelligent Automation & Soft Computing, 2021, 27(3): 761–769.
Singh A K, Alshehri M, Bhushan S, Kumar M. Secure and energy efficient data transmission model for WSN. Intelligent Automation & Soft Computing, 2021, 27(3): 761–769.
Ji Z. Engineering operation management technology based on network automation configuration visualization. International Journal of System Assurance Engineering and Management, 2021, 12(4): 765–775.
Ademaj F, Bernhard H P. Quality-of-service-based minimal latency routing for wireless networks. IEEE Transactions on Industrial Informatics, 2021, 18(3): 1811–1822.
Perwej Y, Akhtar N, Kulshrestha N, Rao AN. A Methodical Analysis of Medical Internet of Things (MIoT) Security and Privacy in Current and Future Trends. Journal of Emerging Technologies and Innovative Research, 2022, 9(1): 346–371.
Jiang Y, Shang T, Liu J. SM algorithms-based encryption scheme for large genomic data files. Digital Communications and Networks, 2021, 7(4): 543–550.
Shao T, Wei B, Ou Y, Wei, Y, Wu X. New Second-order Threshold Implementation of Sm4 Block Cipher. Journal of Electronic Testing, 2023, 39(4): 435–445.
Xiangliang M A, Bing L I, Hong W, Di W. Non-profiled Deep-Learning-Based Power Analysis of the SM4 and DES Algorithms. Chinese Journal of Electronics, 2021, 30(3): 500–507.
Wang R, Guo H, Lu J, Liu J W. Cryptanalysis of a white-box SM4 implementation based on collision attack. IET Information Security, 2022, 16(1): 18–27.
Larijani A, Dehghani F. An efficient optimization approach for designing machine models based on combined algorithm. FinTech, 2023, 3(1): 40–54.
Abolfathi M, Inturi S, Banaei-Kashani F, Jafarian JH. Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples. Computers & Security, 2024, 139(82): 103–173.
Dezfuli S M K P. Targeted killings and the erosion of international norm against assassination[J]. Defense & Security Analysis, 2023, 39(2): 191–206.
Li T, Zhang J, Obaidat M S, Lin Y. Energy-efficient and secure communication toward UAV networks. IEEE Internet of Things Journal, 2021, 9(12): 10061–10076.
Gupta M, Gupta K K, Shukla P K. Session key based fast, secure and lightweight image encryption algorithm. Multimedia Tools and Applications, 2021, 80(7): 10391–10416.
Marzog H A, Mohsin M J, Therib M A. Chaotic systems with pseudorandom number generate to protect the transmitted data of wireless network. Indonesian Journal of Electrical Engineering and Computer Science, 2021, 21(3): 1602–1610.
Zhang, Y., Xu, X., and Shi, Y. (2024). Construction and Analysis of Network Cloud Security Situation Awareness System Based on DBN-DE Algorithm. Journal of Cyber Security and Mobility, 13(03), 439–460. https://doi.org/10.13052/jcsm2245-1439.1335.
Sathya S S, Umadevi K. RETRACTED ARTICLE: An optimized distributed secure routing protocol using dynamic rate aware classified key for improving network security in wireless sensor network. Journal of Ambient Intelligence and Humanized Computing, 2021, 12(7): 7165–7171.
Ismael H M. Authentication and encryption drone communication by using HIGHT lightweight algorithm. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 2021, 12(11): 5891– 5908.
Jayapandian N. Cloud Dynamic Scheduling for Multimedia Data Encryption using Tabu Search Algorithm. Wireless Personal Communications, 2021, 120(3): 2427–2447.
Gheisari M, Hamidpour H, Liu Y, Saedi P, Raza A, Jalili A, Rokhsati H, Amin R. Data Mining Techniques for Web Mining: A Survey. Artificial Intelligence and Applications, 2023, 1(1): 3–10.
Groumpos P P. A Critical Historic Overview of Artificial Intelligence: Issues, Challenges, Opportunities, and Threats. Artificial Intelligence and Applications. 2023, 1(4): 197–213.
Bordel B, Alcarria R, Robles T. Lightweight encryption for short-range wireless biometric authentication systems in Industry 4.0. Integrated Computer-Aided Engineering, 2022, 29(2): 153–173.
Sikora, L. S., Lysa, N. K., Tsikalo, Y. I. and Fedevych, O. Y. (2023) “System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security”, Journal of Cyber Security and Mobility, 12(03), pp. 389–414.
Kumar, S., Kumar, D. and Lamkuche, H. S. (2021) “TPA Auditing to Enhance the Privacy and Security in Cloud Systems”, Journal of Cyber Security and Mobility, 10(3), pp. 537–568.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.