Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree

被引:0
|
作者
Chen, Ding [1 ]
Aljohani, Abeer [2 ]
机构
[1] Nanchang Jiaotong Inst, Sch Traff & Transportat, Nanchang 330100, Peoples R China
[2] Taibah Univ, Appl Coll, Dept Comp Sci, Medina 42353, Saudi Arabia
关键词
Digital twin; Merkle hash tree; WCN; Secure sharing; Data encryption;
D O I
10.1007/s11036-024-02359-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data protection shares sensitive data with authorized users over a wireless communication network (WCN). To protect the data, a secured sharing method for WCNs is required, which is studied using digital twin and Merkle hash tree. This method builds the data-sharing environment of a WCN based on digital twin modeling. The twin-shared environment uses data encryption and authentication schemes based on the Merkle hash tree. The protected network data is encrypted based on time-frequency sensitive features. Then, a safe inverted index of encrypted sensitive data is built with Bloom filter, and the index is encoded by Merkle hash tree. By developing the network security authentication program and providing encrypted data information only for authentic users, the data security sharing of the WCN is realized. Experiment shows that data produced by the proposed method is same as the WCN data sharing process, with the encrypted transmission on the bus. The feature distribution of data changes significantly after encryption, where the distribution frequency increases from an average 75 Hz to 150 Hz, making it less susceptible to malicious theft. The length of transmission data loss is less than 2 bits, moreover, the loss is 0 when the transmission data length is less than 32 bits.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] SCDAP - secured cluster based data aggregation protocol for energy efficient communication in wireless sensor networks
    Lavanya, G.
    Velammal, B. L.
    Kulothungan, K.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (03) : 4747 - 4757
  • [42] A tree based data mining prediction scheme for wireless cellular network
    Tsiligarldis, J
    Acharya, R
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 784 - 786
  • [43] Digital Twin for Intelligent Network: Data Lifecycle, Digital Replication, and AI-Based Optimizations
    Jang, Seowoo
    Jeong, Jinguk
    Lee, Juho
    Choi, Sunghyun
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (11) : 96 - 102
  • [44] Cycle-Consistent Generative Adversarial Network and Crypto Hash Signature Token-based Block chain Technology for Data Aggregation with Secured Routing in Wireless Sensor Networks
    Janarthanan, Ashwinth
    Vidhusha, Vidhusha
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2024, 37 (04)
  • [45] An Efficient Decision Tree Classification Method Based on Extended Hash Table for Data Streams Mining
    Ouyang, Zhenzheng
    Wu, Quanyuan
    Wang, Tao
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 5, PROCEEDINGS, 2008, : 313 - +
  • [46] Communication MWSN Data Transmission Mechanism Based on a Wireless Sensor Network
    Jin, Wei
    Gupta, Rajeev Kumar
    Tiwari, Basant
    JOURNAL OF SENSORS, 2022, 2022
  • [47] Anomaly Detection System of Wireless Communication Network Based on Data Mining
    Chen Ningjun
    Gao Zhinian
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 1257 - 1262
  • [48] Financial Big Data Based on Internet of Things and Wireless Network Communication
    Xue, Lingqi
    Wireless Communications and Mobile Computing, 2021, 2021
  • [49] Financial Big Data Based on Internet of Things and Wireless Network Communication
    Xue, Lingqi
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [50] Short-range wireless network communication and application based on decision tree algorithm
    Xie W.
    Xu H.
    Peng L.
    Lan Z.
    Lan, Zhigao (214129814@qq.com), 2018, Totem Publishers Ltd (14) : 2561 - 2573