Research on the application of data encryption technology in communication security
by Xuhong Li; Guan Wang; Wenwen Pan
International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Vol. 14, No. 1/2, 2021

Abstract: Aiming at the security problems of data monitoring, and forgery and tampering in the process of wireless communication network, this paper proposes a lightweight data encryption algorithm based on dynamic key, in which an authentication scheme combining with the characteristics of communication system is constructed. Firstly, the communication network structure is constructed based on encryption algorithm by using C/S security agent model. Furthermore, the data symmetric encryption and decryption are completed by using exclusive OR algorithm. In addition, adopting hash algorithm which can complete data integrity authentication, and reduce resource consumption in keys and message. The libmodbus open source libraries are employed to simulate the master/slave device communication, and simulation results show that the improved scheme ensures the synchronisation and accurate key updating, realises the self-organisation and management of the key. At the same time, the proposed algorithm has great advantages in resource consumption, compared with other algorithms.

Online publication date: Thu, 15-Apr-2021

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Autonomous and Adaptive Communications Systems (IJAACS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com