针对广域保护通信网络中节点众多、数据流量大导致的安全风险问题,提出了一种基于AES加密与云端验证的广域保护通信网络加密传输方法。该方法首先设计了一种信息认证机制,对广域保护通信网络中的节点进行身份认证,确保通信节点的合法性和可信性;随后,在已认证的网络节点中,采用AES算法对通信网络中的关键信息进行加密处理,防止数据在传输过程中被窃取或篡改;最后,设计了一种基于云端数据完整性验证的信息安全传输机制,确保加密数据在传输和存储过程中的完整性和真实性。仿真实验结果表明,该方法不仅能有效确保传输后的网络信息与原始信息高度一致,保障网络信息的保密性、完整性,还能在确保信息安全的前提下优化数据传输流程,降低安全风险。
Abstract
This paper proposes a wide area protection communication network encryption transmission method based on AES encryption and cloud verification to address the security risks caused by numerous nodes and large data traffic in the network. This method first designs an information authentication mechanism to authenticate the identity of nodes in a wide area protected communication network, ensuring the legitimacy and trustworthiness of communication nodes; Subsequently, in the authenticated network nodes, AES algorithm is used to encrypt key information in the communication network to prevent data from being stolen or tampered during transmission; Finally, an information security transmission mechanism based on cloud data integrity verification is designed to ensure the integrity and authenticity of encrypted data during transmission and storage. The simulation experiment results show that this method can not only effectively ensure that the transmitted network information is highly consistent with the original information, ensuring the confidentiality and integrity of network information, but also optimize the data transmission process and reduce security risks while ensuring information security.
关键词
AES算法 /
信息认证 /
传输方法 /
信息安全 /
通信网络 /
广域保护
Key words
AES algorithm /
information authentication /
transmission method /
information security /
communication network /
wide area protection
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
参考文献
[1] 马艳娥,李瑞金.基于DFT-S-OFDM的网络信息安全加密传输仿真[J].计算机仿真,2022,39(1):358-361+393.
[2] 张婷婷,王智强.基于支持隐私保护的网络信息安全传输仿真[J].计算机仿真,2024,41(5):415-418+464.
[3] 代琪怡,田引黎,刘维.广域网环境中舰船通信网络信息安全传输方法[J].舰船科学技术,2024,46(7):175-178.
[4] Muwardi R,Gao H,Ghifarsyam H U,et al.Network security monitoring system via notification alert[J].Journal of Integrated and Advanced Engineering (JIAE),2021,1(2):113-122.
[5] Lagraa S,Husák M,Seba H,et al.A review on graph-based approaches for network security monitoring and botnet detection[J].International Journal of Information Security,2024,23(1):119-140.
[6] Sulicdio J,Kalsum T U,Arliando Y.Comparative Analysis of Wireshark and Windump Software in Network Security Monitoring[J].Jurnal Media Computer Science,2022,1(1):1-6.
[7] 高凌宇,陈书梅,黄蕾.基于政府网站与政务新媒体考核指标的网站信息监测预警系统的设计[J].现代计算机,2022,28(10):107-111.
[8] Kaur J,Singh H.Intrusion Detection Techniques for Secure Communication in Different Wireless Networks[J].International Journal of Innovative Technology and Exploring Engineering (IJITEE),2019,8(92):668-671.
[9] 齐小刚,马文超,李家慧.网络故障检测中的探测路径选择方法研究[J].南京大学学报(自然科学),2022,58(2):320-327.
[10] 吴晓东,熊伟丽.采用编码输入的生成对抗网络故障检测方法及应用[J].智能系统学报,2022,17(3):496-505.
[11] Tang J,Li S.Intelligent Root Cause Detection for LTE Network Fault Based on Machine Learning[J].2022 IEEE 16th International Conference on Anti-counterfeiting,Security,and Identification (ASID),2022:1-5.
[12] 梁利君.基于渗透测试的广播电视发射台网络安全防护研究[J].电视技术,2024,48(05):181-184+194.
[13] 夏俊梅,赵只增.基于云计算的政务服务电子网络安全防护策略研究[J].网络安全和信息化,2024 (5):122-124.