This paper proposes a wide area protection communication network encryption transmission method based on AES encryption and cloud verification to address the security risks caused by numerous nodes and large data traffic in the network. This method first designs an information authentication mechanism to authenticate the identity of nodes in a wide area protected communication network, ensuring the legitimacy and trustworthiness of communication nodes; Subsequently, in the authenticated network nodes, AES algorithm is used to encrypt key information in the communication network to prevent data from being stolen or tampered during transmission; Finally, an information security transmission mechanism based on cloud data integrity verification is designed to ensure the integrity and authenticity of encrypted data during transmission and storage. The simulation experiment results show that this method can not only effectively ensure that the transmitted network information is highly consistent with the original information, ensuring the confidentiality and integrity of network information, but also optimize the data transmission process and reduce security risks while ensuring information security.
Key words
AES algorithm /
information authentication /
transmission method /
information security /
communication network /
wide area protection
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
References
[1] 马艳娥,李瑞金.基于DFT-S-OFDM的网络信息安全加密传输仿真[J].计算机仿真,2022,39(1):358-361+393.
[2] 张婷婷,王智强.基于支持隐私保护的网络信息安全传输仿真[J].计算机仿真,2024,41(5):415-418+464.
[3] 代琪怡,田引黎,刘维.广域网环境中舰船通信网络信息安全传输方法[J].舰船科学技术,2024,46(7):175-178.
[4] Muwardi R,Gao H,Ghifarsyam H U,et al.Network security monitoring system via notification alert[J].Journal of Integrated and Advanced Engineering (JIAE),2021,1(2):113-122.
[5] Lagraa S,Husák M,Seba H,et al.A review on graph-based approaches for network security monitoring and botnet detection[J].International Journal of Information Security,2024,23(1):119-140.
[6] Sulicdio J,Kalsum T U,Arliando Y.Comparative Analysis of Wireshark and Windump Software in Network Security Monitoring[J].Jurnal Media Computer Science,2022,1(1):1-6.
[7] 高凌宇,陈书梅,黄蕾.基于政府网站与政务新媒体考核指标的网站信息监测预警系统的设计[J].现代计算机,2022,28(10):107-111.
[8] Kaur J,Singh H.Intrusion Detection Techniques for Secure Communication in Different Wireless Networks[J].International Journal of Innovative Technology and Exploring Engineering (IJITEE),2019,8(92):668-671.
[9] 齐小刚,马文超,李家慧.网络故障检测中的探测路径选择方法研究[J].南京大学学报(自然科学),2022,58(2):320-327.
[10] 吴晓东,熊伟丽.采用编码输入的生成对抗网络故障检测方法及应用[J].智能系统学报,2022,17(3):496-505.
[11] Tang J,Li S.Intelligent Root Cause Detection for LTE Network Fault Based on Machine Learning[J].2022 IEEE 16th International Conference on Anti-counterfeiting,Security,and Identification (ASID),2022:1-5.
[12] 梁利君.基于渗透测试的广播电视发射台网络安全防护研究[J].电视技术,2024,48(05):181-184+194.
[13] 夏俊梅,赵只增.基于云计算的政务服务电子网络安全防护策略研究[J].网络安全和信息化,2024 (5):122-124.