# American Institute of Mathematical Sciences

August & September  2019, 12(4&5): 1327-1340. doi: 10.3934/dcdss.2019091

## A high precision data encryption algorithm in wireless network mobile communication

 1 School of Computer, Pingdingshan University, Pingdingshan, China 2 College of Information Engineering, Pingdingshan University, Pingdingshan, China 3 Dept. of Mathematics and Statistics, Winona State University, Winona, MN 55987, USA

* Corresponding author: Aiwan Fan

Received  July 2017 Revised  December 2017 Published  November 2018

At present, the MD5 based data encryption algorithm for wireless network mobile communication cannot effectively detect the intrusion data in the mobile communication. Redundant data is not removed, the efficiency of data encryption is low, and the overall communication security is poor. In this paper, a MDEA based data encryption algorithm for wireless network mobile communication is proposed. By applying normalization of communication data to DBN model, using the way of changing one parameter while keeping others, the optimal DBN detection model is built to achieve high-precision detection of intrusion data. Using the signal intensity at different times, the speed and process time of the data level movements are estimated. By estimating the results, the redundant data and inappropriate data are removed, and performed the MDEA operation based on the secret data, introduced random numbers and timestamps to prevent the foreign infiltrations. Experiments show that the algorithm can not only improve the detection quality of intrusion data, but also enhance the cleaning effect of redundant data and in the communication, and enhance data security.

Citation: Aiwan Fan, Qiming Wang, Joyati Debnath. A high precision data encryption algorithm in wireless network mobile communication. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1327-1340. doi: 10.3934/dcdss.2019091
##### References:

show all references

##### References:
multi-layer RBM learning process
data processing structure
data output structure
MEDA algorithm structure
Comparison of the effects of different algorithms on Intrusion Detection
Comparison of data cleaning effect by different algorithms
Comparison of security effects between different data encryption algorithms
 [1] Li Gang. An optimization detection algorithm for complex intrusion interference signal in mobile wireless network. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1371-1384. doi: 10.3934/dcdss.2019094 [2] Vassili Gelfreich, Carles Simó. High-precision computations of divergent asymptotic series and homoclinic phenomena. Discrete & Continuous Dynamical Systems - B, 2008, 10 (2&3, September) : 511-536. doi: 10.3934/dcdsb.2008.10.511 [3] Keisuke Minami, Takahiro Matsuda, Tetsuya Takine, Taku Noguchi. Asynchronous multiple source network coding for wireless broadcasting. Numerical Algebra, Control & Optimization, 2011, 1 (4) : 577-592. doi: 10.3934/naco.2011.1.577 [4] Fei Gao. Data encryption algorithm for e-commerce platform based on blockchain technology. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1457-1470. doi: 10.3934/dcdss.2019100 [5] Sebastià Galmés. Markovian characterization of node lifetime in a time-driven wireless sensor network. Numerical Algebra, Control & Optimization, 2011, 1 (4) : 763-780. doi: 10.3934/naco.2011.1.763 [6] Xiaoyi Zhou, Tong Ye, Tony T. Lee. Designing and analysis of a Wi-Fi data offloading strategy catering for the preference of mobile users. Journal of Industrial & Management Optimization, 2021  doi: 10.3934/jimo.2021038 [7] Sangkyu Baek, Bong Dae Choi. Performance analysis of power save mode in IEEE 802.11 infrastructure wireless local area network. Journal of Industrial & Management Optimization, 2009, 5 (3) : 481-492. doi: 10.3934/jimo.2009.5.481 [8] Hong Il Cho, Myungwoo Lee, Ganguk Hwang. A cross-layer relay selection scheme of a wireless network with multiple relays under Rayleigh fading. Journal of Industrial & Management Optimization, 2014, 10 (1) : 1-19. doi: 10.3934/jimo.2014.10.1 [9] Yang Chen, Xiaoguang Xu, Yong Wang. Wireless sensor network energy efficient coverage method based on intelligent optimization algorithm. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 887-900. doi: 10.3934/dcdss.2019059 [10] Liu Hui, Lin Zhi, Waqas Ahmad. Network(graph) data research in the coordinate system. Mathematical Foundations of Computing, 2018, 1 (1) : 1-10. doi: 10.3934/mfc.2018001 [11] Junlin Xiong, Wenjie Liu. $H_{\infty}$ observer-based control for large-scale systems with sparse observer communication network. Numerical Algebra, Control & Optimization, 2020, 10 (3) : 331-343. doi: 10.3934/naco.2020005 [12] Carla Mascia, Massimiliano Sala, Irene Villa. A survey on functional encryption. Advances in Mathematics of Communications, 2021  doi: 10.3934/amc.2021049 [13] William Chad Young, Adrian E. Raftery, Ka Yee Yeung. A posterior probability approach for gene regulatory network inference in genetic perturbation data. Mathematical Biosciences & Engineering, 2016, 13 (6) : 1241-1251. doi: 10.3934/mbe.2016041 [14] Cheng-Kai Hu, Fung-Bao Liu, Hong-Ming Chen, Cheng-Feng Hu. Network data envelopment analysis with fuzzy non-discretionary factors. Journal of Industrial & Management Optimization, 2021, 17 (4) : 1795-1807. doi: 10.3934/jimo.2020046 [15] Xuping Xie, Feng Bao, Thomas Maier, Clayton Webster. Analytic continuation of noisy data using Adams Bashforth residual neural network. Discrete & Continuous Dynamical Systems - S, 2021  doi: 10.3934/dcdss.2021088 [16] Angsuman Das, Avishek Adhikari, Kouichi Sakurai. Plaintext checkable encryption with designated checker. Advances in Mathematics of Communications, 2015, 9 (1) : 37-53. doi: 10.3934/amc.2015.9.37 [17] Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas López, Palash Sarkar. ${\sf {FAST}}$: Disk encryption and beyond. Advances in Mathematics of Communications, 2022, 16 (1) : 185-230. doi: 10.3934/amc.2020108 [18] Boya Liu. Stability estimates in a partial data inverse boundary value problem for biharmonic operators at high frequencies. Inverse Problems & Imaging, 2020, 14 (5) : 783-796. doi: 10.3934/ipi.2020036 [19] Junying Hu, Xiaofei Qian, Jun Pei, Changchun Tan, Panos M. Pardalos, Xinbao Liu. A novel quality prediction method based on feature selection considering high dimensional product quality data. Journal of Industrial & Management Optimization, 2021  doi: 10.3934/jimo.2021099 [20] Haili Qiao, Aijie Cheng. A fast high order method for time fractional diffusion equation with non-smooth data. Discrete & Continuous Dynamical Systems - B, 2022, 27 (2) : 903-920. doi: 10.3934/dcdsb.2021073

2020 Impact Factor: 2.425