Abstracts
Because the traditional data transmission security protection methods ignore the process of multi-attribute data detection, resulting in the abnormal data false alarm rate, high missing alarm rate, eliminating accuracy and other problems, a multi-attribute data transmission security protection method based on fuzzy genetic algorithm is proposed. The anomaly detection method based on fuzzy data mining and genetic algorithm is adopted to detect and obtain the abnormal data in the multi-attribute data transmission, and the abnormal data in the multi-attribute data transmission is eliminated through the abnormal data elimination method based on PSO and SVM, so as to realize the security protection of multi-attribute data transmission. It is verified that the recall rate and accuracy rate of abnormal data of the proposed method are higher than 95%, and the removal accuracy of abnormal data is higher. Moreover, this method is far better than the comparison method in positive likelihood ratio and Jordan index, and has higher application value.
Similar content being viewed by others
Data Availability
There is no data file included in this work.
References
Rani, S. S., Alzubi, J. A., Lakshmanaprabu, S. K., et al. (2019). Optimal users based secure data transmission on the internet of healthcare things (Ioht) with lightweight block ciphers. Multimedia Tools and Applications, 25, 69–72.
Horvath, T., Munster, P., Vojtech, J., et al. (2018). simultaneous transmission of accurate time, stable frequency, data, and sensor system over one fiber with ITU 100 GHz grid. Optical Fiber Technology, 40, 139–143.
Zhang, H. B. (2017). Finite-time stabilization of discrete-time switched nonlinear systems without stable subsystems via optimal switching signal design. IEEE Transactions on Fuzzy Systems, 25, 172–180.
Tang, C. S. (2019). High-speed data transmission method for ICPT system based on partial energy coil and OFDM technology. Journal of Power Supply, 17, 80–86.
Danesh, M., & Shirgahi, H. (2017). A novel hybrid knowledge of firefly and PSO swarm intelligence algorithms for efficient data clustering. Journal of Intelligent and Fuzzy Systems, 33, 3529–3538.
Sultan, A., Yang, X., Hajomer, A. A. E., et al. (2018). Chaotic constellation mapping for physical-layer data encryption in OFDM-PON. IEEE Photonics Technology Letters, 52, 65–70.
Rao, F. (2018). Simulation of network data transmission to prevent attack security assessment. Computer Simulation, 35(351–354), 413.
Yi, K. (2018). Design of redundant data mining system based on laser sensor. Automation & Instrumentation, 66, 109–112.
Hannan, M. A., Ali, J. A., Mohamed, A., et al. (2018). Quantum-behaved lightning search algorithm to improve indirect field-oriented fuzzy-PI control for IM drive. IEEE Transactions on Industry Applications, 54, 3793–3905.
Zhang, R. D. (2017). A nonlinear fuzzy neural network modeling approach using improved genetic algorithm. IEEE Transactions on Industrial Electronics, 89, 59–63.
Chrouta, J., Chakchouk, W., Zaafouri, A., et al. (2019). Modeling and control of an irrigation station process using heterogeneous cuckoo search algorithm and fuzzy logic controller. IEEE Transactions on Industry Applications, 55, 976–990.
Bertho, R. B., Lacerda, V. A., Monaro, R. M., et al. (2017). Selective Non-unit protection technique for multiterminal VSC-HVDC grids. IEEE Transactions on Power Delivery, 99, 105–109.
Mazza, G., Rinella, G. A., Benotto, F., et al. (2017). A 1.2 Gb/s data transmission unit in CMOS 0.18 μm technology for the ALICE inner tracking system front-end ASIC. Journal of Instrumentation, 12, 287–300.
Gao, W. (2017). Ontology learning algorithm for similarity measuring and ontology mapping using linear programming. Journal of Intelligent & Fuzzy Systems, 33, 3153–3163.
Zou, W., Li, C., & Zhang, N. (2018). A T-S fuzzy model identification approach based on a modified inter type-2 FRCM algorithm. IEEE Transactions on Fuzzy Systems, 26, 1104–1113.
Zhang, L. M. (2018). Cooperative artificial bee colony algorithm with multiple populations for interval multi-objective optimization problems. IEEE Transactions on Fuzzy Systems, 99, 1–1.
Rathore, P., Bezdek, J. C., Erfani, S. M., et al. (2018). Ensemble fuzzy clustering using cumulative aggregation on random projections. IEEE Transactions on Fuzzy Systems, 26, 1510–1524.
Muroi, T., Katano, Y., Kinoshita, N., et al. (2017). Dual-page reproduction to increase the data transfer rate in holographic memory. Optics Letters, 42, 2287.
Yang, A. M. (2018). Security control redundancy allocation technology and security keys based on internet of things. IEEE Access, 6, 50187–50196.
Abusitta, A., Bellaiche, M., & Dagenais, M. (2018). An SVM-based framework for detecting Dos attacks in virtualized clouds under changing environment. Journal of Cloud Computing, 7, 1–18.
Song, H. (2018). Design of high precision BMS data acquisition system based on ISL78600. Chinese Journal of Power Sources, 42, 892–894.
Çitil, H. G. (2019). Investigation of a fuzzy problem by the Fuzzy laplace transform. Applied Mathematics and Nonlinear Sciences, 4, 407–416.
Giannoukos, S., Marshall, A., Taylor, S., et al. (2017). Molecular communication over gas stream channels using portable mass spectrometry. Journal of the American Society for Mass Spectrometry, 28, 1–13.
Kaushal, M., & Khehra, B. S. (2017). BBBCO and fuzzy entropy based modified background subtraction algorithm for object detection in videos. Applied Intelligence, 47, 1–14.
Zhong, J., Yang, X., & Hu, W. (2017). Performance-improved secure OFDM transmission using chaotic active constellation extension. IEEE Photonics Technology Letters, 57, 99–105.
Mi, C., & Shen, Y. (2015). Ship identification algorithm based on 3D point cloud for automated ship loaders. Journal of Coastal Research, 73, 28–34.
Krishna Kumar, R., Diwakaran, S., & Thilagaraj, M. (2020). Reactive power control of modern type high effective phase grid-tied photovoltaic network inverter. Journal of Green Engineering, 10(9), 4874–4884.
Thilagaraj, M., Arunkumar, N., Ramkumar, S., & Hariharasitaraman, S. (2021). Electrooculogram signal identification for elderly disabled using elman network. Microprocessors and Microsystems, 82, 103811. https://doi.org/10.1016/j.micpro.2020.103811.
Ramani, U., Nithya, R., Thilagaraj, M., & Sathieshkumar, S. (2020). Genetic algorithm based three input dc source using hybrid power system. Journal of Green Engineering, 10(7), 4227–4243.
Ramani, U., Thilagaraj, M., Nair, R. K. R., & Dharinee, J. (2021). Neural network based hybrid power scheme with constant output using three DC source. Materials Today: Proceedings, early online version. https://doi.org/10.1016/j.matpr.2020.12.888
Sivaram, M., Kaliappan, M., Shobana, S. J., Suresh, A., et al. (2020). Secure storage allocation scheme using fuzzy based heuristic algorithm for cloud. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02082-z.
Udendhran, R., Balamurugan, M., Suresh, A., & Varatharajan, R. (2020). Enhancing image processing architecture using deep learning for embedded vision systems. Microprocessors and Microsystems, 76, 103094.
Geetha, R., Sivasubramanian, S., Kaliappan, M., Vimal, S., & Annamalai, S. (2019). Cervical cancer identification with synthetic minority oversampling technique and PCA analysis using random forest classifier. Journal of medical systems, 43(9), 1–19.
Funding
There is no funding for this work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
There is no conflict of interest.
Code Availability
There is no specific code in this work specified.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lv, S., Chen, H. Security Protection Technology in Multi-Attribute Data Transmission Based on Fuzzy Genetic Algorithm. Wireless Pers Commun 127, 897–917 (2022). https://doi.org/10.1007/s11277-021-08447-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08447-7