Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Security Protection Technology in Multi-Attribute Data Transmission Based on Fuzzy Genetic Algorithm

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstracts

Because the traditional data transmission security protection methods ignore the process of multi-attribute data detection, resulting in the abnormal data false alarm rate, high missing alarm rate, eliminating accuracy and other problems, a multi-attribute data transmission security protection method based on fuzzy genetic algorithm is proposed. The anomaly detection method based on fuzzy data mining and genetic algorithm is adopted to detect and obtain the abnormal data in the multi-attribute data transmission, and the abnormal data in the multi-attribute data transmission is eliminated through the abnormal data elimination method based on PSO and SVM, so as to realize the security protection of multi-attribute data transmission. It is verified that the recall rate and accuracy rate of abnormal data of the proposed method are higher than 95%, and the removal accuracy of abnormal data is higher. Moreover, this method is far better than the comparison method in positive likelihood ratio and Jordan index, and has higher application value.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig.10

source transmission

Similar content being viewed by others

Data Availability

There is no data file included in this work.

References

  1. Rani, S. S., Alzubi, J. A., Lakshmanaprabu, S. K., et al. (2019). Optimal users based secure data transmission on the internet of healthcare things (Ioht) with lightweight block ciphers. Multimedia Tools and Applications, 25, 69–72.

    Google Scholar 

  2. Horvath, T., Munster, P., Vojtech, J., et al. (2018). simultaneous transmission of accurate time, stable frequency, data, and sensor system over one fiber with ITU 100 GHz grid. Optical Fiber Technology, 40, 139–143.

    Article  Google Scholar 

  3. Zhang, H. B. (2017). Finite-time stabilization of discrete-time switched nonlinear systems without stable subsystems via optimal switching signal design. IEEE Transactions on Fuzzy Systems, 25, 172–180.

    Article  Google Scholar 

  4. Tang, C. S. (2019). High-speed data transmission method for ICPT system based on partial energy coil and OFDM technology. Journal of Power Supply, 17, 80–86.

    Google Scholar 

  5. Danesh, M., & Shirgahi, H. (2017). A novel hybrid knowledge of firefly and PSO swarm intelligence algorithms for efficient data clustering. Journal of Intelligent and Fuzzy Systems, 33, 3529–3538.

    Article  Google Scholar 

  6. Sultan, A., Yang, X., Hajomer, A. A. E., et al. (2018). Chaotic constellation mapping for physical-layer data encryption in OFDM-PON. IEEE Photonics Technology Letters, 52, 65–70.

    Google Scholar 

  7. Rao, F. (2018). Simulation of network data transmission to prevent attack security assessment. Computer Simulation, 35(351–354), 413.

    Google Scholar 

  8. Yi, K. (2018). Design of redundant data mining system based on laser sensor. Automation & Instrumentation, 66, 109–112.

    Google Scholar 

  9. Hannan, M. A., Ali, J. A., Mohamed, A., et al. (2018). Quantum-behaved lightning search algorithm to improve indirect field-oriented fuzzy-PI control for IM drive. IEEE Transactions on Industry Applications, 54, 3793–3905.

    Article  Google Scholar 

  10. Zhang, R. D. (2017). A nonlinear fuzzy neural network modeling approach using improved genetic algorithm. IEEE Transactions on Industrial Electronics, 89, 59–63.

    Google Scholar 

  11. Chrouta, J., Chakchouk, W., Zaafouri, A., et al. (2019). Modeling and control of an irrigation station process using heterogeneous cuckoo search algorithm and fuzzy logic controller. IEEE Transactions on Industry Applications, 55, 976–990.

    Article  Google Scholar 

  12. Bertho, R. B., Lacerda, V. A., Monaro, R. M., et al. (2017). Selective Non-unit protection technique for multiterminal VSC-HVDC grids. IEEE Transactions on Power Delivery, 99, 105–109.

    Google Scholar 

  13. Mazza, G., Rinella, G. A., Benotto, F., et al. (2017). A 1.2 Gb/s data transmission unit in CMOS 0.18 μm technology for the ALICE inner tracking system front-end ASIC. Journal of Instrumentation, 12, 287–300.

    Article  Google Scholar 

  14. Gao, W. (2017). Ontology learning algorithm for similarity measuring and ontology mapping using linear programming. Journal of Intelligent & Fuzzy Systems, 33, 3153–3163.

    Article  Google Scholar 

  15. Zou, W., Li, C., & Zhang, N. (2018). A T-S fuzzy model identification approach based on a modified inter type-2 FRCM algorithm. IEEE Transactions on Fuzzy Systems, 26, 1104–1113.

    Article  Google Scholar 

  16. Zhang, L. M. (2018). Cooperative artificial bee colony algorithm with multiple populations for interval multi-objective optimization problems. IEEE Transactions on Fuzzy Systems, 99, 1–1.

    Google Scholar 

  17. Rathore, P., Bezdek, J. C., Erfani, S. M., et al. (2018). Ensemble fuzzy clustering using cumulative aggregation on random projections. IEEE Transactions on Fuzzy Systems, 26, 1510–1524.

    Article  Google Scholar 

  18. Muroi, T., Katano, Y., Kinoshita, N., et al. (2017). Dual-page reproduction to increase the data transfer rate in holographic memory. Optics Letters, 42, 2287.

    Article  Google Scholar 

  19. Yang, A. M. (2018). Security control redundancy allocation technology and security keys based on internet of things. IEEE Access, 6, 50187–50196.

    Article  Google Scholar 

  20. Abusitta, A., Bellaiche, M., & Dagenais, M. (2018). An SVM-based framework for detecting Dos attacks in virtualized clouds under changing environment. Journal of Cloud Computing, 7, 1–18.

    Google Scholar 

  21. Song, H. (2018). Design of high precision BMS data acquisition system based on ISL78600. Chinese Journal of Power Sources, 42, 892–894.

    Google Scholar 

  22. Çitil, H. G. (2019). Investigation of a fuzzy problem by the Fuzzy laplace transform. Applied Mathematics and Nonlinear Sciences, 4, 407–416.

    Article  MathSciNet  Google Scholar 

  23. Giannoukos, S., Marshall, A., Taylor, S., et al. (2017). Molecular communication over gas stream channels using portable mass spectrometry. Journal of the American Society for Mass Spectrometry, 28, 1–13.

    Article  Google Scholar 

  24. Kaushal, M., & Khehra, B. S. (2017). BBBCO and fuzzy entropy based modified background subtraction algorithm for object detection in videos. Applied Intelligence, 47, 1–14.

    Article  Google Scholar 

  25. Zhong, J., Yang, X., & Hu, W. (2017). Performance-improved secure OFDM transmission using chaotic active constellation extension. IEEE Photonics Technology Letters, 57, 99–105.

    Google Scholar 

  26. Mi, C., & Shen, Y. (2015). Ship identification algorithm based on 3D point cloud for automated ship loaders. Journal of Coastal Research, 73, 28–34.

    Article  Google Scholar 

  27. Krishna Kumar, R., Diwakaran, S., & Thilagaraj, M. (2020). Reactive power control of modern type high effective phase grid-tied photovoltaic network inverter. Journal of Green Engineering, 10(9), 4874–4884.

    Google Scholar 

  28. Thilagaraj, M., Arunkumar, N., Ramkumar, S., & Hariharasitaraman, S. (2021). Electrooculogram signal identification for elderly disabled using elman network. Microprocessors and Microsystems, 82, 103811. https://doi.org/10.1016/j.micpro.2020.103811.

    Article  Google Scholar 

  29. Ramani, U., Nithya, R., Thilagaraj, M., & Sathieshkumar, S. (2020). Genetic algorithm based three input dc source using hybrid power system. Journal of Green Engineering, 10(7), 4227–4243.

    Google Scholar 

  30. Ramani, U., Thilagaraj, M., Nair, R. K. R., & Dharinee, J. (2021). Neural network based hybrid power scheme with constant output using three DC source. Materials Today: Proceedings, early online version. https://doi.org/10.1016/j.matpr.2020.12.888

  31. Sivaram, M., Kaliappan, M., Shobana, S. J., Suresh, A., et al. (2020). Secure storage allocation scheme using fuzzy based heuristic algorithm for cloud. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-02082-z.

    Article  Google Scholar 

  32. Udendhran, R., Balamurugan, M., Suresh, A., & Varatharajan, R. (2020). Enhancing image processing architecture using deep learning for embedded vision systems. Microprocessors and Microsystems, 76, 103094.

    Article  Google Scholar 

  33. Geetha, R., Sivasubramanian, S., Kaliappan, M., Vimal, S., & Annamalai, S. (2019). Cervical cancer identification with synthetic minority oversampling technique and PCA analysis using random forest classifier. Journal of medical systems, 43(9), 1–19.

    Article  Google Scholar 

Download references

Funding

There is no funding for this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shanguo Lv.

Ethics declarations

Conflict of interest

There is no conflict of interest.

Code Availability

There is no specific code in this work specified.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lv, S., Chen, H. Security Protection Technology in Multi-Attribute Data Transmission Based on Fuzzy Genetic Algorithm. Wireless Pers Commun 127, 897–917 (2022). https://doi.org/10.1007/s11277-021-08447-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08447-7

Keywords

Navigation