Smart IoT information transmission and security optimization model based on chaotic neural computing

  • PDF / 2,228,594 Bytes
  • 14 Pages / 595.276 x 790.866 pts Page_size
  • 65 Downloads / 173 Views

DOWNLOAD

REPORT


(0123456789().,-volV)(0123456789(). ,- volV)

IAPR-MEDPRAI

Smart IoT information transmission and security optimization model based on chaotic neural computing Lianbing Deng1,2 • Daming Li1,3 • Zhiming Cai3 • Lin Hong4 Received: 20 October 2018 / Accepted: 19 March 2019 Ó Springer-Verlag London Ltd., part of Springer Nature 2019

Abstract The improvement of human quality of life is inseparable from the support of information technology, and the development of information technology has made human life more convenient. The current era is the information age, and the level of informatization has gradually become one of the important indicators to measure the comprehensive level of a country. The emergence of the Internet of Things has led to rapid development of technologies such as data perception, wireless data transmission, and intelligent information processing. With the increasing use of information transmission, people gradually realize the impact of security issues on themselves and society. In this paper, a smart IoT information transmission and security optimization model based on chaotic neural computing model is proposed. Simulation and analysis show that the proposed algorithm can ensure the availability and confidentiality of data at the same time. Keywords Chaotic neural network  Computational model  Internet of Things  Intelligent system  Optimization algorithm  Information transmission  Network security

1 Introduction With the continuous development of social economy, computer technology has gradually become an important medium for transmitting information in people’s lives. Informatization promoters change the way people live, but while they bring convenience to people, they also bury the hidden dangers of information security. As the amount of data transmitted by information increases, people gradually realize the impact of security issues on themselves and society. The data transmission mechanism using multipath routing can effectively improve the security of data & Daming Li [email protected] 1

The Post-Doctoral Research Center, Zhuhai Da Hengqin Science and Technology Development Co.,Ltd, Hengqin, China

2

Huazhong University of Science and Technology, Wuhan, China

3

Macau Big Data Research Centre for Urban Governance, City University of Macao, Macau, China

4

School of Management, Beijing Normal University, Zhuhai, China

transmission. However, in terms of data availability and confidentiality, multipath secure messaging protocols have some drawbacks. The SMT protocol has not been elaborated on key exchange and therefore has poor confidentiality [1]. The SDMP protocol performs less well in terms of data availability. Namely, if a piece of data is lost during transmission, the destination node cannot obtain the original message [2]. The SPREAD protocol uses redundant transmission techniques to allow partial packets to be lost, but for all packets in a path that are lost, the destination node will not be able to decode the original message. Radio frequency identification technology in wir