Study on Network Security Based on PCA and BP Neural Network Under Green Communication

In response to the energy consumption caused by the exponential growth of mobile network capacity demand, the Chen Shanzhi team proposed a user-centric ultra-dense network. It dynamically organizes multiple access nodes into a group of access nodes centered on the user. It can “accompany” user services without perception. The result is increased system capacity and user experience. This paper systematically analyzes the key security issues of user-centric ultra-dense networks. Based on the security characteristics of the access node group, a security system adapted to the user-centered ultra-dense network architecture is designed. Aiming at the problem of data security transmission between network entities, a lightweight data security transmission algorithm based on implicit certificate is proposed. The algorithm uses a lightweight implicit certificate to generate a temporary session key by means of a reconfigurable public-private key pair, so as to encrypt and protect the transmitted data, and solve the problem of data security transmission when the access nodes cooperate. The simulation shows that the algorithm consumes 34kB less on average than the traditional key method in different scenarios, and the speed is fast and the encryption key remains stable. At the same time, it also saves storage space and can be conveniently applied to access nodes with limited resources. Then, aiming at the network information security problem, an information security detection method based on improved BP neural network based on PCA is proposed. Simulation experiments were carried out on four types of attack types using the KDD CUP data set. The simulation results show that the improved BP neural network classifier combined with PCA has higher performance in network training. The false alarm rate for the DOS, R2L and PROBE attack types dropped to about 10%, and the false alarm rate for the U2R attack types dropped by 8.07%.

[1]  Gunasekaran Manogaran,et al.  Intelligent decision-making of online shopping behavior based on internet of things , 2020, Int. J. Inf. Manag..

[2]  Hong Wen,et al.  5G security architecture and light weight security authentication , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).

[3]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[4]  Xiaohu You,et al.  Delay-constrained sleeping mechanism for energy saving in cache-aided ultra-dense network , 2019, Sci. China Inf. Sci..

[5]  Chunying Zhang,et al.  Design of Intrusion Detection System for Internet of Things Based on Improved BP Neural Network , 2019, IEEE Access.

[6]  Jürgen Schmidhuber,et al.  LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[7]  Jie Li,et al.  Feature Extraction and Area Identification of Wireless Channel in Mobile Communication , 2019 .

[8]  M. Rajesh,et al.  An efficient RSA cryptosystem by applying cuckoo search optimization algorithm , 2018, Concurr. Comput. Pract. Exp..

[9]  Heikki Hämmäinen,et al.  Effect of Population Density and Network Availability on Deployment of Broadband PPDR Mobile Network Service , 2017 .

[10]  Chen Liang,et al.  Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G , 2016, Secur. Commun. Networks.

[11]  Bo Hu,et al.  User-centric ultra-dense networks for 5G: challenges, methodologies, and directions , 2016, IEEE Wireless Communications.

[12]  Jie Li,et al.  Research on logistics supply chain of iron and steel enterprises based on block chain technology , 2019, Future Gener. Comput. Syst..