Ecological Environment Data Capture and Automatic Encryption Method Based on Symmetric Algorithm and Sensor Network

Jing Zhao*, Qiaoli Wang, Zikai Yu, Shanshan Shang

*Corresponding author for this work

Research output: Contribution to journalJournal Articlepeer-review

Abstract

As the deployment time of a sensor network increases, it will experience node aging, network load increase, and will lead to network security performance degradation and the dynamic capture energy of ecological environment data is significantly reduced as well. In order to overcome this problem, in this paper, a sensor network based on a symmetric algorithm is proposed to realize the capture of ecological environment data and its automatic encryption. By deploying and selecting the appropriate location of the network super-powered node, the data traffic of the first dead node can be reduced. In addition, symmetric algorithms are used to manage network keys and detect dynamic environmental image information. Finally, the sensor network captures ecological environmental data and its automatic encryption is realized. A simulation control experiment is designed to verify the effect of ecological environment image extraction and the actual encryption of the symmetric algorithm. The application effect of the proposed method is compared with the commonly used methods, and the results show that the proposed method can significantly reduce the time cost and communication load, improve the resolution ability of the extracted effective information of the ecological environment image while ensuring data security. Therefore, a good application effect can be obtained by applying the symmetric algorithm to the sensor network to capture data and realize automatic encryption.
Original languageEnglish
Pages (from-to)7411-7418
JournalFresenius Environmental Bulletin
Volumev. 31
Publication statusPublished - 2022
Externally publishedYes

Fingerprint

Dive into the research topics of 'Ecological Environment Data Capture and Automatic Encryption Method Based on Symmetric Algorithm and Sensor Network'. Together they form a unique fingerprint.

Cite this