Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: High-Performance Computing
Guest editors: Achyut Shankar
Article type: Research Article
Authors: Zhang, Lan* | Luo, Yanling | Zhao, Yue
Affiliations: School of Artificial Intelligence, Wuhan Technology and Business University, Wuhan, Hubei, China
Correspondence: [*] Corresponding author: Lan Zhang, School of Artificial Intelligence, Wuhan Technology and Business University, Wuhan 430065, Hubei, China. E-mail: zhanglan@wtbu.edu.cn.
Abstract: The rapid development of mobile communication technology not only brings great convenience to users, but also brings the risk of user data privacy leakage. Due to the broadcasting nature of mobile communication transmission, open wireless interfaces have become a security vulnerability for mobile devices such as mobile phones, which can be easily eavesdropped. This article studied a data privacy protection algorithm suitable for mobile communication in cellular networks based on the anonymous mechanism of blockchain. This article first analyzes the overall framework and anonymity technology of blockchain data from the perspective of privacy and queryability. Then, based on blockchain technology, consistency mechanisms, privacy control, and access rights management are designed. Finally, mobile communication data privacy protection algorithms are designed and implemented through data encryption and verification. The latency of transactions under different task volumes and throughput at different nodes were analyzed to verify the reliability of several anonymous mechanisms in cellular network mobile communication data privacy protection in blockchain. Based on the experimental results, it was concluded that the reliability range of CryptoNote and the zero coin and zero currency protocol mechanism in the specified nodes was between 92 and 99%. This article utilized blockchain technology to distribute mobile communication data in nodes and achieve decentralized data transmission, thus protecting the privacy of wireless network communication data. By analyzing the reliability of anonymous mechanisms based on blockchain in mobile communication nodes, it was concluded that this method had certain research value.
Keywords: Cellular networks, mobile communications, data privacy, blockchain technology, privacy protection, byzantine algorithm
DOI: 10.3233/IDT-230233
Journal: Intelligent Decision Technologies, vol. 18, no. 4, pp. 2811-2825, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl