Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Securing Wireless Communication Using Novel Transfer Learning for Encryption in Wireless Networks


Affiliations
1 Department of Computer Science, Government Arts and Science College, India
2 Department of Physics, Government Science College, Hassan, Karnataka, India
3 Department of Electronics and Communication Engineering, KLM College of Engineering for Women, India
4 Department of Computer Science, College of Computer Science and Information Technology, Jazan University, Saudi Arabia
     

   Subscribe/Renew Journal


Wireless communication is vulnerable to various security threats, including eavesdropping and data interception. To bolster the security of wireless networks, this research explores the application of novel transfer learning techniques for encryption. Transfer Attention learning leverages knowledge from related domains to enhance the performance of encryption methods in wireless communication. This research investigates the application of Transfer Attention Learning, a cutting-edge machine learning technique, to bolster the security of wireless networks. Transfer Attention Learning harnesses knowledge from related domains to enhance the performance of encryption methods in wireless communication. This comprehensive framework encompasses data collection, feature extraction, model selection, training, and deployment. A substantial dataset of wireless network traffic, encompassing benign and malicious packets, is collected. Feature extraction techniques are employed to discern pertinent patterns in the data. Transfer Attention Learning models are meticulously chosen and fine-tuned to align them with the specific requirements of wireless network encryption. The model efficacy is rigorously evaluated using diverse metrics to ensure optimal security enhancement. Subsequently, the model is seamlessly integrated into the wireless network infrastructure, thereby fortifying protection against potential security threats. Ongoing monitoring, updates, regulatory compliance, and user education constitute essential facets of this security framework. This research signifies a significant advancement in wireless network security by harnessing the potential of Transfer Attention Learning to fortify encryption measures, ensuring the safeguarding of sensitive data within wireless communication channels.

Keywords

Transfer Learning, Wireless Networks, Encryption, Security, Data Protection.
Subscription Login to verify subscription
User
Notifications
Font Size

  • H. Yang and X. Cao, “FedSteg: A Federated Transfer Learning Framework for Secure Image Steganalysis”, IEEE Transactions on Network Science and Engineering, Vol. 8, No. 2, pp. 1084-1094, 2020.
  • M.S. Rathore, W. Alhakami and M. Hamdi, “A Novel Trust-Based Security and Privacy Model for Internet of Vehicles using Encryption and Steganography”, Computers and Electrical Engineering, Vol. 102, pp. 108205-108214, 2022.
  • H. Lin and M.J. Piran, “Toward Secure Data Fusion in Industrial IoT using Transfer Learning”, IEEE Transactions on Industrial Informatics, Vol. 17, No. 10, pp. 7114-7122, 2020.
  • P. Zhang and D. Xie, “Federated Transfer Learning for IIoT Devices with Low Computing Power based on Blockchain and Edge Computing”, IEEE Access, Vol. 9, pp. 98630-98638, 2021.
  • R. Indhumathi, G. Kiruthiga and A. Pandey, “Design of Task Scheduling and Fault Tolerance Mechanism based on GWO Algorithm for Attaining Better QoS in Cloud System”, Wireless Personal Communications, Vol. 128, No. 4, pp. 2811-2829, 2023.
  • K. Sreekala, S. Chandrasekaran and E.O. Martinson, “Capsule Network-Based Deep Transfer Learning Model for Face Recognition”, Wireless Communications and Mobile Computing, Vol. 2022, pp. 1-12, 2022.
  • M.U. Rehman and J. Ahmad, “A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis”, IEEE Transactions on Network Science and Engineering, Vol. 9, No. 6, pp. 4322-4337, 2022.
  • B. Gobinathan, P. Niranjan and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-9, 2021.
  • S. Kumar, “MCFT-CNN: Malware Classification with Fine-Tune Convolution Neural Networks using Traditional and Transfer Learning in Internet of Things”, Future Generation Computer Systems, Vol. 125, pp. 334-351, 2021.
  • S. Rajapaksha and G. Madzudzo, “Improving In-Vehicle Networks Intrusion Detection using On-Device Transfer Learning”, Proceedings of Symposium on Vehicles Security and Privacy, pp. 1-7, 2023.
  • A.S. Reegan and V. Kabila, “Highly Secured Cluster based WSN using Novel FCM and Enhanced ECC-ElGamal Encryption in IoT”, Wireless Personal Communications, Vol. 118, pp. 1313-1329, 2021.
  • M. Ramkumar, J. Logeshwaran and T. Husna, “CEA: Certification based Encryption Algorithm for Enhanced Data Protection in Social Networks”, Fundamentals of Applied Mathematics and Soft Computing, Vol. 1, pp. 161-170, 2022.
  • A. Wang and Y. Yan, “Heterogeneous Defect Prediction based on Federated Transfer Learning via Knowledge Distillation”, IEEE Access, Vol. 9, pp. 29530-29540, 2021.
  • K. Praghash and T. Karthikeyan, “Privacy Preservation of the User Data and Properly Balancing between Privacy and Utility”, International Journal of Business Intelligence and Data Mining, Vol. 20, No. 4, pp. 394-411, 2022.
  • K. Yu and T. Sato, “Deep-Learning-Empowered Breast Cancer Auxiliary Diagnosis for 5GB Remote E-Health”, IEEE Wireless Communications, Vol. 28, No. 3, pp. 54-61, 2021.
  • V. Saravanan, D. Saravanan and H.P. Sultana, “Design of Deep Learning Model for Radio Resource Allocation in 5G for Massive IoT Device”, Sustainable Energy Technologies and Assessments, Vol. 56, pp. 103054-103065, 2023.
  • B. Yang, D. Niyato and Y. Zhang, “A Joint Energy and Latency Framework for Transfer Learning over 5G Industrial Edge Networks”, IEEE Transactions on Industrial Informatics, Vol. 18, No. 1, pp. 531-541, 2021.
  • D. Singh, A. Shukla and M. Sajwan, “Deep Transfer Learning Framework for the Identification of Malicious Activities to Combat Cyberattack”, Future Generation Computer Systems, Vol. 125, pp. 687-697, 2021.
  • V. Saravanan and V.M. Raj, “A Seamless Mobile Learning and Tension Free Lifestyle by QoS Oriented Mobile Handoff”, Asian Journal of Research in Social Sciences and Humanities, Vol. 6, No. 7, pp. 374-389, 2016.

Abstract Views: 63

PDF Views: 1




  • Securing Wireless Communication Using Novel Transfer Learning for Encryption in Wireless Networks

Abstract Views: 63  |  PDF Views: 1

Authors

Jayaganesh Jagannathan
Department of Computer Science, Government Arts and Science College, India
S. G. Prasanna Kumara
Department of Physics, Government Science College, Hassan, Karnataka, India
T. Lakshmi Narayana
Department of Electronics and Communication Engineering, KLM College of Engineering for Women, India
Mohammad Shabbir Alam
Department of Computer Science, College of Computer Science and Information Technology, Jazan University, Saudi Arabia

Abstract


Wireless communication is vulnerable to various security threats, including eavesdropping and data interception. To bolster the security of wireless networks, this research explores the application of novel transfer learning techniques for encryption. Transfer Attention learning leverages knowledge from related domains to enhance the performance of encryption methods in wireless communication. This research investigates the application of Transfer Attention Learning, a cutting-edge machine learning technique, to bolster the security of wireless networks. Transfer Attention Learning harnesses knowledge from related domains to enhance the performance of encryption methods in wireless communication. This comprehensive framework encompasses data collection, feature extraction, model selection, training, and deployment. A substantial dataset of wireless network traffic, encompassing benign and malicious packets, is collected. Feature extraction techniques are employed to discern pertinent patterns in the data. Transfer Attention Learning models are meticulously chosen and fine-tuned to align them with the specific requirements of wireless network encryption. The model efficacy is rigorously evaluated using diverse metrics to ensure optimal security enhancement. Subsequently, the model is seamlessly integrated into the wireless network infrastructure, thereby fortifying protection against potential security threats. Ongoing monitoring, updates, regulatory compliance, and user education constitute essential facets of this security framework. This research signifies a significant advancement in wireless network security by harnessing the potential of Transfer Attention Learning to fortify encryption measures, ensuring the safeguarding of sensitive data within wireless communication channels.

Keywords


Transfer Learning, Wireless Networks, Encryption, Security, Data Protection.

References