Open Access
Subscription Access
Open Access
Subscription Access
Securing Wireless Communication Using Novel Transfer Learning for Encryption in Wireless Networks
Subscribe/Renew Journal
Wireless communication is vulnerable to various security threats, including eavesdropping and data interception. To bolster the security of wireless networks, this research explores the application of novel transfer learning techniques for encryption. Transfer Attention learning leverages knowledge from related domains to enhance the performance of encryption methods in wireless communication. This research investigates the application of Transfer Attention Learning, a cutting-edge machine learning technique, to bolster the security of wireless networks. Transfer Attention Learning harnesses knowledge from related domains to enhance the performance of encryption methods in wireless communication. This comprehensive framework encompasses data collection, feature extraction, model selection, training, and deployment. A substantial dataset of wireless network traffic, encompassing benign and malicious packets, is collected. Feature extraction techniques are employed to discern pertinent patterns in the data. Transfer Attention Learning models are meticulously chosen and fine-tuned to align them with the specific requirements of wireless network encryption. The model efficacy is rigorously evaluated using diverse metrics to ensure optimal security enhancement. Subsequently, the model is seamlessly integrated into the wireless network infrastructure, thereby fortifying protection against potential security threats. Ongoing monitoring, updates, regulatory compliance, and user education constitute essential facets of this security framework. This research signifies a significant advancement in wireless network security by harnessing the potential of Transfer Attention Learning to fortify encryption measures, ensuring the safeguarding of sensitive data within wireless communication channels.
Keywords
Transfer Learning, Wireless Networks, Encryption, Security, Data Protection.
Subscription
Login to verify subscription
User
Font Size
Information
- H. Yang and X. Cao, “FedSteg: A Federated Transfer Learning Framework for Secure Image Steganalysis”, IEEE Transactions on Network Science and Engineering, Vol. 8, No. 2, pp. 1084-1094, 2020.
- M.S. Rathore, W. Alhakami and M. Hamdi, “A Novel Trust-Based Security and Privacy Model for Internet of Vehicles using Encryption and Steganography”, Computers and Electrical Engineering, Vol. 102, pp. 108205-108214, 2022.
- H. Lin and M.J. Piran, “Toward Secure Data Fusion in Industrial IoT using Transfer Learning”, IEEE Transactions on Industrial Informatics, Vol. 17, No. 10, pp. 7114-7122, 2020.
- P. Zhang and D. Xie, “Federated Transfer Learning for IIoT Devices with Low Computing Power based on Blockchain and Edge Computing”, IEEE Access, Vol. 9, pp. 98630-98638, 2021.
- R. Indhumathi, G. Kiruthiga and A. Pandey, “Design of Task Scheduling and Fault Tolerance Mechanism based on GWO Algorithm for Attaining Better QoS in Cloud System”, Wireless Personal Communications, Vol. 128, No. 4, pp. 2811-2829, 2023.
- K. Sreekala, S. Chandrasekaran and E.O. Martinson, “Capsule Network-Based Deep Transfer Learning Model for Face Recognition”, Wireless Communications and Mobile Computing, Vol. 2022, pp. 1-12, 2022.
- M.U. Rehman and J. Ahmad, “A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis”, IEEE Transactions on Network Science and Engineering, Vol. 9, No. 6, pp. 4322-4337, 2022.
- B. Gobinathan, P. Niranjan and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-9, 2021.
- S. Kumar, “MCFT-CNN: Malware Classification with Fine-Tune Convolution Neural Networks using Traditional and Transfer Learning in Internet of Things”, Future Generation Computer Systems, Vol. 125, pp. 334-351, 2021.
- S. Rajapaksha and G. Madzudzo, “Improving In-Vehicle Networks Intrusion Detection using On-Device Transfer Learning”, Proceedings of Symposium on Vehicles Security and Privacy, pp. 1-7, 2023.
- A.S. Reegan and V. Kabila, “Highly Secured Cluster based WSN using Novel FCM and Enhanced ECC-ElGamal Encryption in IoT”, Wireless Personal Communications, Vol. 118, pp. 1313-1329, 2021.
- M. Ramkumar, J. Logeshwaran and T. Husna, “CEA: Certification based Encryption Algorithm for Enhanced Data Protection in Social Networks”, Fundamentals of Applied Mathematics and Soft Computing, Vol. 1, pp. 161-170, 2022.
- A. Wang and Y. Yan, “Heterogeneous Defect Prediction based on Federated Transfer Learning via Knowledge Distillation”, IEEE Access, Vol. 9, pp. 29530-29540, 2021.
- K. Praghash and T. Karthikeyan, “Privacy Preservation of the User Data and Properly Balancing between Privacy and Utility”, International Journal of Business Intelligence and Data Mining, Vol. 20, No. 4, pp. 394-411, 2022.
- K. Yu and T. Sato, “Deep-Learning-Empowered Breast Cancer Auxiliary Diagnosis for 5GB Remote E-Health”, IEEE Wireless Communications, Vol. 28, No. 3, pp. 54-61, 2021.
- V. Saravanan, D. Saravanan and H.P. Sultana, “Design of Deep Learning Model for Radio Resource Allocation in 5G for Massive IoT Device”, Sustainable Energy Technologies and Assessments, Vol. 56, pp. 103054-103065, 2023.
- B. Yang, D. Niyato and Y. Zhang, “A Joint Energy and Latency Framework for Transfer Learning over 5G Industrial Edge Networks”, IEEE Transactions on Industrial Informatics, Vol. 18, No. 1, pp. 531-541, 2021.
- D. Singh, A. Shukla and M. Sajwan, “Deep Transfer Learning Framework for the Identification of Malicious Activities to Combat Cyberattack”, Future Generation Computer Systems, Vol. 125, pp. 687-697, 2021.
- V. Saravanan and V.M. Raj, “A Seamless Mobile Learning and Tension Free Lifestyle by QoS Oriented Mobile Handoff”, Asian Journal of Research in Social Sciences and Humanities, Vol. 6, No. 7, pp. 374-389, 2016.
Abstract Views: 125
PDF Views: 1