期刊文献+

基于混沌S盒的无线传感器网络分组加密算法 被引量:8

Block encryption algorithm based on chaotic S-box for wireless sensor network
在线阅读 下载PDF
导出
摘要 针对无线传感器网络中现有的分组加密算法的优缺点,根据无线传感器网络安全需求提出了一种基于混沌S盒的分组加密算法。主要利用了混沌的非周期性、不可预测性等相关特性生成随机数,利用随机数设计对应的S盒,通过统计性检测对其安全性进行分析,并通过能耗仿真对其可用性进行分析,与RC5、RC6加密算法进行比较,结果表明该算法在无线传感器网络加密算法中有一定优势。 The pros and cons of the existing encryption algorithm for Wireless Sensor Network(WSN) were analyzed.A chaotic block cipher based on chaos box was proposed for WSN in accordance with its security request.Random number was generated by mainly using the chaotic aperiodicity,unpredictability and other related characteristics,and corresponding S box was designed by using random number.Finally,conclusion was made by comparing RC5 and RC6 at statistical performance and energy consumption.The results show this encryption scheme has better performance for WSN.
作者 何远 田四梅
出处 《计算机应用》 CSCD 北大核心 2013年第4期1081-1084,共4页 journal of Computer Applications
关键词 混沌 Logistics映射 分组加密 降维 S盒 chaos Logistics map block encryption dimension reduction S-box
  • 相关文献

参考文献11

  • 1裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:94
  • 2LAW Y W, DOUMEN J, HARTEL P. Survey and benchmark of block ciphers for wireless sensor network [ J]. ACM Transactions on Sensor Network, 2006, 2(1) : 65 -93.
  • 3GUIMARAES G, SOUTO E, SADOK D, et al. Evaluation of secur- ity mechanisms in wireless sensor network[ C]// Proceeding of the 2005 Systems Communications. Washington, DC: IEEE Computer Society, 2005:428-433.
  • 4CHEN Z, ZHANG Z W, J]ANG N. A session key generator based on chaotic sequence[ C]/! International Conference on Computer Sci- ence and Software Engineering. Washington, DC: IEEE Computer Society, 2008:635-637.
  • 5PENG J, J]N S Z, LIN H L, et al. A block cipher based on a hybrid of ehaotie system and Feistel network[ C]//2009 Fifth International Conference on Natural Computation. Piscataway, NJ: IEEE Press, 2009:17.
  • 6邓绍江,黄桂超,陈志建,肖潇.基于混沌映射的自适应图像加密算法[J].计算机应用,2011,31(6):1502-1504. 被引量:16
  • 7肖迪,赵秋乐.一种基于Logistic混沌序列的图像置乱算法的安全分析[J].计算机应用,2010,30(7):1815-1817. 被引量:6
  • 8LIANG W, XU J B, TANG M D, et al. A new embedded encryp- tion algorithm for wireless sensor networks[ C]// IFITA'09: Pro- ceedings of the 2009 International Forum on Information Technology and Applications. Washington, DC: IEEE Computer Society, 2009: 119-122.
  • 9ULUAGAC A S, BEYAH R A, LI YINGSHU, et al. WEBEK: virtual energy-based encryption and keying for wireless sensor net- works[ J]. IEEE Transactions on Mobile Computing, 2010, 9(7) : 994 - 1007.
  • 10MASUDA N, JAKIMOSKI G, AIHARA K, eta/. Chaotic block ei- phem: from theory to practical algorithms[ J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 21306, 53(6) : 1341 - 1352.

二级参考文献77

共引文献113

同被引文献44

  • 1韩军,曾晓洋,汤庭鳌.DES密码电路的抗差分功耗分析设计[J].Journal of Semiconductors,2005,26(8):1646-1652. 被引量:11
  • 2杨改贞.AES加密算法在无线网络安全中的应用[J].长沙通信职业技术学院学报,2006,5(3):62-64. 被引量:3
  • 3DAS M L. Efficient user authentication and secure data transmissionin wireless sensor networks[ C] // Proceedings of the 16th IEEE In-ternational Conference on Networks. Piscataway: IEEE, 2008: 1 -6.
  • 4CHEN T H, SHIH W K. A robust mutual authentication protocol forwireless sensor networks[ J]. ETRI Journal, 2010,32( 5): 704 -712.
  • 5KHAN M K, ALGHATHBAR K. Cryptanalysis and security im-provements of two-factor user authentication in wireless sensornetworks’[ J]. Sensors, 2010,10(3): 2450 -2459.
  • 6HE W, LIU X, NGUYEN H, et al. PDA: Privacy-preserving dataaggregation in wireless sensor networks [ C ]// Proceedings of the26 th IEEE Conference on Computer Communications (INFOCOM).Piscataway: IEEE, 2007, 2045 -2053.
  • 7DAS M L. Two-factor user authentication in wireless sensornetworks [ J ]. IEEE Transactions on Wireless Communications,2009, 8(3):1086 -1090.
  • 8TIWARI H,ASAWA K. A secure and efficient cryptographic hashfunction based on NewFORK-256 [ J ]. Egyptian InformaticsJournal, 2012,13(3):199 -208.
  • 9KHAN M K,ALGHATHBAR K. Cryptanalysis and securityimprovements of two-factor user authentication in wireless sensornetworks[ J]. Sensors, 2010,10(3) : 2450 -2459.
  • 10DYANG D H,LEE M K. Improvement of Das’s two-factorauthentication protocol in wireless sensor networks [ J/OL ],(2009- 12- 20) [ 2013- 06- 20 ]. http://eprint. iacr. org/2009/631. pdf.

引证文献8

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部