|
- 2015
基于无线传感器网络的双混沌数据加密算法建模与评价
|
Abstract:
摘要: 无线传感器网络是物联网领域中典型的Ad Hoc网络,其信息安全影响物联网服务实时交互行为的存在性和唯一性,可用于实时嵌入式工业控制系统的安全度量评价。根据无线传感器网络的特性,设计了基于Logistic映射和Henon映射相结合的双混沌系统加密算法(EDC),实现对明文信息的双重加密,有效地保证了数据的安全性。通过实验证明该算法效率高,安全性强,非常适合无线传感器网络用于实时嵌入式工业控制系统的安全性建模设计和性能评价。
Abstract: WSN (wireless sensor networks) is a typical application of Ad-Hoc networks in the internet of things (IoT). The security of WSN influences the existence and uniqueness of real-time interactions in IoT services, and relates to the security metrics of the industrial real-time embedded control systems. According to the characteristics of WSN, a dual chaotic encryption algorithm that is a combination of Logistic map and Henon map (EDC) was designed. And it realized the dual encryption of the plaintext and effectively guaranteed the safety of the data. Finally, the experiment results show that the new algorithm is highly efficient and secure which is very suitable for WSN and can be used to design the security model and evaluate the performance of the industrial real-time embedded control systems
[1] | VIDAL G, BAPTISTA M S, MANCINI H. Fundamentals of a classical chaos-based cryptosystem with some quantum cryptography features [J].International Journal of Bifurcation and Chaos, 2012, 22(10):1250243.1-1250243.14. |
[2] | 杜治国,胡大辉.改进的RSA算法在无线传感器网络中的应用[J].计算机应用,2012,32(6):1609-1612. DU Zhiguo, HU Dahui. Application of improved RSA algorithm in wireless sensor network [J].Journal of Computer Applications, 2012, 32(6):1609-1612. |
[3] | 任帅,高承实,戴青,等.一种对高维混沌图像加密算法的攻击方法[J].计算机工程,2011,37(4):131-133. REN Shuai, GAO Chengshi, DAI Qing, et al. Attack method to high—dimension chaotic image Encryption Algoritnm[J]. Computer Engineering, 2011, 37(4):131-133. |
[4] | ULUAGAC A S, BEYAH R A, LI Yingshu, et al. VEBEK:virtual energy-based encryption and keying for wireless sensor networks[J].IEEE Transactions on Mobile Computing, 2010, 9(7):994-1007. |
[5] | 孙利民,李建中,孙渝,等.无线传感器网络[M]. 北京:清华大学出版社, 2005:4-6. SUN Limin, LI Jianzhong, SUN Yu, et al. Wireless sensor network [M]. Beijing: Tsinghua University Press, 2005:4-6. |
[6] | Khushdeep Kaur, Er Seema. Hybrid algorithm with DSA, RSA and MD5 encryption algorithm for wireless devices[J].International Journal of Engineering Research and Applications, 2012, 2(5):914-917. |
[7] | SAPONARA S, SOLANAS A, AVOINE G, et al.Privacy and security in wireless sensor networks: protocols, algorithms, and efficient architectures[J].Journal of Computer Networks and Communications, 2013(2013):1-3. |
[8] | 赵文博,田小平,吴成茂.基于信道编码和Henon映射的图像加密方法[J].西安邮电学院学报,2012,17(3):15-19. ZHAO Wenbo, TIAN Xiaoping, WU Chengmao. Image encryption combined channel coding with Henon mapping[J]. Journal of Xi'an University of Posts and Telecommunications, 2012, 17(3):15-19. |
[9] | 周松华,张颖.基于一维Logistic映射的图像置乱算法研究[J].井冈山大学学报:自然科学版,2012,33(1):64-67. ZHOU Songhua, ZHANG Ying. Survey on digital image scrambling encryption algorithm [J]. Journal of Jinggangshan University: Natural Science, 2012, 33(1):64-67. |
[10] | 胡春强,邓绍江,秦明甫,等.基于Logistic与标准映射的数字图像加密算法[J].计算机科学,2010,37(12):57-59. HU Chunqiang, DENG Shaojiang, QIN Mingfu, et al. Image encryption algorithm based on logistic and standard map[J]. Computer Science, 2010, 37(12):57-59. |
[11] | DANIEL D W, ROBERT A J M. Supercomputer investigation of a chaotic encryption algorithm [J]. Cryptologia, 1991, 15(2):140-152. |
[12] | RAJKUMAR, SUNITHA K R, CHANDRAKANTH H G. A survey on security attacks in wireless sensor network[J].International Journal of Engineering Research and Applications, 2012, 2(4):1684-1691. |
[13] | 吴祥兴,陈忠.混沌学导论[M].上海:上海科学技术文献出版社,2001:1-6. WU Xiangxing, CHEN Zhong, Introduction to chaos theory [M]. Shanghai:Shanghai Science and Technology Press, 2001:1-6. |