计算机科学 ›› 2013, Vol. 40 ›› Issue (6): 49-51.

• 网络与通信 • 上一篇    下一篇

一种无线传感器网络的混沌Hash算法

黄锦旺,胡志辉,冯久超   

  1. 华南理工大学电子与信息学院 广州510641;华南理工大学电子与信息学院 广州510641;华南理工大学电子与信息学院 广州510641
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(60872123),国家-广东省自然科学基金联合基金(U0835001)资助

Chaos-based Hash Function for Wireless Sensor Networks

HUANG Jin-wang,HU Zhi-hui and FENG Jiu-chao   

  • Online:2018-11-16 Published:2018-11-16

摘要: 无线传感器网络是当前的一个研究热点,在军事、工业、地质监测和医疗健康等方面有重要的应用价值,这些应用经常包含敏感信息,因此无线传感器网络的信息安全很重要。由于无线传感器网络节点运算能力低、存储空间小且能量有限,在PC上使用的混沌Hash算法不能直接在无线传感器网络中使用,因此提出一种可以在无线传感器网络中使用的混沌Hash算法。理论分析和仿真结果表明,该方法与PC上使用的方法具有同等的安全性能。

关键词: 无线传感器网络,混沌,Hash,安全

Abstract: Wireless sensor networks (WSNs) are one of hot research issues because of their applications in fields of mi-litary,industry,ecological and health care.These applications often also include to monitor sensitive information,and security is therefore important.WSNs are restricted from many constraints,including low computation capability,small memory,limited energy resources.Hash function ran on PC can not used in WSNs directly,so we proposed a chaos-based hash function that can be ran on WSNs.Theoretical analysis and simulation results show that it has the same security level as the hash that ran on PC.

Key words: WSNs,Chaos,Hash,Security

[1] Estrin D,et al.Instrumenting the World with Wireless Sensor Networks[C]∥Proc.Int’l.Conf.Acoustics,Speech and Signal Processing.Salt Lake City,UT,May 2001
[2] Chan H,Perrig A.Security and Privacy in Sensor Networks[J].IEEE Comp.,2003,36(10):103-105
[3] Shi E,Perrig A.Designing Secure Sensor Networks[J].Wireless Commun,2004,11(6):38-43
[4] Gura N,et al.Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs[C]∥CHES’04:Proc.Wksp.Cryptographic Hardware and Embedded Systems.Aug.2004
[5] Gaubatz G,Kaps J-P,Sunar B.Public Key Cryptogra-phy inSensor Networks-Revisited[C]∥ESAS’04:1st European Wksp.Security in Ad-Hoc and Sensor Networks.2004
[6] Rivest R L.RFC 1321.The MD5message digest algorithm request for comments [S].Cambridge:MIT and RSA Data Security,1992
[7] Nits F P.FIPS PUB 180,Secure hash standard [S].Washington DC:U.S.Department of Commerce,1993
[8] Wang S Y,Feng J C.Chaotic communication scheme by parame-ter division multiple access[J].Acta Electronica Sinica,2007,35(7):35-40
[9] 刘式达,梁福明,刘式适,等.自然科学中的混沌和分形[M].北京:北京大学出版社,2003:1-12,6,31-32,5
[10] 陈帅.无线微传感器网络混沌加密理论及其关键技术研究[D].重庆:重庆大学,2006:55-78
[11] Peng Fei,Qiu Shui-sheng.One-way Hash Functions Based on Iterated Chaotic Systems[C]∥Communications,Circuits and Systems International Conference.2007:1070-1074
[12] Shannon C E.Communication theory of secrecy systems[J].Bell System Technology Journal,1949,28:656-715
[13] 郑世慧,张国艳,杨义先,等.基于混沌的带密钥散列函数安全分析[J].通信学报,2011,32(5):146-152

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!