计算机科学 ›› 2019, Vol. 46 ›› Issue (6A): 362-364.

• 信息安全 • 上一篇    下一篇

基于混沌和WEP的无线传感器网络加密研究

卢政桥   

  1. 中国航发控制系统研究所软件部 江苏 无锡214063
  • 出版日期:2019-06-14 发布日期:2019-07-02
  • 通讯作者: 卢政桥 硕士生,主要研究方向为数字控制、软件实现,E-mail:448207632@qq.com(通信作者)。

Encryption of Wireless Sensor Networks Based on Chaos and WEP

LU Zheng-qiao   

  1. Aero Engine Control System Institute of China,Wuxi,Jiangsu 214063,China
  • Online:2019-06-14 Published:2019-07-02

摘要: 无线传感器网络是一个易受监听和干扰的开放系统,传感器节点的CPU计算速度、字长和存储空间有限,无法像pc级那样执行运行成本较大的加密算法,而运行成本较低的WEP、THIP等无线网加密算法已被证实存在密钥强度等问题。文中提出了一种基于WEP和混沌序列结合的加密协议,通过混沌序列作为子密钥的生成算法,可以在不增加时间复杂度和空间复杂度的情况下,同时利用混沌序列映射提高密钥随机性,回避WEP协议的密钥重复问题,增加破译的难度。

关键词: 混沌序列, 加密, 嵌入式

Abstract: Wireless sensor network is an open system which is easy to be monitored and disturbed.The CPU of sensor nodes has limited computing speed,word length and storage space.It is impossible to execute the encryption algorithm with high running cost like PC level.The encryption algorithm of wireless network such as WEP and THIP with low running cost has been proved to have the problem of key strength and so on.This paper proposes an encryption protocol based on the combination of WEP and chaotic sequence.By using chaotic sequence as a sub-key generation algorithm,the key randomness can be improved by using chaotic sequence mapping without increasing the time complexity and space complexity,avoiding the key duplication problem of WEP protocol and increasing the difficulty of deciphering.

Key words: Chaotic queues, Embedded, Encryption

中图分类号: 

  • TP393.1
[1]郭海霞,裘雪红.嵌入式系统安全的研究与设计[J].电子科技,2005,8:49-54.
[2]路安平,杨济民,李峰.几种轻量级加密算法的比较研究[J].现代电子科技,2014,37(12):37-41.
[3]刘宴兵,田四梅,唐浩坤,等.基于混沌的+RC4+流加密算法[J].计算机工程,2011,37(2):136-138.
[4]刘坤.无线局域网的安全性研究[D].上海:复旦大学,2008.
[5]LORENZ E N.Deterministic nonperiodic flow[J].Journal of atmosphere science,1963,20:130-141.
[6]FREY D Q.chaotic digital encoding:an approach to secure communication[J].IEEE Trans Circuit and Systems,1993,40(40):660-666.
[7]DEDIEU H,KENNEDY M P,HASLER M.chaos shift keying:modulation and demodulation of a chaotic carrier using self-synchronizing chua’s circuit[J].IEEE Trans Circuit and Systems,1993,40(40):634-642.
[8]胡岗,萧井华,郑志刚.混沌控制[M].上海:上海科技教育出版社,2000:167-193.
[9]孟庆树,王丽娜,傅建明.密码编码学与网络安全[M].北京:电子工业出版社,2006.
[10]LIU M S,ZHANG Y,LI J H.Research on Improving Security of DES by Chaotic Mapping[C]∥Proc.sof the 8th International Conference on Machine Learnling and Cybernetics.Baoding,China,2009.
[11]QIAN G B,JIANG Q F,QIU S S.A New Image Encryption Scheme Based on DES Algorithm and Chua’s Circuit[C]∥Proc. of International Workshop on Imaging Systems and Techniques.Shenzhen,China,2009.
[12]廖晓蜂,肖迪,陈勇,等.混沌密码学原理及其应用[M].北京:科学出版社,2009.
[1] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[2] 王磊, 李晓宇.
基于随机洋葱路由的LBS移动隐私保护方案
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing
计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077
[3] 周连兵, 周湘贞, 崔学荣.
基于双重二维混沌映射的压缩图像加密方案
Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map
计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235
[4] 秦小月, 黄汝维, 杨波.
基于素数幂次阶分圆环的NTRU型全同态加密方案
NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings
计算机科学, 2022, 49(5): 341-346. https://doi.org/10.11896/jsjkx.210300089
[5] 赵耿, 王超, 马英杰.
基于混沌序列相关性的峰均比抑制研究
Study on PAPR Reduction Based on Correlation of Chaotic Sequences
计算机科学, 2022, 49(5): 250-255. https://doi.org/10.11896/jsjkx.210400292
[6] 宋涛, 李秀华, 李辉, 文俊浩, 熊庆宇, 陈杰.
大数据时代下车联网安全加密认证技术研究综述
Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era
计算机科学, 2022, 49(4): 340-353. https://doi.org/10.11896/jsjkx.210400112
[7] 任花, 牛少彰, 王茂森, 岳桢, 任如勇.
基于奇异值分解的同态可交换脆弱零水印研究
Homomorphic and Commutative Fragile Zero-watermarking Based on SVD
计算机科学, 2022, 49(3): 70-76. https://doi.org/10.11896/jsjkx.210800015
[8] 高诗尧, 陈燕俐, 许玉岚.
云环境下基于属性的多关键字可搜索加密方案
Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing
计算机科学, 2022, 49(3): 313-321. https://doi.org/10.11896/jsjkx.201100214
[9] 吕由, 吴文渊.
基于同态加密的线性系统求解方案
Linear System Solving Scheme Based on Homomorphic Encryption
计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124
[10] 金华, 朱靖宇, 王昌达.
视频隐私保护技术综述
Review on Video Privacy Protection
计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047
[11] 梁剑, 何军辉.
基于宏块编码信息自适应置换的H.264/AVC视频加密方法
H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information
计算机科学, 2022, 49(1): 314-320. https://doi.org/10.11896/jsjkx.201100089
[12] 张赛男, 李千目.
一种基于Logistic-Sine-Cosine映射的彩色图像加密算法
Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping
计算机科学, 2022, 49(1): 353-358. https://doi.org/10.11896/jsjkx.201000041
[13] 张小艳, 李秦伟, 付福杰.
基于数字承诺的区块链交易金额保密验证方法
Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment
计算机科学, 2021, 48(9): 324-329. https://doi.org/10.11896/jsjkx.200800123
[14] 唐飞, 陈云龙, 冯卓.
基于区块链和代理重加密的电子处方共享方案
Electronic Prescription Sharing Scheme Based on Blockchain and Proxy Re-encryption
计算机科学, 2021, 48(6A): 498-503. https://doi.org/10.11896/jsjkx.201000143
[15] 瞿伟, 余飞鸿.
基于多核处理器的非对称嵌入式系统研究综述
Survey of Research on Asymmetric Embedded System Based on Multi-core Processor
计算机科学, 2021, 48(6A): 538-542. https://doi.org/10.11896/jsjkx.200900204
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!