Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 362-364.

• Information Security • Previous Articles     Next Articles

Encryption of Wireless Sensor Networks Based on Chaos and WEP

LU Zheng-qiao   

  1. Aero Engine Control System Institute of China,Wuxi,Jiangsu 214063,China
  • Online:2019-06-14 Published:2019-07-02

Abstract: Wireless sensor network is an open system which is easy to be monitored and disturbed.The CPU of sensor nodes has limited computing speed,word length and storage space.It is impossible to execute the encryption algorithm with high running cost like PC level.The encryption algorithm of wireless network such as WEP and THIP with low running cost has been proved to have the problem of key strength and so on.This paper proposes an encryption protocol based on the combination of WEP and chaotic sequence.By using chaotic sequence as a sub-key generation algorithm,the key randomness can be improved by using chaotic sequence mapping without increasing the time complexity and space complexity,avoiding the key duplication problem of WEP protocol and increasing the difficulty of deciphering.

Key words: Chaotic queues, Embedded, Encryption

CLC Number: 

  • TP393.1
[1]郭海霞,裘雪红.嵌入式系统安全的研究与设计[J].电子科技,2005,8:49-54.
[2]路安平,杨济民,李峰.几种轻量级加密算法的比较研究[J].现代电子科技,2014,37(12):37-41.
[3]刘宴兵,田四梅,唐浩坤,等.基于混沌的+RC4+流加密算法[J].计算机工程,2011,37(2):136-138.
[4]刘坤.无线局域网的安全性研究[D].上海:复旦大学,2008.
[5]LORENZ E N.Deterministic nonperiodic flow[J].Journal of atmosphere science,1963,20:130-141.
[6]FREY D Q.chaotic digital encoding:an approach to secure communication[J].IEEE Trans Circuit and Systems,1993,40(40):660-666.
[7]DEDIEU H,KENNEDY M P,HASLER M.chaos shift keying:modulation and demodulation of a chaotic carrier using self-synchronizing chua’s circuit[J].IEEE Trans Circuit and Systems,1993,40(40):634-642.
[8]胡岗,萧井华,郑志刚.混沌控制[M].上海:上海科技教育出版社,2000:167-193.
[9]孟庆树,王丽娜,傅建明.密码编码学与网络安全[M].北京:电子工业出版社,2006.
[10]LIU M S,ZHANG Y,LI J H.Research on Improving Security of DES by Chaotic Mapping[C]∥Proc.sof the 8th International Conference on Machine Learnling and Cybernetics.Baoding,China,2009.
[11]QIAN G B,JIANG Q F,QIU S S.A New Image Encryption Scheme Based on DES Algorithm and Chua’s Circuit[C]∥Proc. of International Workshop on Imaging Systems and Techniques.Shenzhen,China,2009.
[12]廖晓蜂,肖迪,陈勇,等.混沌密码学原理及其应用[M].北京:科学出版社,2009.
[1] LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325.
[2] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[3] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[4] LI Li, HE Xin, HAN Zhi-jie. Review of Privacy-preserving Mechanisms in Crowdsensing [J]. Computer Science, 2022, 49(5): 303-310.
[5] QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346.
[6] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[7] REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong. Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [J]. Computer Science, 2022, 49(3): 70-76.
[8] GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321.
[9] LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345.
[10] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[11] LIANG Jian, HE Jun-hui. H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information [J]. Computer Science, 2022, 49(1): 314-320.
[12] ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358.
[13] ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie. Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment [J]. Computer Science, 2021, 48(9): 324-329.
[14] TANG Fei, CHEN Yun-long, FENG Zhuo. Electronic Prescription Sharing Scheme Based on Blockchain and Proxy Re-encryption [J]. Computer Science, 2021, 48(6A): 498-503.
[15] QU Wei, YU Fei-hong. Survey of Research on Asymmetric Embedded System Based on Multi-core Processor [J]. Computer Science, 2021, 48(6A): 538-542.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!