您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2015, Vol. 50 ›› Issue (03): 1-5.doi: 10.6040/j.issn.1671-9352.3.2014.147

• 论文 •    下一篇

基于无线传感器网络的双混沌数据加密算法建模与评价

张晶1,2, 薛冷1,2, 崔毅3, 容会4, 王剑平2   

  1. 1. 昆明理工大学云南省计算机技术应用重点实验室, 云南 昆明 650500;
    2. 昆明理工大学信息工程与自动化学院, 云南 昆明 650500;
    3. 云南省科技情报研究院, 云南 昆明 650051;
    4. 昆明冶金高等专科学校艺术设计学院, 云南 昆明 650033
  • 收稿日期:2014-09-19 修回日期:2015-01-16 出版日期:2015-03-20 发布日期:2015-03-13
  • 作者简介:张晶(1974- ),男,博士,教授,研究方向为实时与嵌入式软件、物联网软件建模与设计、信息物理融合系统.E-mail:zhangji0548_cn@sina.com
  • 基金资助:
    国家自然科学基金资助项目(61364008);云南省自然科学基金资助项目(2014FA029,2012FB137,2011FZ202)

Modeling and evaluation of a dual chaotic encryption algorithm for WSN

ZHANG Jing1,2, XUE Leng1,2, CUI Yi3, RONG Hui4, WANG Jian-ping2   

  1. 1. Computer Technology Application Key Lab of Yunnan Province, Kunming University of Science and Technology, Kunming 650500, Yunnan, China;
    2. Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming 650500, Yunnan, China;
    3. Yunnan Academy of Scientific & Technical Information, Kunming 650051, Yunnan, China;
    4. Faculty of Art and Design, Kunming Metallurgy College, Kunming 650033, Yunnan, China
  • Received:2014-09-19 Revised:2015-01-16 Online:2015-03-20 Published:2015-03-13

摘要: 无线传感器网络是物联网领域中典型的Ad Hoc网络,其信息安全影响物联网服务实时交互行为的存在性和唯一性,可用于实时嵌入式工业控制系统的安全度量评价。根据无线传感器网络的特性,设计了基于Logistic映射和Henon映射相结合的双混沌系统加密算法(EDC),实现对明文信息的双重加密,有效地保证了数据的安全性。通过实验证明该算法效率高,安全性强,非常适合无线传感器网络用于实时嵌入式工业控制系统的安全性建模设计和性能评价。

关键词: 无线传感器网络, 信息安全, 数据加密, 混沌加密算法

Abstract: WSN (wireless sensor networks) is a typical application of Ad-Hoc networks in the internet of things (IoT). The security of WSN influences the existence and uniqueness of real-time interactions in IoT services, and relates to the security metrics of the industrial real-time embedded control systems. According to the characteristics of WSN, a dual chaotic encryption algorithm that is a combination of Logistic map and Henon map (EDC) was designed. And it realized the dual encryption of the plaintext and effectively guaranteed the safety of the data. Finally, the experiment results show that the new algorithm is highly efficient and secure which is very suitable for WSN and can be used to design the security model and evaluate the performance of the industrial real-time embedded control systems.

Key words: information security, data encryption, WSNs, chaos encryption algorithm

中图分类号: 

  • TP393
[1] 孙利民,李建中,孙渝,等.无线传感器网络[M]. 北京:清华大学出版社, 2005:4-6. SUN Limin, LI Jianzhong, SUN Yu, et al. Wireless sensor network [M]. Beijing: Tsinghua University Press, 2005:4-6.
[2] 杜治国,胡大辉.改进的RSA算法在无线传感器网络中的应用[J].计算机应用,2012,32(6):1609-1612. DU Zhiguo, HU Dahui. Application of improved RSA algorithm in wireless sensor network [J].Journal of Computer Applications, 2012, 32(6):1609-1612.
[3] Khushdeep Kaur, Er Seema. Hybrid algorithm with DSA, RSA and MD5 encryption algorithm for wireless devices[J].International Journal of Engineering Research and Applications, 2012, 2(5):914-917.
[4] SAPONARA S, SOLANAS A, AVOINE G, et al.Privacy and security in wireless sensor networks: protocols, algorithms, and efficient architectures[J].Journal of Computer Networks and Communications, 2013(2013):1-3.
[5] RAJKUMAR, SUNITHA K R, CHANDRAKANTH H G. A survey on security attacks in wireless sensor network[J].International Journal of Engineering Research and Applications, 2012, 2(4):1684-1691.
[6] 吴祥兴,陈忠.混沌学导论[M].上海:上海科学技术文献出版社,2001:1-6. WU Xiangxing, CHEN Zhong, Introduction to chaos theory [M]. Shanghai:Shanghai Science and Technology Press, 2001:1-6.
[7] 周松华,张颖.基于一维Logistic映射的图像置乱算法研究[J].井冈山大学学报:自然科学版,2012,33(1):64-67. ZHOU Songhua, ZHANG Ying. Survey on digital image scrambling encryption algorithm [J]. Journal of Jinggangshan University: Natural Science, 2012, 33(1):64-67.
[8] 任帅,高承实,戴青,等.一种对高维混沌图像加密算法的攻击方法[J].计算机工程,2011,37(4):131-133. REN Shuai, GAO Chengshi, DAI Qing, et al. Attack method to high—dimension chaotic image Encryption Algoritnm[J]. Computer Engineering, 2011, 37(4):131-133.
[9] 胡春强,邓绍江,秦明甫,等.基于Logistic与标准映射的数字图像加密算法[J].计算机科学,2010,37(12):57-59. HU Chunqiang, DENG Shaojiang, QIN Mingfu, et al. Image encryption algorithm based on logistic and standard map[J]. Computer Science, 2010, 37(12):57-59.
[10] DANIEL D W, ROBERT A J M. Supercomputer investigation of a chaotic encryption algorithm [J]. Cryptologia, 1991, 15(2):140-152.
[11] 赵文博,田小平,吴成茂.基于信道编码和Henon映射的图像加密方法[J].西安邮电学院学报,2012,17(3):15-19. ZHAO Wenbo, TIAN Xiaoping, WU Chengmao. Image encryption combined channel coding with Henon mapping[J]. Journal of Xi'an University of Posts and Telecommunications, 2012, 17(3):15-19.
[12] ULUAGAC A S, BEYAH R A, LI Yingshu, et al. VEBEK:virtual energy-based encryption and keying for wireless sensor networks[J].IEEE Transactions on Mobile Computing, 2010, 9(7):994-1007.
[13] VIDAL G, BAPTISTA M S, MANCINI H. Fundamentals of a classical chaos-based cryptosystem with some quantum cryptography features [J].International Journal of Bifurcation and Chaos, 2012, 22(10):1250243.1-1250243.14.
[1] 丁义涛,杨海滨,杨晓元,周潭平. 一种同态密文域可逆隐藏方案[J]. 山东大学学报(理学版), 2017, 52(7): 104-110.
[2] 康海燕,马跃雷. 差分隐私保护在数据挖掘中应用综述[J]. 山东大学学报(理学版), 2017, 52(3): 16-23.
[3] 及歆荣,侯翠琴,侯义斌,赵斌. 基于筛选机制的L1核学习机分布式训练方法[J]. 山东大学学报(理学版), 2016, 51(9): 137-144.
[4] 吴志军,沈丹丹. 基于信息综合集成共享的下一代网络化全球航班追踪体系结构及关键技术[J]. 山东大学学报(理学版), 2016, 51(11): 1-6.
[5] 周先存, 黎明曦, 李瑞霞, 徐明鹃, 凌海波. 多点协作复制攻击检测研究[J]. 山东大学学报(理学版), 2015, 50(07): 54-65.
[6] 万智萍. 一种混合Das协议的无线传感器网络身份验证协议[J]. 山东大学学报(理学版), 2015, 50(05): 12-17.
[7] 李国庆. 无线传感器网络基于联系数的信任评估模型[J]. 山东大学学报(理学版), 2014, 49(09): 123-128.
[8] 康海燕, 杨孔雨, 陈建明. 于K-匿名的个性化隐私保护方法研究[J]. 山东大学学报(理学版), 2014, 49(09): 142-149.
[9] 赵泽茂1,刘洋1,张帆1,2,周建钦1,张品1. 基于角度和概率的WSN源位置隐私保护路由研究[J]. J4, 2013, 48(09): 1-9.
[10] 万润泽1,雷建军1,袁操2. 基于模糊聚类理论的无线传感器节点休眠优化策略[J]. J4, 2013, 48(09): 17-21.
[11] 吕家亮1,2,3,王英龙1,3,崔焕庆1,魏诺2,3,郭强2,3. 基于微粒群优化的三维无线传感网定位算法研究[J]. J4, 2013, 48(05): 78-82.
[12] 崔焕庆1,2,王英龙1*,吕家亮1,2,魏诺1. 基于随机微粒群算法的分布式节点定位方法[J]. J4, 2012, 47(9): 51-55.
[13] 郭晓东1,杜鹏1,张雪芬2. 一种WSN中能量有效的分布式检测和功率分配算法[J]. J4, 2012, 47(9): 60-64.
[14] 黄景文. 信息安全风险因素分析的模糊群决策方法研究[J]. J4, 2012, 47(11): 45-49.
[15] 刘梦君,刘树波*,刘泓晖,蔡朝晖,涂国庆. 异构无线传感器网络动态混合密钥管理方案研究[J]. J4, 2012, 47(11): 67-73.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!