JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (03): 1-5.doi: 10.6040/j.issn.1671-9352.3.2014.147

    Next Articles

Modeling and evaluation of a dual chaotic encryption algorithm for WSN

ZHANG Jing1,2, XUE Leng1,2, CUI Yi3, RONG Hui4, WANG Jian-ping2   

  1. 1. Computer Technology Application Key Lab of Yunnan Province, Kunming University of Science and Technology, Kunming 650500, Yunnan, China;
    2. Faculty of Information Engineering and Automation, Kunming University of Science and Technology, Kunming 650500, Yunnan, China;
    3. Yunnan Academy of Scientific & Technical Information, Kunming 650051, Yunnan, China;
    4. Faculty of Art and Design, Kunming Metallurgy College, Kunming 650033, Yunnan, China
  • Received:2014-09-19 Revised:2015-01-16 Online:2015-03-20 Published:2015-03-13

Abstract: WSN (wireless sensor networks) is a typical application of Ad-Hoc networks in the internet of things (IoT). The security of WSN influences the existence and uniqueness of real-time interactions in IoT services, and relates to the security metrics of the industrial real-time embedded control systems. According to the characteristics of WSN, a dual chaotic encryption algorithm that is a combination of Logistic map and Henon map (EDC) was designed. And it realized the dual encryption of the plaintext and effectively guaranteed the safety of the data. Finally, the experiment results show that the new algorithm is highly efficient and secure which is very suitable for WSN and can be used to design the security model and evaluate the performance of the industrial real-time embedded control systems.

Key words: information security, data encryption, WSNs, chaos encryption algorithm

CLC Number: 

  • TP393
[1] 孙利民,李建中,孙渝,等.无线传感器网络[M]. 北京:清华大学出版社, 2005:4-6. SUN Limin, LI Jianzhong, SUN Yu, et al. Wireless sensor network [M]. Beijing: Tsinghua University Press, 2005:4-6.
[2] 杜治国,胡大辉.改进的RSA算法在无线传感器网络中的应用[J].计算机应用,2012,32(6):1609-1612. DU Zhiguo, HU Dahui. Application of improved RSA algorithm in wireless sensor network [J].Journal of Computer Applications, 2012, 32(6):1609-1612.
[3] Khushdeep Kaur, Er Seema. Hybrid algorithm with DSA, RSA and MD5 encryption algorithm for wireless devices[J].International Journal of Engineering Research and Applications, 2012, 2(5):914-917.
[4] SAPONARA S, SOLANAS A, AVOINE G, et al.Privacy and security in wireless sensor networks: protocols, algorithms, and efficient architectures[J].Journal of Computer Networks and Communications, 2013(2013):1-3.
[5] RAJKUMAR, SUNITHA K R, CHANDRAKANTH H G. A survey on security attacks in wireless sensor network[J].International Journal of Engineering Research and Applications, 2012, 2(4):1684-1691.
[6] 吴祥兴,陈忠.混沌学导论[M].上海:上海科学技术文献出版社,2001:1-6. WU Xiangxing, CHEN Zhong, Introduction to chaos theory [M]. Shanghai:Shanghai Science and Technology Press, 2001:1-6.
[7] 周松华,张颖.基于一维Logistic映射的图像置乱算法研究[J].井冈山大学学报:自然科学版,2012,33(1):64-67. ZHOU Songhua, ZHANG Ying. Survey on digital image scrambling encryption algorithm [J]. Journal of Jinggangshan University: Natural Science, 2012, 33(1):64-67.
[8] 任帅,高承实,戴青,等.一种对高维混沌图像加密算法的攻击方法[J].计算机工程,2011,37(4):131-133. REN Shuai, GAO Chengshi, DAI Qing, et al. Attack method to high—dimension chaotic image Encryption Algoritnm[J]. Computer Engineering, 2011, 37(4):131-133.
[9] 胡春强,邓绍江,秦明甫,等.基于Logistic与标准映射的数字图像加密算法[J].计算机科学,2010,37(12):57-59. HU Chunqiang, DENG Shaojiang, QIN Mingfu, et al. Image encryption algorithm based on logistic and standard map[J]. Computer Science, 2010, 37(12):57-59.
[10] DANIEL D W, ROBERT A J M. Supercomputer investigation of a chaotic encryption algorithm [J]. Cryptologia, 1991, 15(2):140-152.
[11] 赵文博,田小平,吴成茂.基于信道编码和Henon映射的图像加密方法[J].西安邮电学院学报,2012,17(3):15-19. ZHAO Wenbo, TIAN Xiaoping, WU Chengmao. Image encryption combined channel coding with Henon mapping[J]. Journal of Xi'an University of Posts and Telecommunications, 2012, 17(3):15-19.
[12] ULUAGAC A S, BEYAH R A, LI Yingshu, et al. VEBEK:virtual energy-based encryption and keying for wireless sensor networks[J].IEEE Transactions on Mobile Computing, 2010, 9(7):994-1007.
[13] VIDAL G, BAPTISTA M S, MANCINI H. Fundamentals of a classical chaos-based cryptosystem with some quantum cryptography features [J].International Journal of Bifurcation and Chaos, 2012, 22(10):1250243.1-1250243.14.
[1] DING Yi-tao, YANG Hai-bin, YANG Xiao-yuan, ZHOU Tan-ping. A reversible image data hiding scheme in Homomorphic encrypted domain [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 104-110.
[2] KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23.
[3] WU Zhi-jun,SHEN Dan-dan. Architecture and key technologies of network-enabled next generation global flight tracking based on information integration and sharing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 1-6.
[4] KANG Hai-yan, YANG Kong-yu, CHEN Jian-ming. A method of personalized privacy preservation based on K-anonymization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 142-149.
[5] L Jia-liang1,2,3, WANG Ying-long1,3, CUI Huan-qing1, WEI Nuo2,3, GUO Qiang2,3. Study on the node localization schemes of three dimensional wireless sensor networks based on particle swarm optimization [J]. J4, 2013, 48(05): 78-82.
[6] HUANG Jing-wen. uzzy group decision making for information security risk factors analysis [J]. J4, 2012, 47(11): 45-49.
[7] ZHOU Shu-wang1,2,3, WANG Ying-long1,3, GUO Qiang1,2, WEI Nuo1,2, GUO Wen-juan1,3. A new method for localization based on network  coverage and intelligent search [J]. J4, 2010, 45(11): 27-31.
[8] ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo. Particle swarm optimizationbasedwireless sensor  network nodes localization method [J]. J4, 2009, 44(9): 52-55.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!