期刊文献+

TinySBSec—新型轻量级WSN链路层加密算法 被引量:20

TinySBSec—the new lightweight WSN link-layer encryption algorithm
下载PDF
导出
摘要 WSN是一种节点资源受限的无线网络,其链路层安全策略的轻量化研究适合于各种应用环境的WSN系统,且效果显著。结合序列密码和分组密码各自的优势,提出了一种新型轻量的WSN链路层加密算法—TinySBSec。对算法的安全性进行了理论分析,并且采用统计学方法,对该算法的安全性能进行了测试,结果证明算法具有良好的安全性能。 WSN is a kind of wireless network with constrained node resources. The research on the security strategy of the lightweight link-layer is appropriate for the WSN systems working under various kinds of application environ-ments;in addition, the effects are marked. This paper describes a new lightweight WSN link-layer encryption algo-rithm based on the advantages of the stream cipher and block cipher. The security strategy of the new algorithm was analyzed and the new algorithm was tested by using statistical methods. The results show that the new algorithm has good safety performance.
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2014年第2期250-255,共6页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(61003278) 上海市自然科学基金资助项目(10ZR1401400) 中央高校基本科研业务费专项资金资助项目(11D10417 11D10402)
关键词 链路层 加密算法 WSN TinySec TinySBSec WSN link-layer encryption algorithm TinySec TinySBSec
  • 相关文献

参考文献9

  • 1KARLOF C, SASTRY N, WAGNER D. TinySec : a link layer security architecture for wireless sensor networks [ C ]// Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems. Baltimore, USA, 2004. 被引量:1
  • 2CASADO L, TSIGAS P. ContikiSec: a secure network layer for wireless sensor networks under the Contiki operating system[C]// The 14th Nordic Conference on Secure IT Systems. Oslo, Norway, 2009. 被引量:1
  • 3BANDIRMALI N, ERTURK I. WSNSec: a scalable data link layer security protocol for WSNs [ J ]. Ad Hoc Net-works, 2012, 10(1) : 37-45. 被引量:1
  • 4陈铁明,白素刚,蔡家楣.TinyIBE:面向无线传感器网络的身份公钥加密系统[J].传感技术学报,2009,22(8):1193-1197. 被引量:7
  • 5PU Chuanchin, CHUNG Wanyoung. Group key update method for improving RC4 stream cipher in wireless sensor networks [C]//ICCIT'07. [S.l.], 2007. 被引量:1
  • 6TSUNOO Yukiyasu, SAITO Teruo, KUBO Hiroyasu, et al. a distinguishing attack on a fast software-implemented RC4- Like stream cipher [ J ]. IEEE Transactions on Information Theory, 2007, 53( 9): 3250-3255. 被引量:1
  • 7GRASSBERGER P, PROCACCIA I. Characterization of strange attractors [ J]. Physical Review Letters, 1983, 50 (5) : 346-349. 被引量:1
  • 8FARMER J D, SIDOROWICH J J. Predicting chaotic time series [ J ]. Physical Review Letters, 1987, 59 (8) : 845- 848. 被引量:1
  • 9亓民勇,董金新.基于卡方拟合优度检验的序列等概性测试组[J].计算机工程与设计,2012,33(5):1757-1760. 被引量:6

二级参考文献27

  • 1苏桂平,刘争春,姚旭初,殷学文.一种信息安全系统中序列随机性检验方法[J].计算机工程,2006,32(8):153-154. 被引量:12
  • 2Perrig A, Szewczyk R, Wen V, et al. SPINS: Security Protocols for Sensor Networks. Wireless Networks [J]. Wireless Networks, 2002, 8(5):521-534. 被引量:1
  • 3Karlof C, Sastry N, Wagner D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks [C]// 2nd ACM SensSys, 2004,162-175. 被引量:1
  • 4Gura N , Patel A , Wander A , et al. Comparing Elliptic Curve Cryptography and R SA on 8-bit CPUs[C]//Workshop on Cryptographic Hardware and Embedded Systems, 2004, 119-132. 被引量:1
  • 5Malan D J, Welsh M, and Smith M Do A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//IEEE International Conference on Sensor and Ad Hoe Communications and Networks, Santa Clara, California, 2004,71-80. 被引量:1
  • 6Zhang Y, Liu W, Lou W, and Fang Y. Securing Sensor Networks with Location-Based Keys[C]// IEEE Wireless Communications and Networking Conference. 2005, 1909-1914. 被引量:1
  • 7Doyle B, Bell S, Smeaton A F, McCusker K, et al. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks [J]. The Computer Journal, 2006, 49(4): 443-453. 被引量:1
  • 8McCusker K, Connor N, and Diamond D. Low-Energy Finite Field Arithmetic Primitives for Implementing Security in Wireless Sensor Networks[J]. Communication, Circuits And Systems Proceedings, 2006,1537-1541. 被引量:1
  • 9Oliveira L B, Dahab R, Lopez J, et al. Identity-Encryption for Sensor Networks[C]// 3rd IEEE PerCom Workshop on Pervasive Wireless Networking, March 2007,876-884. 被引量:1
  • 10Watro R, Kong D, at al. TinyPK..Securing Sensor Networks with Public Key Technology[C]//SASN' 04 (ACM), Washington DC, 2004, 322-339. 被引量:1

共引文献11

同被引文献110

  • 1秦怡,郑长波.基于双随机相位编码的彩色图像加密技术[J].光子学报,2012,41(3):326-329. 被引量:18
  • 2来学嘉,卢明欣,秦磊,韩峻松,方习文.基于DNA技术的非对称加密与签名方法[J].中国科学:信息科学,2010,40(2):240-248. 被引量:7
  • 3Barrod J F,Wilson S K,Kahn J M.Comparison of orthogonal frequency division multiplexing and pulse amplitude modu-lation in indooro ptical wireless links[J] ,IEEE Transaction-son Communications,2012,60(1):153-163. 被引量:1
  • 4Michael Winkler, Michael Street, Klaus-Dieter Tuchs, et al. Wireless sensor networks for military purposes [J]. Autono- mous Sensor Networks, 2013, 13 (5): 365-394. 被引量:1
  • 5Lin Chih-Yu, Tseng Yu-Chee, Ten H Lai. Exploiting spatial correlation at the link layer for event-driven sensor networks [J]. International Journal of Sensor Networks, 2013, 12 (1) : 352-365. 被引量:1
  • 6Moh'd A, Aslam N, Robertson W, et al. C-Sec: Energy effi- cient link layer encryption protocol for wireless sensor networks [C] //IEEE Consumer Communications and Networking Con- ference, 2012: 219-223. 被引量:1
  • 7Necla Bandirmali. WSNSec: A scalable data link layer security pro- tocol for WSNs [J]. Ad Hoc Networks, 2012, 10 (1): 37-45. 被引量:1
  • 8Bo Zhu, Yin Tan, Guang Gong. Revisiting MAC forgeries, weak keys and provable security of Galois/counter mode of operation [C] //12th International Conference on Cryptology and Network Security, 2013:20-38. 被引量:1
  • 9Uke SN, Mahajan AR, Thool RC. UML modeling of physical and data link layer security attacks in WSN [J]. International Journal of Computer Applications, 2013, 70 (11): 25-31. 被引量:1
  • 10He Daojing, Chen Chun, Chan S, et al. Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks [J]. IEEE Transactions on Indus- trial Electronics, 2013, 60 (11): 5348-5354. 被引量:1

引证文献20

二级引证文献126

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部