期刊文献+

面向WSN环境数据传输加密算法的研究 被引量:4

Research on the WSN Environment Data Transmission Encryption Algorithm
下载PDF
导出
摘要 针对无线传感器网络中存在的节点能量与存储运行空间资源有限、计算量过大等问题,为提高无线传输过程的安全性,需采用随机性强、安全性高、占用内存小的加密算法。根据仪表行业对加密算法的要求,对行业标准推荐使用的3DES与AES这2种加密算法进行了研究比较。通过对其密钥空间、线性复杂度、信息熵及"0-1"平衡性等性能的比较可知,AES算法优于3DES算法,更适用于无线传感器网络的数据加密。 Because of the resources limited of wireless sensor network (WSN) ,e . g. ,the node energy and storage and operation space, excessive calculation; in order to enhance the security of wireless transmission process limited, it is necessary to use encryption algorithm with strong randomness,high security,and small memory occupation. Based on the requirement of encryption algorithm for household instrument industry, two kinds of encryption algorithms that are recommended by industrial standards, i. e. 3DES and AES are compared. Through comparing the performance of key space, linear complexity, information entropy and balance for two algorithms, it is found that the AES algorithm is better than3DES algorithm, and more adapted to data encryption of WSN.
出处 《自动化仪表》 CAS 2016年第11期55-57,65,共4页 Process Automation Instrumentation
基金 山东省科技发展计划基金资助项目(编号:2010GGX10132) 山东省科技发展计划基金资助项目(编号:2012GGX10110) 山东省自然科学基金资助项目(编号:ZR2014FM026)
关键词 无线传感器网络 网络安全 信息传输 加密算法 通信协议 线性复杂度 信息熵 Wireless sensor network Network security Information transmission Encryption algorithm Communication protocol Linear complexity Information entropy
  • 相关文献

参考文献7

二级参考文献82

  • 1陈帅,钟先信,巫正中.无线传感器网络混沌分组密码研究[J].中国科学(F辑:信息科学),2009,39(3):357-362. 被引量:6
  • 2李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 3DJENOURI D, KHELLADI L, BADACHE A N. A sur- vey of security issues in mobile ad hoc and sensor net- works[J]. IEEE Communications Surveys & Tutorials, 2005, 7(4) : 2 -28. 被引量:1
  • 4ESCHENAUER L, GLIGOR V. A key-management scheme for distributed sensor networks [ C ]//Proceed- ings of the 9th ACM Conference on Computer and Corn- munieations Security. New York, NY : ACM, 2002 : 41 - 47. 被引量:1
  • 5ZHANG W S, TRAN M, ZHU S C, et al. A random perturbation-based scheme for pairwise key establish- ment in sensor networks [C]//Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Net- working and Computing. New York, NY : ACM, 2007 : 90 - 99. 被引量:1
  • 6NASSER N, CHEN Y F. Secure muhipath routing proto- col for wireless sensor networks nasser [C]//Proceed- ings of the 27th International Conterence on Distributed Computing Systems Workshops ( ICDCSW 07 ). Wash- ington DC : IEEE Computer Society, 2007 : 12 - 12. 被引量:1
  • 7ZHANG K, WANG C, WANG C, et al. A secure rou- ting protocol for cluster-based wireless sensor networks using group key management [ C ]//Proceedings of the 4th International Conference on Wireless Conmmnica- tions, Networking and Mobile Computing( WiCOM08 ). Washington, DC: IEEE, 2008: 12- 14. 被引量:1
  • 8SUN B, JIN X, WU K, et al. Integration of secure in- network aggregation and system monitoring for wireless sensor networks [ C ]//Proceedings of IEEE Internation- al Conference on Communications ( IEEE ICC ' 07 ). Washington, DC : IEEE, 2007 : 1466 - 1471. 被引量:1
  • 9ZHANG W, LIU Y H, DAS S K, et al. Secure data ag- gregation in wireless sensor networks: A watermark based authentication supportive approach [ J]. Pervasive Mobile Computing, 2008, 4(5): 658-680. 被引量:1
  • 10CHANG C-C G, SNYDER W E, WANG C. A new re- laxation labeling architecture for secure localization in sensor networks [ C ]//Proceedings of the Communica- tions ( ICC ' 07 ). Washington, DC: IEEE, 2007: 3076 - 3081. 被引量:1

共引文献60

同被引文献33

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部