期刊文献+

一种WSN的低开销分组加密安全协议

A Low Overhead Block Encryption Security Protocol for Wireless Sensor Networks
下载PDF
导出
摘要 由于无线传感器网络的许多特性,使其安全方案必须兼顾安全与性能两方面的因素。由此提出了一种全新的分组加密安全协议,以线性同余发生器LCG为基础,适合构建可靠安全并资源有限的无线传感器网络。具体来说,分组加密是给原始数据包加入LCG生成的随机噪声和随机序列,以此来提高安全性。而且这种方式能够满足无线传感器网络的安全需求,并且开销低、效率高。 Because of their own characteristics,Wireless sensor networks should take account of both the security and the system performance.In this paper,we propose a new block cipher security protocol,which based on a Linear Congruential Generator(LCG).The security protocol is suitable for constructing reliable,safe and resource-constrained Wireless sensor networks.Specifically,our proposed block cipher is to add LCG random noise and random sequence to the original data messages,in order to improve security.Moreover,this approach based on our proposed can satisfy the security requirements of Wireless sensor networks,low overhead and high efficiency.
出处 《电脑开发与应用》 2010年第12期64-66,69,共4页 Computer Development & Applications
关键词 无线传感器网络 安全协议 低开销 Wireless Sensor Networks(WSN),security protocol,low overhead
  • 相关文献

参考文献8

  • 1李晓唯主编.无线传感器网络技术[M].北京:北京理工大学出版社,2007.
  • 2Rivest R L,Shamir A,Adleman L M. A Method for Obtaining Digital Signatures and Public-key Cryptosystems [J]. Communications of the ACM, 1978,21(2) :120-126.
  • 3Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C[M]. John Wiley & Sons, 1996.
  • 4Goldwasser S, Micali S. Probabilistic Eneryption[J]. Journal of Computer Security, 1984,28 : 270-299.
  • 5Knuth D E. Deciphering a Linear Congruential Encryption [J]. IEEE Transactions on Information Theory, 1985,31 (1) : 49-52.
  • 6王东安,张方舟,秦刚,南凯,阎保平.无线传感器网络安全协议的研究[J].计算机工程,2005,31(21):10-13. 被引量:12
  • 7于秀珍,周爱霞,贾廷见.无线传感器网络的结构分析与加密方案[J].中州大学学报,2009,26(1):119-121. 被引量:1
  • 8焦四辈,黄波,左朝树,杨志聪.无线传感器网络中的分组加密算法评测与分析[J].信息与电子工程,2008,6(4):258-261. 被引量:5

二级参考文献21

  • 1郎为民,杨宗凯,吴世忠,谭运猛.一种基于无线传感器网络的密钥管理方案[J].计算机科学,2005,32(4):147-148. 被引量:10
  • 2Tilak S, Heinzelman W. A Taxonomy of Wireless Micro - sensor NetworkModels [ J ]. Mobile Computing and Communications Review,2002,6 (2) :28 - 36.
  • 3Adrian Perrig, John Stankovic, David Wagner. Security in Wireless Sensor Networks [ J ]. Communications of the ACM, June 2004, 47 (6) : 53 - 57.
  • 4[1]Rivest R L.The RC5 Encryption Algorithm[C]// Proc.1994 Leuven Workshop on Fast Software Encryption.1995:86-89.
  • 5[2]Rivest R L,Robshaw M J B,Sidney R,et al.The RC6? Block Cipher[EB/OL].(1998-08-20) Http://people.csail.mit.edu/ rivest/RC6.pdf.
  • 6[3]Daemen J,Rijmen V.AES Proposal:Rijndael[EB/OL].(1998-10-05).http://www.esat.kuleuven.ac.be/~rijmen/rijindael.
  • 7[4]Matsui M.New Block Encryption Algorithm MISTY[C]// Proceeding of the 4th International Workshop on Fast Software Encryption.1997,1267:54-68.
  • 8[5]3GPP TS 35.202.Specification of the 3GPP Confidentiality and Integrity Algorithms Document 2:KASUMI Specification[S].
  • 9[6] Aoki K,Ichikawa T,Kanda M,et al.Camellia:A 128-Bit Block Cipher Suitable for Multiple Platforms[J].Lecture Notes in Computer Science,2001,2012:39-56.
  • 10Perrig A. SPINS: Security Protocols for Sensor Network. Wireless Networks, 2002,8(5): 521-534.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部