期刊文献+

基于可编程器件的Rijndael加密算法优化实现 被引量:2

Rijndael Encryption Algorithm Optimization Based on Programmable Device
下载PDF
导出
摘要 本文针对无线传感器网络传感器节点处理能力弱、携带能量低的特点,提出基于Rijndael算法优化的数据加密技术.通过对Rijndael加密算法的数据存储、列混合以及轮变换等特点的分析,提出对于加密算法的优化建议,采用可编程逻辑器件对优化后的加密算法进行设计和实现,并进行加密验证,同时对优化后加密算法的数据处理速率、算法功耗、逻辑资源占用情况进行评估.由实验结果可知,优化后的Rijndael加密算法相比优化之前有很大的突破,能够适用于无线传感器网络的数据加密. Considering the sensor node of wireless sensor network weak processing and carrying low en- ergy, this paper gives the optimized Rijndael algorithm data encryption technology. Based on the analysis of Rijndael encryption algorithm of data storage, columns, the characteristics of the mixing and round trans- formation, optimization algorithm is suggested .The programmable logic devices is used for the design and authentication of the optimized encryption. At the same time the data processing speed, power and logic resource usage of the optimized encryption algorithm is evaluated. The experimental results shows that the optimized Rijndael encryption algorithm has a great breakthrough and can be applied to the wireless sensor network data encr^otion.
出处 《新疆大学学报(自然科学版)》 CAS 2013年第4期455-459,475,共6页 Journal of Xinjiang University(Natural Science Edition)
基金 新疆大学博士启动基金(BS120123)
关键词 RIJNDAEL 加密算法 数据安全 可编程器件 Rijndael encryption algorithm data security programmable device
  • 相关文献

参考文献6

  • 1李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 2Dong X L, Hu Y P, Wei Y Z, et al. A New Method for Meet-in-the-Middle Attacks on Reduced AES[J]. China Communi- cations, 2011, 8, 21-25.
  • 3Sasikanth Avancha, Jerey Undercoer, Anupam Joshi, et a/.Secure sensor networks for perimeterprotection[J]. Computer Networks, 2003, 10(4): 421-435.
  • 4Yang B, Fu R Y, Diao J Z, et a/.Security mechanisms analysis for ZigBee standard based on AES-CCM[J]. In Automation Equipment And Systems,2012,468-471:1359-1362.
  • 5Vitaletti A, PalombizioG. Rijndael for sensor networks: Is speed the main issue?[J].Electronic Notes Theory of Computer Science, 2007,12(1):71-81.
  • 6Launchbury J. Theorem-based Circuit Derivation in Cryptol[J]. Acm Sigplan Notices, 2012, 47(3):185-185.

二级参考文献33

  • 1Chong CY,Kumar SP.Sensor networks:Evolution,opportunities,and challenges.Proc.of the IEEE,2003,91(8):1247-1256.
  • 2Krishnamachari L,Estrin D,Wicker S.The impact of data aggregation in wireless sensor networks In:Proc.of the 22nd IEEE Int'l Conf.on Distributed Computing Systems Vienna:IEEE Computer Society,2002.575-578.
  • 3Ren FY,Huang HN,Lin C.Wireless sensor networks.Journal of Software,2003,14(7):1282-1291http://www.jos.org.cn/1000-9825/14/1282.htm
  • 4Perrig A,Szewczyk R,Wen V,Culler D,Tygar JD.SPINS:Security protocols for sensor networks.In:Proc.of the 7th Annual Int'l Conf.on Mobile Computing and Networks.Rome ACM Press,2001.189-199.
  • 5The official website of the ZigBee alliances.http://www.zigbee.org
  • 6Doumit S,Agrawal DP.Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks.MILCOM 2003-IEEE Military Communications Conf,2003,22(1):609-614.
  • 7Akyildiz IF,Su W,Sankarasubramaniam Y,Cayirci E.Wireless sensor networks:A survey.Computer Networks,2002,38(4):393-422.
  • 8Huang Q,Cukier J,Kobayashi H,Liu BD,Zhang JY.Fast authenticated key establishment protocols for wireless sensor networks.In:Proc.of the 2nd ACM Int'l Conf.on Wireless Sensor Networks and Applications.San Diego:ACM Press,2003.141-150.
  • 9Zhu S,Setia S,Jajodia S.LEAP:Efficient security mechanisms for large-scale distributed sensor networks.In:Proc.of the 10th ACM Conf.on Computer and Communications Security (CCS2003).Washington D.C.,2003.62-72.
  • 10Chan H,Perrig A,Song D.Random key predistribution schemes for sensor networks.In:Proc.of the IEEE Symp.on Research in Security and Privacy.Oakland:IEEE Computer Society,2003.197-213.

共引文献29

同被引文献5

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部