期刊文献+

基于混沌RC4算法的WSN安全技术研究 被引量:2

Research of WSN Security Technology Based on Chaotic Ciphers and RC4
下载PDF
导出
摘要 本文针对WSN对数据安全传输需求,提出了一种新的WSN数据加密方案。该方案基于RC4加密算法,在密钥调度算法(KSA)阶段引入混沌信号。该算法结合了对称加密算法与混沌理论,对称加密算法加密速度快,占用资源少。并用C语言实现了本文提出混沌RC4加密、与RC4、RC5算法在执行速度、占用空间,字符频率等方面进行了比较,发现混沌RC4加密算法虽然占用空间稍大,但执行速度低于RC5算法,解决了RC4的安全缺陷,适用于无线传感网络。 In this paper, we propose a new WSN data encryption scheme for WSN security demand. The scheme based on the RC4 encryption algorithm, we involve the chaotic signals to the key scheduling algorithm (KSA). The algorithm combines a symmetric encryption algorithm with chaos theory, symmetric encryption algorithm is faster, uses less resources. We use C language to implement the chaotic RC4 encryption ,and compare with RC4, RC5 algorithm in execution speed, space , and so on. We found although the chaos RC4 encryption algorithm space is slightly larger, but execution speed is faster than RC5 algorithm, it can be applied to wireless sensor networks.
机构地区 同济大学
出处 《科技视界》 2014年第5期69-71,共3页 Science & Technology Vision
关键词 RC4算法 混沌 无线传感器网络 RC4 Chaos WSN
  • 相关文献

参考文献5

  • 1Andrew Roos.A class of weak ys in the RC4 stream cipher[OL].http://marcel. Wanda.ch/Archive/WeakKeys, Post in sci.encrypt, September 2004.
  • 2Grosul and D.Wallach.A related key cryptanalysis of RC4,TechReport[R].TR- 00-358, Department of Computer Science, Rice University, June 2000.
  • 3刘宴兵,田四梅,唐浩坤,吕淑品.基于混沌的RC4流加密算法[J].计算机工程,2011,37(2):136-138. 被引量:7
  • 4耿嘉,曹秀英,毕光国.一种攻击RC4-WEP类密码的改进方法[J].通信学报,2004,25(1):11-21. 被引量:7
  • 5Ginting,R.U,Dillak,R.Y.Digital color image encryption using RCd stream cipher and chaotic logistic map [C]//.International Conference Information Technology and Electrical Engineering (ICITEE).2013 : 101-5.

二级参考文献10

  • 1梁峰,史杏荣,曲阜平.IEEE802.11i中四次握手过程的安全分析和改进[J].计算机工程,2007,33(3):149-150. 被引量:5
  • 2[4]STUBBLEFIELD A, IOANNIDIS J, RUBIN A D. Using the fiuhrer, mantin, and shamir attack to break WEP, revision 2[EB/OL].http://www.cs.rice.edu/astubble/wep/.
  • 3[1]FLUHRER S, MANTIN I, SHAMIR A. Weaknesses in the key scheduling algorithm of RC4[EB/OL]. http://www. drizzle.com/aboba/IEEE/rc4_ksaproc.pdf.
  • 4[2]IEEE Standards Board, 802 part 11:Wireless LAN Medium Access Control(MAC)and Physical Layer (PHY) Specifications[S]. IEEE Standard 802.11, 1999.
  • 5[3]HULTON D. Practical exploitation of RC4 weakness in WEP environents[EB/OL]. http://www.dachb0den.com/projects/bsd airtools Feb 22,2002.
  • 6Wang Qianxue, Guyeux C, Bahi J M. A Novel Pseudo-random Number Generator Based on Discrete Chaotic Iterations[C]//Proc. of the 1st International Conference on Evolving Internet. Cannes, France: [s. n.], 2009.
  • 7Youssef M I, Zahara M, Emam A E, et al. Image Encryption Using Pseudo Random Number and Chaotic Sequence Generators[C]// Proc. of the 26th National Radio Science Conference. New Cairo, Egypt: [s. n.], 2009.
  • 8Qian Gongbin, Jiang Qingfeng, Qiu Shuisheng. A New Image Encryption Scheme Based on DES Algorithm and Chua's Circuit[Cl//Proc. of International Workshop on Imaging Systems and Techniques. Shenzhen, China: [s. n.], 2009.
  • 9Liu Mingsheng, Zhang Yi, Li Jianhua. Research on Improving Security of DES by Chaotic Mapping[C]//Proc. of the 8th International Conference on Machine Learning and Cybernetics. Baoding, China:[s. n.], 2009.
  • 10盂庆树,王丽娜,傅建明.密码编码学与网络安全[M].北京:电子工业出版社,2006.

共引文献12

同被引文献38

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部