期刊文献+

加密算法优化对无人机的CPU功耗影响研究 被引量:2

Research on Effect of Encryption Algorithm Optimization for Power Consumption of UAVs' CPU
下载PDF
导出
摘要 数据安全传输和功率消耗问题是无人机自组织网络(Unmanned Ad Hoc Network,UANET)中不容忽视的研究主题.在UANET环境中,现有的数据传输加密算法的应用越来越广泛.本文首先介绍了Blow fish、AES、GOST R 34.12-2015这3种加密算法;接着在保证算法安全性能的前提下,分别对Blowfish和GOST算法进行了优化,减小Blowfish算法的迭代次数,降低GOST算法的预处理数据的运算表数量;然后通过NS-3仿真平台模拟各种算法的执行时间、吞吐量及功率消耗情况,并对比了无人机CPU模块和无线电模块的功耗情况.对比结果表明:优化后的算法在处理数据传输时,加密和解密时间明显缩短,吞吐量均有显著提升,各无人机节点的CPU功率消耗均明显下降.可见,优化后的加密算法使UANET更节能. The issues of data security transmission and power consumption are the subject of research that can't be ignored in Un- manned Ad Hoc Network. Information security can be guaranteed by the commonly used encryption algorithm. However, a large a- mount of resource consumption can be caused easily. Firstly, the Blowfish, AES,GOST R 34.12-2015 three encryption algorithrns are introduced in the paper. Then, under the premise of maintain security performance, the number of iterations is reduced for Blowfish al- gorithm and the number of operation table about pre-processing data is decreased in GOST algorithm. In addition, the execution time, throughput and power consumption of various algorithms are simulated using NS-3 simulation platform. Besides, the comparison results about the energy consumption of the CPU and radio module of mini-UAV are presented when performing secure in process. According to the experimental results, the time of encryption and decryption is shorter, the throughput is improved and the power consumption of each node on the UAV's CPU is decreased obviously, which shows the power consumption of mini-UAV's CPU is reduced and the optimized aigorithm is more energy efficient.
作者 吴杰宏 柔莹莹 邹良开 李亚 WU Jie-hong;ROU Ying-ying;ZOU Liang-kai;LI Ya(School of Computer Science,Shenyang Aerospace University,Shenyang 110136,China)
出处 《小型微型计算机系统》 CSCD 北大核心 2018年第8期1774-1780,共7页 Journal of Chinese Computer Systems
基金 辽宁省自然科学基金项目(2014024001)资助 辽宁省教育厅科学研究项目(L2014068)资助 航天科技创新基金项目(2014-CXJJ-TX-16)资助 航空科学基金项目(2013ZC54013)资助
关键词 无人机自组织网络 数据安全 密码学 微型无人机 功率消耗 UANET data security cryptography mini-UAVs power consumption
  • 相关文献

参考文献3

二级参考文献22

  • 1李桂满,李国.加解密算法Blowfish在单片机上的应用[J].单片机与嵌入式系统应用,2007,7(10):12-14. 被引量:4
  • 2B Schneier. The Blowfish Encryption Algorithm[OL]. (2008 -10 - 25 ). http ://www. schneier, comlblowsh, html.
  • 3Sindhuja A, Logeshwari R, ThirunadanaSikamaniA K. Secure PMS based on Fingerprint Authentication and Blowfish Cryptographic Algorithm[ C ]//2010 International Conference on Signal and Image Pro- cessing : 424 - 429.
  • 4Allam Mousa. Data Encryption Performance Based on Blowfish [ C ]// 47th International Symposium ELMAR-2005:8- 10.
  • 5Harsh Kumar Verma, Ravindra Kumar Singh. Performance Analysis of RCS, Blowfish and DES Block Cipher Algorithms [J]. International Journal of Computer Applications (0975 - 8887 ) ,2012,42 ( 16 ).
  • 6Allam Mousa. Data Encryption Performance Based on Blowfish [ C ]// 47th International Symposium ELMAR -2005:8 - 10.
  • 7钟黔川,朱清新.Blowfish密码系统分析[J].计算机应用,2007,27(12):2940-2941. 被引量:8
  • 8Andre T, Hummel K A, Schoellig A P, et al. Application- driven design of aerial communication networks [J]. Commu- nications Magazine, IEEE, 2014, 52(5): 129-137.
  • 9Asadpour M, Van den Bergh B, Giustiniano D, et aL Micro Aerial Vehicle Network An Experimental Analysis of Challenges and Opportunities[J]. IEEE Communications Magazine, 2014.
  • 10Bekmezci I, Sahingoz O K, TemeL Flying ad-hoc networks (FAN ETs): a survey [J]. Ad Hoc Networks, 2013, 11 (3): 1254-1270.

共引文献9

同被引文献5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部