期刊文献+

基于矩阵分析的无线网络敏感信息传输加密方法

Wireless Network Sensitive Information Transmission Encryption Method based on Matrix Analysis
下载PDF
导出
摘要 当前的敏感信息传输加密方法在无线网络应用中的节点配置数据量较少,储存数据量有限,导致无线网络敏感信息安全性降低。为提高无线网络敏感信息传输的机密性和安全性,提出基于矩阵分析的无线网络敏感信息传输加密方法。引入矩阵分析理论,构建无线网络敏感信息传输加密算法,对无线网络敏感信息传输加密原理进行分析,描述分簇式阶级型无线网络结构,将分簇式阶级型无线网络结构作为基础,对敏感信息进行传输加密。实验数据表明,设计的敏感信息传输加密方法相比于传统敏感信息传输加密方法,对无线网络敏感信息具有较高的安全性能。 The current sensitive information transmission encryption method has less node configuration data in a wireless network application,and the amount of stored data is limited,resulting in a decrease in the security of wireless network sensitive information.In order to improve the confidentiality and security of wireless network sensitive information transmission,a wireless network sensitive information transmission encryption method based on matrix analysis is proposed.This paper introduces the theory of matrix analysis,constructs the wireless network sensitive information transmission encryption algorithm,analyzes the wireless network sensitive information transmission encryption principle,describes the clustered class-type wireless network structure,and uses the clustered class-type wireless network structure as the basis for sensitive information.Perform transmission encryption.The experimental data shows that the designed sensitive information transmission encryption method has higher security performance for wireless network sensitive information than the traditional sensitive information transmission encryption method.
作者 王建军 WANG Jian-jun(Zhonghui Jian Technology co.,Ltd.,Hefei Anhui 230088,China)
出处 《新一代信息技术》 2019年第13期54-60,共7页 New Generation of Information Technology
基金 芜湖市科技计划项目(项目编号:2017yf23)。
关键词 矩阵分析理论 无线网络 敏感信息传输 加密方法 Matrix analysis theory Wireless network Sensitive information transmission Encryption method
  • 相关文献

参考文献12

二级参考文献70

  • 1陈昭智,郑建德.一种基于身份分层结构加密算法的广播加密方案[J].厦门大学学报(自然科学版),2006,45(3):342-346. 被引量:8
  • 2张大奇,曲仕茹,康宝生.基于DCT和DWT的数字图像隐藏技术[J].西北工业大学学报,2007,25(3):378-382. 被引量:4
  • 3瞿绍军,刘宏.家庭网络安全的研究[J].航空计算技术,2007,37(2):112-115. 被引量:3
  • 4FiatA,NaorM. Broadcast encryption[A]. Proceedings of Crypto'93.- LNCS 773 [C]. Berlin:Springer-Verlag, 1993. 480-491.
  • 5Naor D, Naor M, Lotspiech J. Revocation and Tracing Schemes for Stateless Receivers [A]. Proceedings of Crypto'01: LNCS 2139[C]. Berlin:Springer-Verlag, 2001.41-62.
  • 6D Boneh, M Franklin. Identity Based Eneryption from the Well Pairing[Z]. Berlin: Springer-Verlag, 2001, 213-229.
  • 7Goodrich M, Sun J, Tamassia R. Efficient Tree-based Revocation in Groups of Low-state Devices[A]. Proceed- ings of Crypto'04: LNCS 3152[C]. Berlin: Springer-Verlag, 2004. 511-527.
  • 8Boneh D, Boyen X, Goh E. Hierarchical Identity Based Encryption with Constant Size Ciphertext [A]. Proceedings of Eurocrypt 2005:LNCS 3494[C]. Berlin: Springer Verlag, 2005. 440-456.
  • 9Boneh D, Boyen X. Efficient Selective-ID Identity Based Encryption Without Random Oracles[A]. Proceedings of Eurocrypt 2004: LNCS 3027[C]. Berlin: Springer-Verlag, 2004. 223-238.
  • 10Gentry C, Silverberg A. Hierarchical ID-based Cryptography[A]. Proceedings of Asia crypt 2002: LNCS 2501 [C]. Berlin: Springer-Verlag,2002: 548-566.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部