期刊文献+

基于MD5算法的无线传感网络用户身份分簇节点安全认证方法 被引量:3

Security Authentication Method for User Identity Clustering Nodes in Wireless Sensor Networks Based on MD5 Algorithm
下载PDF
导出
摘要 为防止恶意的中间节点截获、篡改和干扰信息的传输,以及反馈延迟导致认证密钥丢失等问题的出现,提出基于MD5算法的无线传感网络用户身份分簇节点安全认证方法。预处理无线传感网络用户身份分簇节点数据,将数据加密参量转换为MD5的512位标准;根据用户分簇节点对应的MD5变换参量对其认证规则加以定义,用于MD5算法优化规则制定;通过MD5算法对请求数据进行数据融合压缩,解析交互认证过程密钥,完成对应节点数据簇头信息的安全认证。实验结果表明:该方法收发成功率均在97%以上,开销率最高在50%。该方法在多种条件环境下均有效可行,其所得各项指标数据均为最佳,能够在满足相关指标要求的基础上保持连续稳定运行,具有一定的应用推广价值。 In order to prevent malicious intermediate nodes from intercepting,tampering and interfering with the transmission of information,and the phenomenon of loss of authentication keys caused by feedback delay,a security authentication method for wireless sensor network user identity clustered nodes based on MD5 algorithm is proposed.Preprocess the data of the wireless sensor network user identity clustering node,and convert the data encryption parameters into the 512 bit standard of MD5.According to the MD5 transformation parameters corresponding to the user's clustered nodes,the authentication rules are defined for the MD5 algorithm optimization rule formulation.Through the MD5 algorithm,the data fusion and compression of the request data is carried out,the key of the interactive authentication process is parsed,and the security authentication of the data cluster header information of the corresponding node is completed.The experiment results show that the success rate of this method is above 97%,the overhead rate is up to 50%.The method is effective and feasible under a variety of conditions,and the data obtained by various indicators can be the best.It can maintain continuous and stable operation on the basis of meeting the requirements of relevant indicators,and has high application promotion value.
作者 卓蔚 Zhuo Wei(Shanghai Tobacco Group Co.,Ltd.,Shanghai 200082,China)
出处 《单片机与嵌入式系统应用》 2023年第2期49-52,56,共5页 Microcontrollers & Embedded Systems
关键词 MD5算法 无线传感网络 用户分簇节点 安全认证规则 MD5 algorithm wireless sensor network user cluster nodes security authentication rules
  • 相关文献

参考文献7

二级参考文献41

共引文献27

同被引文献30

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部