期刊文献+

无线自组网舰载通信数据安全传输技术研究 被引量:4

Research on secure transmission technology of wireless ad hoc network
下载PDF
导出
摘要 为了提高无线自组网舰载通信数据传输安全性和保密性,提出基于混沌稀疏加密的无线自组网舰载通信数据安全传输技术。建立无线自组网舰载通信数据区块链分布结构模型,采用算术编码和数据隐写技术实现对无线自组网舰载通信数据的量化编码和特征重组,提取舰载通信数据的稀疏性特征值,结合混沌密钥设计方法实现对数据加密过程中的密钥体系构造,通过稀疏化的密钥表征方法,实现对无线自组网舰载通信数据的码元频次检测和数据重排,根据混沌映射的非线性特征分布实现数据加密密钥敏感性表征,设计数据加密和解密协议,实现无线自组网舰载通信数据的安全传输。仿真结果表明,采用该方法进行无线自组网舰载通信数据加密,降低了数据被攻击的风险,提高了数据传输的置乱性和加密隐写度水平。 In order to improve the security and confidentiality of wireless ad hoc network carrier communication data transmission,the secure transmission technology of wireless ad hoc network carrier communication data based on chaotic sparse encryption is proposed.In the research,establish the blockchain distribution structure model of wireless ad hoc network carrier communication data,use arithmetic coding and data steganography technology to realize the quantitative coding and feature reorganization of wireless ad hoc network carrier communication data,extract the sparsity feature values of carrier communication data,and construct the key system in the process of data encryption.Through the sparser key characterization method,the code element frequency detection and data rearrangement of wireless ad hoc network shipboard communication data is realized,according to the nonlinear characteristic distribution of the chaotic map,the data encryption and decryption protocols are designed,thereafter the safe transmission of wireless ad hoc network shipboard communication data is realized.The simulation results show that the data encryption reduces the risk of data attack and improves the level of data transmission.
作者 徐新林 邓异 XU Xinlin;DENG Yi(China People′s Liberation Army Unit 91977,Beijing 100161,China;China People's Liberation Army Unit 91640,Zhanjiang Guangdong 524064,China)
出处 《智能计算机与应用》 2023年第3期83-87,92,共6页 Intelligent Computer and Applications
关键词 无线自组网 舰载通信 数据安全 通信传输 wireless ad hoc network carrier-borne communication data security communication transmission
  • 相关文献

参考文献10

二级参考文献59

  • 1杨盛春,贾林祥.神经网络内监督学习和无监督学习之比较[J].徐州建筑职业技术学院学报,2006,6(3):55-58. 被引量:5
  • 2王迤冉,朱维军,詹新生.基于图像加密的置乱性能分析研究[J].计算机工程与设计,2006,27(24):4729-4731. 被引量:16
  • 3李和平,胡占义,吴毅红,吴福朝.基于半监督学习的行为建模与异常检测[J].软件学报,2007,18(3):527-537. 被引量:30
  • 4KARLOF C, SASTRY N, WAGNER D. TinySec : a link layer security architecture for wireless sensor networks [ C ]// Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems. Baltimore, USA, 2004.
  • 5CASADO L, TSIGAS P. ContikiSec: a secure network layer for wireless sensor networks under the Contiki operating system[C]// The 14th Nordic Conference on Secure IT Systems. Oslo, Norway, 2009.
  • 6BANDIRMALI N, ERTURK I. WSNSec: a scalable data link layer security protocol for WSNs [ J ]. Ad Hoc Net-works, 2012, 10(1) : 37-45.
  • 7PU Chuanchin, CHUNG Wanyoung. Group key update method for improving RC4 stream cipher in wireless sensor networks [C]//ICCIT'07. [S.l.], 2007.
  • 8TSUNOO Yukiyasu, SAITO Teruo, KUBO Hiroyasu, et al. a distinguishing attack on a fast software-implemented RC4- Like stream cipher [ J ]. IEEE Transactions on Information Theory, 2007, 53( 9): 3250-3255.
  • 9GRASSBERGER P, PROCACCIA I. Characterization of strange attractors [ J]. Physical Review Letters, 1983, 50 (5) : 346-349.
  • 10FARMER J D, SIDOROWICH J J. Predicting chaotic time series [ J ]. Physical Review Letters, 1987, 59 (8) : 845- 848.

共引文献223

同被引文献18

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部