通信学报 ›› 2013, Vol. 34 ›› Issue (5): 113-120.doi: 10.3969/j.issn.1000-436x.2013.05.013

• 技术报告 • 上一篇    下一篇

面向无线传感器网络的混沌加密与消息鉴别算法

陈铁明1,2,葛亮1   

  1. 1 浙江工业大学 计算机科学与技术学院,浙江 杭州 310023;
    2 北京航空航天大学 软件开发环境国家重点实验室,北京 100191
  • 出版日期:2013-05-25 发布日期:2017-06-27
  • 基金资助:
    国家自然科学基金资助项目;浙江省自然科学基金资助项目;浙江省科技厅公益技术研究计划基金资助项目;“十二五”国家密码发展基金密码理论课题基金资助项目;北京航空航天大学软件开发环境国家重点实验室开放课题基金资助项目

Chaos-based encryption and message authentication algorithm for wireless sensor network

Tie-ming CHEN1,2,Liang GE1   

  1. 1 College of Computer Science & Technology,Zhejiang University of Technology,Hangzhou 310023,China;
    2 State Key Laboratory of Software Development Environment,Beihang University,Beijing 100191,China
  • Online:2013-05-25 Published:2017-06-27
  • Supported by:
    The National Natural Science Foundation of China;The Natural Science Foundation of Zhejiang;The National Cryptography Development Foundation of China;Zhejiang Public Technology Research Project;The State Key Laboratory of Software Development and Environment of Beihang University

摘要:

摘要:针对数字混沌密码无法直接在轻量的传感节点上实现,介绍了一种基于整数型混沌映射的轻量级分组加密算法,并提出一种新型的消息鉴别码方案,具有输出长度可变、混沌序列复合安全等特点,最后实现了一个完整的无线传感网数据安全传输应用方案,并在Mica2节点上给出性能分析。实验表明该方案对无线传感网具有更高的实用性。

关键词: 无线传感器网络, 混沌映射, 分组加密, 散列函数, 消息鉴别码

Abstract:

As for the traditional digital chaos-based scheme being not directly applicable for WSN because some sensor node does not support the float type of computation,integer chaotic maps and its block encryption schemes are firstly in-troduced,and then a novel chaos-based message authentication code (MAC) scheme was proposed,which was length changeable with high-level hybrid chaotic security.At last,a security application solution for data communication on WSN employing the proposed chaos-based schemes is presented,and the performance evaluation on the real-world Mica2 node is analyzed to show that the new security solution is more applicable for WSN than the current most popular security scheme,TinySec.

Key words: wireless sensor network, chaos mapping, block encryption, hash function, MAC

No Suggested Reading articles found!