RESEARCH ON PRIVACY DATA SECURITY PROTECTION IN SENSOR NETWORKS USING ENCRYPTION ALGORITHMS

被引:0
|
作者
Yao, Yunxia [1 ]
Peng, Renjie [2 ]
Mi, Wenli [1 ]
机构
[1] Longdong Univ, Sch Math & Informat Engn, Qingyang 745000, Gansu, Peoples R China
[2] Longdong Univ, Sch Intelligent Mfg, Qingyang 745000, Gansu, Peoples R China
来源
UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE | 2024年 / 86卷 / 03期
关键词
encryption algorithm; sensor network; data security; chaotic mapping; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper briefly introduces wireless sensor networks (WSNs) and proposes an enhancement to a block encryption algorithm using chaotic mapping principles. The proposed encryption algorithm was tested on an established WSN platform in a simulation experiment, and a comparative analysis was conducted with two encryption algorithms, advanced encryption standard (AES) and data encryption standard (DES). The results indicated that, as the volume of encrypted data grew, the encryption time for all three algorithms exhibited an upward trend, the 0-1 balance degree of the ciphertext decreased, and the information entropy increased. Specifically, for a given size of encrypted data, the optimized encryption algorithm demonstrated the shortest encryption time, the smallest 0-1 balance degree in the ciphertext, and the highest information entropy, closely approaching the ideal value.
引用
收藏
页码:25 / 34
页数:10
相关论文
共 50 条
  • [1] Attribute-Based Encryption Method for Data Privacy Security Protection
    Li, Ziqian
    He, Yeshen
    Zhang, Yiying
    Li, Siwei
    Wang, Cong
    Zhang, Xiankun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 458 - 467
  • [2] CLOUD COMPUTING DATA SECURITY USING ENCRYPTION ALGORITHMS
    Rithvik, Kumar
    Kaur, Simran
    Sejwal, Shilpa
    Narwal, Priti
    Jain, Prateek
    IIOAB JOURNAL, 2019, 10 (02) : 75 - 82
  • [3] The Application of AES-SM2 Hybrid Encryption Algorithm in Big Data Security and Privacy Protection
    Huang, Pingyun
    Liao, Guizhou
    Ren, Jianhong
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 989 - 997
  • [4] Enhancing data privacy in wireless sensor network using homomorphic encryption
    Mante-Khurpade, Jyoti
    Dhotay, Megha
    Patil, Prerna
    Kulkarni, Sanjivani
    Budhavale, Shilpa
    Ikhar, Sharayu
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B) : 833 - 842
  • [5] Research on Enterprise Information Security and Privacy Protection in Big Data Environment
    Du, Juan
    2021 3RD INTERNATIONAL CONFERENCE ON MACHINE LEARNING, BIG DATA AND BUSINESS INTELLIGENCE (MLBDBI 2021), 2021, : 324 - 327
  • [6] Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy
    Raj, Rahul
    Peker, Yesem Kurt
    Mutlu, Zeynep Delal
    ELECTRONICS, 2024, 13 (15)
  • [7] A Security Framework for Privacy-Preserving Data Aggregation in Wireless Sensor Networks
    Chan, Aldar C-F.
    Castelluccia, Claude
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2011, 7 (04)
  • [8] Security and privacy designs based data encryption in cloud storage and challenges: A review
    Mogarala, Aruna Guruvaya
    Mohan, K. G.
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [9] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [10] Research Review on the Application of Homomorphic Encryption in Database Privacy Protection
    Ma, Yong
    Zhao, Jiale
    Li, Kangshun
    Cao, Yuanlong
    Chen, Huyuan
    Zhang, Youcheng
    INTERNATIONAL JOURNAL OF COGNITIVE INFORMATICS AND NATURAL INTELLIGENCE, 2021, 15 (04)