RESEARCH ON PRIVACY DATA SECURITY PROTECTION IN SENSOR NETWORKS USING ENCRYPTION ALGORITHMS

被引:0
作者
Yao, Yunxia [1 ]
Peng, Renjie [2 ]
Mi, Wenli [1 ]
机构
[1] Longdong Univ, Sch Math & Informat Engn, Qingyang 745000, Gansu, Peoples R China
[2] Longdong Univ, Sch Intelligent Mfg, Qingyang 745000, Gansu, Peoples R China
来源
UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE | 2024年 / 86卷 / 03期
关键词
encryption algorithm; sensor network; data security; chaotic mapping; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper briefly introduces wireless sensor networks (WSNs) and proposes an enhancement to a block encryption algorithm using chaotic mapping principles. The proposed encryption algorithm was tested on an established WSN platform in a simulation experiment, and a comparative analysis was conducted with two encryption algorithms, advanced encryption standard (AES) and data encryption standard (DES). The results indicated that, as the volume of encrypted data grew, the encryption time for all three algorithms exhibited an upward trend, the 0-1 balance degree of the ciphertext decreased, and the information entropy increased. Specifically, for a given size of encrypted data, the optimized encryption algorithm demonstrated the shortest encryption time, the smallest 0-1 balance degree in the ciphertext, and the highest information entropy, closely approaching the ideal value.
引用
收藏
页码:25 / 34
页数:10
相关论文
共 50 条
[21]   A Review of Big Data Security and Privacy Protection Technology [J].
Lv, Denglong ;
Zhu, Shibing ;
Xu, Huazheng ;
Liu, Ran .
2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, :1082-1091
[22]   Supporting Business Privacy Protection in Wireless Sensor Networks [J].
Feng, Nan ;
Hao, Zhiqi ;
Yang, Sibo ;
Wu, Harris .
JOURNAL OF SENSORS, 2016, 2016
[23]   PRIVACY PROTECTION AND DATA SECURITY REFERING TO DIRECT MARKETING [J].
Sudar-Kulcar, Mirna .
POLITICKA MISAO-CROATIAN POLITICAL SCIENCE REVIEW, 2005, 42 (04) :97-114
[24]   Data Security and Privacy Protection for Cloud Storage: A Survey [J].
Yang, Pan ;
Xiong, Naixue ;
Ren, Jingli .
IEEE ACCESS, 2020, 8 :131723-131740
[25]   Towards Choosing Authentication and Encryption: Communication Security in Sensor Networks [J].
Youn, Seongwook ;
Cho, Hyun-chong .
JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2017, 12 (03) :1307-1313
[26]   Research on data security in industry 4.0 manufacturing industry against the background of privacy protection challenges [J].
Tang, Zeyu ;
Zeng, Chang ;
Zeng, Yali .
INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2025, 38 (05) :636-648
[27]   An efficient privacy protection scheme for data security in video surveillance [J].
Du, Ling ;
Zhang, Wei ;
Fu, Huazhu ;
Ren, Wenqi ;
Zhang, Xinpeng .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 59 :347-362
[28]   Node Location Privacy Protection in Unattended Wireless Sensor Networks [J].
Zhou, ZhiGang ;
Wang, Yu ;
Li, PanPan ;
Chang, XinGong ;
Luo, JiWei .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
[29]   A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks [J].
Ying, Bidi ;
Makrakis, Dimitrios ;
Mouftah, Hussein T. .
2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
[30]   The Data Protection of MapReduce Using Homomorphic Encryption [J].
Chen, Xu ;
Huang, Qiming .
PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, :419-421