RESEARCH ON PRIVACY DATA SECURITY PROTECTION IN SENSOR NETWORKS USING ENCRYPTION ALGORITHMS

被引:0
作者
Yao, Yunxia [1 ]
Peng, Renjie [2 ]
Mi, Wenli [1 ]
机构
[1] Longdong Univ, Sch Math & Informat Engn, Qingyang 745000, Gansu, Peoples R China
[2] Longdong Univ, Sch Intelligent Mfg, Qingyang 745000, Gansu, Peoples R China
来源
UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE | 2024年 / 86卷 / 03期
关键词
encryption algorithm; sensor network; data security; chaotic mapping; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper briefly introduces wireless sensor networks (WSNs) and proposes an enhancement to a block encryption algorithm using chaotic mapping principles. The proposed encryption algorithm was tested on an established WSN platform in a simulation experiment, and a comparative analysis was conducted with two encryption algorithms, advanced encryption standard (AES) and data encryption standard (DES). The results indicated that, as the volume of encrypted data grew, the encryption time for all three algorithms exhibited an upward trend, the 0-1 balance degree of the ciphertext decreased, and the information entropy increased. Specifically, for a given size of encrypted data, the optimized encryption algorithm demonstrated the shortest encryption time, the smallest 0-1 balance degree in the ciphertext, and the highest information entropy, closely approaching the ideal value.
引用
收藏
页码:25 / 34
页数:10
相关论文
共 50 条
[41]   On security of wireless sensor networks: a data authentication protocol using digital signature [J].
Ferng, Huei-Wen ;
Nguyen Minh Khoa .
WIRELESS NETWORKS, 2017, 23 (04) :1113-1131
[42]   To Increase Security and Privacy, the QAES Encryption Algorithm is used for Storage of Data for Cloud Computing [J].
Rani, Geetha E. ;
Chetana, D. T. .
2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
[43]   Location Protection Technology for Wireless Sensor Networks Based on Differential Privacy using DSRNN-MOA [J].
Nie, Yalin ;
Peng, Huiling ;
Shi, Nianfeng .
JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) :2625-2639
[44]   Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection [J].
Shariati, S. Mandi ;
Abouzarjomehri ;
Ahmadzadegan, M. Hossein .
2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, :1078-1082
[45]   An Enhanced Data Privacy Mechanism Suitable for Ubiquitous Sensor Networks [J].
Park, Jeong-Hyo ;
Jung, Yong-Hoon ;
Lee, Kwang-Hyung ;
Lee, Keun-Wang ;
Jun, Moon-Seog .
GRID AND DISTRIBUTED COMPUTING, 2011, 261 :138-+
[46]   Optimizing resource and data security in shared sensor networks [J].
Huygens, Christophe ;
Matthys, Nelson ;
Joosen, Wouter .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) :149-165
[47]   Cloud Data Life Cycle Security Issues and Research of Encryption Technology [J].
Li, Nengneng ;
Zhang, Yongsheng ;
Fan, Yueqin ;
Chang, Liang .
PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 :356-359
[48]   Data Privacy Protection Using Multiple Cloud Storages [J].
Zhang Wei ;
Sun Xinwei ;
Xu Tao .
PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, :1768-1772
[49]   Security and Data Privacy of Medical Information in Blockchain Using Lightweight Cryptographic System [J].
Puneeth, R. P. ;
Parthasarathy, G. .
INTERNATIONAL JOURNAL OF ENGINEERING, 2023, 36 (05) :925-933
[50]   Healthcare Data Security and Privacy Protection Framework Based on Dual Channel Blockchain [J].
Kaur, Jasleen ;
Rani, Rinkle ;
Kalra, Nidhi .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2025, 36 (01)