Charging wireless sensor network security technology based on encryption algorithms and dynamic model

被引:0
作者
Li, Yuanming [1 ,2 ]
Guo, Wei [1 ,2 ]
Meng, Xuejun [1 ,2 ]
Xia, Wen [1 ,2 ]
机构
[1] State Key Lab Astronaut Dynam, Xian 710043, Shaanxi, Peoples R China
[2] China Xian Satellite Control Ctr, Xian, Shaanxi, Peoples R China
关键词
Wireless network; encryption algorithm; dynamic security model; network security;
D O I
10.1177/1550147720901999
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. The purpose of this article is to solve the existing security problems and study the operation process of RC4 and Advanced Encryption Standard algorithms, and the improvement scheme is put forward. This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. Devices accessing the network use 802.1x authentication method and distribute and set security status values for each device, the authentication server uses Remote Authentication Dial in User Service. This article uses the method of virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected. In this article, the structure and strategy of Remote Authentication Dial in User Service are changed, in order to ensure the high security of wireless network equipment in the connection process. In the testing phase of this article, we have tested the model in detail several times. Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.
引用
收藏
页数:10
相关论文
共 20 条
[1]   Wireless Rogue Access Point Detection Using Shadow Honeynet [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (01) :551-570
[2]   Wireless network security architecture [J].
Blumenthal, U ;
Marcovici, M ;
Mizikovsky, S ;
Patel, S ;
Sundaram, GS ;
Wong, M .
BELL LABS TECHNICAL JOURNAL, 2002, 7 (02) :19-36
[3]  
Dong JW, 2014, INT J CONTROL AUTOM, V12, P102
[4]   Wireless Network Security: Building on Erasures [J].
Fragouli, Christina ;
Prabhakaran, Vinod M. ;
Czap, Laszlo ;
Diggavi, Suhas N. .
PROCEEDINGS OF THE IEEE, 2015, 103 (10) :1826-1840
[5]   A layered approach to cognitive radio network security: A survey [J].
Hlavacek, Deanna ;
Chang, J. Morris .
COMPUTER NETWORKS, 2014, 75 :414-436
[6]   Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking [J].
Hu, Bin ;
Gharavi, Hamid .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (02) :550-558
[7]   Refined RC4 Key Correlations of Internal States in WPA [J].
Ito, Ryoma ;
Miyaji, Atsuko .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (06) :1132-1144
[8]  
Izhar M, 2014, INT J COMPUT APPL, V82, P33
[9]   Dual Resonance Frequency Selective Loop of Near-Field Wireless Charging and Communications Systems for Portable Device [J].
Kwon, DukSoo ;
Yeo, Tae-Dong ;
Oh, Kyoung-Sub ;
Yu, Jong-Won ;
Lee, Wang-Sang .
IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS, 2015, 25 (09) :624-626
[10]   Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation [J].
Li, Na ;
Tao, Xiaofeng ;
Wu, Huici ;
Xu, Jin ;
Cui, Qimei .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (09) :7036-7050