Wireless Sensor Network Security Based on Improved Identity Encryption

被引:2
作者
Zhou, Hao [1 ]
Bi, Haochang [2 ]
机构
[1] Anhui Post & Telecommun Coll, Comp Dept, Hefei 230031, Peoples R China
[2] Anhui Vocat Coll Elect & Informat Technol, Bengbu 233030, Anhui, Peoples R China
关键词
ALGORITHM;
D O I
10.1155/2022/2308825
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In order to protect network information security and improve the security of wireless sensor networks, based on chaotic systems, we propose a wireless sensor algorithm based on improved identity encryption. First, the basic principle of chaotic system mapping is specifically analyzed; the two chaotic mapping systems are rectified to obtain the hybrid chaotic mapping system according to the demand of wireless sensing network. After that, an encryption framework and key are designed and the hybrid mapping system is applied to the encryption framework to encrypt the data. In this way, the length of the encryption algorithm is lengthened and the defensibility of the encrypted content is improved. Finally, the performance of the proposed encryption algorithm is tested in terms of information entropy, statistical methods, and ciphertext randomness. The test results show that compared with other encryption algorithms, the running speed of the encryption algorithm proposed in this paper is only 18.51 ms, which is faster than that of other encryption algorithms, and the memory consumption is only 27%, which is much lower than that of other algorithms. It can be seen that the proposed encryption algorithm has strong encryption effect and superior algorithm performance for data encryption in wireless sensor networks.
引用
收藏
页数:10
相关论文
共 30 条
[1]  
Abidi A, 2019, INT J ADV COMPUT SC, V10, P533
[2]   A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm [J].
Abusukhon, Ahmad ;
Anwar, Muhammad Naveed ;
Mohammad, Zeyad ;
Alghannam, Bareeq .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (01) :65-81
[3]   An improved DPA attack on DES with forth and back random round algorithm [J].
Chen C.-S. ;
Yu X. ;
Xiang Y.-X. ;
Li X. ;
Li T. .
International Journal of Network Security, 2017, 19 (02) :285-294
[4]  
Chatterjee Pinaki Sankar, 2018, International Journal of Wireless and Mobile Computing, V15, P113
[5]   Optimized Non-Cooperative Spectrum Sensing Algorithm in Cognitive Wireless Sensor Networks [J].
Chen, Yangyi ;
Su, Shaojing ;
Yin, Huiwen ;
Guo, Xiaojun ;
Zuo, Zhen ;
Wei, Junyu ;
Zhang, Liyin .
SENSORS, 2019, 19 (09)
[6]  
Deng A.P., 2012, ADV MAT RES, V532, P1695
[7]  
Ge J., 2019, INT J PERFORMABILITY, V15, P1436
[8]   3-D Image Encryption Based on Rubik’s Cube and RC6 Algorithm [J].
Helmy M. ;
El-Rabaie E.-S.M. ;
Eldokany I.M. ;
El-Samie F.E.A. .
3D Research, 2017, 8 (04)
[9]   Study of an encryption system based on compressive temporal ghost imaging with a chaotic laser [J].
Kang Yi ;
Zhang Leihong ;
Zhang Dawei .
OPTICS COMMUNICATIONS, 2018, 426 :535-540
[10]  
Kraleva Liliya, 2019, Tatra Mountains Mathematical Publications, V73, P109, DOI 10.2478/tmmp-2019-0009