无线传感器网络密钥管理与信息加密研究
[Abstract]:Wireless sensor network (Wireless Sensor Networks,WSN) is an important research direction in the field of information science and technology, and has a good application prospect in military, transportation, medical treatment and so on. WSN is limited by many factors, making it lightweight. Low-energy security protocols such as key management and information encryption technology have become an important research direction in WSN. Key management is the foundation of information encryption and entity authentication. In recent years, chaotic encryption technology has become a hotspot of WSN encryption technology because of its low resource consumption and fast encryption speed. This paper first introduces the existing key management and information encryption technology. On the basis of summarizing and analyzing the research status of key management and information encryption, the paper improves the block key management algorithm based on ECC and the block encryption algorithm based on Logistic mapping. The main contributions of this paper are as follows: (1) in key management, the existing key management algorithms are studied, and the advantages and disadvantages of the existing algorithms are pointed out. Then, the key management algorithm based on ECC, which has good application value in recent years, is studied deeply. It is pointed out that the algorithm has security problems and low efficiency in using single link to distribute keys in the process of key updating, and there is forward security problem in the process of adding new nodes. In view of the above shortcomings, an improved scheme is proposed in combination with the hierarchical and grouped key management model, and compared with the original scheme in terms of security, storage cost and energy cost. It is proved that the overall performance of the improved algorithm has been improved. (2) in the aspect of information encryption, the existing chaotic mapping methods are studied, and the fundamental reasons that the existing chaotic maps are easy to produce weak keys due to the inherent short period phenomenon are analyzed. It is pointed out that the influence of short period on the performance of random sequences can be reduced by perturbation initial value x 0 and perturbation parameter u in chaotic mapping, and the Logistic chaotic map based on parameter perturbation is proposed. The randomness of binary sequences generated by Logistic chaotic map and ordinary chaotic map based on parameter perturbation is tested. It is proved that the improved scheme can greatly improve the short period problem. Improve the randomness of sequences. (3) on the basis of Logistic chaotic map based on parameter perturbation, the block encryption algorithm based on Logistic mapping is studied, and the algorithm is successfully cracked by selective plaintext attack. Then an improved ciphertext feedback method is proposed to resist the selective plaintext attack and the shift algorithm is improved so that the attacker can not obtain the shift bits D by exhaustive method. Finally, the security, key sensitivity and other aspects of the simulation results show that the overall performance of the improved scheme has been greatly improved.
【学位授予单位】:东北大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.4;TN929.5;TP212.9
【相似文献】
相关期刊论文 前10条
1 刘晓艳;;一种基于身份认证的多智体密钥管理方法[J];山西财经大学学报;2007年S2期
2 王燕;陈燕俐;曹晓梅;杨庚;;无线网络中一种新型密钥管理[J];信息网络安全;2009年11期
3 石强;张欣;;可信存储的密钥管理[J];中国科技信息;2011年09期
4 赵华伟;郭强;舒明雷;吕家亮;黄太波;;躯感网密钥管理特征及研究现状分析[J];计算机应用与软件;2012年07期
5 黄江凭,张克骞;单密钥算法中的密钥管理问题[J];中国金融电脑;1999年06期
6 戴琼海,覃毅力,张莹;组播通信的访问控制和密钥管理[J];电子学报;2002年S1期
7 王国明;侯整风;;信息隐藏技术在密钥管理中的应用研究[J];计算机工程与设计;2008年18期
8 孙磊;戴紫珊;郭锦娣;;云计算密钥管理框架研究[J];电信科学;2010年09期
9 龚敏;陆萍;;基于城市通卡的发卡与密钥管理研究[J];福建电脑;2012年05期
10 顾冠群 ,朱艳琴 ,徐永南;密钥管理的设计与实现[J];电信科学;1992年02期
相关会议论文 前7条
1 刘鹏;赵战生;荆继武;戴英侠;;批发银行业环境中的密钥管理[A];第十次全国计算机安全学术交流会论文集[C];1995年
2 王潮;张振华;应仲平;徐拾义;牛志华;;WSN中基于身份的分散密钥管理研究[A];第六届中国测试学术会议论文集[C];2010年
3 马春光;戴膺赞;;无线传感器网络动态密钥管理方案综述[A];黑龙江省计算机学会2009年学术交流年会论文集[C];2010年
4 刘文远;裴继辉;王永栓;;PKI密钥管理系统的研究与设计[A];2007年全国第十一届企业信息化与工业工程学术会议论文集[C];2007年
5 王绘丽;李冰;张晓慧;孙斌;;Ad Hoc虚拟骨干网中密钥管理的研究[A];2006通信理论与技术新进展——第十一届全国青年通信学术会议论文集[C];2006年
6 徐莹;徐福缘;李生琦;;层级结构中基于一元hash函数的存取控制方法研究[A];全国第十届企业信息化与工业工程学术年会论文集[C];2006年
7 张轶北;高宝成;;基于簇结构分布式认证的Shamir机制研究[A];中国电子学会第十五届信息论学术年会暨第一届全国网络编码学术年会论文集(上册)[C];2008年
相关重要报纸文章 前3条
1 ;众多存储企业关注密钥管理[N];人民邮电;2007年
2 宋家雨;密钥管理之秘诀[N];网络世界;2007年
3 江信q,
本文编号:2428534
本文链接:https://www.wllwen.com/kejilunwen/wltx/2428534.html