無線傳感器網(wǎng)絡密鑰管理與信息加密研究
[Abstract]:Wireless sensor network (Wireless Sensor Networks,WSN) is an important research direction in the field of information science and technology, and has a good application prospect in military, transportation, medical treatment and so on. WSN is limited by many factors, making it lightweight. Low-energy security protocols such as key management and information encryption technology have become an important research direction in WSN. Key management is the foundation of information encryption and entity authentication. In recent years, chaotic encryption technology has become a hotspot of WSN encryption technology because of its low resource consumption and fast encryption speed. This paper first introduces the existing key management and information encryption technology. On the basis of summarizing and analyzing the research status of key management and information encryption, the paper improves the block key management algorithm based on ECC and the block encryption algorithm based on Logistic mapping. The main contributions of this paper are as follows: (1) in key management, the existing key management algorithms are studied, and the advantages and disadvantages of the existing algorithms are pointed out. Then, the key management algorithm based on ECC, which has good application value in recent years, is studied deeply. It is pointed out that the algorithm has security problems and low efficiency in using single link to distribute keys in the process of key updating, and there is forward security problem in the process of adding new nodes. In view of the above shortcomings, an improved scheme is proposed in combination with the hierarchical and grouped key management model, and compared with the original scheme in terms of security, storage cost and energy cost. It is proved that the overall performance of the improved algorithm has been improved. (2) in the aspect of information encryption, the existing chaotic mapping methods are studied, and the fundamental reasons that the existing chaotic maps are easy to produce weak keys due to the inherent short period phenomenon are analyzed. It is pointed out that the influence of short period on the performance of random sequences can be reduced by perturbation initial value x 0 and perturbation parameter u in chaotic mapping, and the Logistic chaotic map based on parameter perturbation is proposed. The randomness of binary sequences generated by Logistic chaotic map and ordinary chaotic map based on parameter perturbation is tested. It is proved that the improved scheme can greatly improve the short period problem. Improve the randomness of sequences. (3) on the basis of Logistic chaotic map based on parameter perturbation, the block encryption algorithm based on Logistic mapping is studied, and the algorithm is successfully cracked by selective plaintext attack. Then an improved ciphertext feedback method is proposed to resist the selective plaintext attack and the shift algorithm is improved so that the attacker can not obtain the shift bits D by exhaustive method. Finally, the security, key sensitivity and other aspects of the simulation results show that the overall performance of the improved scheme has been greatly improved.
【學位授予單位】:東北大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TN918.4;TN929.5;TP212.9
【相似文獻】
相關期刊論文 前10條
1 劉曉艷;;一種基于身份認證的多智體密鑰管理方法[J];山西財經大學學報;2007年S2期
2 王燕;陳燕俐;曹曉梅;楊庚;;無線網(wǎng)絡中一種新型密鑰管理[J];信息網(wǎng)絡安全;2009年11期
3 石強;張欣;;可信存儲的密鑰管理[J];中國科技信息;2011年09期
4 趙華偉;郭強;舒明雷;呂家亮;黃太波;;軀感網(wǎng)密鑰管理特征及研究現(xiàn)狀分析[J];計算機應用與軟件;2012年07期
5 黃江憑,張克騫;單密鑰算法中的密鑰管理問題[J];中國金融電腦;1999年06期
6 戴瓊海,覃毅力,張瑩;組播通信的訪問控制和密鑰管理[J];電子學報;2002年S1期
7 王國明;侯整風;;信息隱藏技術在密鑰管理中的應用研究[J];計算機工程與設計;2008年18期
8 孫磊;戴紫珊;郭錦娣;;云計算密鑰管理框架研究[J];電信科學;2010年09期
9 龔敏;陸萍;;基于城市通卡的發(fā)卡與密鑰管理研究[J];福建電腦;2012年05期
10 顧冠群 ,朱艷琴 ,徐永南;密鑰管理的設計與實現(xiàn)[J];電信科學;1992年02期
相關會議論文 前7條
1 劉鵬;趙戰(zhàn)生;荊繼武;戴英俠;;批發(fā)銀行業(yè)環(huán)境中的密鑰管理[A];第十次全國計算機安全學術交流會論文集[C];1995年
2 王潮;張振華;應仲平;徐拾義;牛志華;;WSN中基于身份的分散密鑰管理研究[A];第六屆中國測試學術會議論文集[C];2010年
3 馬春光;戴膺贊;;無線傳感器網(wǎng)絡動態(tài)密鑰管理方案綜述[A];黑龍江省計算機學會2009年學術交流年會論文集[C];2010年
4 劉文遠;裴繼輝;王永栓;;PKI密鑰管理系統(tǒng)的研究與設計[A];2007年全國第十一屆企業(yè)信息化與工業(yè)工程學術會議論文集[C];2007年
5 王繪麗;李冰;張曉慧;孫斌;;Ad Hoc虛擬骨干網(wǎng)中密鑰管理的研究[A];2006通信理論與技術新進展——第十一屆全國青年通信學術會議論文集[C];2006年
6 徐瑩;徐福緣;李生琦;;層級結構中基于一元hash函數(shù)的存取控制方法研究[A];全國第十屆企業(yè)信息化與工業(yè)工程學術年會論文集[C];2006年
7 張軼北;高寶成;;基于簇結構分布式認證的Shamir機制研究[A];中國電子學會第十五屆信息論學術年會暨第一屆全國網(wǎng)絡編碼學術年會論文集(上冊)[C];2008年
相關重要報紙文章 前3條
1 ;眾多存儲企業(yè)關注密鑰管理[N];人民郵電;2007年
2 宋家雨;密鑰管理之秘訣[N];網(wǎng)絡世界;2007年
3 江信q,
本文編號:2428534
本文鏈接:http://www.sikaile.net/kejilunwen/wltx/2428534.html