無(wú)線傳感器網(wǎng)絡(luò)密鑰管理與信息加密研究
[Abstract]:Wireless sensor network (Wireless Sensor Networks,WSN) is an important research direction in the field of information science and technology, and has a good application prospect in military, transportation, medical treatment and so on. WSN is limited by many factors, making it lightweight. Low-energy security protocols such as key management and information encryption technology have become an important research direction in WSN. Key management is the foundation of information encryption and entity authentication. In recent years, chaotic encryption technology has become a hotspot of WSN encryption technology because of its low resource consumption and fast encryption speed. This paper first introduces the existing key management and information encryption technology. On the basis of summarizing and analyzing the research status of key management and information encryption, the paper improves the block key management algorithm based on ECC and the block encryption algorithm based on Logistic mapping. The main contributions of this paper are as follows: (1) in key management, the existing key management algorithms are studied, and the advantages and disadvantages of the existing algorithms are pointed out. Then, the key management algorithm based on ECC, which has good application value in recent years, is studied deeply. It is pointed out that the algorithm has security problems and low efficiency in using single link to distribute keys in the process of key updating, and there is forward security problem in the process of adding new nodes. In view of the above shortcomings, an improved scheme is proposed in combination with the hierarchical and grouped key management model, and compared with the original scheme in terms of security, storage cost and energy cost. It is proved that the overall performance of the improved algorithm has been improved. (2) in the aspect of information encryption, the existing chaotic mapping methods are studied, and the fundamental reasons that the existing chaotic maps are easy to produce weak keys due to the inherent short period phenomenon are analyzed. It is pointed out that the influence of short period on the performance of random sequences can be reduced by perturbation initial value x 0 and perturbation parameter u in chaotic mapping, and the Logistic chaotic map based on parameter perturbation is proposed. The randomness of binary sequences generated by Logistic chaotic map and ordinary chaotic map based on parameter perturbation is tested. It is proved that the improved scheme can greatly improve the short period problem. Improve the randomness of sequences. (3) on the basis of Logistic chaotic map based on parameter perturbation, the block encryption algorithm based on Logistic mapping is studied, and the algorithm is successfully cracked by selective plaintext attack. Then an improved ciphertext feedback method is proposed to resist the selective plaintext attack and the shift algorithm is improved so that the attacker can not obtain the shift bits D by exhaustive method. Finally, the security, key sensitivity and other aspects of the simulation results show that the overall performance of the improved scheme has been greatly improved.
【學(xué)位授予單位】:東北大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN918.4;TN929.5;TP212.9
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 劉曉艷;;一種基于身份認(rèn)證的多智體密鑰管理方法[J];山西財(cái)經(jīng)大學(xué)學(xué)報(bào);2007年S2期
2 王燕;陳燕俐;曹曉梅;楊庚;;無(wú)線網(wǎng)絡(luò)中一種新型密鑰管理[J];信息網(wǎng)絡(luò)安全;2009年11期
3 石強(qiáng);張欣;;可信存儲(chǔ)的密鑰管理[J];中國(guó)科技信息;2011年09期
4 趙華偉;郭強(qiáng);舒明雷;呂家亮;黃太波;;軀感網(wǎng)密鑰管理特征及研究現(xiàn)狀分析[J];計(jì)算機(jī)應(yīng)用與軟件;2012年07期
5 黃江憑,張克騫;單密鑰算法中的密鑰管理問題[J];中國(guó)金融電腦;1999年06期
6 戴瓊海,覃毅力,張瑩;組播通信的訪問控制和密鑰管理[J];電子學(xué)報(bào);2002年S1期
7 王國(guó)明;侯整風(fēng);;信息隱藏技術(shù)在密鑰管理中的應(yīng)用研究[J];計(jì)算機(jī)工程與設(shè)計(jì);2008年18期
8 孫磊;戴紫珊;郭錦娣;;云計(jì)算密鑰管理框架研究[J];電信科學(xué);2010年09期
9 龔敏;陸萍;;基于城市通卡的發(fā)卡與密鑰管理研究[J];福建電腦;2012年05期
10 顧冠群 ,朱艷琴 ,徐永南;密鑰管理的設(shè)計(jì)與實(shí)現(xiàn)[J];電信科學(xué);1992年02期
相關(guān)會(huì)議論文 前7條
1 劉鵬;趙戰(zhàn)生;荊繼武;戴英俠;;批發(fā)銀行業(yè)環(huán)境中的密鑰管理[A];第十次全國(guó)計(jì)算機(jī)安全學(xué)術(shù)交流會(huì)論文集[C];1995年
2 王潮;張振華;應(yīng)仲平;徐拾義;牛志華;;WSN中基于身份的分散密鑰管理研究[A];第六屆中國(guó)測(cè)試學(xué)術(shù)會(huì)議論文集[C];2010年
3 馬春光;戴膺贊;;無(wú)線傳感器網(wǎng)絡(luò)動(dòng)態(tài)密鑰管理方案綜述[A];黑龍江省計(jì)算機(jī)學(xué)會(huì)2009年學(xué)術(shù)交流年會(huì)論文集[C];2010年
4 劉文遠(yuǎn);裴繼輝;王永栓;;PKI密鑰管理系統(tǒng)的研究與設(shè)計(jì)[A];2007年全國(guó)第十一屆企業(yè)信息化與工業(yè)工程學(xué)術(shù)會(huì)議論文集[C];2007年
5 王繪麗;李冰;張曉慧;孫斌;;Ad Hoc虛擬骨干網(wǎng)中密鑰管理的研究[A];2006通信理論與技術(shù)新進(jìn)展——第十一屆全國(guó)青年通信學(xué)術(shù)會(huì)議論文集[C];2006年
6 徐瑩;徐福緣;李生琦;;層級(jí)結(jié)構(gòu)中基于一元hash函數(shù)的存取控制方法研究[A];全國(guó)第十屆企業(yè)信息化與工業(yè)工程學(xué)術(shù)年會(huì)論文集[C];2006年
7 張軼北;高寶成;;基于簇結(jié)構(gòu)分布式認(rèn)證的Shamir機(jī)制研究[A];中國(guó)電子學(xué)會(huì)第十五屆信息論學(xué)術(shù)年會(huì)暨第一屆全國(guó)網(wǎng)絡(luò)編碼學(xué)術(shù)年會(huì)論文集(上冊(cè))[C];2008年
相關(guān)重要報(bào)紙文章 前3條
1 ;眾多存儲(chǔ)企業(yè)關(guān)注密鑰管理[N];人民郵電;2007年
2 宋家雨;密鑰管理之秘訣[N];網(wǎng)絡(luò)世界;2007年
3 江信q,
本文編號(hào):2428534
本文鏈接:http://sikaile.net/kejilunwen/wltx/2428534.html