首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于变化映射表的WSN通信数据语义安全算法
引用本文:康一梅,王涛,胡江,赵磊.基于变化映射表的WSN通信数据语义安全算法[J].北京航空航天大学学报,2010,36(9):1043-1047.
作者姓名:康一梅  王涛  胡江  赵磊
作者单位:北京航空航天大学,软件学院,北京,100191;93756部队,天津,300131;中国兵器工业计算所,北京,100089
摘    要:提出一种基于变化映射表的语义安全算法.该算法首先针对无线传感器网络(WSN,Wireless Sensor Networks)应用对临界值敏感的特点,采用变精度状态采集方法,建立了一个原始语义与其标识数值的映射表;在此基础上,网关和节点之间通过同步映射表进行通信数据的语义加密和解密,为提高安全性,在通信过程中,映射表基于通信携带的随机变更因子而不断更新.最后给出算法分析及仿真验证,结果表明提出的算法可以有效抑制已知明密文对攻击和实现语义安全.

关 键 词:无线传感器网络  数据加密  语义  语义安全
收稿时间:2009-07-09

Semantic security algorithm for wireless sensor network
Kang Yimei,Wang Tao,Hu Jiang,Zhao Lei.Semantic security algorithm for wireless sensor network[J].Journal of Beijing University of Aeronautics and Astronautics,2010,36(9):1043-1047.
Authors:Kang Yimei  Wang Tao  Hu Jiang  Zhao Lei
Institution:1. School of Software, Beijing University of Aeronautics and Astronautics, Beijing 100191, China;
2. Army 93756, Tianjin 300131, China;
3. Beijing Institute of Computer Technology and Application, Beijing 100089, China
Abstract:To improve security of communication data in WSN (Wireless Sensor Networks), a semantic security algorithm based on a changing mapping table was presented. Considering of threshold-sensitive characteristics of WSN application, a data collection method with variable precision was used, i.e. high collection precision close to threshold and low collection precision far from threshold. Then a mapping table was introduced which defined the mapping way of identification and original semantic. The encryption in the nodes and decrypt in the gateway were depended on the mapping table, which kept synchronization between the gateway and the node during the communication. To enhance security, the mapping table was continuously updated based on a random changing factor. And some improved random number generators were suggested in order to improve the nonlinear feature of mapping table conversion. The time complexity analysis, space complexity analysis and energy consumption analysis were given. Finally, some experiments were done with Micaz sensor nodes and the simulation results and analysis were given.
Keywords:wireless sensor networks  security of data  semantic  semantic security
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《北京航空航天大学学报》浏览原始摘要信息
点击此处可从《北京航空航天大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号