Search

Article

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

The Novel Block Encryption Scheme Based on Hybrid Chaotic Maps for the Wireless Sensor Networks

Tong Xiao-Jun Zuo Ke Wang Zhu

Citation:

The Novel Block Encryption Scheme Based on Hybrid Chaotic Maps for the Wireless Sensor Networks

Tong Xiao-Jun, Zuo Ke, Wang Zhu
PDF
Get Citation

(PLEASE TRANSLATE TO ENGLISH

BY GOOGLE TRANSLATE IF NEEDED.)

  • Traditional encryption schemes are not suitable for the Wireless sensor networks (WSNS) due to some intrinsic features of nodes in WSNS such as low energy, limited computation ability and storage resources. This paper presented a novel block encryption scheme based on hybrid chaotic maps dynamically and proposed an integer digital random method, and the Feistel network structure, which is a kind of fast, secure, low resource consumption and suitable for WSNS nodes encryption scheme. The experimental tests show the new encryption scheme has follows prefect performance: the large key space, very good diffusion and disrupt performance, strict avalanche effect, excellent statistical balance and fast encryption speed of the new scheme, and the encryption scheme passes the SP800-22 test; meanwhile, the analysis and testing of speed, time and storage space on the simulator platform shows this new encryption scheme is well able to hide the data information the node in WSNS.
    • Funds: Project supported by the National Natural Science Foundation of China (Grant No. 60973162), the Natural Science Foundation of Shandong Province of China (Grant No. ZR2009GM037), the Science and Technology of Shandong Province of China (Grant No. 2010GGX10132), the Key Natural Science Foundation of Shandong Province of China (Grant No. Z2006G01), the Scientific Research Foundation of Harbin Institute of Technology at Weihai, China (Grant No. HIT(WH) ZB200909), the Technology Research and Development Program of Weihai High-Tech Development Zone in Shandong Province of China (Grant No. 201025), and the Technology Research and Development Program of Weihai, China (Grant No. 2008011).
    [1]

    Tilak S, Ghazaleh N B, Heinzelman W 2002 Mob. Comput. Commun. Rev. 1 1

    [2]

    Sun L M, Li J Z, Chen Y, Zhu H S 2005 Wireless Sensor Networks (Beijing: Tsinghua University Press)p37(in Chinese)[孙利民, 李建中, 陈渝, 朱红松 2005 无线传感器网络 (北京:清华大学出版社)第37页]

    [3]

    Yang J Y 2007 Ph. D. Dissertation (Chongqing: Chongqing University)(in Chinese)[杨吉云 2007 博士学位论文 (重庆: 重庆大学)]

    [4]

    Wang S 2007 The Theory and Application for Wireless Sensor Networks (Beijing: Beihang University Press)pp7—9 (in Chinese)[ 王殊 2007 无线传感器网络的理论及应用 (北京:北京航空航天大学出版社)第7—9页]

    [5]

    Liu S D, Liang F M, Liu S K 2003 The Chaos and Fractal in Nature Science (Beijing: Beijing University Press)p26 (in Chinese)[刘式达, 梁福明, 刘式适 2003 自然科学中的混沌和分形 (北京:北京大学出版社)第26页]

    [6]

    Liao X F, Xiao D, Chen Y 2009 The Principle and Application of Chaotic Cryptography (Beijing: Science Press)p1 (in Chinese)[廖晓峰, 肖迪, 陈永 2009 混沌密码学原理及其应用 (北京:科学出版社)第1页]

    [7]

    Xu S J, Wang J Z 2008 Acta Phys. Sin. 57 37 (in Chinese)[徐淑奖, 王继志 2008 57 37]

    [8]

    Xie K, Lei M, Feng Z J 2005 Acta Phys. Sin. 54 1267 (in Chinese)[ 谢鲲, 雷敏, 冯正进 2005 54 1267].

    [9]

    Liu M H, Feng J C 2009 Acta Phys. Sin. 58 4457 (in Chinese)[刘明华, 冯久超 2009 58 4457]

    [10]

    Li J B 2011 Acta Phys. Sin. 60 060508 (in Chinese)[李家标 2011 60 060508]

    [11]

    Gu Q L, Gao T G 2009 Chin. Phys. B 18 84

    [12]

    Hu J F, Guo J B 2008 Acta Phys. Sin. 57 1477 (in Chinese)[胡进峰, 郭静波 2008 57 1477]

    [13]

    Li W, Hao J H, Qi B 2008 Acta Phys. Sin. 57 1398 (in Chinese)[李伟, 郝建红, 祁兵 2008 57 1398]

    [14]

    Ji J X, Qiu S S 2010 Acta Phys. Sin. 59 (in Chinese)[晋建秀, 丘水生 2010 59 792]

    [15]

    Liu S B, Sun Q, Xu Z Q, Liu J S 2009 Chin. Phys. B 18 5219

    [16]

    Chen S 2006 Ph. D. Dissertation (Chongqing: Chongqing University)(in Chinese)[陈帅 2006 博士学位论文 (重庆:重庆大学)]

    [17]

    Tan Y J 2010 Ph. D. Dissertation (Chengdu: Electric and Scientific University)(in Chinese)[谭益军 2010 博士学位论文 (成都: 电子科技大学)]

    [18]

    Rivest R L 1995 Dr. Dobb’s Journal 20 146

    [19]

    Rivest R L 1995 Lecture Notes in Computer Science 1008 86

    [20]

    Yee W L, Jeroen D, Pieter H 2006 ACM Transactions on Sensor Networks (TOSN)2 65

    [21]

    Rivest R L 1994 Proceedings of the Second International Workshop on Fast Software Encryption (New York: Springer-Verlag)p86

    [22]

    Guido B, Luca B, Israel K Paolo M, Vincenzo P 2003 14th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP’03)Hague, Netherlands, 24–26 June, 2003 p423

    [23]

    Rivest R L Http://people.csail.mit.edu/rivest/RC6.pdf 1998-08-20

    [24]

    Sun S L 2004 Application Cryptography (Beijing: Tsinghua University press)p(23)(in Chinese)[孙淑玲 2004 应用密码学 (北京: 清华大学出版社)第23页]

    [25]

    Advanced Encrtption Standard.buchholz.hs-bremen.de/aes/AES. pdf 2006-02-20

    [26]

    Peng J , Liao X F 2006 J. Electron. Inform. 28 4 (in Chinese)[彭军, 廖晓峰 2006 电子与信息学报 28 4]

    [27]

    Mohammad P, Nevenko Z 2000 Comput. Secur. 19 467

    [28]

    Liu Y Z 2005 Cryptography and Network Security—Principle and Practice p135 (in Chinese)[刘玉珍 2005 密码编码学与网络安全——原理与实践 (电子工业出版社)第135页]

    [29]

    Shannon C E 1949 The Bell Syst. Tech. J. 28 656

    [30]

    Zhu M F, Zhang B D, Lv S W 2002 J. Commun. 23 10 [朱明富, 张宝东, 吕述望 2002 通信学报 23 10]

  • [1]

    Tilak S, Ghazaleh N B, Heinzelman W 2002 Mob. Comput. Commun. Rev. 1 1

    [2]

    Sun L M, Li J Z, Chen Y, Zhu H S 2005 Wireless Sensor Networks (Beijing: Tsinghua University Press)p37(in Chinese)[孙利民, 李建中, 陈渝, 朱红松 2005 无线传感器网络 (北京:清华大学出版社)第37页]

    [3]

    Yang J Y 2007 Ph. D. Dissertation (Chongqing: Chongqing University)(in Chinese)[杨吉云 2007 博士学位论文 (重庆: 重庆大学)]

    [4]

    Wang S 2007 The Theory and Application for Wireless Sensor Networks (Beijing: Beihang University Press)pp7—9 (in Chinese)[ 王殊 2007 无线传感器网络的理论及应用 (北京:北京航空航天大学出版社)第7—9页]

    [5]

    Liu S D, Liang F M, Liu S K 2003 The Chaos and Fractal in Nature Science (Beijing: Beijing University Press)p26 (in Chinese)[刘式达, 梁福明, 刘式适 2003 自然科学中的混沌和分形 (北京:北京大学出版社)第26页]

    [6]

    Liao X F, Xiao D, Chen Y 2009 The Principle and Application of Chaotic Cryptography (Beijing: Science Press)p1 (in Chinese)[廖晓峰, 肖迪, 陈永 2009 混沌密码学原理及其应用 (北京:科学出版社)第1页]

    [7]

    Xu S J, Wang J Z 2008 Acta Phys. Sin. 57 37 (in Chinese)[徐淑奖, 王继志 2008 57 37]

    [8]

    Xie K, Lei M, Feng Z J 2005 Acta Phys. Sin. 54 1267 (in Chinese)[ 谢鲲, 雷敏, 冯正进 2005 54 1267].

    [9]

    Liu M H, Feng J C 2009 Acta Phys. Sin. 58 4457 (in Chinese)[刘明华, 冯久超 2009 58 4457]

    [10]

    Li J B 2011 Acta Phys. Sin. 60 060508 (in Chinese)[李家标 2011 60 060508]

    [11]

    Gu Q L, Gao T G 2009 Chin. Phys. B 18 84

    [12]

    Hu J F, Guo J B 2008 Acta Phys. Sin. 57 1477 (in Chinese)[胡进峰, 郭静波 2008 57 1477]

    [13]

    Li W, Hao J H, Qi B 2008 Acta Phys. Sin. 57 1398 (in Chinese)[李伟, 郝建红, 祁兵 2008 57 1398]

    [14]

    Ji J X, Qiu S S 2010 Acta Phys. Sin. 59 (in Chinese)[晋建秀, 丘水生 2010 59 792]

    [15]

    Liu S B, Sun Q, Xu Z Q, Liu J S 2009 Chin. Phys. B 18 5219

    [16]

    Chen S 2006 Ph. D. Dissertation (Chongqing: Chongqing University)(in Chinese)[陈帅 2006 博士学位论文 (重庆:重庆大学)]

    [17]

    Tan Y J 2010 Ph. D. Dissertation (Chengdu: Electric and Scientific University)(in Chinese)[谭益军 2010 博士学位论文 (成都: 电子科技大学)]

    [18]

    Rivest R L 1995 Dr. Dobb’s Journal 20 146

    [19]

    Rivest R L 1995 Lecture Notes in Computer Science 1008 86

    [20]

    Yee W L, Jeroen D, Pieter H 2006 ACM Transactions on Sensor Networks (TOSN)2 65

    [21]

    Rivest R L 1994 Proceedings of the Second International Workshop on Fast Software Encryption (New York: Springer-Verlag)p86

    [22]

    Guido B, Luca B, Israel K Paolo M, Vincenzo P 2003 14th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP’03)Hague, Netherlands, 24–26 June, 2003 p423

    [23]

    Rivest R L Http://people.csail.mit.edu/rivest/RC6.pdf 1998-08-20

    [24]

    Sun S L 2004 Application Cryptography (Beijing: Tsinghua University press)p(23)(in Chinese)[孙淑玲 2004 应用密码学 (北京: 清华大学出版社)第23页]

    [25]

    Advanced Encrtption Standard.buchholz.hs-bremen.de/aes/AES. pdf 2006-02-20

    [26]

    Peng J , Liao X F 2006 J. Electron. Inform. 28 4 (in Chinese)[彭军, 廖晓峰 2006 电子与信息学报 28 4]

    [27]

    Mohammad P, Nevenko Z 2000 Comput. Secur. 19 467

    [28]

    Liu Y Z 2005 Cryptography and Network Security—Principle and Practice p135 (in Chinese)[刘玉珍 2005 密码编码学与网络安全——原理与实践 (电子工业出版社)第135页]

    [29]

    Shannon C E 1949 The Bell Syst. Tech. J. 28 656

    [30]

    Zhu M F, Zhang B D, Lv S W 2002 J. Commun. 23 10 [朱明富, 张宝东, 吕述望 2002 通信学报 23 10]

  • [1] Luo Xiao-Yuan, Li Hao, Ma Ju-Hai. Topology optimization algorithm for wireless networks based on the algebraic properties of minimum rigid graph. Acta Physica Sinica, 2016, 65(24): 240201. doi: 10.7498/aps.65.240201
    [2] Li Xiao-Long, Feng Dong-Lei, Peng Peng-Cheng. A potential game based topology control algorithm for wireless sensor networks. Acta Physica Sinica, 2016, 65(2): 028401. doi: 10.7498/aps.65.028401
    [3] Jiang Rui, Yang Zhen. An improved centroid localization algorithm based on iterative computation for wireless sensor network. Acta Physica Sinica, 2016, 65(3): 030101. doi: 10.7498/aps.65.030101
    [4] Hao Xiao-Chen, Liu Wei-Jing, Xin Min-Jie, Yao Ning, Ru Xiao-Yue. Energy balance and robustness adjustable topology control algorithm for wireless sensor networks. Acta Physica Sinica, 2015, 64(8): 080101. doi: 10.7498/aps.64.080101
    [5] Hao Xiao-Chen, Yao Ning, Ru Xiao-Yue, Liu Wei-Jing, Xin Min-Jie. Channel allocation game algorithm based on lifetime model in wireless sensor network. Acta Physica Sinica, 2015, 64(14): 140101. doi: 10.7498/aps.64.140101
    [6] Liu Hao-Ran, Yin Wen-Xiao, Dong Ming-Ru, Liu Bin. Study on the scale-free topology model with strong intrusion-tolerance ability in wireless sensor networks. Acta Physica Sinica, 2014, 63(9): 090503. doi: 10.7498/aps.63.090503
    [7] Fang Wei, Song Xin-Hong. A deployment strategy for coverage control in wireless sensor networks based on the blind-zone of Voronoi diagram. Acta Physica Sinica, 2014, 63(22): 220701. doi: 10.7498/aps.63.220701
    [8] Liu Zhou-Zhou, Wang Fu-Bao. Research on weighted scale-free topology with balancing energy consumption characteristics in wireless sensor networks. Acta Physica Sinica, 2014, 63(19): 190504. doi: 10.7498/aps.63.190504
    [9] Han Li, Liu Bin, Li Ya-Qian, Zhao Lei-Jing. Studies on weighted scale-free topology in energy heterogeneous wireless sensor network. Acta Physica Sinica, 2014, 63(15): 150504. doi: 10.7498/aps.63.150504
    [10] Yin Rong-Rong, Liu Bin, Liu Hao-Ran, Li Ya-Qian. Dynamic fault-tolerance analysis of scale-free topology in wireless sensor networks. Acta Physica Sinica, 2014, 63(11): 110205. doi: 10.7498/aps.63.110205
    [11] Liu Bin, Dong Ming-Ru, Liu Hao-Ran, Yin Rong-Rong, Han Li. A scale-free fault tolerant topology model in wireless sensor network for toleration of comprehensive fault. Acta Physica Sinica, 2014, 63(17): 170506. doi: 10.7498/aps.63.170506
    [12] Song Jia, Luo Qing-Hua, Peng Xi-Yuan. Faultprevention technique of controlling redundant routes into sleeping based on health degree. Acta Physica Sinica, 2014, 63(12): 128401. doi: 10.7498/aps.63.128401
    [13] Liu Hao-Ran, Yin Wen-Xiao, Han Tao, Dong Ming-Ru. Wireless sensor network fault tolerant topology for lifetime optimization. Acta Physica Sinica, 2014, 63(4): 040509. doi: 10.7498/aps.63.040509
    [14] Peng Hai-Xia, Zhao Hai, Li Da-Zhou, Lin Chuan. Data fusaggregation algorithm based on dynamic minimal spanning tree routing protocol. Acta Physica Sinica, 2014, 63(9): 090206. doi: 10.7498/aps.63.090206
    [15] Huang Jin-Wang, Feng Jiu-Chao, Lü Shan-Xiang. Blind source separation of chaotic signals in wireless sensor networks. Acta Physica Sinica, 2014, 63(5): 050502. doi: 10.7498/aps.63.050502
    [16] Qi Hao, Wang Fu-Bao, Deng Hong. A novel approach to research on feature extraction of seismic wave signal based on wireless sensor networks. Acta Physica Sinica, 2013, 62(10): 104301. doi: 10.7498/aps.62.104301
    [17] Liu Xiang-Li, Li Zan, Hu Yi-Su. A coordinate compression algorithm based on centroid for wireless sensor networks. Acta Physica Sinica, 2013, 62(7): 070201. doi: 10.7498/aps.62.070201
    [18] Wang Ya-Qi, Yang Xiao-Yuan. Study on a model of topology evolution of wireless sensor networks among cluster heads and its immunization. Acta Physica Sinica, 2012, 61(9): 090202. doi: 10.7498/aps.61.090202
    [19] Wang Zhu, Wang Qi, Wei De-bao, Wang Ling. Relay node placement and addition algorithms in wireless sensor networks. Acta Physica Sinica, 2012, 61(12): 120505. doi: 10.7498/aps.61.120505
    [20] Zhou Jie, Liu Yuan-An, Wu Fan, Zhang Hong-Guang, Zu Yun-Xiao. Allocation of multi-objective cross-layer wireless sensor network resource based on chaotic parallel genetic algorithm. Acta Physica Sinica, 2011, 60(9): 090504. doi: 10.7498/aps.60.090504
Metrics
  • Abstract views:  7480
  • PDF Downloads:  678
  • Cited By: 0
Publishing process
  • Received Date:  06 May 2011
  • Accepted Date:  09 June 2011
  • Published Online:  15 March 2012

/

返回文章
返回
Baidu
map