Volume 36 Issue 9
Sep.  2010
Turn off MathJax
Article Contents
Kang Yimei, Wang Tao, Hu Jiang, et al. Semantic security algorithm for wireless sensor network[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(9): 1043-1047. (in Chinese)
Citation: Kang Yimei, Wang Tao, Hu Jiang, et al. Semantic security algorithm for wireless sensor network[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(9): 1043-1047. (in Chinese)

Semantic security algorithm for wireless sensor network

  • Received Date: 09 Jul 2009
  • Publish Date: 30 Sep 2010
  • To improve security of communication data in WSN (Wireless Sensor Networks), a semantic security algorithm based on a changing mapping table was presented. Considering of threshold-sensitive characteristics of WSN application, a data collection method with variable precision was used, i.e. high collection precision close to threshold and low collection precision far from threshold. Then a mapping table was introduced which defined the mapping way of identification and original semantic. The encryption in the nodes and decrypt in the gateway were depended on the mapping table, which kept synchronization between the gateway and the node during the communication. To enhance security, the mapping table was continuously updated based on a random changing factor. And some improved random number generators were suggested in order to improve the nonlinear feature of mapping table conversion. The time complexity analysis, space complexity analysis and energy consumption analysis were given. Finally, some experiments were done with Micaz sensor nodes and the simulation results and analysis were given.

     

  • loading
  • [1] 李晖.无线传感器网络安全技术研究 .上海:上海交通大学, 2007 Li Hui.Study on the security of wireless sensor networks Shanghai: Shanghai Jiaotong University,2007(in Chinese) [2] A.Perrig,R.Szewczyk,V.Wen,et al. SPINS:security protocols for sensor networks[J]. Wireless Networks,2002,8(5):521-534 [3] 程宏兵,王江涛,杨庚. SPINS安全框架协议研究[J].计算机科学,2006,33(8):106-108,143 Cheng Hongbin, Wang Jiangtao, Yang Geng. Research of secure frame protocol based on SPINS . Computer Science, 2006,33(8):106-108,143(in Chinese) [4] 沈华韵, 张鹏, 王侃.改进线性同余法随机数发生器[J].清华大学学报:自然科学版,2009,49(2):191-193 Shen Huayun,Zhang Peng,Wang Kan.Improved linear congruential radom number generators[J].Journal of Tsinghua University,2009,49(2):191-193(in Chinese) [5] 王萍,许海洋.一种新的随机数组合发生器的研究[J],计算机技术与发展,2006,16(4):79-81 Wang Ping, Xu Haiyang.Study on a new kind of combined random number generator[J]. Computer Technology and Development, 2006,16(4):79-81(in Chinese)
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(3674) PDF downloads(944) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return