[an error occurred while processing this directive]
   
 
���¿��ټ��� �߼�����
   ��ҳ  �ڿ�����  ��ί��  Ͷ��ָ��  �ڿ�����  ��������  �� �� ��  ��ϵ����
�������պ����ѧѧ�� 2010, Vol. 36 Issue (9) :1043-1047    DOI:
���� ����Ŀ¼ | ����Ŀ¼ | ������� | �߼����� << | >>
���ڱ仯ӳ����WSNͨ���������尲ȫ�㷨
��һ÷1, �� ��1, �� ��2, �� ��3*
1. �������պ����ѧ ���ѧԺ, ���� 100191;
2. 93756����,��� 300131;
3. �й�������ҵ������, ���� 100089
Semantic security algorithm for wireless sensor network
Kang Yimei1, Wang Tao1, Hu Jiang2, Zhao Lei3*
1. School of Software, Beijing University of Aeronautics and Astronautics, Beijing 100191, China;
2. Army 93756, Tianjin 300131, China;
3. Beijing Institute of Computer Technology and Application, Beijing 100089, China

ժҪ
�����
�������
Download: PDF (0KB)   HTML 1KB   Export: BibTeX or EndNote (RIS)      Supporting Info
ժҪ ���һ�ֻ��ڱ仯ӳ�������尲ȫ�㷨.���㷨�������WSN(Wireless Sensor Networks)Ӧ�ö��ٽ�ֵ���е��ص�,���ñ侫��״̬�ɼ�����,������һ��ԭʼ���������ʶ��ֵ��ӳ���;�ڴ˻�����,���غͽڵ�֮��ͨ��ͬ��ӳ������ͨ�����ݵ�������ܺͽ���,Ϊ��߰�ȫ��,��ͨ�Ź�����,ӳ������ͨ��Я�������������Ӷ����ϸ���.�������㷨������������֤,�������������㷨������Ч������֪�����ĶԹ�����ʵ�����尲ȫ.
Service
�ѱ����Ƽ�������
�����ҵ����
�������ù�����
Email Alert
RSS
�����������
��һ÷
����
����
����
�ؼ����� ���ߴ���������   ���ݼ���   ����   ���尲ȫ     
Abstract�� To improve security of communication data in WSN (Wireless Sensor Networks), a semantic security algorithm based on a changing mapping table was presented. Considering of threshold-sensitive characteristics of WSN application, a data collection method with variable precision was used, i.e. high collection precision close to threshold and low collection precision far from threshold. Then a mapping table was introduced which defined the mapping way of identification and original semantic. The encryption in the nodes and decrypt in the gateway were depended on the mapping table, which kept synchronization between the gateway and the node during the communication. To enhance security, the mapping table was continuously updated based on a random changing factor. And some improved random number generators were suggested in order to improve the nonlinear feature of mapping table conversion. The time complexity analysis, space complexity analysis and energy consumption analysis were given. Finally, some experiments were done with Micaz sensor nodes and the simulation results and analysis were given.
Keywords�� wireless sensor networks   security of data   semantic   semantic security     
Received 2009-07-09;
About author: ��һ÷(1968-),Ů,�����Ӱ���,������,kangyimei@buaa.edu.cn.
���ñ���:   
��һ÷, ����, ����, ����.���ڱ仯ӳ����WSNͨ���������尲ȫ�㷨[J]  �������պ����ѧѧ��, 2010,V36(9): 1043-1047
Kang Yimei, Wang Tao, Hu Jiang, Zhao Lei.Semantic security algorithm for wireless sensor network[J]  JOURNAL OF BEIJING UNIVERSITY OF AERONAUTICS AND A, 2010,V36(9): 1043-1047
���ӱ���:  
http://bhxb.buaa.edu.cn//CN/     ��     http://bhxb.buaa.edu.cn//CN/Y2010/V36/I9/1043
Copyright 2010 by �������պ����ѧѧ��