Font Size: a A A

Application Research On Improved Blowfish Encryption Algorithm In Wireless Sensor Network

Posted on:2014-01-10Degree:MasterType:Thesis
Country:ChinaCandidate:X Q CaoFull Text:PDF
GTID:2248330398477455Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
WSN (Wireless Sensor Networks) is a completely new technology to access and process information. It integrates several techniques such as computer network, sensor network, wireless and communications and so on. It has broadly application prospects in areas such as national defense, transport, medical care, agriculture. Security is a prerequisite in application. Furthermore WSN is frequently arranged in appalling conditions of unmanned, coupled with the nodes of the network computing, storage, power supply, capacity constraints. The existing security mechanism is no longer suitable while the network poses a serious security risk which gradually draws the attention of the experts all over the world. In view of this, this text raises the study of this subject.Firstly, this article describes characteristics of WSN, including the WSN network architectures, protocols, network security threats and existing security mechanisms. We also analyze the limitations of current security mechanisms. Secondly, we introduce Blowfish algorithm in detail, including its key initialization, the F function specific implementation, encryption and decryption implementation process. On this basis, we have an in-depth study of the algorithms. In connection with WSN node features such as limited memory space and computation ability. The algorithm is based on the CC2530on-chip system for improvement of Z-Stack. Finally giving an efficiently and useless RAM(Random Access Memory)space solution in the on-chip system. Last but not least, adopting the experimental data for comparative analysis of the performance of optimization algorithms. Application on the CC2530shows that Blowfish algorithm optimization in WSN nodes run efficiently and take up less RAM space. The scheme can also be applied to other embedded systems with small storage space.
Keywords/Search Tags:WSN, Network Security, Blowfish Algorithm, RAM Space, CC2530on-chip System
PDF Full Text Request
Related items