Font Size: a A A

Encryption Algorithm And Authentication Scheme Based On Chaotic Maps For Wireless Sensor Networks

Posted on:2021-01-09Degree:MasterType:Thesis
Country:ChinaCandidate:L Y YaoFull Text:PDF
GTID:2428330629952978Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
With the advent of the information age,people can receive and send data through various devices,which brings great convenience to their daily life.However,at the same time,information security problems also come one after another.Therefore,encryption technology has gradually touched people's attention.Chaotic systems possess the characteristics of being sensitive to initial values,ergodicity,and pseudo-randomness.These characteristics perfectly fit the characteristics of diffusion and confusion in encryption systems,so they are widely applied in the field of information security.In recent years,Wireless Sensor Network has been widely used,and its security problems also receive more and more attention from experts and scholars.Research in the field of Wireless Sensor Network information security is mainly divided into two categories: encryption algorithms and identity authentication schemes,which are used to ensure the security of data and the legitimacy of information sources,respectively.Although some schemes have been proposed for information security of Wireless Sensor Network,due to the limited resources of the Wireless Sensor Network nodes,it is impossible for them to perform high-precision and high-intensity calculations,so the effect of these encryption schemes is not very ideal.It is undoubtedly a promising research direction to apply chaotic systems to the Wireless Sensor Network information security field.The main work of this article is divided into the following four aspects:1.Firstly,background of this subject is introduced,including the basic concept of chaotic system,network structure and working principle of Wireless Sensor Network.Then the innovation and structure of the article are given.After that,the research status of Wireless Sensor Network information security field is presented,mainly including the research of encryption algorithm and identity authentication,and the shortcomings of these schemes are pointed out.Finally,improved schemes are given for these deficiencies.2.A new encryption algorithm based on hybrid chaotic maps for Wireless Sensor Network is proposed.The Logistic map and Cubic map are integrated to enlarge the range of the generated data and make the data easy to be processed.The two chaotic systems are mixed to improve the autocorrelation,and then the linear congruential generator is used for the mixed chaotic systems to expand the period of the generated data.Finally,the data generated by the hybrid chaotic system is used as the initial value to generate the round key,and the data is encrypted in the Feistel encryption framework.Compared with previous schemes,the encryption algorithm proposed in this paper has a greater improvement in the encryption length,the encryption length extends from 8-bit,16-bit to 32-bit,which reduces the risk of encrypted content being cracked.Performance test results show that the algorithm has better performance than other related algorithms in information entropy,statistical analysis,ciphertext randomness and so on.In addition,the algorithm has great advantages in running speed and memory consumption compared with other related algorithms,so this proposed algorithm is suitable for data encryption in Wireless Sensor Networks.3.An improved identity authentication scheme based on a single base station Wireless Sensor Network model is proposed.In order to solve the problem that the user's password is easy to be stolen in the original scheme,the user's password is encrypted by using the encryption algorithm proposed in the previous point,and then the encryption result and a random sequence are hashed to protect the user's password.Through method mentioned above,the hidden security risks in the original scheme are eliminated,and the use of encryption algorithms specifically applied to the wireless sensor network also reduces the workload of the node.The final security analysis and performance test results show that the scheme can resist most security attacks such as replay attack and denial of service attack.In addition,its running time is much shorter than other related schemes,which has higher efficiency.4.In view of the situation that the single base station model in the previous point may cause network performance degradation or even collapse due to too many nodes,the single base station model is optimized to a multiple-base-station model,and a Wireless Sensor Network identity authentication scheme based on multiple base stations is proposed.This scheme includes the authentication steps between the base station and the base station,which is the key and difficulty of the authentication scheme.The base stations communicate with each other through the session key generated during the pre-deployment phase to ensure the legitimacy of the base stations' identity.Security analysis and performance test results show that the authentication scheme can resist most security attacks,and runs faster than the authentication scheme based on single base station.
Keywords/Search Tags:Chaotic System, Information Security, Internet of Things, Wireless Sensor Network, Authentication
PDF Full Text Request
Related items