Search

Article

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

The Novel Block Encryption Scheme Based on Hybrid Chaotic Maps for the Wireless Sensor Networks

Tong Xiao-Jun Zuo Ke Wang Zhu

The Novel Block Encryption Scheme Based on Hybrid Chaotic Maps for the Wireless Sensor Networks

Tong Xiao-Jun, Zuo Ke, Wang Zhu
PDF
Get Citation
  • Traditional encryption schemes are not suitable for the Wireless sensor networks (WSNS) due to some intrinsic features of nodes in WSNS such as low energy, limited computation ability and storage resources. This paper presented a novel block encryption scheme based on hybrid chaotic maps dynamically and proposed an integer digital random method, and the Feistel network structure, which is a kind of fast, secure, low resource consumption and suitable for WSNS nodes encryption scheme. The experimental tests show the new encryption scheme has follows prefect performance: the large key space, very good diffusion and disrupt performance, strict avalanche effect, excellent statistical balance and fast encryption speed of the new scheme, and the encryption scheme passes the SP800-22 test; meanwhile, the analysis and testing of speed, time and storage space on the simulator platform shows this new encryption scheme is well able to hide the data information the node in WSNS.
    • Funds: Project supported by the National Natural Science Foundation of China (Grant No. 60973162), the Natural Science Foundation of Shandong Province of China (Grant No. ZR2009GM037), the Science and Technology of Shandong Province of China (Grant No. 2010GGX10132), the Key Natural Science Foundation of Shandong Province of China (Grant No. Z2006G01), the Scientific Research Foundation of Harbin Institute of Technology at Weihai, China (Grant No. HIT(WH) ZB200909), the Technology Research and Development Program of Weihai High-Tech Development Zone in Shandong Province of China (Grant No. 201025), and the Technology Research and Development Program of Weihai, China (Grant No. 2008011).
    [1]

    Tilak S, Ghazaleh N B, Heinzelman W 2002 Mob. Comput. Commun. Rev. 1 1

    [2]

    Sun L M, Li J Z, Chen Y, Zhu H S 2005 Wireless Sensor Networks (Beijing: Tsinghua University Press)p37(in Chinese)[孙利民, 李建中, 陈渝, 朱红松 2005 无线传感器网络 (北京:清华大学出版社)第37页]

    [3]

    Yang J Y 2007 Ph. D. Dissertation (Chongqing: Chongqing University)(in Chinese)[杨吉云 2007 博士学位论文 (重庆: 重庆大学)]

    [4]

    Wang S 2007 The Theory and Application for Wireless Sensor Networks (Beijing: Beihang University Press)pp7—9 (in Chinese)[ 王殊 2007 无线传感器网络的理论及应用 (北京:北京航空航天大学出版社)第7—9页]

    [5]

    Liu S D, Liang F M, Liu S K 2003 The Chaos and Fractal in Nature Science (Beijing: Beijing University Press)p26 (in Chinese)[刘式达, 梁福明, 刘式适 2003 自然科学中的混沌和分形 (北京:北京大学出版社)第26页]

    [6]

    Liao X F, Xiao D, Chen Y 2009 The Principle and Application of Chaotic Cryptography (Beijing: Science Press)p1 (in Chinese)[廖晓峰, 肖迪, 陈永 2009 混沌密码学原理及其应用 (北京:科学出版社)第1页]

    [7]

    Xu S J, Wang J Z 2008 Acta Phys. Sin. 57 37 (in Chinese)[徐淑奖, 王继志 2008 物理学报 57 37]

    [8]

    Xie K, Lei M, Feng Z J 2005 Acta Phys. Sin. 54 1267 (in Chinese)[ 谢鲲, 雷敏, 冯正进 2005 物理学报 54 1267].

    [9]

    Liu M H, Feng J C 2009 Acta Phys. Sin. 58 4457 (in Chinese)[刘明华, 冯久超 2009 物理学报 58 4457]

    [10]

    Li J B 2011 Acta Phys. Sin. 60 060508 (in Chinese)[李家标 2011 物理学报 60 060508]

    [11]

    Gu Q L, Gao T G 2009 Chin. Phys. B 18 84

    [12]

    Hu J F, Guo J B 2008 Acta Phys. Sin. 57 1477 (in Chinese)[胡进峰, 郭静波 2008 物理学报 57 1477]

    [13]

    Li W, Hao J H, Qi B 2008 Acta Phys. Sin. 57 1398 (in Chinese)[李伟, 郝建红, 祁兵 2008 物理学报 57 1398]

    [14]

    Ji J X, Qiu S S 2010 Acta Phys. Sin. 59 (in Chinese)[晋建秀, 丘水生 2010 物理学报 59 792]

    [15]

    Liu S B, Sun Q, Xu Z Q, Liu J S 2009 Chin. Phys. B 18 5219

    [16]

    Chen S 2006 Ph. D. Dissertation (Chongqing: Chongqing University)(in Chinese)[陈帅 2006 博士学位论文 (重庆:重庆大学)]

    [17]

    Tan Y J 2010 Ph. D. Dissertation (Chengdu: Electric and Scientific University)(in Chinese)[谭益军 2010 博士学位论文 (成都: 电子科技大学)]

    [18]

    Rivest R L 1995 Dr. Dobb’s Journal 20 146

    [19]

    Rivest R L 1995 Lecture Notes in Computer Science 1008 86

    [20]

    Yee W L, Jeroen D, Pieter H 2006 ACM Transactions on Sensor Networks (TOSN)2 65

    [21]

    Rivest R L 1994 Proceedings of the Second International Workshop on Fast Software Encryption (New York: Springer-Verlag)p86

    [22]

    Guido B, Luca B, Israel K Paolo M, Vincenzo P 2003 14th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP’03)Hague, Netherlands, 24–26 June, 2003 p423

    [23]

    Rivest R L Http://people.csail.mit.edu/rivest/RC6.pdf 1998-08-20

    [24]

    Sun S L 2004 Application Cryptography (Beijing: Tsinghua University press)p(23)(in Chinese)[孙淑玲 2004 应用密码学 (北京: 清华大学出版社)第23页]

    [25]

    Advanced Encrtption Standard.buchholz.hs-bremen.de/aes/AES. pdf 2006-02-20

    [26]

    Peng J , Liao X F 2006 J. Electron. Inform. 28 4 (in Chinese)[彭军, 廖晓峰 2006 电子与信息学报 28 4]

    [27]

    Mohammad P, Nevenko Z 2000 Comput. Secur. 19 467

    [28]

    Liu Y Z 2005 Cryptography and Network Security—Principle and Practice p135 (in Chinese)[刘玉珍 2005 密码编码学与网络安全——原理与实践 (电子工业出版社)第135页]

    [29]

    Shannon C E 1949 The Bell Syst. Tech. J. 28 656

    [30]

    Zhu M F, Zhang B D, Lv S W 2002 J. Commun. 23 10 [朱明富, 张宝东, 吕述望 2002 通信学报 23 10]

  • [1]

    Tilak S, Ghazaleh N B, Heinzelman W 2002 Mob. Comput. Commun. Rev. 1 1

    [2]

    Sun L M, Li J Z, Chen Y, Zhu H S 2005 Wireless Sensor Networks (Beijing: Tsinghua University Press)p37(in Chinese)[孙利民, 李建中, 陈渝, 朱红松 2005 无线传感器网络 (北京:清华大学出版社)第37页]

    [3]

    Yang J Y 2007 Ph. D. Dissertation (Chongqing: Chongqing University)(in Chinese)[杨吉云 2007 博士学位论文 (重庆: 重庆大学)]

    [4]

    Wang S 2007 The Theory and Application for Wireless Sensor Networks (Beijing: Beihang University Press)pp7—9 (in Chinese)[ 王殊 2007 无线传感器网络的理论及应用 (北京:北京航空航天大学出版社)第7—9页]

    [5]

    Liu S D, Liang F M, Liu S K 2003 The Chaos and Fractal in Nature Science (Beijing: Beijing University Press)p26 (in Chinese)[刘式达, 梁福明, 刘式适 2003 自然科学中的混沌和分形 (北京:北京大学出版社)第26页]

    [6]

    Liao X F, Xiao D, Chen Y 2009 The Principle and Application of Chaotic Cryptography (Beijing: Science Press)p1 (in Chinese)[廖晓峰, 肖迪, 陈永 2009 混沌密码学原理及其应用 (北京:科学出版社)第1页]

    [7]

    Xu S J, Wang J Z 2008 Acta Phys. Sin. 57 37 (in Chinese)[徐淑奖, 王继志 2008 物理学报 57 37]

    [8]

    Xie K, Lei M, Feng Z J 2005 Acta Phys. Sin. 54 1267 (in Chinese)[ 谢鲲, 雷敏, 冯正进 2005 物理学报 54 1267].

    [9]

    Liu M H, Feng J C 2009 Acta Phys. Sin. 58 4457 (in Chinese)[刘明华, 冯久超 2009 物理学报 58 4457]

    [10]

    Li J B 2011 Acta Phys. Sin. 60 060508 (in Chinese)[李家标 2011 物理学报 60 060508]

    [11]

    Gu Q L, Gao T G 2009 Chin. Phys. B 18 84

    [12]

    Hu J F, Guo J B 2008 Acta Phys. Sin. 57 1477 (in Chinese)[胡进峰, 郭静波 2008 物理学报 57 1477]

    [13]

    Li W, Hao J H, Qi B 2008 Acta Phys. Sin. 57 1398 (in Chinese)[李伟, 郝建红, 祁兵 2008 物理学报 57 1398]

    [14]

    Ji J X, Qiu S S 2010 Acta Phys. Sin. 59 (in Chinese)[晋建秀, 丘水生 2010 物理学报 59 792]

    [15]

    Liu S B, Sun Q, Xu Z Q, Liu J S 2009 Chin. Phys. B 18 5219

    [16]

    Chen S 2006 Ph. D. Dissertation (Chongqing: Chongqing University)(in Chinese)[陈帅 2006 博士学位论文 (重庆:重庆大学)]

    [17]

    Tan Y J 2010 Ph. D. Dissertation (Chengdu: Electric and Scientific University)(in Chinese)[谭益军 2010 博士学位论文 (成都: 电子科技大学)]

    [18]

    Rivest R L 1995 Dr. Dobb’s Journal 20 146

    [19]

    Rivest R L 1995 Lecture Notes in Computer Science 1008 86

    [20]

    Yee W L, Jeroen D, Pieter H 2006 ACM Transactions on Sensor Networks (TOSN)2 65

    [21]

    Rivest R L 1994 Proceedings of the Second International Workshop on Fast Software Encryption (New York: Springer-Verlag)p86

    [22]

    Guido B, Luca B, Israel K Paolo M, Vincenzo P 2003 14th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP’03)Hague, Netherlands, 24–26 June, 2003 p423

    [23]

    Rivest R L Http://people.csail.mit.edu/rivest/RC6.pdf 1998-08-20

    [24]

    Sun S L 2004 Application Cryptography (Beijing: Tsinghua University press)p(23)(in Chinese)[孙淑玲 2004 应用密码学 (北京: 清华大学出版社)第23页]

    [25]

    Advanced Encrtption Standard.buchholz.hs-bremen.de/aes/AES. pdf 2006-02-20

    [26]

    Peng J , Liao X F 2006 J. Electron. Inform. 28 4 (in Chinese)[彭军, 廖晓峰 2006 电子与信息学报 28 4]

    [27]

    Mohammad P, Nevenko Z 2000 Comput. Secur. 19 467

    [28]

    Liu Y Z 2005 Cryptography and Network Security—Principle and Practice p135 (in Chinese)[刘玉珍 2005 密码编码学与网络安全——原理与实践 (电子工业出版社)第135页]

    [29]

    Shannon C E 1949 The Bell Syst. Tech. J. 28 656

    [30]

    Zhu M F, Zhang B D, Lv S W 2002 J. Commun. 23 10 [朱明富, 张宝东, 吕述望 2002 通信学报 23 10]

  • [1] Zhuang Zhi-Ben, Li Jun, Liu Jing-Yi, Chen Shi-Qiang. Image encryption algorithm based on new five-dimensional multi-ring multi-wing hyperchaotic system. Acta Physica Sinica, 2020, 69(4): 040502. doi: 10.7498/aps.69.20191342
    [2] Li Chuang, Li Wei-Wei, Cai Li, Xie Dan, Liu Bao-Jun, Xiang Lan, Yang Xiao-Kuo, Dong Dan-Na, Liu Jia-Hao, Chen Ya-Bo. Flexible nitrogen dioxide gas sensor based on reduced graphene oxide sensing material using silver nanowire electrode. Acta Physica Sinica, 2020, 69(5): 058101. doi: 10.7498/aps.69.20191390
    [3] Hu Yao-Hua, Liu Yan, Mu Ge, Qin Qi, Tan Zhong-Wei, Wang Mu-Guang, Yan Feng-Ping. Application of compressive sensing based on multimode fiber specklegram in optical image encryption. Acta Physica Sinica, 2020, 69(3): 034203. doi: 10.7498/aps.69.20191143
    [4] Simulation of the nonlinear cahn-hilliard equation based onthe local refinement pure meshless method. Acta Physica Sinica, 2020, (): . doi: 10.7498/aps.69.20191829
    [5] Internal dynamic detection of soliton molecules in a Ti: sapphire femtosecond laser. Acta Physica Sinica, 2020, (): . doi: 10.7498/aps.69.20191989
    [6] Research on few-mode PAM regenerator based on nonlinear optical fiber loop mirror. Acta Physica Sinica, 2020, (): . doi: 10.7498/aps.69.20191858
    [7] Zhang Ji-Ye, Zhang Jian-Wei, Zeng Yu-Gang, Zhang Jun, Ning Yong-Qiang, Zhang Xing, Qin Li, Liu Yun, Wang Li-Jun. Design of gain region of high-power vertical external cavity surface emitting semiconductor laser and its fabrication. Acta Physica Sinica, 2020, 69(5): 054204. doi: 10.7498/aps.69.20191787
    [8] Zhang Zhan-Gang, Lei Zhi-Feng, Tong Teng, Li Xiao-Hui, Wang Song-Lin, Liang Tian-Jiao, Xi Kai, Peng Chao, He Yu-Juan, Huang Yun, En Yun-Fei. Comparison of neutron induced single event upsets in 14 nm FinFET and 65 nm planar static random access memory devices. Acta Physica Sinica, 2020, 69(5): 056101. doi: 10.7498/aps.69.20191209
  • Citation:
Metrics
  • Abstract views:  1649
  • PDF Downloads:  656
  • Cited By: 0
Publishing process
  • Received Date:  06 May 2011
  • Accepted Date:  09 June 2011
  • Published Online:  15 March 2012

The Novel Block Encryption Scheme Based on Hybrid Chaotic Maps for the Wireless Sensor Networks

  • 1. School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209, China
Fund Project:  Project supported by the National Natural Science Foundation of China (Grant No. 60973162), the Natural Science Foundation of Shandong Province of China (Grant No. ZR2009GM037), the Science and Technology of Shandong Province of China (Grant No. 2010GGX10132), the Key Natural Science Foundation of Shandong Province of China (Grant No. Z2006G01), the Scientific Research Foundation of Harbin Institute of Technology at Weihai, China (Grant No. HIT(WH) ZB200909), the Technology Research and Development Program of Weihai High-Tech Development Zone in Shandong Province of China (Grant No. 201025), and the Technology Research and Development Program of Weihai, China (Grant No. 2008011).

Abstract: Traditional encryption schemes are not suitable for the Wireless sensor networks (WSNS) due to some intrinsic features of nodes in WSNS such as low energy, limited computation ability and storage resources. This paper presented a novel block encryption scheme based on hybrid chaotic maps dynamically and proposed an integer digital random method, and the Feistel network structure, which is a kind of fast, secure, low resource consumption and suitable for WSNS nodes encryption scheme. The experimental tests show the new encryption scheme has follows prefect performance: the large key space, very good diffusion and disrupt performance, strict avalanche effect, excellent statistical balance and fast encryption speed of the new scheme, and the encryption scheme passes the SP800-22 test; meanwhile, the analysis and testing of speed, time and storage space on the simulator platform shows this new encryption scheme is well able to hide the data information the node in WSNS.

Reference (30)

Catalog

    /

    返回文章
    返回