Confidential Communication Through Chaos Encryption in Wireless Sensor Network

来源 :Journal of China University of Mining & Technology | 被引量 : 0次 | 上传用户:Dutch_deamer
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation,the byte block was encrypted through a Feistel structure in multiple turns and afterwards replaced again. The child keys are the composite sequence of discrete chaos and linear congruence sequences. Both the plain text and cipher text are of 8 bits. The number of keys is alterable. A nonlinear encryption function in the Feistel structure with chaos was constructed. The cipher algorithm was realized in the Micaz node,and the confidential communication experiment in wireless sensor network was completed success-fully. Additional ROM memory required for the cipher algorithm is 4144 bytes and an additional RAM memory 61 bytes. The cipher algorithm is nonlinear chaos and the Feistel structure holds the best of the RC6,DES and SKIPJACK cipher algorithms.The result shows that the algorithm needs a little memory and is safe at a high level. A new byte block cipher algorithm with discrete chaos and Feistel structure has been studied for confidential communication in wireless sensor network to improve security. After permutation, the byte block was encrypted through a Feistel structure in multiple turns and afterwards replaced again. The child keys are the composite sequence of discrete chaos and linear congruence sequences. Both the plain text and cipher text are of 8 bits. The number of keys is alterable. A nonlinear encryption function in the Feistel structure with chaos was constructed. The cipher algorithm was realized in the Mickey node, and the confidential communication experiment in wireless sensor network was completed success-fully. Additional ROM memory required for the cipher algorithm is 4144 bytes and an additional RAM memory 61 bytes. The cipher algorithm is nonlinear chaos and the Feistel structure holds the best of the RC6, DES and SKIPJACK cipher algorithms. The result shows that the algorithm needs a little m emory and is safe at a high level.
其他文献
近年来,国务院国资委陆续出台了系列指引及实施意见,指导中央企业开展全面风险管理、内部控制、合规管理等工作.电网企业贯彻国资委要求,持续开展相关探索与实践,但随着各个
期刊
森林是我国重要的自然资源,对人类生活发展具有直接影响.近年来,随着我国工业化生产水平的不断提升,对生态环境的破坏较为严重,森林资源也呈逐年下降趋势.林业建设能够扩大森
  本文结合近年来国外发表的有关针刺治疗偏头痛的高质量循证医学证据,并结合笔者所从事的针刺治疗偏头痛临床体会,提出了针刺治疗偏头痛试验设计中需要注意的问题和处理方法
电厂经济作为我国经济的一部分,是较为关键的一项,其对人民日常生活与城市建设都有着巨大的影响.基于此,本文重点分析了电厂隐患的由来和表现,主要是:管理意识淡薄、素质较低
  本文通过大耳白兔实验得知脑震荡后齿突均发生移位,且延髓下部及上颈髓水肿较明显,频度亦高,说明脑外伤均伴发颈外伤。枕寰枢椎的解剖位置改变是脑艇荡的主要发病机制,PCS的
近年来,人类活动加剧了生态环境的破坏,为了缓解生态危机,人们逐步意识到林业在环境保护与生态恢复方面的重要作用,因此积极开展各种植树造林工作.但是,盲目的林业规划与造林
任哲1983年生于山东淄博。2005年毕业于中国人民大学艺术学院获学士学位。现任职于中国美术馆展览部。中国博物馆学会会员。 Ren Zhe was born in Shandong Zibo in 1983. 2
  将有限的测试资源有效用于软件可靠性测试中具有十分重要的意义。传统方法生成的测试用例中存在大量冗余信息,测试效率低下。本文首先通过引入Markov使用模型生成测试用例
2008年仲夏,时值新疆好家乡超市有限公司10周年庆典会上,董事长许平这样诠释和追忆公司所走过的艰辛历程和收获的累累硕果:“10年前的今天,一家200多平方米的小型超市开张营业了,我们带着一个目标,要做乌鲁木齐最好的超市,好家乡开始了艰难的起步。回想10年前的诺言,今天,我们可以自豪地说,我们做到了。”  10载弹指一挥,10载春华秋实。通过10年的学习和努力,新疆本土零售企业的“好家乡”已开设大
在当前时代背景下,新媒体的发展速度越来越快,公司营销工作逐步展现出了多方面特点。为了能够顺应时代的要求,公司在制定营销策略的时候,理应从整体角度出发,全面分析,以此促使自身