RESEARCH ON PRIVACY DATA SECURITY PROTECTION IN SENSOR NETWORKS USING ENCRYPTION ALGORITHMS

被引:0
|
作者
Yao, Yunxia [1 ]
Peng, Renjie [2 ]
Mi, Wenli [1 ]
机构
[1] Longdong Univ, Sch Math & Informat Engn, Qingyang 745000, Gansu, Peoples R China
[2] Longdong Univ, Sch Intelligent Mfg, Qingyang 745000, Gansu, Peoples R China
关键词
encryption algorithm; sensor network; data security; chaotic mapping; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper briefly introduces wireless sensor networks (WSNs) and proposes an enhancement to a block encryption algorithm using chaotic mapping principles. The proposed encryption algorithm was tested on an established WSN platform in a simulation experiment, and a comparative analysis was conducted with two encryption algorithms, advanced encryption standard (AES) and data encryption standard (DES). The results indicated that, as the volume of encrypted data grew, the encryption time for all three algorithms exhibited an upward trend, the 0-1 balance degree of the ciphertext decreased, and the information entropy increased. Specifically, for a given size of encrypted data, the optimized encryption algorithm demonstrated the shortest encryption time, the smallest 0-1 balance degree in the ciphertext, and the highest information entropy, closely approaching the ideal value.
引用
收藏
页码:25 / 34
页数:10
相关论文
共 50 条
  • [1] RESEARCH ON PRIVACY DATA SECURITY PROTECTION IN SENSOR NETWORKS USING ENCRYPTION ALGORITHMS
    Yao, Yunxia
    Peng, Renjie
    Mi, Wenli
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2024, 86 (03): : 25 - 34
  • [2] Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
    Mohammadi, A.
    Hamidi, H.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2018, 31 (08): : 1267 - 1273
  • [3] Security and Privacy Protection in Visual Sensor Networks: A Survey
    Winkler, Thomas
    Rinner, Bernhard
    ACM COMPUTING SURVEYS, 2014, 47 (01)
  • [4] Attribute-Based Encryption Method for Data Privacy Security Protection
    Li, Ziqian
    He, Yeshen
    Zhang, Yiying
    Li, Siwei
    Wang, Cong
    Zhang, Xiankun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 458 - 467
  • [5] Privacy Protection and Security for Medical Images Using Homomorphic Encryption Based Reversible Data Hiding
    Liu, Jianyi
    Zhao, Kaifeng
    Zhang, Ru
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 27 - 28
  • [6] Research on the Security Protection of Network Communication Data Using DES Encryption Algorithm
    Wang, Tao
    Wang, Jia
    International Journal of Network Security, 2022, 24 (04) : 741 - 746
  • [7] Data Privacy Protection Solution for Ubiquitous Sensor Networks
    Wang, Jin
    Kim, Ho-Chan
    Tian, Wei
    Ji, Sal
    Kinn, Jeong-Uk
    SENSOR LETTERS, 2013, 11 (02) : 384 - 387
  • [8] CLOUD COMPUTING DATA SECURITY USING ENCRYPTION ALGORITHMS
    Rithvik, Kumar
    Kaur, Simran
    Sejwal, Shilpa
    Narwal, Priti
    Jain, Prateek
    IIOAB JOURNAL, 2019, 10 (02) : 75 - 82
  • [9] Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data
    Zhang H.
    Li P.
    Journal of Cyber Security and Mobility, 2023, 12 (06): : 845 - 868
  • [10] Big data security and privacy protection model based on image encryption algorithm
    Hua, Binjie
    Wang, Zhe
    Meng, Junying
    Xi, HaiYan
    Qi, RuiLi
    SOFT COMPUTING, 2023,