CN106533656B - A kind of key multilayer mixing method for encryption/decryption based on WSN - Google Patents

A kind of key multilayer mixing method for encryption/decryption based on WSN Download PDF

Info

Publication number
CN106533656B
CN106533656B CN201611031173.5A CN201611031173A CN106533656B CN 106533656 B CN106533656 B CN 106533656B CN 201611031173 A CN201611031173 A CN 201611031173A CN 106533656 B CN106533656 B CN 106533656B
Authority
CN
China
Prior art keywords
data
key
sequence
encryption
plaintext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611031173.5A
Other languages
Chinese (zh)
Other versions
CN106533656A (en
Inventor
林盛鑫
刘华珠
赵晓芳
陈雪芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan University of Technology
Original Assignee
Dongguan University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan University of Technology filed Critical Dongguan University of Technology
Priority to CN201611031173.5A priority Critical patent/CN106533656B/en
Publication of CN106533656A publication Critical patent/CN106533656A/en
Application granted granted Critical
Publication of CN106533656B publication Critical patent/CN106533656B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of, and the key multilayer based on WSN mixes method for encryption/decryption, the described method includes: clear data multilayer Hybrid Encryption sending step, using random isolation technics in plain text, Digital Envelope Technology and digital signature technology are sent again after carrying out multilayer Hybrid Encryption to the clear data for needing to send in WSN network;The ciphertext data received in WSN network are decrypted, to complete the reception of data in ciphertext data deciphering receiving step using random isolation technics, Digital Envelope Technology and digital signature technology in plain text.The present invention is by using binary pseudo-random sequence to separating in plain text, data are encrypted using Digital Envelope Technology and digital signature technology again, plaintext separation, symmetric cryptography and a variety of encryption systems such as public key encryption and digital signature are effectively fused together, the high efficiency and safety of data transmission are greatly improved.

Description

A kind of key multilayer mixing method for encryption/decryption based on WSN
Technical field
The present invention relates to a kind of network method for encryption/decryption more particularly to a kind of mixing of key multilayer plus/solution based on WSN Decryption method.
Background technique
Currently, with the fast development of technology of Internet of things and computer technology, nowadays wireless sensor network (Wireless Sensor Network, WSN) have been widely used for the intelligences such as smart home, agricultural, commercial and industrial, automatic field. Since the Node distribution of wireless sensor network is in complex environment, most sensor node is in open environment, It is faced with the threat of network security, the data transmitted in air are easy to be stolen by attacker, are likely to result in personal information, quotient Secret, property loss even personal safety of industry etc. threatens, and has severely impacted the development and application of WSN.
WSN is a kind of new network, but its sensor network nodes computing capability is low, memory space is small, and provides energy The battery capacity of amount is extremely limited, and feature and itself limitation cause it and conventional wireless network to exist in security algorithm research Many differences.Imitate traditional cordless communication network, the security algorithm in computer network, to the safe practice of WSN into Row further investigation, proposes the lightweight solutions of feasibility, is of great significance.It is an object of the invention to propose one kind Key multilayer based on WSN mixes method for encryption/decryption, to improve the safety of network among the nodes.
Summary of the invention
In order to overcome the deficiencies of the prior art and there are the problem of, the present invention provide it is a kind of based on WSN key multilayer mixing Method for encryption/decryption, this method separate clear data using binary pseudo-random sequence, then using Digital Envelope Technology with Digital signature technology carries out data transmission after encrypting to data again, will in plain text separation, symmetric cryptography and public key encryption with A variety of encryption systems such as digital signature are effectively fused together, and effectively increase Information Security.
The present invention is achieved by the following technical solutions: a kind of key multilayer mixing method for encryption/decryption based on WSN, Wherein, the WSN network is preferably based on the WSN network of the wireless sensor building of ZIGBEE technology, which comprises
Clear data multilayer Hybrid Encryption sending step: using random isolation technics in plain text, Digital Envelope Technology and number Word signature technology is sent again after carrying out multilayer Hybrid Encryption to the clear data for needing to send in WSN network;
Ciphertext data deciphering receiving step: to the ciphertext data received in WSN network, random separation skill in plain text is utilized Art, Digital Envelope Technology and digital signature technology are decrypted, to complete the reception of data.
Wherein, the clear data multilayer Hybrid Encryption sending step specifically includes:
S11, generation and clear data binary random sequences consistent in length;
S12, two-dimensional sequence is synthesized with one-dimensional index sequence using the binary random sequences;
S13, plaintext separation is carried out to clear data by the two-dimensional sequence, clear data is divided into the first plaintext and the Two in plain text;
S14, originating party public key and originating party private key are generated by ECC, and obtains public key disclosed in debit;
S15, HASH function operation is carried out in plain text to first, form eap-message digest, carry out digital label in conjunction with originating party private key Name forms signaling block;
S16, AES encryption is carried out to the first plaintext and second plaintext respectively, forms ciphertext blocks;
S17, AES key and debit's public key are subjected to ECC encryption, form key block;
S18, ECC encryption, formation sequence ciphertext blocks are carried out to the two-dimensional sequence by debit's public key;
S19, in conjunction with the signaling block, ciphertext blocks, key block and sequence ciphertext blocks, formed and send ciphertext, complete data It sends.
The ciphertext data deciphering receiving step specifically includes:
S21, the ciphertext data received are divided into signaling block, key block, ciphertext blocks and sequence ciphertext blocks;
S22, using originating party public key, authentication is carried out to signaling block, and obtain the eap-message digest in originating party digital signature;
S23, ECC decryption is carried out to key block using sending and receiving side's private key, obtains AES key;
S24, the AES key using acquisition carry out AES decryption to ciphertext blocks, obtain the first plaintext and second plaintext;
S25, obtained to step S24 first carry out HASH function operation in plain text, form eap-message digest;
S26, the eap-message digest obtained in step S22 and the step S25 eap-message digest formed are compared, if two message It makes a summary identical, authenticates success, enter step S27, otherwise authentification failure, and return step S21 is decrypted again;
S27, ECC decryption is carried out to sequence ciphertext blocks using debit's private key, obtains two-dimensional sequence;
S28, data recombination is carried out to the first plaintext and second plaintext B according to two-dimensional sequence, obtains clear data, completes number According to reception.
Preferably, in the step S11, the binary system stochastic ordering is generated using binary pseudo-random sequence generator Column.
Preferably, in the step S13 when separate to clear data the two-dimensional sequence in plain text, by stochastic ordering Plaintext corresponding to all positions on column for " 1 " will be corresponding to all positions of " 0 " in random sequence in plain text as first Plaintext as second plaintext.
Key multilayer provided by the invention based on WSN mixes method for encryption/decryption, for great deal of nodes in WSN network Between data transmission present in network security problem, by using binary pseudo-random sequence to separating in plain text, then Data are encrypted using Digital Envelope Technology and digital signature technology, will in plain text separation, symmetric cryptography and public key encryption with A variety of encryption systems such as digital signature are effectively fused together, and greatly improve the high efficiency and safety of data transmission.
Detailed description of the invention
Fig. 1 is the flow diagram that the Hybrid Encryption of clear data multilayer described in the embodiment of the present invention is sent.
Fig. 2 is the received flow diagram of ciphertext data deciphering described in the embodiment of the present invention.
Specific embodiment
For the ease of the understanding of those skilled in the art, the present invention is made below in conjunction with the drawings and specific embodiments further Detailed description.
A kind of key multilayer mixing method for encryption/decryption based on WSN, which comprises
Clear data multilayer Hybrid Encryption sending step: using random isolation technics in plain text, Digital Envelope Technology and number Word signature technology is sent again after carrying out multilayer Hybrid Encryption to the clear data for needing to send in WSN network;Ciphertext data It decrypts receiving step: to the ciphertext data received in WSN network, utilizing random isolation technics, Digital Envelope Technology in plain text It is decrypted with digital signature technology, to complete the reception of data.
Wherein, using when random isolation technics separate in plain text to clear data in plain text, using with clear data length The two-dimensional sequence conduct that identical binary pseudo-random sequence is synthesized with the one-dimensional index sequence for being responsible for record data home position The foundation of separation in plain text.Since the randomness of the two-dimensional sequence is good, the safety of data information can be effectively increased.Number label The effect of name technology is the private key encryption by summary info with sender's (originating party), sends recipient to together with former data and (receives Side).Recipient only uses the public key of sender that could decrypt encrypted summary info, then with HASH function to the original received Data generate a summary info, then compare with the summary info of decryption.If two summary infos are identical, illustrate the letter received Breath is completely, not modified in transmission process, otherwise illustrate that information is modified, therefore, in data transmission procedure, The integrality of information transmission is able to verify that using digital signature technology.Digital Envelope Technology is guaranteed by double layer encryption algorithm The safety of information encrypts clear data using the higher symmetric encryption scheme of encryption efficiency (AES encryption), and makes With being conducive to manage and distribute the public key cryptography scheme (ECC encryption) of key to carry out cryptographic operation to AES key, therefore, number is utilized Word envelope technology can effectively ensure that the safety that data are sent.
Method provided by the invention is described in further detail below:
As shown in Fig. 1, the clear data multilayer Hybrid Encryption sending step specifically includes:
S11, generation and clear data binary random sequences consistent in length;In the present embodiment, preferably by binary system Pseudo random sequence generator generates the binary random sequences;
S12, two-dimensional sequence is synthesized with one-dimensional index sequence using the binary random sequences;
S13, plaintext separation is carried out to clear data by the two-dimensional sequence, clear data is divided into the first plaintext and the Two in plain text;In the present embodiment, when separate to clear data the two-dimensional sequence in plain text, will be in random sequence " 1 " All positions corresponding to plaintext as first in plain text, will in random sequence for " 0 " all positions corresponding to plaintext make For second plaintext;
S14, originating party public key and originating party private key are generated by ECC, and obtains public key disclosed in debit;
S15, HASH function operation is carried out in plain text to first, form eap-message digest, carry out digital label in conjunction with originating party private key Name forms signaling block;
S16, AES encryption is carried out to the first plaintext and second plaintext respectively, forms ciphertext blocks;
S17, AES key and debit's public key are subjected to ECC encryption, form key block;
S18, ECC encryption, formation sequence ciphertext blocks are carried out to the two-dimensional sequence by debit's public key;
S19, in conjunction with the signaling block, ciphertext blocks, key block and sequence ciphertext blocks, formed and send ciphertext, complete data It sends.
Wherein, the binary pseudo-random sequence generator is preferably linear congruence random sequence generator (Linear Congruential Generator, LCG).The formula of the random sequence of the linear congruence random sequence generator is xi= (Axi-1+ C) mod (M), wherein M is mould (M>0), and A is coefficient (0<A<M), and C is increment (0≤C<M), x0For initial value (0 < =x0<M).Since parameter C, M, A directly affect the quality of pseudo random number generation, it is contemplated that the efficiency of WSN point section, this " Lewis-Goosman-Miller " minimum sandards are used in embodiment: taking A=16807, C=0 and M=231- 1, it is generated Period can reach maximum value.Using linear congruence random sequence generator, a kind of binary system stochastic ordering of good performance can produce Column, so as to effectively improve the safety of data information.
As shown in Fig. 2, the ciphertext data deciphering receiving step specifically includes:
S21, the ciphertext data received are divided into signaling block, key block, ciphertext blocks and sequence ciphertext blocks;
S22, using originating party public key, authentication is carried out to signaling block, and obtain the eap-message digest in originating party digital signature;
S23, ECC decryption is carried out to key block using sending and receiving side's private key, obtains AES key;
S24, the AES key using acquisition carry out AES decryption to ciphertext blocks, obtain the first plaintext and second plaintext;
S25, obtained to step S24 first carry out HASH function operation in plain text, form eap-message digest;
S26, the eap-message digest obtained in step S22 and the step S25 eap-message digest formed are compared, if two message It makes a summary identical, authenticates success, enter step S27, otherwise authentification failure, and return step S21 is decrypted again;
S27, ECC decryption is carried out to sequence ciphertext blocks using debit's private key, obtains two-dimensional sequence;
S28, data recombination is carried out to the first plaintext and second plaintext B according to two-dimensional sequence, obtains clear data, completes number According to reception.
Key multilayer provided in an embodiment of the present invention based on WSN mixes method for encryption/decryption, by using binary system puppet Random sequence encrypts data to separating in plain text, then using Digital Envelope Technology and digital signature technology, will be in plain text Separation, symmetric cryptography and a variety of encryption systems such as public key encryption and digital signature are effectively fused together, and are both effectively increased The high efficiency of data transmission so that energy consumption be effectively reduced, and greatly improves the safety of data transmission, so that effective guarantee is used The data information security at family, and effectively facilitate the development and application of WSN network.
Above-described embodiment is preferable implementation of the invention, is not limited to the present invention, is not departing from this hair Under the premise of bright inventive concept, it is any obviously replace it is within the scope of the present invention.

Claims (6)

1. a kind of key multilayer based on WSN mixes method for encryption/decryption, which is characterized in that the described method includes:
Clear data multilayer Hybrid Encryption sending step: using random isolation technics in plain text, Digital Envelope Technology and number label Name technology is sent again after carrying out multilayer Hybrid Encryption to the clear data for needing to send in WSN network;
Ciphertext data deciphering receiving step: to the ciphertext data received in WSN network, using random isolation technics in plain text, Digital Envelope Technology and digital signature technology are decrypted, to complete the reception of data;
The clear data multilayer Hybrid Encryption sending step specifically includes:
S11, generation and clear data binary random sequences consistent in length;
S12, two-dimensional sequence is synthesized with one-dimensional index sequence using the binary random sequences;
S13, plaintext separation is carried out to clear data by the two-dimensional sequence, clear data is divided into the first plaintext and second bright Text;
S14, originating party public key and originating party private key are generated by ECC, and obtains public key disclosed in debit;
S15, HASH function operation is carried out in plain text to first, form eap-message digest, be digitally signed in conjunction with originating party private key, shape At signaling block;
S16, AES encryption is carried out to the first plaintext and second plaintext respectively, forms ciphertext blocks;
S17, AES key and debit's public key are subjected to ECC encryption, form key block;
S18, ECC encryption, formation sequence ciphertext blocks are carried out to the two-dimensional sequence by debit's public key;
S19, in conjunction with the signaling block, ciphertext blocks, key block and sequence ciphertext blocks, formed and send ciphertext, completed data and send.
2. according to the method described in claim 1, it is characterized by: the ciphertext data deciphering receiving step specifically includes:
S21, the ciphertext data received are divided into signaling block, key block, ciphertext blocks and sequence ciphertext blocks;
S22, using originating party public key, authentication is carried out to signaling block, and obtain the eap-message digest in originating party digital signature;
S23, ECC decryption is carried out to key block using sending and receiving side's private key, obtains AES key;
S24, the AES key using acquisition carry out AES decryption to ciphertext blocks, obtain the first plaintext and second plaintext;
S25, obtained to step S24 first carry out HASH function operation in plain text, form eap-message digest;
S26, the eap-message digest obtained in step S22 and the step S25 eap-message digest formed are compared, if two eap-message digests It is identical, success is authenticated, enters step S27, otherwise authentification failure, and return step S21 is decrypted again;
S27, ECC decryption is carried out to sequence ciphertext blocks using debit's private key, obtains two-dimensional sequence;
S28, data are completed and are connect with second plaintext progress data recombination, acquisition clear data in plain text to first according to two-dimensional sequence It receives.
3. according to the method described in claim 2, it is characterized by: utilizing binary pseudo-random sequence life in the step S11 It grows up to be a useful person and generates the binary random sequences.
4. according to the method described in claim 3, it is characterized by: the binary pseudo-random sequence generator is linear congruence Random sequence generator.
5. according to the method described in claim 2, it is characterized by: in the step S13 by the two-dimensional sequence in plain text It will be plaintext corresponding to all positions of " 1 " in random sequence as the first plaintext when data separate in plain text, it will be random Plaintext corresponding to all positions in sequence for " 0 " is as second plaintext.
6. method described according to claim 1~any one of 5, it is characterised in that: the WSN network is based on ZIGBEE The WSN network of the wireless sensor building of technology.
CN201611031173.5A 2016-11-18 2016-11-18 A kind of key multilayer mixing method for encryption/decryption based on WSN Active CN106533656B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611031173.5A CN106533656B (en) 2016-11-18 2016-11-18 A kind of key multilayer mixing method for encryption/decryption based on WSN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611031173.5A CN106533656B (en) 2016-11-18 2016-11-18 A kind of key multilayer mixing method for encryption/decryption based on WSN

Publications (2)

Publication Number Publication Date
CN106533656A CN106533656A (en) 2017-03-22
CN106533656B true CN106533656B (en) 2019-08-23

Family

ID=58356100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611031173.5A Active CN106533656B (en) 2016-11-18 2016-11-18 A kind of key multilayer mixing method for encryption/decryption based on WSN

Country Status (1)

Country Link
CN (1) CN106533656B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181739B (en) * 2017-04-28 2021-02-26 深圳市航天无线通信技术有限公司 Data security interaction method and device
CN107466478B (en) * 2017-06-06 2020-09-29 香港应用科技研究院有限公司 Method and system for data exchange between Bluetooth low-power-consumption devices
CN107396351A (en) * 2017-08-24 2017-11-24 四川长虹电器股份有限公司 A kind of encipher-decipher method for strengthening zigbee network safety
CN108833343A (en) * 2018-04-28 2018-11-16 南京搜文信息技术有限公司 A kind of parallel encryption method that supporting big data and decryption method
CN109873700B (en) * 2019-01-16 2023-10-10 内蒙古惠强科技有限公司 Key generation method, device, computer readable storage medium and terminal equipment
CN110086818B (en) * 2019-05-05 2020-05-19 绍兴文理学院 Cloud file secure storage system and access control method
CN112601111B (en) * 2020-11-19 2023-03-14 西安诺瓦星云科技股份有限公司 Data processing method and device and data transmission system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223228A (en) * 2011-05-11 2011-10-19 北京航空航天大学 Method for designing AES (Advanced Encryption Standard) encryption chip based on FPGA (Field Programmable Gate Array) and embedded encryption system
CN103414842A (en) * 2013-08-02 2013-11-27 广州杰赛科技股份有限公司 Image data encryption method and system and image data decryption method and system
JP2015069192A (en) * 2013-10-01 2015-04-13 富士電機株式会社 Information processing device, and encryption method
US9020146B1 (en) * 2007-09-18 2015-04-28 Rockwell Collins, Inc. Algorithm agile programmable cryptographic processor
CN104735652A (en) * 2015-03-30 2015-06-24 东北大学 Chaotic encryption method suitable for wireless sensor network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9020146B1 (en) * 2007-09-18 2015-04-28 Rockwell Collins, Inc. Algorithm agile programmable cryptographic processor
CN102223228A (en) * 2011-05-11 2011-10-19 北京航空航天大学 Method for designing AES (Advanced Encryption Standard) encryption chip based on FPGA (Field Programmable Gate Array) and embedded encryption system
CN103414842A (en) * 2013-08-02 2013-11-27 广州杰赛科技股份有限公司 Image data encryption method and system and image data decryption method and system
JP2015069192A (en) * 2013-10-01 2015-04-13 富士電機株式会社 Information processing device, and encryption method
CN104735652A (en) * 2015-03-30 2015-06-24 东北大学 Chaotic encryption method suitable for wireless sensor network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于WSN的ECC与AES混合加密算法研究;王亮;《中国优秀硕士学位论文全文数据库信息科技辑》;20150715;第32-33页

Also Published As

Publication number Publication date
CN106533656A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
US9172529B2 (en) Hybrid encryption schemes
CN101980558B (en) Method for encryption authentication on Ad hoc network transmission layer protocol
CN105024994A (en) Secure certificateless hybrid signcryption method without pairing
CN102025505A (en) Advanced encryption standard (AES) algorithm-based encryption/decryption method and device
CN103684794A (en) Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms
Hayouni et al. A survey on encryption schemes in wireless sensor networks
CN102594551B (en) Method for reliable statistics of privacy data on radio frequency identification (RFID) tag
CN113285959A (en) Mail encryption method, decryption method and encryption and decryption system
CN100594691C (en) Data transmission encryption method of MANET network
CN109873699A (en) A kind of voidable identity public key encryption method
CN104333860A (en) ZigBee security network with public key cryptography system NTRU (number theory research unit)
CN110245511A (en) A kind of file encryption storage method based on block chain
CN112055022A (en) High-efficiency and high-security network file transmission double encryption method
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN103167494A (en) Information sending method and information sending system
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN103297230A (en) Information encryption and decryption method, device and system
CN110519226B (en) Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate
CN102958021A (en) Short message encryption and decryption communication system and communication method thereof
CN103023646A (en) Signcryption method capable of gathering signcryption texts
CN101882996A (en) Information encryption and decryption method in distributed system based on identity
CN101964039B (en) Encryption protection method and system of copyright object
CN104113543B (en) A kind of message discrimination method based on block cipher

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20170322

Assignee: Dongguan Spider IoT Technology Co.,Ltd.

Assignor: DONGGUAN University OF TECHNOLOGY

Contract record no.: X2022980026002

Denomination of invention: A WSN Based Key Multilayer Hybrid Encryption/Decryption Method

Granted publication date: 20190823

License type: Common License

Record date: 20221213

Application publication date: 20170322

Assignee: Guangdong Hansheng Information Technology Co.,Ltd.

Assignor: DONGGUAN University OF TECHNOLOGY

Contract record no.: X2022440000320

Denomination of invention: A WSN Based Key Multilayer Hybrid Encryption/Decryption Method

Granted publication date: 20190823

License type: Common License

Record date: 20221214

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20170322

Assignee: Yangjiang taiyijiehua Technology Co.,Ltd.

Assignor: DONGGUAN University OF TECHNOLOGY

Contract record no.: X2023990000090

Denomination of invention: A Multi-layer Hybrid Encryption/Decryption Method of Key Based on WSN

Granted publication date: 20190823

License type: Common License

Record date: 20230112