Charging wireless sensor network security technology based on encryption algorithms and dynamic model

被引:0
|
作者
Li, Yuanming [1 ,2 ]
Guo, Wei [1 ,2 ]
Meng, Xuejun [1 ,2 ]
Xia, Wen [1 ,2 ]
机构
[1] State Key Lab Astronaut Dynam, Xian 710043, Shaanxi, Peoples R China
[2] China Xian Satellite Control Ctr, Xian, Shaanxi, Peoples R China
关键词
Wireless network; encryption algorithm; dynamic security model; network security;
D O I
10.1177/1550147720901999
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. The purpose of this article is to solve the existing security problems and study the operation process of RC4 and Advanced Encryption Standard algorithms, and the improvement scheme is put forward. This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. Devices accessing the network use 802.1x authentication method and distribute and set security status values for each device, the authentication server uses Remote Authentication Dial in User Service. This article uses the method of virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected. In this article, the structure and strategy of Remote Authentication Dial in User Service are changed, in order to ensure the high security of wireless network equipment in the connection process. In the testing phase of this article, we have tested the model in detail several times. Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Security technology of a wireless sensor network based on chaotic encryption
    Hu, Yuxiang
    [J]. ENERGY SCIENCE AND APPLIED TECHNOLOGY (ESAT 2016), 2016, : 623 - 627
  • [2] Wireless Sensor Network Technology Based on Security Trust Evaluation Model
    Zhu, Jinghua
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (04) : 211 - 226
  • [3] Wireless Sensor Network Security Based on Improved Identity Encryption
    Zhou, Hao
    Bi, Haochang
    [J]. SCIENTIFIC PROGRAMMING, 2022, 2022
  • [4] A Comparative Study of Encryption Algorithms in Wireless Sensor Network
    Xi, Zonghu
    Li, Li
    Shi, Guozhen
    Wang, Shuaibing
    [J]. WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 : 1087 - 1097
  • [5] Intelligent Security System based on Wireless Sensor Network Technology
    Liu Shanshan
    Wang Peng
    Wang Changyong
    Chang Qiang
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 157 - 159
  • [6] Overview of Wireless Sensor Network Security Technology
    Zeng, Zili
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 454 - 457
  • [7] Enhanced Encryption Model For Sensor Data in Wireless Sensor Network
    Vangala, Anusha
    Parwekar, Pritee
    [J]. 2017 20TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2017, : 16 - 21
  • [8] Research of security routing technology in wireless sensor network
    Wu, Jixiang
    [J]. Sensors and Transducers, 2013, 23 (SPEC.ISSUE): : 152 - 156
  • [9] Location-based data encryption for wireless sensor network using dynamic keys
    Han-Yu Lin
    [J]. Wireless Networks, 2015, 21 : 2649 - 2656
  • [10] Location-based data encryption for wireless sensor network using dynamic keys
    Lin, Han-Yu
    [J]. WIRELESS NETWORKS, 2015, 21 (08) : 2649 - 2656