Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chaos message authentication code realization method for wireless sensor network

A technology of message authentication codes and wireless sensors, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as low efficiency and poor security, and achieve broad application fields, enhanced security, and easy implementation Effect

Active Publication Date: 2012-07-18
ZHEJIANG UNIV OF TECH
View PDF1 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the shortcomings of poor security and low efficiency of the existing chaotic message authentication code implementation method, the present invention provides a chaotic message authentication code implementation method for wireless sensor networks with good security and high efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaos message authentication code realization method for wireless sensor network
  • Chaos message authentication code realization method for wireless sensor network
  • Chaos message authentication code realization method for wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with the accompanying drawings.

[0040] refer to Figure 1 to Figure 8 , a chaotic message authentication code implementation method for wireless sensor networks, the chaotic message authentication code implementation method includes the following steps:

[0041] 1) First, the Logistic chaotic mapping function based on integer calculation is used for wireless sensor nodes. The iterative formula of the Logistic chaotic mapping function is:

[0042] z n + 1 = z n 2 - z n 2 > > 6 - 1 - - - ( I - 10 )

[0043]Among them, z n =ax n +a, tak...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a chaos message authentication code realization method for a radio sensor network, which comprises the following steps: 1) firstly, adopting a Logistic chaotic mapping function calculated based on an integer type for a radio sensor node; 2) adopting a block encryption algorithm which has the dynamic Feistel structural characteristic and has a block length being 8 bits only; and 3) realizing a message authentication code of which the length is 32 bits based on the block encryption algorithm. The invention provides the chaos message authentication code realization method for the radio sensor network, which has the advantages of good safety and higher efficiency.

Description

technical field [0001] The invention relates to a method for realizing a chaotic message authentication code. Background technique [0002] The message authentication code is the Hash value of the message, and the key is the design of the Hash function. Hash function, also called hash function, is a special one-way function that can compress messages of any length into fixed-length message digests. At present, the common traditional Hash functions mainly include MD4, MD5, SHA1, etc. [0003] Because the iterative process of the digital chaotic system is not only sensitive to the initial conditions, but also has the property of a one-way function in a certain sense, so there have been many researches on chaotic Hash, including the construction method of one-way Hash function based on variable parameters. , in the process of chaotic iteration, this method uses the last iteration value and the currently processed plaintext message to continuously adjust the control parameters ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00
Inventor 陈铁明葛亮蔡家楣
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products