{"title":"无线传感器网络中基于时间戳的AES加密算法研究","authors":"Zumin Wang, Boxiao Yu, Bingnan Pei, Lei Zhang","doi":"10.1109/ITCA52113.2020.00010","DOIUrl":null,"url":null,"abstract":"This paper mainly studies the security of data link layer in wireless sensor network (WSN), and proposes AES-128 encryption scheme based on time synchronization for data link layer data. In this scheme, AES-128 algorithm is combined with the time stamp in the process of key expansion to encrypt the data in the data link layer. At the same time of dynamic updating and synchronization of the key, the extraction and synchronization of timestamp are released. When sending broadcast packets, timestamp is used to generate time-related key to realize the security update and synchronization of the key. Simulation results show that, compared with other traditional algorithms, this scheme is more suitable for solving the potential threat from source node to destination node.","PeriodicalId":103309,"journal":{"name":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research on AES encryption algorithm based on timestamp in Wireless Sensor Networks\",\"authors\":\"Zumin Wang, Boxiao Yu, Bingnan Pei, Lei Zhang\",\"doi\":\"10.1109/ITCA52113.2020.00010\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper mainly studies the security of data link layer in wireless sensor network (WSN), and proposes AES-128 encryption scheme based on time synchronization for data link layer data. In this scheme, AES-128 algorithm is combined with the time stamp in the process of key expansion to encrypt the data in the data link layer. At the same time of dynamic updating and synchronization of the key, the extraction and synchronization of timestamp are released. When sending broadcast packets, timestamp is used to generate time-related key to realize the security update and synchronization of the key. Simulation results show that, compared with other traditional algorithms, this scheme is more suitable for solving the potential threat from source node to destination node.\",\"PeriodicalId\":103309,\"journal\":{\"name\":\"2020 2nd International Conference on Information Technology and Computer Application (ITCA)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 2nd International Conference on Information Technology and Computer Application (ITCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITCA52113.2020.00010\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd International Conference on Information Technology and Computer Application (ITCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCA52113.2020.00010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on AES encryption algorithm based on timestamp in Wireless Sensor Networks
This paper mainly studies the security of data link layer in wireless sensor network (WSN), and proposes AES-128 encryption scheme based on time synchronization for data link layer data. In this scheme, AES-128 algorithm is combined with the time stamp in the process of key expansion to encrypt the data in the data link layer. At the same time of dynamic updating and synchronization of the key, the extraction and synchronization of timestamp are released. When sending broadcast packets, timestamp is used to generate time-related key to realize the security update and synchronization of the key. Simulation results show that, compared with other traditional algorithms, this scheme is more suitable for solving the potential threat from source node to destination node.