无线传感器网络中使用dlc实现对称密钥

N. Singla, M. Tripathy
{"title":"无线传感器网络中使用dlc实现对称密钥","authors":"N. Singla, M. Tripathy","doi":"10.1109/ACCT.2012.65","DOIUrl":null,"url":null,"abstract":"In the design of WSN protocols the harsh environments and the existence of threats demand more careful security considerations. Cryptography is the art of achieving security by encoding messages to keep the information non-readable. Cryptography actually is a mathematical scrambling and unscrambling of data to achieve, Confidentiality (Readable only to sender and receiver), Integrity (not modified by any one to integrity of message), Availability (sender can't refuse the claim of not sending), and Entity authentication. While sending or receiving the data, special keys are used to encrypt/decrypt data to verify the original contents. This key makes the process of cryptography secure. There are two approaches for the generation of encryption/decryption keys i.e. software and hardware. The purpose of this paper is to generate encryption key using hardware technique. To design electronics circuit basic concept is derived from encoding and decoding of data via four different channels at different times. Selections of channels will be guided by timer and decoder circuits. As in the defense there are different hierarchy levels and they need secure communication. The purpose of this paper is to generate the key codes using electronic circuits to make the data more secure. The technique used in this paper is more secure then discussed in prior papers.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Implementation of Symmetric Key Using Dlcs for Wireless Sensor Network\",\"authors\":\"N. Singla, M. Tripathy\",\"doi\":\"10.1109/ACCT.2012.65\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the design of WSN protocols the harsh environments and the existence of threats demand more careful security considerations. Cryptography is the art of achieving security by encoding messages to keep the information non-readable. Cryptography actually is a mathematical scrambling and unscrambling of data to achieve, Confidentiality (Readable only to sender and receiver), Integrity (not modified by any one to integrity of message), Availability (sender can't refuse the claim of not sending), and Entity authentication. While sending or receiving the data, special keys are used to encrypt/decrypt data to verify the original contents. This key makes the process of cryptography secure. There are two approaches for the generation of encryption/decryption keys i.e. software and hardware. The purpose of this paper is to generate encryption key using hardware technique. To design electronics circuit basic concept is derived from encoding and decoding of data via four different channels at different times. Selections of channels will be guided by timer and decoder circuits. As in the defense there are different hierarchy levels and they need secure communication. The purpose of this paper is to generate the key codes using electronic circuits to make the data more secure. The technique used in this paper is more secure then discussed in prior papers.\",\"PeriodicalId\":396313,\"journal\":{\"name\":\"2012 Second International Conference on Advanced Computing & Communication Technologies\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-01-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Second International Conference on Advanced Computing & Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACCT.2012.65\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Second International Conference on Advanced Computing & Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCT.2012.65","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在无线传感器网络协议的设计中,恶劣的环境和威胁的存在需要更多的安全考虑。密码学是一门通过对消息进行编码以保持信息不可读来实现安全性的艺术。密码学实际上是对数据进行数学加扰和解扰来实现的,保密性(仅对发送方和接收方可读)、完整性(任何人都不能修改消息的完整性)、可用性(发送方不能拒绝不发送的声明)和实体认证。在发送或接收数据时,使用特殊的密钥对数据进行加密/解密,以验证原始内容。这个密钥使加密过程安全。生成加密/解密密钥有两种方法,即软件和硬件。本文的目的是利用硬件技术生成加密密钥。设计电子电路的基本概念是在不同的时间通过四个不同的信道对数据进行编码和解码。通道的选择将由定时器和解码器电路引导。在防御中,有不同的层次结构,它们需要安全的通信。本文的目的是利用电子电路生成密钥码,使数据更加安全。本文中使用的技术比以前的论文中讨论的更安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Implementation of Symmetric Key Using Dlcs for Wireless Sensor Network
In the design of WSN protocols the harsh environments and the existence of threats demand more careful security considerations. Cryptography is the art of achieving security by encoding messages to keep the information non-readable. Cryptography actually is a mathematical scrambling and unscrambling of data to achieve, Confidentiality (Readable only to sender and receiver), Integrity (not modified by any one to integrity of message), Availability (sender can't refuse the claim of not sending), and Entity authentication. While sending or receiving the data, special keys are used to encrypt/decrypt data to verify the original contents. This key makes the process of cryptography secure. There are two approaches for the generation of encryption/decryption keys i.e. software and hardware. The purpose of this paper is to generate encryption key using hardware technique. To design electronics circuit basic concept is derived from encoding and decoding of data via four different channels at different times. Selections of channels will be guided by timer and decoder circuits. As in the defense there are different hierarchy levels and they need secure communication. The purpose of this paper is to generate the key codes using electronic circuits to make the data more secure. The technique used in this paper is more secure then discussed in prior papers.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信