首页 | 官方网站   微博 | 高级检索  
     

基于忆阻混沌的安全增强算法及其在物联网的应用
引用本文:曹华珍,韦 斌,隋 宇,陈亚彬.基于忆阻混沌的安全增强算法及其在物联网的应用[J].计算技术与自动化,2022(3):176-182.
作者姓名:曹华珍  韦 斌  隋 宇  陈亚彬
作者单位:(广东电网公司规划研究中心,广东 广州 510600)
摘    要:随着工业物联网的蓬勃发展,物联网信息交互模式下的信息安全问题逐渐成为讨论热点,现有的安全增强技术存在安全性不足、实用性欠缺、技术难以实物化等问题。针对此类情况,提出了一种基于忆阻超混沌系统的加密算法,并在物联网平台实现。首先对原始图像信息进行初处理,将原始图像矩阵以二值化矩阵存储;接着用已定参数来生成混沌序列,并选取部...

关 键 词:混沌加密  电网技术  安全通信  物联网

Security Enhancement Algorithm Based on Memristive Chaos and Its Application in the Internet of Things
CAO Hua-zhen,WEI Bin,SUI Yu,CHEN Ya-bing.Security Enhancement Algorithm Based on Memristive Chaos and Its Application in the Internet of Things[J].Computing Technology and Automation,2022(3):176-182.
Authors:CAO Hua-zhen  WEI Bin  SUI Yu  CHEN Ya-bing
Affiliation:(Guangdong Power Grid Corporation Planning Research Center, Guangzhou,Guangdong 510600, China)
Abstract:With the vigorous development of the industrial Internet of Things, the information security problem under the information interaction mode of the Internet of Things has gradually become a hot topic. The existing security enhancement technology has some problems, such as lack of security and practicability, difficulty in materialization and so on. In view of this situation, an encryption algorithm based on memristor hyperchaos system is proposed and implemented on the platform of Internet of Things. Firstly, the original image information is processed, and the original image matrix is stored as a binary matrix. Secondly, the chaotic sequence is generated by using the determined parameters, and some values are selected to assume the key function. Thirdly, the key is normalized, and the high randomness of the sequence generated by the hyperchaotic system is used for encryption operations such as mask and diffusion. Finally, the generated ciphertext is sent to the receiving end. Experimental results and analysis show that the algorithm has the advantages of large key space and strong sensitivity to plaintext and key. Its successful implementation on the Internet of things platform shows that this algorithm is expected to be applied in the industrial Internet of Things.
Keywords:chaotic encryption  power grid technology  secure communication  Internet of Things
点击此处可从《计算技术与自动化》浏览原始摘要信息
点击此处可从《计算技术与自动化》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号