Charging wireless sensor network security technology based on encryption algorithms and dynamic model

With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, n...

Full description

Saved in:
Bibliographic Details
Main Authors: Yuanming Li, Wei Guo, Xuejun Meng, Wen Xia
Format: Article
Language:English
Published: Wiley 2020-02-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147720901999
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832546775749099520
author Yuanming Li
Wei Guo
Xuejun Meng
Wen Xia
author_facet Yuanming Li
Wei Guo
Xuejun Meng
Wen Xia
author_sort Yuanming Li
collection DOAJ
description With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. The purpose of this article is to solve the existing security problems and study the operation process of RC4 and Advanced Encryption Standard algorithms, and the improvement scheme is put forward. This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. Devices accessing the network use 802.1x authentication method and distribute and set security status values for each device, the authentication server uses Remote Authentication Dial in User Service. This article uses the method of virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected. In this article, the structure and strategy of Remote Authentication Dial in User Service are changed, in order to ensure the high security of wireless network equipment in the connection process. In the testing phase of this article, we have tested the model in detail several times. Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.
format Article
id doaj-art-eff3699a66f841518c1e394f0245b0d5
institution Kabale University
issn 1550-1477
language English
publishDate 2020-02-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-eff3699a66f841518c1e394f0245b0d52025-02-03T06:47:19ZengWileyInternational Journal of Distributed Sensor Networks1550-14772020-02-011610.1177/1550147720901999Charging wireless sensor network security technology based on encryption algorithms and dynamic modelYuanming Li0Wei Guo1Xuejun Meng2Wen Xia3China Xi’an Satellite Control Center, Xi’an, Shaanxi, ChinaChina Xi’an Satellite Control Center, Xi’an, Shaanxi, ChinaChina Xi’an Satellite Control Center, Xi’an, Shaanxi, ChinaChina Xi’an Satellite Control Center, Xi’an, Shaanxi, ChinaWith the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. The purpose of this article is to solve the existing security problems and study the operation process of RC4 and Advanced Encryption Standard algorithms, and the improvement scheme is put forward. This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. Devices accessing the network use 802.1x authentication method and distribute and set security status values for each device, the authentication server uses Remote Authentication Dial in User Service. This article uses the method of virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected. In this article, the structure and strategy of Remote Authentication Dial in User Service are changed, in order to ensure the high security of wireless network equipment in the connection process. In the testing phase of this article, we have tested the model in detail several times. Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.https://doi.org/10.1177/1550147720901999
spellingShingle Yuanming Li
Wei Guo
Xuejun Meng
Wen Xia
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
International Journal of Distributed Sensor Networks
title Charging wireless sensor network security technology based on encryption algorithms and dynamic model
title_full Charging wireless sensor network security technology based on encryption algorithms and dynamic model
title_fullStr Charging wireless sensor network security technology based on encryption algorithms and dynamic model
title_full_unstemmed Charging wireless sensor network security technology based on encryption algorithms and dynamic model
title_short Charging wireless sensor network security technology based on encryption algorithms and dynamic model
title_sort charging wireless sensor network security technology based on encryption algorithms and dynamic model
url https://doi.org/10.1177/1550147720901999
work_keys_str_mv AT yuanmingli chargingwirelesssensornetworksecuritytechnologybasedonencryptionalgorithmsanddynamicmodel
AT weiguo chargingwirelesssensornetworksecuritytechnologybasedonencryptionalgorithmsanddynamicmodel
AT xuejunmeng chargingwirelesssensornetworksecuritytechnologybasedonencryptionalgorithmsanddynamicmodel
AT wenxia chargingwirelesssensornetworksecuritytechnologybasedonencryptionalgorithmsanddynamicmodel