Charging wireless sensor network security technology based on encryption algorithms and dynamic model
With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, n...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2020-02-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147720901999 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832546775749099520 |
---|---|
author | Yuanming Li Wei Guo Xuejun Meng Wen Xia |
author_facet | Yuanming Li Wei Guo Xuejun Meng Wen Xia |
author_sort | Yuanming Li |
collection | DOAJ |
description | With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. The purpose of this article is to solve the existing security problems and study the operation process of RC4 and Advanced Encryption Standard algorithms, and the improvement scheme is put forward. This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. Devices accessing the network use 802.1x authentication method and distribute and set security status values for each device, the authentication server uses Remote Authentication Dial in User Service. This article uses the method of virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected. In this article, the structure and strategy of Remote Authentication Dial in User Service are changed, in order to ensure the high security of wireless network equipment in the connection process. In the testing phase of this article, we have tested the model in detail several times. Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance. |
format | Article |
id | doaj-art-eff3699a66f841518c1e394f0245b0d5 |
institution | Kabale University |
issn | 1550-1477 |
language | English |
publishDate | 2020-02-01 |
publisher | Wiley |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj-art-eff3699a66f841518c1e394f0245b0d52025-02-03T06:47:19ZengWileyInternational Journal of Distributed Sensor Networks1550-14772020-02-011610.1177/1550147720901999Charging wireless sensor network security technology based on encryption algorithms and dynamic modelYuanming Li0Wei Guo1Xuejun Meng2Wen Xia3China Xi’an Satellite Control Center, Xi’an, Shaanxi, ChinaChina Xi’an Satellite Control Center, Xi’an, Shaanxi, ChinaChina Xi’an Satellite Control Center, Xi’an, Shaanxi, ChinaChina Xi’an Satellite Control Center, Xi’an, Shaanxi, ChinaWith the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. The purpose of this article is to solve the existing security problems and study the operation process of RC4 and Advanced Encryption Standard algorithms, and the improvement scheme is put forward. This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. Devices accessing the network use 802.1x authentication method and distribute and set security status values for each device, the authentication server uses Remote Authentication Dial in User Service. This article uses the method of virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected. In this article, the structure and strategy of Remote Authentication Dial in User Service are changed, in order to ensure the high security of wireless network equipment in the connection process. In the testing phase of this article, we have tested the model in detail several times. Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.https://doi.org/10.1177/1550147720901999 |
spellingShingle | Yuanming Li Wei Guo Xuejun Meng Wen Xia Charging wireless sensor network security technology based on encryption algorithms and dynamic model International Journal of Distributed Sensor Networks |
title | Charging wireless sensor network security technology based on encryption algorithms and dynamic model |
title_full | Charging wireless sensor network security technology based on encryption algorithms and dynamic model |
title_fullStr | Charging wireless sensor network security technology based on encryption algorithms and dynamic model |
title_full_unstemmed | Charging wireless sensor network security technology based on encryption algorithms and dynamic model |
title_short | Charging wireless sensor network security technology based on encryption algorithms and dynamic model |
title_sort | charging wireless sensor network security technology based on encryption algorithms and dynamic model |
url | https://doi.org/10.1177/1550147720901999 |
work_keys_str_mv | AT yuanmingli chargingwirelesssensornetworksecuritytechnologybasedonencryptionalgorithmsanddynamicmodel AT weiguo chargingwirelesssensornetworksecuritytechnologybasedonencryptionalgorithmsanddynamicmodel AT xuejunmeng chargingwirelesssensornetworksecuritytechnologybasedonencryptionalgorithmsanddynamicmodel AT wenxia chargingwirelesssensornetworksecuritytechnologybasedonencryptionalgorithmsanddynamicmodel |