Abstract
We use the adaptive clustering method that is the division of network by following the complex network theory model to manage nodes in case of WSN node scale changes and node data traffic surges, which complicates the node relationship at the same time and puts forward higher requirements for security management. In this paper, it is proposed to generate a variable-length random key to manage the relationship between the nodes to ensure that the complex relationship between the node changes and the security of the entire network, and provide an easy-to-implement variable security management mechanism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Qin, D.Y., Jia, S., Yang, S.X., Wang, E.F., Ding, Q.: Research on secure aggregation scheme based on stateful public key cryptology in wireless sensor networks. J. Inf. Hiding Multimedia 7(5), 938–948 (2016)
Ruan, Y.R., Lao, S.Y., Wang, J.D., et al.: An algorithm for evaluating the importance of complex network node based on domain similarity. ACTA Phys. Sin. 66(3), 371–379 (2017)
Fu, X.W., Li, W.F.: Clustering evolution model of wireless sensor networks based on local domain. J. Commun. 36, 204–214 (2015)
Duan, H.X., Zhou, Y., Liu, M.M.: Fault tolerant scheduling algorithm in distributed sensor networks. J. Inf. Hiding Multimedia Sig. Process. 8(1), 127–137 (2017)
Ma, H.B., Li, X.: Topology control based on double cluster head ellipse model in WSN. In: International Conference on Mechanical Materials and Manufacturing Engineering (2016)
Zhang, Y.P., Lu, R.M.: An improved chaotic sequence quantization algorithm. Commun. Technol. 42(3), 278–281 (2016)
Acknowledgments
Acknowledgment Project supported by the National Natural Science Foundation of China (Grant Nos. 61302074).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Ma, H., Zhuang, W., Wang, Y., Qin, D., Xu, X. (2018). Variable-Length Key Implementation Based on Complex Network WSN Clustering. In: Pan, JS., Tsai, PW., Watada, J., Jain, L. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. IIH-MSP 2017. Smart Innovation, Systems and Technologies, vol 81. Springer, Cham. https://doi.org/10.1007/978-3-319-63856-0_49
Download citation
DOI: https://doi.org/10.1007/978-3-319-63856-0_49
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63855-3
Online ISBN: 978-3-319-63856-0
eBook Packages: EngineeringEngineering (R0)