基于C/S结构的公安综合移动警务系统设计与加密方案研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
针对现有移动警务系统存在传输信息容量有限,信息共享性差,图像相关业务应用少,加解密算法速度慢,严重影响系统处理速度等缺点。论文在分析公安系统信息化建设的需求、任务、特点及建设现状的基础上,设计了基于C/S结构的公安综合移动警务系统。该系统以现代通信手段,实现公安专网的数据信息与移动终端警员对接,充分利用后台数据资源,为现场事故处理提供强大的数据支持,提高警务人员的工作效率和实战能力。论文的主要研究成果如下:
     1.设计了一种基于C/S结构的公安综合移动警务系统,该系统以三层C/S结构实现移动终端和公安数据中心的信息交换。
     2.设计了基于XML数据格式的数据编码方案,确保数据在网络中实现不同平台的对接;同时,采用JPEG压缩算法实现图像信息在无线网络上的传输。
     3.设计并实现了基于警员密码的AES加密方案,实现了移动警务系统文字和图像信息的加密传输。该方案实现图像压缩后的加密传输技术,弥补了一些图像加密算法无法实现图像压缩的缺点。加密方案以AES加密算法为基础,以警员密码作为密钥基,通过保密扩展函数将警员密码扩展成AES算法密钥。该算法需求存储空间小、运算速度快、带宽要求低、密钥管理方便,并且具有数字签名功能,为公安综合移动警务系统数据传输提供安全保障。
     4.对公安综合移动警务系统软件的各模块进行测试确保软件的正确性和稳定性。公安综合移动警务系统实现警员的移动办公和后台数据共享,达到公安部提出的查询3A要求,使民警快捷、有效地获取相关信息。因此,公安综合移动警务系统的设计与实现具有很高的实际应用价值。
The traditional mobile police information system has lots of defects, such as limited capacity, poor information sharing, less relevant business applications of image, slower encryption and decryption speed. In order to solve these problems of the mobile police information system, this thesis designs a kind of public security synthesis mobile police system based on C/S structure on the basis of analyzing the requirements, tasks, characteristics and actual status of the police system informatization. The system uses modern communication to link the information of police security network and mobile data terminals, and makes full use of the background information resources and improves the working efficiency and combat capability of the police officers. The main results in the research are as follows:
     1. A kind of public security synthesis mobile police system based on C/S structure is developed. This system adopts the three layer C/S structure to achieve data exchange between the frontline policemen and the data centre.
     2. This thesis designs the coding schemes which based on XML-based to realize the connection among different network platforms .At the same time, the system uses the JPEG compression algorithm to transmit image information in the wireless network.
     3. The AES encryption scheme based on officers’password is proposed and realized. This scheme achieves encryption transmission of character and image information, and the programmer has compressed image date before transmission, which makes up the disadvantage of some image encryption algorithm that is without compression. The encryption scheme uses AES encryption algorithm as the basis, officer’s password as a key, the confidential expanded function will extend police officers’password into AES algorithm keys. The algorithm needs small storage space and low bandwidth, and has the advantages of high speed and convenient key-manage and digital-signature. The algorithm provides security safeguards for police information system.
     4. The module of the system’s software is tested in order to make sure about its correctness and stability.
     The public-security synthesis mobile police system realizes mobile office and the sharing of background information, reaches the 3A requirements in police Ministry. The police can achieve the relevant information as quickly as possible. Therefore, the design and implementation of this system has high practical value.
引文
[1]苏州新闻.苏州警方启用公安无线移动警务通,http://www.sz.chinanews.com.cn/suzhou/2002 -09-03/8/18562.html
    [2]马琳.新疆移动助力警务信息化,http://www.cnii.com.cn/20040423ca270905.html. 2004-12-02
    [3]全国公安信息化工程——金盾工程总体方案设计[S].公安部,2001.4.
    [4]闫茂德,纪志强,吴青云,吴婷婷.基于C/S结构的公安交警无线移动警务系统的设计与实现[J].微电子学与计算机, 2006, 23(3):129-130
    [5]王莉,潘正运,刘伟.一种基于J2ME的移动警务应用系统的新型设计[J].计算机工程, 2006,7,32(14):283-285
    [6]吴勤,徐进. C/S结构业务系统平移到多层体系结构技术的研究[J].计算机系统应用, 2004, 11: 26-29
    [7]尹毅峰,刘志镜,李康, PDA在移动电子商务中的应用[J].计算机应用, 2001,21(8):72-73
    [8] Kaveh Pahalavan.无线网络通信原理与应用[M].北京:清华大学出版社, 2002
    [9]南爱霞,张曙光,刘英,基于XML的三层网络结构的WebGIS系统模型[J].计算机应用研究, 2004, 1: 91-93
    [10]安兴亚,周本新,童小念,基于XML的网络数据更新模式[J].微计算机应用, 2005, 26(1):41-44
    [11]杨建武,陈晓鸥, XML相关标准综述[J].计算机科学, 2002, 29(2):25-28.
    [12] Didier Martin著,李喆,严春莹,马琳译, XML高级编程[M].机械工业出版社,2001.
    [13]安兴亚,周本新,童小念,基于XML的网络数据更新模式[J].微计算机应用,2005, 26(1):41-44.
    [14]苏前敏.套接字接口在Linux平台下应用和设计[J].上海工程技术大学学报,2002,16(3):192-196
    [15] Warren W.Gay.实战Linux Socket编程[M].西安:西安电子科技大学出版社2001.01:300-350
    [16]支建伟,曹庆宏.一种改进的JPEG算法研究[J].计算机应用与软件,2005,22(1):121-123
    [17]邢赛鹏,平西建,詹杰勇. JPEG图像数据格式简明分析[J].微计算机信息, 2005, 21(12-3):166-168
    [18] Maryline Charrier, Diego SantaCruz and Mathias Larsson. JPEG2000, the Next Millennium Compression Standard for Still Images[J].IEEE Transactions on Multimedia Computing andSystems.1999,1(1):131-132
    [19] Wen-Chien Yen, Shen-Chuan Tai. DCT-Based Image Compression Using Wavelet-Based Algorithm with Efficient Deblocking Filter[J]. IEEE Transactions on Computer and Information Science[J]. July 2005, 3(05):489-494
    [20] Andrew B.Watson. Image Compression Using the Discrete Cosine Transform[J]. Mathematica Journal, 1994, 4(1):81-88
    [21] Luciano Volcan Agostini and Ivan Saraiva Silva. Pipelined Fast 2-D DCT Architecture for JPEG Image Compression[J]. IEEE Transactions on Integrated Circuits and System Design, 2001, 6(01):1333-1339
    [22]张益贞,刘滔. Visual C++实现MPEG/JPEG编解码技术[M].人民邮电出版社,2002,11:10-69
    [23]秦志光.密码算法的现状和发展研究[J].计算机应用, 2004,2,24(2):1-4
    [24]冯登国.密码学原理与实践[M].北京:电子工业出版社,2003,2:194-207
    [25]陈相琳,刘润涛,于存光.基于DES与ECC的混合数据加密算法[J].哈尔滨理工大学学报,2007,12(1):58-61
    [26]吕锋,樊冰,吴丹雯.四种新型加密技术的比较研究[J].计算机应用研究,2002,2(11),
    [27]陈肇宇.非超递增背包公钥体制[D].福州:福州大学,2005,12
    [28]何明星,林昊. AES算法原理及其实现[J].计算机应用研究,2002,21:61-63
    [29]蒋欣,李灿平,李蕊. Rijndael加密算在网络文件传输系统中的应用[J].计算机测量与控制, 2003, 11(4):312-314
    [30] Chih-Chung Lu, Shau-Yin Tseng. Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter [J].IEEE International Conference on Application-Specific Systems, Architectures and Processors. July, 2002:277-290
    [31]田莹,王丽君,张学东. RSA算法的一种快速软件实现[J].计算机应用与软件, 2004,3,21(3)91-92
    [32]杨维忠,李彤,郝林. RSA加密体制的安全隐患[J].云南大学学报(自然科学版),2004,26(3):212-215
    [33] Masakatu Morii, Masao Kasahara. New public key cryptosystem using discrete logarithm over GF(p). IEICE Transactions, vol. J71-D, 1988-02, pp. 448-453
    [34]侯整风,李岚.椭圆曲线密码系统(ECC)整体算法设计及优化研究[J].电子学报, Vol.32,No.11,Nov.2004
    [35]李学俊,敬忠良,张骏,戴冠中.基于椭圆曲线离散对数问题的公钥密码[J].计算机工程与应用,2002, 06:20-22
    [36]张险峰,秦志光,刘锦德.椭圆曲线加密系统的性能分析[J].电子科技大学学报,2001,4,30(2)144-147
    [37] Mahmoud T.El-hadidi, Nadia H.Hegazi, Heba K.Aslan.Implementation of a Hybrid Encryption Scheme for Ethernet [J].IEEE Transactions on Computers and Communications. 1995, 7: 150-156
    [38] Mahmoud T.El-hadidi, Nadia H.Hegazi, Heba K.Aslan.Implementation of a Hybrid Encryption Scheme for Ethernet [J].IEEE Transactions on Computers and Communications. 1995, 7: 150-156
    [39] Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vipul Gupta, Leonard Rarick Sun Microsystems Laboratories. A Public-key Cryptographic Processor for RSA and ECC [J].IEEE Transactions on Application-Specific Systems, Architectures and Processors. 2004, 9:98-110
    [40] Shakit Fernando, Ha Yajun. Design of networked Reconfigurable Encryption Engine[J].IEEE transactions on Field-Programmable Custom Computing Machines. 2005,4: 285-286
    [41]维库电子市场网.带椭圆曲线密码算法ECC的智能卡http://www.dzsc.com/data/html/2007 -12-26/59927.html
    [42]解鲲,乌旭.一种基于m序列的图像随机加密与实时传输方案[J].现代电子技术,2003,151(8):22~25
    [43] Bourbakis N, Alexopoulos C. Picture data encryption us-ing SCAN patterns[J].Pattern Recogntion, 1992,25(6):567~581
    [44] Refregier P,Javidi B. Optical image encryption based oninput plane and Fourier planer andom encoding [J].Optlett,1995,20(7):767~769
    [45] Yamazaki M, Ohtsubo J. Optimization of encrypted holo-gramsin optical security systems [J].OptEng, 2001, 40(1):132~137
    [46] Kuo C J. Novel image encryption technique and its appli-cation in progressive transmission[J].J.Electron,Imaging,1993,2(4):345~351
    [47] Chang H K,Liou J L.An image encryption scheme basedon quadtree compression scheme[A]. Proceedings of theInternational Computer Symposium [C]. Taiwan:2001.230~237
    [48] Chang C C. et al. A new encryption algorithm for imagecrypto-systems[J].The Journal of systems and Software,2001,58(7):83~91
    [49]陈鲁生,沈世镒.现代密码学[M].北京:科学出版社,2002
    [50] Jiancheng Zou, RababWard, DongxuQi. Anovel digital image scrambling method based on Fibonacci sequence.Proceedings of the 2004 IEEE International Symposium on Circuits and Systems[J].Vancouver, 2004,3:965~968

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700