Previous |  Up |  Next

Article

Title: A chaos-based secure cluster protocol for wireless sensor networks (English)
Author: Fang, Qian
Author: Liu, Ying
Author: Zhao, Xiaoqun
Language: English
Journal: Kybernetika
ISSN: 0023-5954
Volume: 44
Issue: 4
Year: 2008
Pages: 522-533
Summary lang: English
.
Category: math
.
Summary: Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate chaotic function called N-Logistic-tent is proposed. Data range is thus enlarged as compared to the basic Logistic map and the security is enhanced. In addition, the computation is easier, which does not take much resource. Then, a secure protocol is designed based on it. Most of communication data are encrypted by chaotic keys except the initialization by the base station. Analysis shows that the security of the protocol is improved with a low cost, and it has a balance between resource and security. (English)
Keyword: wireless sensor network
Keyword: security
Keyword: chaotic encryption
Keyword: cluster
MSC: 37D45
MSC: 68M12
MSC: 74H65
MSC: 90B18
MSC: 94A60
MSC: 94C10
idZBL: Zbl 1171.90356
idMR: MR2459070
.
Date available: 2009-09-24T20:37:40Z
Last updated: 2012-06-06
Stable URL: http://hdl.handle.net/10338.dmlcz/135871
.
Reference: [1] Huang G., Zhou Y.: MANET security communication model based on multistage chaotic encryption.Comput. Engrg. Appl. 3 (2006), 136–139
Reference: [2] Kelber K.: General design rules for chaos-based encryption systems.Internat. Symposium on Nonlinear Theory and its Applications 1 (2005), 465–468
Reference: [3] Liu S., Liang, F., Xin G.: Chaos and Fractal in Natural Science.Beijing: Publishing House of Beijing University 2003, pp. 16–53
Reference: [4] Luo J., Shi H.: Research of chaos encryption algorithm based on logistic mapping.In: Internat. Conference Intelligent Information Hiding and Multimedia Signal Processing 2006, pp. 381–383
Reference: [5] Lv J., Lu, J., Chen S.: Chaos Time Series Analysis and its Applications.Wuhan: Publishing House of Wuhan University 2002, pp. 72–92
Reference: [6] Perrig A., Szewczyk R., Wen V., Culler, D., Tygar J.: SPINS: Security protocols for sensor networks.Wireless Networks 8 (2002), 5, 521–534 Zbl 1030.68814
Reference: [7] Plitsis G.: Performance of the application of chaotic signals in IEEE 802.11b and wireless sensor networks. In: Proc. Seventh IEEE Internat. Symposium on Computer Networks. 2006
Reference: [8] Wang Y., Attebury, G., Ramamurthy B.: A survey of security issues in wireless sensor networks.IEEE Comm. Surveys $\&$ Tutorials 8 (2006), 2, 2–23
Reference: [9] Yu H., Zeng, P., Liang W.: Intelligent Wireless Sensor Network System.Beijing: Publishing House of Science 2006, pp. 126–132
Reference: [10] Zhu C., Chen Z.: A fast combined chaotic cryptographic method fitting mobile computing.Comput. Engrg. 31 (2005), 1, 138–140
.

Files

Files Size Format View
Kybernetika_44-2008-4_8.pdf 746.7Kb application/pdf View/Open
Back to standard record
Partner of
EuDML logo