Title:
|
A chaos-based secure cluster protocol for wireless sensor networks (English) |
Author:
|
Fang, Qian |
Author:
|
Liu, Ying |
Author:
|
Zhao, Xiaoqun |
Language:
|
English |
Journal:
|
Kybernetika |
ISSN:
|
0023-5954 |
Volume:
|
44 |
Issue:
|
4 |
Year:
|
2008 |
Pages:
|
522-533 |
Summary lang:
|
English |
. |
Category:
|
math |
. |
Summary:
|
Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate chaotic function called N-Logistic-tent is proposed. Data range is thus enlarged as compared to the basic Logistic map and the security is enhanced. In addition, the computation is easier, which does not take much resource. Then, a secure protocol is designed based on it. Most of communication data are encrypted by chaotic keys except the initialization by the base station. Analysis shows that the security of the protocol is improved with a low cost, and it has a balance between resource and security. (English) |
Keyword:
|
wireless sensor network |
Keyword:
|
security |
Keyword:
|
chaotic encryption |
Keyword:
|
cluster |
MSC:
|
37D45 |
MSC:
|
68M12 |
MSC:
|
74H65 |
MSC:
|
90B18 |
MSC:
|
94A60 |
MSC:
|
94C10 |
idZBL:
|
Zbl 1171.90356 |
idMR:
|
MR2459070 |
. |
Date available:
|
2009-09-24T20:37:40Z |
Last updated:
|
2012-06-06 |
Stable URL:
|
http://hdl.handle.net/10338.dmlcz/135871 |
. |
Reference:
|
[1] Huang G., Zhou Y.: MANET security communication model based on multistage chaotic encryption.Comput. Engrg. Appl. 3 (2006), 136–139 |
Reference:
|
[2] Kelber K.: General design rules for chaos-based encryption systems.Internat. Symposium on Nonlinear Theory and its Applications 1 (2005), 465–468 |
Reference:
|
[3] Liu S., Liang, F., Xin G.: Chaos and Fractal in Natural Science.Beijing: Publishing House of Beijing University 2003, pp. 16–53 |
Reference:
|
[4] Luo J., Shi H.: Research of chaos encryption algorithm based on logistic mapping.In: Internat. Conference Intelligent Information Hiding and Multimedia Signal Processing 2006, pp. 381–383 |
Reference:
|
[5] Lv J., Lu, J., Chen S.: Chaos Time Series Analysis and its Applications.Wuhan: Publishing House of Wuhan University 2002, pp. 72–92 |
Reference:
|
[6] Perrig A., Szewczyk R., Wen V., Culler, D., Tygar J.: SPINS: Security protocols for sensor networks.Wireless Networks 8 (2002), 5, 521–534 Zbl 1030.68814 |
Reference:
|
[7] Plitsis G.: Performance of the application of chaotic signals in IEEE 802.11b and wireless sensor networks. In: Proc. Seventh IEEE Internat. Symposium on Computer Networks. 2006 |
Reference:
|
[8] Wang Y., Attebury, G., Ramamurthy B.: A survey of security issues in wireless sensor networks.IEEE Comm. Surveys $\&$ Tutorials 8 (2006), 2, 2–23 |
Reference:
|
[9] Yu H., Zeng, P., Liang W.: Intelligent Wireless Sensor Network System.Beijing: Publishing House of Science 2006, pp. 126–132 |
Reference:
|
[10] Zhu C., Chen Z.: A fast combined chaotic cryptographic method fitting mobile computing.Comput. Engrg. 31 (2005), 1, 138–140 |
. |