A chaos-based secure cluster protocol for wireless sensor networks
Qian Fang; Ying Liu; Xiaoqun Zhao
Kybernetika (2008)
- Volume: 44, Issue: 4, page 522-533
- ISSN: 0023-5954
Access Full Article
topAbstract
topHow to cite
topReferences
top- Huang G., Zhou Y., MANET security communication model based on multistage chaotic encryption, Comput. Engrg. Appl. 3 (2006), 136–139
- Kelber K., General design rules for chaos-based encryption systems, Internat. Symposium on Nonlinear Theory and its Applications 1 (2005), 465–468
- Liu S., Liang, F., Xin G., Chaos and Fractal in Natural Science, Beijing: Publishing House of Beijing University 2003, pp. 16–53
- Luo J., Shi H., Research of chaos encryption algorithm based on logistic mapping, In: Internat. Conference Intelligent Information Hiding and Multimedia Signal Processing 2006, pp. 381–383
- Lv J., Lu, J., Chen S., Chaos Time Series Analysis and its Applications, Wuhan: Publishing House of Wuhan University 2002, pp. 72–92
- Perrig A., Szewczyk R., Wen V., Culler, D., Tygar J., SPINS: Security protocols for sensor networks, Wireless Networks 8 (2002), 5, 521–534 Zbl1030.68814
- Plitsis G., Performance of the application of chaotic signals in IEEE 802, 11b and wireless sensor networks. In: Proc. Seventh IEEE Internat. Symposium on Computer Networks. 2006
- Wang Y., Attebury, G., Ramamurthy B., A survey of security issues in wireless sensor networks, IEEE Comm. Surveys Tutorials 8 (2006), 2, 2–23
- Yu H., Zeng, P., Liang W., Intelligent Wireless Sensor Network System, Beijing: Publishing House of Science 2006, pp. 126–132
- Zhu C., Chen Z., A fast combined chaotic cryptographic method fitting mobile computing, Comput. Engrg. 31 (2005), 1, 138–140