A chaos-based secure cluster protocol for wireless sensor networks

Qian Fang; Ying Liu; Xiaoqun Zhao

Kybernetika (2008)

  • Volume: 44, Issue: 4, page 522-533
  • ISSN: 0023-5954

Abstract

top
Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate chaotic function called N-Logistic-tent is proposed. Data range is thus enlarged as compared to the basic Logistic map and the security is enhanced. In addition, the computation is easier, which does not take much resource. Then, a secure protocol is designed based on it. Most of communication data are encrypted by chaotic keys except the initialization by the base station. Analysis shows that the security of the protocol is improved with a low cost, and it has a balance between resource and security.

How to cite

top

Fang, Qian, Liu, Ying, and Zhao, Xiaoqun. "A chaos-based secure cluster protocol for wireless sensor networks." Kybernetika 44.4 (2008): 522-533. <http://eudml.org/doc/33947>.

@article{Fang2008,
abstract = {Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate chaotic function called N-Logistic-tent is proposed. Data range is thus enlarged as compared to the basic Logistic map and the security is enhanced. In addition, the computation is easier, which does not take much resource. Then, a secure protocol is designed based on it. Most of communication data are encrypted by chaotic keys except the initialization by the base station. Analysis shows that the security of the protocol is improved with a low cost, and it has a balance between resource and security.},
author = {Fang, Qian, Liu, Ying, Zhao, Xiaoqun},
journal = {Kybernetika},
keywords = {wireless sensor network; security; chaotic encryption; cluster; wireless sensor network; security; chaotic encryption; cluster},
language = {eng},
number = {4},
pages = {522-533},
publisher = {Institute of Information Theory and Automation AS CR},
title = {A chaos-based secure cluster protocol for wireless sensor networks},
url = {http://eudml.org/doc/33947},
volume = {44},
year = {2008},
}

TY - JOUR
AU - Fang, Qian
AU - Liu, Ying
AU - Zhao, Xiaoqun
TI - A chaos-based secure cluster protocol for wireless sensor networks
JO - Kybernetika
PY - 2008
PB - Institute of Information Theory and Automation AS CR
VL - 44
IS - 4
SP - 522
EP - 533
AB - Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate chaotic function called N-Logistic-tent is proposed. Data range is thus enlarged as compared to the basic Logistic map and the security is enhanced. In addition, the computation is easier, which does not take much resource. Then, a secure protocol is designed based on it. Most of communication data are encrypted by chaotic keys except the initialization by the base station. Analysis shows that the security of the protocol is improved with a low cost, and it has a balance between resource and security.
LA - eng
KW - wireless sensor network; security; chaotic encryption; cluster; wireless sensor network; security; chaotic encryption; cluster
UR - http://eudml.org/doc/33947
ER -

References

top
  1. Huang G., Zhou Y., MANET security communication model based on multistage chaotic encryption, Comput. Engrg. Appl. 3 (2006), 136–139 
  2. Kelber K., General design rules for chaos-based encryption systems, Internat. Symposium on Nonlinear Theory and its Applications 1 (2005), 465–468 
  3. Liu S., Liang, F., Xin G., Chaos and Fractal in Natural Science, Beijing: Publishing House of Beijing University 2003, pp. 16–53 
  4. Luo J., Shi H., Research of chaos encryption algorithm based on logistic mapping, In: Internat. Conference Intelligent Information Hiding and Multimedia Signal Processing 2006, pp. 381–383 
  5. Lv J., Lu, J., Chen S., Chaos Time Series Analysis and its Applications, Wuhan: Publishing House of Wuhan University 2002, pp. 72–92 
  6. Perrig A., Szewczyk R., Wen V., Culler, D., Tygar J., SPINS: Security protocols for sensor networks, Wireless Networks 8 (2002), 5, 521–534 Zbl1030.68814
  7. Plitsis G., Performance of the application of chaotic signals in IEEE 802, 11b and wireless sensor networks. In: Proc. Seventh IEEE Internat. Symposium on Computer Networks. 2006 
  8. Wang Y., Attebury, G., Ramamurthy B., A survey of security issues in wireless sensor networks, IEEE Comm. Surveys Tutorials 8 (2006), 2, 2–23 
  9. Yu H., Zeng, P., Liang W., Intelligent Wireless Sensor Network System, Beijing: Publishing House of Science 2006, pp. 126–132 
  10. Zhu C., Chen Z., A fast combined chaotic cryptographic method fitting mobile computing, Comput. Engrg. 31 (2005), 1, 138–140 

NotesEmbed ?

top

You must be logged in to post comments.

To embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.

Only the controls for the widget will be shown in your chosen language. Notes will be shown in their authored language.

Tells the widget how many notes to show per page. You can cycle through additional notes using the next and previous controls.

    
                

Note: Best practice suggests putting the JavaScript code just before the closing </body> tag.