A chaos-based secure cluster protocol for wireless sensor networks
Kybernetika, Tome 44 (2008) no. 4, pp. 522-533 Cet article a éte moissonné depuis la source Czech Digital Mathematics Library

Voir la notice de l'article

Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate chaotic function called N-Logistic-tent is proposed. Data range is thus enlarged as compared to the basic Logistic map and the security is enhanced. In addition, the computation is easier, which does not take much resource. Then, a secure protocol is designed based on it. Most of communication data are encrypted by chaotic keys except the initialization by the base station. Analysis shows that the security of the protocol is improved with a low cost, and it has a balance between resource and security.
Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate chaotic function called N-Logistic-tent is proposed. Data range is thus enlarged as compared to the basic Logistic map and the security is enhanced. In addition, the computation is easier, which does not take much resource. Then, a secure protocol is designed based on it. Most of communication data are encrypted by chaotic keys except the initialization by the base station. Analysis shows that the security of the protocol is improved with a low cost, and it has a balance between resource and security.
Classification : 37D45, 68M12, 74H65, 90B18, 94A60, 94C10
Keywords: wireless sensor network; security; chaotic encryption; cluster
@article{KYB_2008_44_4_a7,
     author = {Fang, Qian and Liu, Ying and Zhao, Xiaoqun},
     title = {A chaos-based secure cluster protocol for wireless sensor networks},
     journal = {Kybernetika},
     pages = {522--533},
     year = {2008},
     volume = {44},
     number = {4},
     mrnumber = {2459070},
     zbl = {1171.90356},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/KYB_2008_44_4_a7/}
}
TY  - JOUR
AU  - Fang, Qian
AU  - Liu, Ying
AU  - Zhao, Xiaoqun
TI  - A chaos-based secure cluster protocol for wireless sensor networks
JO  - Kybernetika
PY  - 2008
SP  - 522
EP  - 533
VL  - 44
IS  - 4
UR  - http://geodesic.mathdoc.fr/item/KYB_2008_44_4_a7/
LA  - en
ID  - KYB_2008_44_4_a7
ER  - 
%0 Journal Article
%A Fang, Qian
%A Liu, Ying
%A Zhao, Xiaoqun
%T A chaos-based secure cluster protocol for wireless sensor networks
%J Kybernetika
%D 2008
%P 522-533
%V 44
%N 4
%U http://geodesic.mathdoc.fr/item/KYB_2008_44_4_a7/
%G en
%F KYB_2008_44_4_a7
Fang, Qian; Liu, Ying; Zhao, Xiaoqun. A chaos-based secure cluster protocol for wireless sensor networks. Kybernetika, Tome 44 (2008) no. 4, pp. 522-533. http://geodesic.mathdoc.fr/item/KYB_2008_44_4_a7/

[1] Huang G., Zhou Y.: MANET security communication model based on multistage chaotic encryption. Comput. Engrg. Appl. 3 (2006), 136–139

[2] Kelber K.: General design rules for chaos-based encryption systems. Internat. Symposium on Nonlinear Theory and its Applications 1 (2005), 465–468

[3] Liu S., Liang, F., Xin G.: Chaos and Fractal in Natural Science. Beijing: Publishing House of Beijing University 2003, pp. 16–53

[4] Luo J., Shi H.: Research of chaos encryption algorithm based on logistic mapping. In: Internat. Conference Intelligent Information Hiding and Multimedia Signal Processing 2006, pp. 381–383

[5] Lv J., Lu, J., Chen S.: Chaos Time Series Analysis and its Applications. Wuhan: Publishing House of Wuhan University 2002, pp. 72–92

[6] Perrig A., Szewczyk R., Wen V., Culler, D., Tygar J.: SPINS: Security protocols for sensor networks. Wireless Networks 8 (2002), 5, 521–534 | Zbl

[7] Plitsis G.: Performance of the application of chaotic signals in IEEE 802. 11b and wireless sensor networks. In: Proc. Seventh IEEE Internat. Symposium on Computer Networks. 2006

[8] Wang Y., Attebury, G., Ramamurthy B.: A survey of security issues in wireless sensor networks. IEEE Comm. Surveys $\&$ Tutorials 8 (2006), 2, 2–23

[9] Yu H., Zeng, P., Liang W.: Intelligent Wireless Sensor Network System. Beijing: Publishing House of Science 2006, pp. 126–132

[10] Zhu C., Chen Z.: A fast combined chaotic cryptographic method fitting mobile computing. Comput. Engrg. 31 (2005), 1, 138–140