Journal on Communications ›› 2013, Vol. 34 ›› Issue (5): 113-120.doi: 10.3969/j.issn.1000-436x.2013.05.013

• Technical Report • Previous Articles     Next Articles

Chaos-based encryption and message authentication algorithm for wireless sensor network

Tie-ming CHEN1,2,Liang GE1   

  1. 1 College of Computer Science & Technology,Zhejiang University of Technology,Hangzhou 310023,China;
    2 State Key Laboratory of Software Development Environment,Beihang University,Beijing 100191,China
  • Online:2013-05-25 Published:2017-06-27
  • Supported by:
    The National Natural Science Foundation of China;The Natural Science Foundation of Zhejiang;The National Cryptography Development Foundation of China;Zhejiang Public Technology Research Project;The State Key Laboratory of Software Development and Environment of Beihang University

Abstract:

As for the traditional digital chaos-based scheme being not directly applicable for WSN because some sensor node does not support the float type of computation,integer chaotic maps and its block encryption schemes are firstly in-troduced,and then a novel chaos-based message authentication code (MAC) scheme was proposed,which was length changeable with high-level hybrid chaotic security.At last,a security application solution for data communication on WSN employing the proposed chaos-based schemes is presented,and the performance evaluation on the real-world Mica2 node is analyzed to show that the new security solution is more applicable for WSN than the current most popular security scheme,TinySec.

Key words: wireless sensor network, chaos mapping, block encryption, hash function, MAC

No Suggested Reading articles found!