메뉴 건너뛰기




Volumn 15, Issue 5, 2015, Pages 2801-2809

An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks

Author keywords

Chaotic map; Crossover; Data Encryption; Elliptic curve; Mutation; Pseudorandom bit sequence generator; Wireless Sensor Network

Indexed keywords

CHAOTIC SYSTEMS; COMPLEX NETWORKS; CRYPTOGRAPHY; ENVIRONMENTAL MANAGEMENT; GEOMETRY; MOBILE SECURITY; MONOLITHIC MICROWAVE INTEGRATED CIRCUITS; NETWORK SECURITY; SENSOR NODES; STRUCTURAL HEALTH MONITORING; TWINE; WIRELESS SENSOR NETWORKS;

EID: 84926470319     PISSN: 1530437X     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSEN.2014.2380816     Document Type: Article
Times cited : (51)

References (31)
  • 1
    • 84858719793 scopus 로고    scopus 로고
    • A survey on wireless sensor network: An application perspective
    • G. R. Sakthidharan and S. Chitra, "A survey on wireless sensor network: An application perspective," in Proc. ICCCI, Jan. 2012, pp. 1-5.
    • Proc. ICCCI, Jan. 2012 , pp. 1-5
    • Sakthidharan, G.R.1    Chitra, S.2
  • 5
    • 24944505936 scopus 로고    scopus 로고
    • Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
    • E. Biham, A. Biryukov, and A. Shamir, "Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials," J. Cryptol., vol. 18, no. 4, pp. 291-311, 2005.
    • (2005) J. Cryptol. , vol.18 , Issue.4 , pp. 291-311
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 8
    • 82955189841 scopus 로고    scopus 로고
    • Biclique Crypt-analysis of the Full AES
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • A. Bogdanov, D. Khovratovich, and C. Rechberger, "Biclique crypt-analysis of the full AES," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 7073. Berlin, Germany: Springer-Verlag, 2011, pp. 344-371.
    • (2011) Lecture Notes in Computer Science , vol.7073 , pp. 344-371
    • Bogdanov, A.1    Khovratovich, D.2    Rechberger, C.3
  • 9
    • 84863152843 scopus 로고    scopus 로고
    • A novel block encryption scheme based on chaos and an S-box for wireless sensor networks
    • T. Xiao-Jun, W. Zhu, and Z. Ke, "A novel block encryption scheme based on chaos and an S-box for wireless sensor networks," J. Chin. Phys. B, vol. 21, no. 2, p. 020506, 2012.
    • (2012) J. Chin. Phys. B , vol.21 , Issue.2 , pp. 020506
    • Xiao-Jun, T.1    Zhu, W.2    Ke, Z.3
  • 10
    • 70350589237 scopus 로고    scopus 로고
    • KATAN and KTANTAN - A Family of Small and Efficient Hardware-oriented Block Ciphers
    • Berlin, Germany: Springer-Verlag
    • C. De Cannière, O. Dunkelman, and M. Knežević, "KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers," in Cryptographic Hardware and Embedded Systems, vol. 5747. Berlin, Germany: Springer-Verlag, 2009, pp. 272-288.
    • (2009) Cryptographic Hardware and Embedded Systems , vol.5747 , pp. 272-288
    • De Cannière, C.1    Dunkelman, O.2    Knežević, M.3
  • 11
    • 78650841310 scopus 로고    scopus 로고
    • Conditional Differential Cryptanalysis of NLFSR-based Cryptosystems
    • Advances in Cryptology, Berlin, Germany: Springer-Verlag
    • S. Knellwolf, W. Meier, and M. Naya-Plasencia, "Conditional differential cryptanalysis of NLFSR-based cryptosystems," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6477. Berlin, Germany: Springer-Verlag, 2010, pp. 130-145.
    • (2010) Lecture Notes in Computer Science , vol.6477 , pp. 130-145
    • Knellwolf, S.1    Meier, W.2    Naya-Plasencia, M.3
  • 12
    • 84857711684 scopus 로고    scopus 로고
    • Conditional Differential Cryptanalysis of Trivium and KATAN
    • Selected Areas in Cryptography, Berlin, Germany: Springer-Verlag
    • S. Knellwolf, W. Meier, and M. Naya-Plasencia, "Conditional differential cryptanalysis of trivium and KATAN," in Selected Areas in Cryptography (Lecture Notes in Computer Science), vol. 7118. Berlin, Germany: Springer-Verlag, 2012, pp. 200-212.
    • (2012) Lecture Notes in Computer Science , vol.7118 , pp. 200-212
    • Knellwolf, S.1    Meier, W.2    Naya-Plasencia, M.3
  • 13
    • 79960205944 scopus 로고    scopus 로고
    • Improved Meet-in-the-middle Cryptanalysis of KTANTAN
    • (Poster)," in Information Security and Privacy, Berlin, Germany: Springer-Verlag
    • L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang, and S. Ling, "Improved meet-in-the-middle cryptanalysis of KTANTAN (Poster)," in Information Security and Privacy (Lecture Notes in Computer Science), vol. 6812. Berlin, Germany: Springer-Verlag, 2011, pp. 433-438.
    • (2011) Lecture Notes in Computer Science , vol.6812 , pp. 433-438
    • Wei, L.1    Rechberger, C.2    Guo, J.3    Wu, H.4    Wang, H.5    Ling, S.6
  • 14
    • 80053476418 scopus 로고    scopus 로고
    • The LED Block Cipher
    • Cryptographic Hardware and Embedded Systems, Berlin, Germany: Springer-Verlag
    • J. Guo, T. Peyrin, A. Poschmann, and M. Robshaw, "The LED block cipher," in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2011, pp. 326-341.
    • (2011) Lecture Notes in Computer Science , pp. 326-341
    • Guo, J.1    Peyrin, T.2    Poschmann, A.3    Robshaw, M.4
  • 15
    • 84864807560 scopus 로고    scopus 로고
    • Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo
    • Information Security and Privacy, Berlin, Germany: Springer-Verlag
    • T. Isobe and K. Shibutani, "Security analysis of the lightweight block ciphers XTEA, LED and piccolo," in Information Security and Privacy (Lecture Notes in Computer Science), vol. 7372. Berlin, Germany: Springer-Verlag, 2012, pp. 71-86.
    • (2012) Lecture Notes in Computer Science , vol.7372 , pp. 71-86
    • Isobe, T.1    Shibutani, K.2
  • 16
    • 84871585930 scopus 로고    scopus 로고
    • Differential Analysis of the LED Block Cipher
    • Advances in Cryptology Berlin, Germany: Springer-Verlag
    • F. Mendel, V. Rijmen, D. Toz, and K. Varici, "Differential analysis of the LED block cipher," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 7658. Berlin, Germany: Springer-Verlag, 2012, pp. 190-207.
    • (2012) Lecture Notes in Computer Science , vol.7658 , pp. 190-207
    • Mendel, F.1    Rijmen, V.2    Toz, D.3    Varici, K.4
  • 17
    • 84872542511 scopus 로고    scopus 로고
    • TWINE: A Lightweight Block Cipher for Multiple Platforms
    • Selected Areas in Cryptography, Berlin, Germany: Springer-Verlag
    • T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, "TWINE: A lightweight block cipher for multiple platforms," in Selected Areas in Cryptography (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2012, pp. 339-354.
    • (2012) Lecture Notes in Computer Science , pp. 339-354
    • Suzaki, T.1    Minematsu, K.2    Morioka, S.3    Kobayashi, E.4
  • 18
    • 84872708211 scopus 로고    scopus 로고
    • Biclique cryptanalysis of TWINE
    • Cryptology and Network Security, Berlin, Germany: Springer-Verlag [Online]. Available
    • M. Çoban, F. Karakoç, and O. Boztaş, "Biclique cryptanalysis of TWINE," in Cryptology and Network Security, vol. 7712 (LNCS). Berlin, Germany: Springer-Verlag, 2012, pp. 43-55. [Online]. Available: http://eprint.iacr.org
    • (2012) LNCS , vol.7712 , pp. 43-55
    • Çoban, M.1    Karakoç, F.2    Boztaş, O.3
  • 19
    • 84893046807 scopus 로고    scopus 로고
    • A Simple Lightweight Encryption Scheme for Wireless Sensor Networks
    • Distributed Computing and Networking, Berlin, Germany: Springer-Verlag
    • K. Biswas, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, "A simple lightweight encryption scheme for wireless sensor networks,"in Distributed Computing and Networking (Lecture Notes in Computer Science), vol. 8314. Berlin, Germany: Springer-Verlag, 2014, pp. 499-504.
    • (2014) Lecture Notes in Computer Science , vol.8314 , pp. 499-504
    • Biswas, K.1    Muthukkumarasamy, V.2    Sithirasenan, E.3    Singh, K.4
  • 20
    • 46749131960 scopus 로고    scopus 로고
    • Chaos block cipher for wireless sensor network
    • S. Chen, X. Zhong, and Z. Wu, "Chaos block cipher for wireless sensor network," J. Sci. China Ser. F, Inf. Sci., vol. 51, no. 8, pp. 1055-1063, 2008.
    • (2008) J. Sci. China Ser. F, Inf. Sci. , vol.51 , Issue.8 , pp. 1055-1063
    • Chen, S.1    Zhong, X.2    Wu, Z.3
  • 21
    • 77956058248 scopus 로고    scopus 로고
    • Cryptanalysis of a chaos block cipher for wireless sensor network
    • J. Yang, D. Xiao, and T. Xiang, "Cryptanalysis of a chaos block cipher for wireless sensor network," Commun. Nonlinear Sci. Numer. Simul., vol. 16, no. 2, pp. 844-850, 2011.
    • (2011) Commun. Nonlinear Sci. Numer. Simul. , vol.16 , Issue.2 , pp. 844-850
    • Yang, J.1    Xiao, D.2    Xiang, T.3
  • 22
    • 79951617961 scopus 로고    scopus 로고
    • Design and statistical analysis of a new chaos block cipher for WSN
    • Y. Liu and S. Tian, "Design and statistical analysis of a new chaos block cipher for WSN," in Proc. IEEE ICITIS, Dec. 2010, pp. 327-330.
    • Proc. IEEE ICITIS, Dec. 2010 , pp. 327-330
    • Liu, Y.1    Tian, S.2
  • 24
    • 84926437155 scopus 로고    scopus 로고
    • [Online]. Available
    • NIST. (2014). Download Documentation and Software. [Online]. Available: http://csrc.nist.gov/groups/ST/toolkit/rng/documentation-software.html
    • (2014) Download Documentation and Software
    • NIST1
  • 25
    • 55349129633 scopus 로고    scopus 로고
    • A chaos-based secure cluster protocol for wireless sensor networks
    • Q. Fang, Y. Liu, and X. Zhao, "A chaos-based secure cluster protocol for wireless sensor networks," Kybernetika, vol. 44, no. 4, pp. 522-533, 2008.
    • (2008) Kybernetika , vol.44 , Issue.4 , pp. 522-533
    • Fang, Q.1    Liu, Y.2    Zhao, X.3
  • 26
    • 84865198377 scopus 로고    scopus 로고
    • Encryption of Images Based on Genetic Algorithm - A New Approach
    • Advances in Computer Science, Engineering & Applications Berlin, Germany: Springer-Verlag
    • J. Kumar and S. Nirmala, "Encryption of images based on genetic algorithm - A new approach," in Advances in Computer Science, Engineering & Applications (Advances in Intelligent Systems and Computing), vol. 167. Berlin, Germany: Springer-Verlag, 2012, pp. 783-791.
    • (2012) Advances in Intelligent Systems and Computing , vol.167 , pp. 783-791
    • Kumar, J.1    Nirmala, S.2
  • 27
    • 35248822352 scopus 로고    scopus 로고
    • Encryption-scheme Security in the Presence of Key-dependent Messages
    • Selected Areas in Cryptography, Berlin, Germany: Springer-Verlag
    • J. Black, P. Rogaway, and T. Shrimpton, "Encryption-scheme security in the presence of key-dependent messages," in Selected Areas in Cryptography (Lecture Notes in Computer Science), vol. 2595. Berlin, Germany: Springer-Verlag, 2003, pp. 62-75.
    • (2003) Lecture Notes in Computer Science , vol.2595 , pp. 62-75
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 28
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • M. Bellare, J. Kilian, and P. Rogaway, "The security of the cipher block chaining message authentication code," J. Comput. Syst. Sci., vol. 61, no. 3, pp. 363-399, 2000.
    • (2000) J. Comput. Syst. Sci. , vol.61 , Issue.3 , pp. 363-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.