메뉴 건너뛰기




Volumn 3, Issue , 2015, Pages 718-724

A hybrid security and compressive sensing-based sensor data gathering scheme

Author keywords

chaotic block encryption; Compressive sensing; multimedia data gathering; WSNs

Indexed keywords

COMPLEX NETWORKS; COMPRESSED SENSING; CRYPTOGRAPHY; ENERGY UTILIZATION; MOBILE SECURITY; SIGNAL RECONSTRUCTION;

EID: 84959857578     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2015.2439034     Document Type: Article
Times cited : (28)

References (18)
  • 1
    • 85032751965 scopus 로고    scopus 로고
    • Compressive sensing [lecture notes]
    • Jul.
    • R. G. Baraniuk, Compressive sensing [lecture notes], " IEEE Signal Process. Mag., vol. 24, no. 4, pp. 118-121, Jul. 2007.
    • (2007) IEEE Signal Process. Mag. , vol.24 , Issue.4 , pp. 118-121
    • Baraniuk, R.G.1
  • 3
    • 79955744825 scopus 로고    scopus 로고
    • Energy-ef-cient data acquisition in wireless sensor networks using compressed sensing
    • Mar.
    • M. Sartipi and R. Fletcher, Energy-ef-cient data acquisition in wireless sensor networks using compressed sensing, " in Proc. Data Compress. Conf. (DCC), Mar. 2011, pp. 223-232.
    • (2011) Proc. Data Compress. Conf. (DCC) , pp. 223-232
    • Sartipi, M.1    Fletcher, R.2
  • 5
    • 33645004780 scopus 로고    scopus 로고
    • The NTMAC for authentication of noisy messages
    • Mar.
    • C. G. Boncelet, Jr., The NTMAC for authentication of noisy messages, " IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 35-42, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 35-42
    • Boncelet, C.G.1
  • 6
    • 79957844692 scopus 로고    scopus 로고
    • Soft correction and veri-cation of the messages protected by cryptographic check values
    • Mar.
    • N. Zivic, Soft correction and veri-cation of the messages protected by cryptographic check values, " in Proc. 45th Annu. Conf. Inf. Sci. Syst., Mar. 2013, pp. 1-6.
    • (2013) Proc. 45th Annu. Conf. Inf. Sci. Syst. , pp. 1-6
    • Zivic, N.1
  • 7
    • 84861182125 scopus 로고    scopus 로고
    • On joint cryptographic veri-cation and channel decoding via the maximum likelihood criterion
    • May
    • N. Zivic and M. F. Flanagan, On joint cryptographic veri-cation and channel decoding via the maximum likelihood criterion, " IEEE Commun. Lett., vol. 16, no. 5, pp. 717-719, May 2013.
    • (2013) IEEE Commun. Lett. , vol.16 , Issue.5 , pp. 717-719
    • Zivic, N.1    Flanagan, M.F.2
  • 10
    • 84878844326 scopus 로고    scopus 로고
    • [Online]. Available
    • (2005). SKIPJACK and KEA Algorithm Speci-cations. [Online]. Available: http://csrc. nist. gov/CryptoToolkit/skipjack/skipjack. pdf
    • (2005) SKIPJACK and KEA Algorithm Speci-cations
  • 11
    • 12344281198 scopus 로고    scopus 로고
    • Cryptography using multiple one-dimensional chaotic maps
    • N. K. Pareek, V. Patidar, and K. K. Sud, Cryptography using multiple one-dimensional chaotic maps, " Commun. Nonlinear Sci. Numer. Simul., vol. 10, no. 7, pp. 715-723, 2005.
    • (2005) Commun. Nonlinear Sci. Numer. Simul. , vol.10 , Issue.7 , pp. 715-723
    • Pareek, N.K.1    Patidar, V.2    Sud, K.K.3
  • 12
    • 77952236404 scopus 로고    scopus 로고
    • A fast image encryption and authentication scheme based on chaotic maps
    • H. Yang, K.-W. Wong, X. Liao, W. Zhang, and P. Wei, A fast image encryption and authentication scheme based on chaotic maps, " Commun. Nonlinear Sci. Numer. Simul., vol. 15, no. 11, pp. 3507-3517, 2010.
    • (2010) Commun. Nonlinear Sci. Numer. Simul. , vol.15 , Issue.11 , pp. 3507-3517
    • Yang, H.1    Wong, K.-W.2    Liao, X.3    Zhang, W.4    Wei, P.5
  • 13
    • 80054946483 scopus 로고    scopus 로고
    • Block permutation cipher in chaos with Feistel struc-ture for wireless sensor networks
    • Jul.
    • S. Chen and R. Shu, Block permutation cipher in chaos with Feistel struc-ture for wireless sensor networks, " J. Adv. Intell. Soft Comput., vol. 105, pp. 391-396, Jul. 2011.
    • (2011) J. Adv. Intell. Soft Comput. , vol.105 , pp. 391-396
    • Chen, S.1    Shu, R.2
  • 14
    • 67349197413 scopus 로고    scopus 로고
    • Logistic chaotic maps for binary numbers generations
    • A. Kanso and A. Smaoui, Logistic chaotic maps for binary numbers generations, " Chaos, Solitons Fractals, vol. 40, no. 5, pp. 2557-2568, 2009.
    • (2009) Chaos, Solitons Fractals , vol.40 , Issue.5 , pp. 2557-2568
    • Kanso, A.1    Smaoui, A.2
  • 18
    • 80051993020 scopus 로고    scopus 로고
    • Release V-2004. 06, Synopsys, Inc., Mountain View, CA, USA, Jun.
    • Power Compiler User Guide Manual, Release V-2004. 06, Synopsys, Inc., Mountain View, CA, USA, Jun. 2004.
    • (2004) Power Compiler User Guide Manual


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.