# zbMATH — the first resource for mathematics

A chaos-based secure cluster protocol for wireless sensor networks. (English) Zbl 1171.90356
Summary: Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate chaotic function called N-Logistic-tent is proposed. Data range is thus enlarged as compared to the basic Logistic map and the security is enhanced. In addition, the computation is easier, which does not take much resource. Then, a secure protocol is designed based on it. Most of communication data are encrypted by chaotic keys except the initialization by the base station. Analysis shows that the security of the protocol is improved with a low cost, and it has a balance between resource and security.
##### MSC:
 90B18 Communication networks in operations research 94A60 Cryptography 68M12 Network protocols
##### Keywords:
wireless sensor network; security; chaotic encryption; cluster
SPINS
Full Text:
##### References:
 [1] Huang G., Zhou Y.: MANET security communication model based on multistage chaotic encryption. Comput. Engrg. Appl. 3 (2006), 136-139 [2] Kelber K.: General design rules for chaos-based encryption systems. Internat. Symposium on Nonlinear Theory and its Applications 1 (2005), 465-468 [3] Liu S., Liang, F., Xin G.: Chaos and Fractal in Natural Science. Beijing: Publishing House of Beijing University 2003, pp. 16-53 [4] Luo J., Shi H.: Research of chaos encryption algorithm based on logistic mapping. Internat. Conference Intelligent Information Hiding and Multimedia Signal Processing 2006, pp. 381-383 [5] Lv J., Lu, J., Chen S.: Chaos Time Series Analysis and its Applications. Wuhan: Publishing House of Wuhan University 2002, pp. 72-92 [6] Perrig A., Szewczyk R., Wen V., Culler, D., Tygar J.: SPINS: Security protocols for sensor networks. Wireless Networks 8 (2002), 5, 521-534 · Zbl 1030.68814 [7] Plitsis G.: Performance of the application of chaotic signals in IEEE 802. 11b and wireless sensor networks. Proc. Seventh IEEE Internat. Symposium on Computer Networks. 2006 [8] Wang Y., Attebury, G., Ramamurthy B.: A survey of security issues in wireless sensor networks. IEEE Comm. Surveys $$\&$$ Tutorials 8 (2006), 2, 2-23 [9] Yu H., Zeng, P., Liang W.: Intelligent Wireless Sensor Network System. Beijing: Publishing House of Science 2006, pp. 126-132
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.