2012
DOI: 10.20533/ijicr.2042.4655.2012.0027
|View full text |Cite
|
Sign up to set email alerts
|

A New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks

Abstract: Wi-Fi and Zigbee networks are widely deployed in wireless industrial control and monitoring applications. The security protocols used in these wireless networks rely on stream cipher to encrypt data before being transmitted. These protocols are secure but they don't respect the real-time requirement of industrial control. Chaotic systems are able to produce stream cipher with higher randomicity, which looks like stochastic noise. Based on two perturbed piecewise linear chaotic map (PWLCM), we propose a new hig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…The proposed method generates better results than the AESCTR based on correlation, UACI, NPCR, and NIST statistical tests. Encryption speed and security of the method is very high and its realization is easy with large key size and low memory capacity, so it fulfills the requirements of industrial control used in Wi-Fi and ZigBee networks [9,10].…”
Section: Literature Surveymentioning
confidence: 99%
“…The proposed method generates better results than the AESCTR based on correlation, UACI, NPCR, and NIST statistical tests. Encryption speed and security of the method is very high and its realization is easy with large key size and low memory capacity, so it fulfills the requirements of industrial control used in Wi-Fi and ZigBee networks [9,10].…”
Section: Literature Surveymentioning
confidence: 99%
“…Nonlinearity [8] in this property, the smallest change in data at any instant can result in a change in the same or a different data at a later time, that is not depended to the change at the initial time [9], [10].…”
Section: Chaos Theorymentioning
confidence: 99%
“…Parameter (j=4, A=2, n X =3) Keys (10,12,72,48) Given. It is hard to deduce the key or the algorithm to decrypt the plaintext encrypted with the same keys.…”
Section: A Ciphertext Only Attacksmentioning
confidence: 99%
“…In recent years, the one way hash functions based on chaotic logistic maps, including 1D & 2D piecewise linear/nonlinear logistical map, high dimensional chaotic map, chaotic neural networks, hyper chaos and chaos S-Box have been modified [6][7][8]. Chaos map-based different algorithms, techniques and methods are constructed using hash functions, so high dimensionality dynamic systems have become an important and interesting research area in several scientific fields in the …”
Section: Introductionmentioning
confidence: 99%