2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.93
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Chaotic Stream Cipher for WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Different from the above, this paper proposes a new lightweight chaos‐based cryptosystem that combines a modified discrete version of the Lorenz system, proposed in, with improved and optimized confusion‐diffusion layers. The proposed system is designed to be fully implemented on highly constrained hardware used in constrained‐node networks.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Different from the above, this paper proposes a new lightweight chaos‐based cryptosystem that combines a modified discrete version of the Lorenz system, proposed in, with improved and optimized confusion‐diffusion layers. The proposed system is designed to be fully implemented on highly constrained hardware used in constrained‐node networks.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The proposed chaotic generator uses a discrete version of the Lorenz system denoted DLZ and described as: {left leftarrayxn+1=xn+σ(ynxn)δarrayyn+1=yn+(xn(ρzn)yn)δarrayzn+1=zn+((xnyn)(βzn))δ where σ , β , ρ and x 0 , y 0 , z 0 are the parameters and the initial conditions, respectively.…”
Section: The Proposed Cryptosystemmentioning
confidence: 99%
“…To construct the S‐Box, we used the discretized Lorenz map mentioned in and given by the following equation: {leftxk+1=xk+σykxkΔtleftyk+1=yk+xkρzkykΔtleftzk+1=zk+xkykβzkΔt…”
Section: The Proposed Algorithms For S‐box Designmentioning
confidence: 99%
“…Applying the perturbation seems necessary like in because of the apparition of redundancy after a number of iterations. So, the output of LFSR is XORed to y k + 1 and z k + 1 , whereas x k + 1 is XORed to the integration step as expressed in the following equation : {leftyk+1=yk+1LFSRleftzk+1=zk+1LFSRleftΔt=Δtxk+1…”
Section: The Proposed Algorithms For S‐box Designmentioning
confidence: 99%
See 1 more Smart Citation