Computer Science ›› 2013, Vol. 40 ›› Issue (6): 49-51.

Previous Articles     Next Articles

Chaos-based Hash Function for Wireless Sensor Networks

HUANG Jin-wang,HU Zhi-hui and FENG Jiu-chao   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Wireless sensor networks (WSNs) are one of hot research issues because of their applications in fields of mi-litary,industry,ecological and health care.These applications often also include to monitor sensitive information,and security is therefore important.WSNs are restricted from many constraints,including low computation capability,small memory,limited energy resources.Hash function ran on PC can not used in WSNs directly,so we proposed a chaos-based hash function that can be ran on WSNs.Theoretical analysis and simulation results show that it has the same security level as the hash that ran on PC.

Key words: WSNs,Chaos,Hash,Security

[1] Estrin D,et al.Instrumenting the World with Wireless Sensor Networks[C]∥Proc.Int’l.Conf.Acoustics,Speech and Signal Processing.Salt Lake City,UT,May 2001
[2] Chan H,Perrig A.Security and Privacy in Sensor Networks[J].IEEE Comp.,2003,36(10):103-105
[3] Shi E,Perrig A.Designing Secure Sensor Networks[J].Wireless Commun,2004,11(6):38-43
[4] Gura N,et al.Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs[C]∥CHES’04:Proc.Wksp.Cryptographic Hardware and Embedded Systems.Aug.2004
[5] Gaubatz G,Kaps J-P,Sunar B.Public Key Cryptogra-phy inSensor Networks-Revisited[C]∥ESAS’04:1st European Wksp.Security in Ad-Hoc and Sensor Networks.2004
[6] Rivest R L.RFC 1321.The MD5message digest algorithm request for comments [S].Cambridge:MIT and RSA Data Security,1992
[7] Nits F P.FIPS PUB 180,Secure hash standard [S].Washington DC:U.S.Department of Commerce,1993
[8] Wang S Y,Feng J C.Chaotic communication scheme by parame-ter division multiple access[J].Acta Electronica Sinica,2007,35(7):35-40
[9] 刘式达,梁福明,刘式适,等.自然科学中的混沌和分形[M].北京:北京大学出版社,2003:1-12,6,31-32,5
[10] 陈帅.无线微传感器网络混沌加密理论及其关键技术研究[D].重庆:重庆大学,2006:55-78
[11] Peng Fei,Qiu Shui-sheng.One-way Hash Functions Based on Iterated Chaotic Systems[C]∥Communications,Circuits and Systems International Conference.2007:1070-1074
[12] Shannon C E.Communication theory of secrecy systems[J].Bell System Technology Journal,1949,28:656-715
[13] 郑世慧,张国艳,杨义先,等.基于混沌的带密钥散列函数安全分析[J].通信学报,2011,32(5):146-152

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!