Browse > Article
http://dx.doi.org/10.17661/jkiiect.2015.8.6.528

Design of USN Communication Protocol Using Individual Chaotic Systems  

Yim, Geo-Su (Department of Electrical Engineering, PaiChai University)
Publication Information
The Journal of Korea Institute of Information, Electronics, and Communication Technology / v.8, no.6, 2015 , pp. 528-533 More about this Journal
Abstract
In the construction of USN environment, the implementation of a safe sensor network using wireless communications can be said to be the most important factor in the entire system. Although USN communication uses wireless communications to enhance accessability and non-contact capability, this results in the security vulnerability, thus endangering the system. In this regard, we propose a security protocol that can be effectively applied to USN, a multi-sensor network. The proposed protocol is a method using an individual chaotic system, and it is a security protocol to synchronize the main chaotic system mounted on each sensor and prepared key values into the initial values, and to communicate with the use of the synchronized values as symmetric keys. The communication protocol proposed in this paper is expected to yield good results as a new method to resolve security problems of USN and program capacity limitations of sensor nodes if subsequent studies continue to be carried out.
Keywords
Ubiquitous; Sensor Network; Chaos; Secure Channel; multi-sensor network; chaotic system;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 D. -H. Shin, "Design of Remote Health Monitoring System Based on USN", Journal of Korean Institute of Information Technology, vol. 7, no. 4, pp. 183-187, Oct. 2009.
2 C.-H. Lee, S.-C, Jeong, Y.-S. Ock, and M.-S, Kim, "Development of Water Quality Monitoring System using USN", Journal of Korean Institute of Information Technology, vol. 10, no. 8, pp. 153-163, 2012.
3 G.-S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System", Korea Information Assurance Society, vol. 8, no. 3, pp. 57-64, 2008.
4 G.-S. Yim, and H.-S. Kim, "Chaos-based Image Encryption Scheme using Noise-induced Synchronization", J. of the Korea Society of Computer and Information, vol. 13, no. 5, pp. 155-162, 2008.
5 G.-S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System", Korea Information Assurance Society, vol. 8, no. 3, pp. 57-64, 2008.
6 J. C. Yen, and J. I. Guo, "A new chaotic key-based design form image encryption and decryption", The 2000 IEEE international symposium on circuits and system, pp. 49-52, May. 2000.
7 H. E. Ahmed, H. M. Kalash, and O. S. Farag Allah, "An Efficient Chaos-Based Feedbacks Stream Cipher for Image Encryption and Decryption", Information, vol. 31, pp. 121-129, 2007.
8 F. Fu. Z. Zhang, Y. Chen, and X. Wang, "An Improved Chaos-Based Image Encryption Scheme", International Conference on Computer Science 2007, pp. 575-582, June, 2007.
9 G. G. Schuster, "Deterministic Chaos: An Introduction: 2nd edition", VCH, pp. 17-19, Dec. 1997.
10 A. H. Nayfeh, and B. Blachandran, "Applied Nonlinear Dynamics" Wiley-Interscience, pp. 4-5, 1995.
11 E. Ott, "Chaos in Dynamical Systems Second Edition", Cambridge University Press, pp. 15-18, Sept. 1996.
12 G. P. Williams, "Chaos Theory Tamed", Tayler&Francis, pp. 211-219, 1997.