[1]裴庆祺, 沈玉龙, 马建峰.无线传感器网络安全技术综述[J].通信学报,2007, 28(8):113-122.[2]LAW Y W, DOUMEN J, HARTEL P. Survey and benchmark of block ciphers for wireless sensor network [J]. ACM Transactions on Sensor Network, 2006, 2(1):65-93.[3]GUIMARAES G, SOUTO E, SADOK D, et al. Evaluation of security mechanisms in wireless sensor network[C]// Proceeding of the 2005 Systems Communications. Washington, DC: IEEE Computer Society, 2005: 428-433.[4]吴文玲, 冯登国, 张文涛. 分组密码的设计与分析[M]. 北京: 清华大学出版社, 2009: 64-84.[5]廖晓峰, 肖迪, 陈勇, 等. 混沌密码学原理及其应用[M]. 北京: 科学出版社, 2009:55.[6]CHEN Z,ZHANG Z W,JIANG N. A session key generator based on chaotic sequence[C]// International Conference on Computer Science and Software Engineering. Washington, DC: IEEE Computer Society, 2008:635-637.[7]PENG J, JIN S Z, LIN H L, et al.A block cipher based on a hybrid of chaotic system and Feistel network[C]// 2009 Fifth International Conference on Natural Computation. Piscataway, NJ: IEEE Press, 2009:17.[8]邓绍江,黄桂超,陈志建.基于混沌映射的自适应图像加密算法[J].计算机应用,2011,31(6):1502-1504.[9]肖迪,赵秋乐.一种基于Logistic混沌序列的图像置乱算法的安全分析[J].计算机应用,2010,30(7):1815-1817.[10]LIANG W, XU J B, TANG M D, et al.A new embedded encryption algorithm for wireless sensor networks[C]// IFITA'09: Proceedings of the 2009 International Forum on Information Technology and Applications. Washington, DC: IEEE Computer Society, 2009: 119-122.[11]ULUAGAC A S, BEYAH R A, LI YINGSHU, et al. WEBEK: virtual energy-based encryption and keying for wireless sensor networks[J]. IEEE Transactions on Mobile Computing, 2010, 9(7): 994-1007.[12]MASUDA N, JAKIMOSKI G, AIHARA K, et al. Chaotic block ciphers: from theory to practical algorithms[J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 2006,53(6):1341-1352.[13]陈帅. 网络混沌加密理论及其关键技术研究[D]. 重庆:重庆大学, 2006.[14]TANG G P, LIAO X F, CHEN Y. A novel method for designing S-boxes based on chaotic maps[J]. Chaos, Solitons & Fractals, 2005, 23(2):413-419.[15]杨吉云. 混沌密码在无线传感器网络安全中的应用研究[D]. 重庆:重庆大学, 2007. |