Data transmission with adjustable security exploiting chaos-based pseudorandom number generators.
Mieczyslaw JessaPublished in: ISCAS (3) (2002)
Keyphrases
- pseudorandom number
- data transmission
- chaotic map
- data acquisition
- base station
- computer networks
- wireless sensor networks
- communication networks
- network security
- security requirements
- information security
- security policies
- piecewise linear
- routing protocol
- key management
- energy consumption
- image encryption
- access control
- transmission delay
- real time
- data mining
- sensor nodes
- intrusion detection
- mobile devices