Table of Contents Author Guidelines Submit a Manuscript
International Journal of Antennas and Propagation
Volume 2015 (2015), Article ID 315721, 10 pages
http://dx.doi.org/10.1155/2015/315721
Research Article

Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network

China University of Geosciences, Wuhan 430074, China

Received 26 June 2014; Revised 23 October 2014; Accepted 3 November 2014

Academic Editor: Stephen Wang

Copyright © 2015 Wei Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. World Road Association, “ITS Handbook,” http://road-network-operations.piarc.org/index.php?option=com_content&task=view&id=38&Itemid=71&lang=en.
  2. G. Dimitrakopoulos and P. Demestichas, “Intelligent transportation systems,” IEEE Vehicular Technology Magazine, vol. 5, no. 1, pp. 77–84, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. F. Don, Electronic Toll Collection: An Introduction and Brief Look at Potential Vulnerabilities, SANS Institute InfoSec Reading Room, 2004.
  4. H. Ning, N. Ning, S. Qu, Y. Zhang, and H. Yang, “Layered structure and management in internet of things,” in Proceedings of the Future Generation Communication and Networking (FGCN '07), vol. 2, pp. 386–389, Jeju, Republic of Korea, December 2007. View at Scopus
  5. R. Bera, J. Bera, S. Sil, S. Dogra, N. B. Sinha, and D. Mondal, “Dedicated Short Range Communications (DSRC) for intelligent transport system,” in Proceedings of the IFIP International Conference on Wireless and Optical Communications Networks, vol. 5, pp. 1–5, April 2006. View at Scopus
  6. S. Sharma, A. Sahu, A. Verma et al., “Wireless sensor network security,” in Advances in Computer Science and Information Technology, Computer Science and Information Technology, pp. 317–326, Springer, Berlin, Germany, 2012. View at Google Scholar
  7. S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 62–72, Washington, DC, USA, October 2003. View at Scopus
  8. C. Xu and Y. Ge, “The public key encryption to improve the security on wireless sensor networks,” in Proceedings of the 2nd International Conference on Information and Computing Science (ICIC "09), pp. 11–14, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. A. R. Ganesh, P. N. Manikandan, S. P. Sethu, R. Sundararajan, and K. Pargunarajan, “An improved AES-ECC hybrid encryption scheme for secure communication in cooperative diversity based Wireless Sensor Networks,” in Proceedings of the International Conference on Recent Trends in Information Technology (ICRTIT '11), pp. 1209–1214, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. K. G. Gopchandran, K. Gopakumar, and B. Premlet, “Information encryption and decryption using hyperchaotic systems in delayed nonlinear feedback systems,” in Proceedings of the International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT '10), pp. 855–859, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. G. Grassi and D. A. Miller, “Theory and experimental realization of observer-based discrete-time hyperchaos synchronization,” IEEE Transactions on Circuits and Systems I. Fundamental Theory and Applications, vol. 49, no. 3, pp. 373–378, 2002. View at Publisher · View at Google Scholar · View at Scopus
  12. N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926–934, 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Andrecut, “Logistic map as a random number generator,” International Journal of Modern Physics B, vol. 12, no. 9, pp. 921–930, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4,” in Selected Areas in Cryptography, vol. 2259 of Lecture Notes in Computer Science, pp. 1–24, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar · View at MathSciNet
  15. N. Couture and K. B. Kent, “The effectiveness of brute force attacks on RC4,” in Proceedings of the 2nd Annual Conference on Communication Networks and Services Research, pp. 333–336, May 2004. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Klein, “Attacks on the RC4 stream cipher,” Designs, Codes and Cryptography, vol. 48, no. 3, pp. 269–286, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. S. Paul and B. Preneel, “A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher,” in Fast Software Encryption, Springer, Berlin, Germany, 2004. View at Google Scholar
  18. Z. Wu and N. E. Huang, “A study of the characteristics of white noise using the empirical mode decomposition method,” Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 460, no. 2046, pp. 1597–1611, 2004. View at Publisher · View at Google Scholar · View at Scopus