Chaos-based message authentication code for remote monitoring applications
Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Title of host publication | Proceedings of the IEEE International Conference on Industrial Technology |
Pages | 231-236 |
Volume | 2005 |
Publication status | Published - 2005 |
Publication series
Name | |
---|---|
Volume | 2005 |
Conference
Title | 2005 IEEE International Conference on Industrial Technology, ICIT 2005 |
---|---|
Place | Hong Kong |
City | Hong Kong |
Period | 14 - 17 December 2005 |
Link(s)
Abstract
In this paper, a novel chaos-based message authentication coding scheme is proposed for remote monitoring applications. With the use of high-dimensional chaotic map, a keyed hash function is constructed so that authentication code of any arbitrary message can be generated. The performance analysis of the proposed system is presented and its practical usage is demonstrated by a remote monitoring system. © 2005 IEEE.
Research Area(s)
- Chaos, Message authentication, Remote monitoring
Citation Format(s)
Chaos-based message authentication code for remote monitoring applications. / Kwok, H. S.; Tang, Wallace K. S.; Zhong, G. Q.
Proceedings of the IEEE International Conference on Industrial Technology. Vol. 2005 2005. p. 231-236 1600641.
Proceedings of the IEEE International Conference on Industrial Technology. Vol. 2005 2005. p. 231-236 1600641.
Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45) › 32_Refereed conference paper (with host publication) › peer-review