Chaos-based message authentication code for remote monitoring applications

Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

1 Scopus Citations
View graph of relations

Author(s)

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationProceedings of the IEEE International Conference on Industrial Technology
Pages231-236
Volume2005
Publication statusPublished - 2005

Publication series

Name
Volume2005

Conference

Title2005 IEEE International Conference on Industrial Technology, ICIT 2005
PlaceHong Kong
CityHong Kong
Period14 - 17 December 2005

Abstract

In this paper, a novel chaos-based message authentication coding scheme is proposed for remote monitoring applications. With the use of high-dimensional chaotic map, a keyed hash function is constructed so that authentication code of any arbitrary message can be generated. The performance analysis of the proposed system is presented and its practical usage is demonstrated by a remote monitoring system. © 2005 IEEE.

Research Area(s)

  • Chaos, Message authentication, Remote monitoring

Citation Format(s)

Chaos-based message authentication code for remote monitoring applications. / Kwok, H. S.; Tang, Wallace K. S.; Zhong, G. Q.
Proceedings of the IEEE International Conference on Industrial Technology. Vol. 2005 2005. p. 231-236 1600641.

Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review