[1] Huang G., Zhou Y.: MANET security communication model based on multistage chaotic encryption. Comput. Engrg. Appl. 3 (2006), 136–139
[2] Kelber K.: General design rules for chaos-based encryption systems. Internat. Symposium on Nonlinear Theory and its Applications 1 (2005), 465–468
[3] Liu S., Liang, F., Xin G.: Chaos and Fractal in Natural Science. Beijing: Publishing House of Beijing University 2003, pp. 16–53
[4] Luo J., Shi H.: Research of chaos encryption algorithm based on logistic mapping. In: Internat. Conference Intelligent Information Hiding and Multimedia Signal Processing 2006, pp. 381–383
[5] Lv J., Lu, J., Chen S.: Chaos Time Series Analysis and its Applications. Wuhan: Publishing House of Wuhan University 2002, pp. 72–92
[6] Perrig A., Szewczyk R., Wen V., Culler, D., Tygar J.:
SPINS: Security protocols for sensor networks. Wireless Networks 8 (2002), 5, 521–534
Zbl 1030.68814
[7] Plitsis G.: Performance of the application of chaotic signals in IEEE 802. 11b and wireless sensor networks. In: Proc. Seventh IEEE Internat. Symposium on Computer Networks. 2006
[8] Wang Y., Attebury, G., Ramamurthy B.: A survey of security issues in wireless sensor networks. IEEE Comm. Surveys $\&$ Tutorials 8 (2006), 2, 2–23
[9] Yu H., Zeng, P., Liang W.: Intelligent Wireless Sensor Network System. Beijing: Publishing House of Science 2006, pp. 126–132
[10] Zhu C., Chen Z.: A fast combined chaotic cryptographic method fitting mobile computing. Comput. Engrg. 31 (2005), 1, 138–140