2LAW Y W, DOUMEN J, HARTEL P. Survey and benchmark of block ciphers for wireless sensor network [ J]. ACM Transactions on Sensor Network, 2006, 2(1) : 65 -93.
3GUIMARAES G, SOUTO E, SADOK D, et al. Evaluation of secur- ity mechanisms in wireless sensor network[ C]// Proceeding of the 2005 Systems Communications. Washington, DC: IEEE Computer Society, 2005:428-433.
4CHEN Z, ZHANG Z W, J]ANG N. A session key generator based on chaotic sequence[ C]/! International Conference on Computer Sci- ence and Software Engineering. Washington, DC: IEEE Computer Society, 2008:635-637.
5PENG J, J]N S Z, LIN H L, et al. A block cipher based on a hybrid of ehaotie system and Feistel network[ C]//2009 Fifth International Conference on Natural Computation. Piscataway, NJ: IEEE Press, 2009:17.
6LIANG W, XU J B, TANG M D, et al. A new embedded encryp- tion algorithm for wireless sensor networks[ C]// IFITA'09: Pro- ceedings of the 2009 International Forum on Information Technology and Applications. Washington, DC: IEEE Computer Society, 2009: 119-122.
7ULUAGAC A S, BEYAH R A, LI YINGSHU, et al. WEBEK: virtual energy-based encryption and keying for wireless sensor net- works[ J]. IEEE Transactions on Mobile Computing, 2010, 9(7) : 994 - 1007.
8MASUDA N, JAKIMOSKI G, AIHARA K, eta/. Chaotic block ei- phem: from theory to practical algorithms[ J]. IEEE Transactions on Circuits and Systems I: Regular Papers, 21306, 53(6) : 1341 - 1352.
9TANG G P, LIAO X F, CHEN Y. A novel method for designing S- boxes based on chaotic maps [ J]. Chaos, Solitons & Fractals, 2005, 23(2):413 -419.