Title :
A Security Policy of WLAN Data Transmission Based on Logistic Chaotic Modulation
Author :
Shi, Wenjun ; Zhou, Yuan ; Qian, Zhihong ; Shang, Kecheng ; Zhang, Xiaofan ; Li, Meng
Author_Institution :
Coll. of Commun. Eng., Jilin Univ., Changchun, China
Abstract :
Analyzing on WEP (Wired Equivalent Privacy) indicates many defects existing in security. A security policy of WLAN data transmission based on logistic chaotic modulation is presented. The improved Logistic mapping can carry information in the WLAN data frame through the change of single parameter μ, which can lead to morphological changes of chaotic attractors. The receiver decision device is used to restore the original signals at the recieving end. The results of simulation show that the proposed policy can secure the data transmission effectively. In addition, throughput, time delay and other properties meet customers´ needs basically. And the effectiveness and availability of this policy are also proved.
Keywords :
chaotic communication; cryptographic protocols; data communication; data privacy; delays; telecommunication security; wireless LAN; WLAN data frame encryption; WLAN data transmission; chaotic attractors; customer needs; logistic chaotic modulation; logistic mapping; receiver decision device; security defects; security policy; signal restoration; stream cipher algorithm; time delay; wired equivalent privacy; Chaotic communication; Encryption; Logistics; Throughput; Wireless LAN; Logistic chaotic modulation; Wireless LAN; data security;
Conference_Titel :
Communications and Mobile Computing (CMC), 2011 Third International Conference on
Conference_Location :
Qingdao
Print_ISBN :
978-1-61284-312-4
DOI :
10.1109/CMC.2011.15