Application of Chaotic Encryption Algorithm in RFID Secure Mechanism

Article Preview

Abstract:

It urgently needs to solve the information security issues of RFID system at present. In order to increase the security of RFID Secure Mechanism without affecting the operation efficiency, a novel chaotic encryption scheme is proposed to improve the RFID information security in RFID. The Logistic map with variable initial value is used to generate chaotic cipher sequence, and then the sequence is encrypted. Related analysis and simulation experiment verified that this chaotic encryption RFID Secure Mechanism is easily to realize. It shows that the novel chaotic encryption can completely meet the security demand of the RFID systems effectively.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 532-533)

Pages:

1695-1699

Citation:

Online since:

June 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Finkenzeller K. RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification. New York:John Wiley and Sons, (2003).

DOI: 10.1145/1005062.1005077

Google Scholar

[2] Garfinkel S L, Juels A, and Pappu R.RFID privacy: An overview of problems and proposed solutions. IEEE Security& Privacy Magazine, 2005, 3(3): 34-44.

DOI: 10.1109/msp.2005.78

Google Scholar

[3] Osaka K, Takagi. An Efficient and Secure RFID Security Method with Ownership Transfer. Proc. of Computational Intelligence and Security. Guangzhou, China. 2006, 1090-1095.

DOI: 10.1109/iccias.2006.295430

Google Scholar

[4] Li Heng, Gao Fei , Xue Yanming, Feng Shuo. Discussion of Chaos Algorithm Apply in RFID Authentication Protocol. Int. Conf. on Computer and Communications Security. Hong Kong, China, Dec, 2009: 123-126.

DOI: 10.1109/icccs.2009.22

Google Scholar

[5] Ohkubo M, Suzuki K, Kinoshita S. Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID. Proc. of Symposium on Cryptography and Information Security. Sendai, Japan, 2004: 719-724.

Google Scholar

[6] Zhang Limin, Li Zhanglin. Research for a Dynamic Key Establishing Algorithm Suitable for Mobile Computer. 5th Int. Conf. on Wireless Communications, Networking and Mobile Computing, 2009. Beijing, China. Sept. 2009: 24-26.

DOI: 10.1109/wicom.2009.5305002

Google Scholar