C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications

被引:11
|
作者
Zhang, Zhihua [1 ]
Wang, Huanwen [1 ]
Gao, Yanghua [1 ]
机构
[1] China Tobacco Zhejiang Ind Co Ltd, Hangzhou, Zhejiang, Peoples R China
关键词
Radio frequency identification (RFID); Authentication; Chebyshev chaotic map; Protocol; Security; IDENTIFICATION SYSTEMS;
D O I
10.1007/s00779-015-0876-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio frequency identification (RFID) is a promising wireless sensor technology in the Internet of Things and can be applied for object identification. However, the security issues are still open challenges and should be addressed to achieve enhanced safeguard. Existing security solutions mainly apply logical operators, hash function, and other cryptographic primitives to design authentication schemes. In this paper, we propose a Chebyshev chaotic map-based authentication protocol (C2MP) for the RFID applications. Thereinto, Chebyshev polynomial's semigroup and chaotic properties are introduced for identity authentication and anonymous data transmission. The proposed C2MP owns the security properties including data integrity, authentication, anonymity, and session freshness. According to the BAN logic, security formal analysis is performed based on the messages formalization, initial assumptions, anticipant goals, and logic verification. It indicates that the proposed C2MP is suitable for universal RFID applications.
引用
下载
收藏
页码:1053 / 1061
页数:9
相关论文
共 50 条
  • [1] C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications
    Zhihua Zhang
    Huanwen Wang
    Yanghua Gao
    Personal and Ubiquitous Computing, 2015, 19 : 1053 - 1061
  • [2] Attacks and improvements to chaotic map-based RFID authentication protocol
    Akgun, Mete
    Bayrak, Ali Osman
    Caglayan, Mehmet Ufuk
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4028 - 4040
  • [3] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder Dharminder
    Nibedita Kundu
    Dheerendra Mishra
    Journal of Medical Systems, 2021, 45
  • [4] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder, Dharminder
    Kundu, Nibedita
    Mishra, Dheerendra
    JOURNAL OF MEDICAL SYSTEMS, 2021, 45 (08)
  • [5] Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card
    Meshram, Chandrashekhar
    Meshram, Sarita Gajbhiye
    Ibrahim, Rabha W.
    Jalab, Hamid A.
    Jamal, Sajjad Shaukat
    Barve, Sharad Kumar
    COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (02) : 973 - 987
  • [6] Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card
    Chandrashekhar Meshram
    Sarita Gajbhiye Meshram
    Rabha W. Ibrahim
    Hamid A. Jalab
    Sajjad Shaukat Jamal
    Sharad Kumar Barve
    Complex & Intelligent Systems, 2022, 8 : 973 - 987
  • [7] Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol
    Chen, Chien-Ming
    Fang, Weicheng
    Liu, Shuai
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    Wang, King-Hang
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (02) : 371 - 390
  • [8] Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture
    Wang, Huawei
    Guo, Dianli
    Wen, Qiaoyan
    Hua, Zhang
    IEEE ACCESS, 2019, 7 : 161340 - 161349
  • [9] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Kardas, Suleyman
    Genc, Ziya Alper
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 1135 - 1154
  • [10] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Süleyman Kardaş
    Ziya Alper Genç
    Wireless Personal Communications, 2018, 98 : 1135 - 1154