C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications

被引:0
|
作者
Zhihua Zhang
Huanwen Wang
Yanghua Gao
机构
[1] China Tobacco Zhejiang Industrial Co.,
[2] Ltd,undefined
来源
关键词
Radio frequency identification (RFID); Authentication; Chebyshev chaotic map; Protocol; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Radio frequency identification (RFID) is a promising wireless sensor technology in the Internet of Things and can be applied for object identification. However, the security issues are still open challenges and should be addressed to achieve enhanced safeguard. Existing security solutions mainly apply logical operators, hash function, and other cryptographic primitives to design authentication schemes. In this paper, we propose a Chebyshev chaotic map-based authentication protocol (C2MP) for the RFID applications. Thereinto, Chebyshev polynomial’s semigroup and chaotic properties are introduced for identity authentication and anonymous data transmission. The proposed C2MP owns the security properties including data integrity, authentication, anonymity, and session freshness. According to the BAN logic, security formal analysis is performed based on the messages formalization, initial assumptions, anticipant goals, and logic verification. It indicates that the proposed C2MP is suitable for universal RFID applications.
引用
下载
收藏
页码:1053 / 1061
页数:8
相关论文
共 50 条
  • [31] A Lightweight Authentication Scheme for Power IoT Based on PUF and Chebyshev Chaotic Map
    Jin, Xianji
    Lin, Na
    Li, Zhongwei
    Jiang, Wenqi
    Jia, Yuge
    Li, Qingyang
    IEEE ACCESS, 2024, 12 : 83692 - 83706
  • [32] Identity Authentication Protocol of Smart Home IoT based on Chebyshev Chaotic Mapping
    Sun, Jingjing
    Zhang, Peng
    Kong, Xiaohong
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (04) : 557 - 565
  • [33] An Improved RFID Authentication Protocol with Privacy Protection Based on Chaotic Maps
    Zhu, Hongfeng
    Zhang, Yan
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1777 - 1787
  • [34] Enhancing the security of FinTech applications with map-based graphical password authentication
    Meng, Weizhi
    Zhu, Liqiu
    Li, Wenjuan
    Han, Jinguang
    Li, Yan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 1018 - 1027
  • [35] A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0
    Altameem, Ayman
    Prabu, P.
    Senthilnathan, T.
    Poonia, Ramesh Chandra
    Saudagar, Abdul Khader Jilani
    SYSTEMS, 2023, 11 (01):
  • [36] A secure chaotic map-based remote authentication scheme for telecare medicine information systems
    Li, Xiong
    Wu, Fan
    Khan, Muhammad Khurram
    Xu, Lili
    Shen, Jian
    Jo, Minho
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 149 - 159
  • [37] CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things
    Tanveer, Muhammad
    Badshah, Akhtar
    Khan, Abd Ullah
    Alasmary, Hisham
    Chaudhry, Shehzad Ashraf
    INTERNET OF THINGS, 2023, 23
  • [38] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200
  • [39] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Wei-Chuen Yau
    Raphael C.-W. Phan
    Journal of Medical Systems, 2013, 37
  • [40] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Yau, Wei-Chuen
    Phan, Raphael C. -W.
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (06)