Application of chaotic encryption algorithm based on variable parameters in RFID security

被引:0
|
作者
Yi Guo
Jianfang Yang
Baolong Liu
机构
[1] Xi’an Technological University,Centre for Information Technology
[2] Xi’an Technological University,School of Computing Science & Engineering
关键词
RFID system; Segmented Logistic mapping; Security mechanism; Chaotic encryption algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
In the development of the Internet of Things technology, RFID technology plays a very important role in the application of the Internet of Things. However, due to the safety problems caused by the non-contact sensing of the RFID system, the further development of RFID technology in the application is largely hindered. In recent years, chaotic encryption has been applied in the field of cryptography by virtue of its unique characteristics, and it has received more and more attention in the security of RFID data transmission. Using the same key for encryption and decryption operations is a lightweight encryption algorithm. However, there are various problems in the application process of chaotic encryption: (1) nonlinear dynamic characteristics degradation and short-cycle cycle problems will occur under the influence of computer limited accuracy; (2) numerical conversion operations are required during application, to a certain extent It will affect the randomness of the iterative sequence; (3) During the iterative process, the iterative sequence cannot be spread over the entire value interval, and the randomness is poor. This paper proposes an improved segmented Logistic mapping encryption algorithm, uses the m-sequence to perturb initial value and sets a fixed step to change the control parameter value to generate a chaotic key stream sequence, and applies it to the RFID system data transmission security mechanism to encrypt the data. Experimental simulation and performance analysis show that the iterated chaotic sequence has good random distribution characteristics, unpredictability, and traversability. Compared to the previous improvement, the key space is increased to reach the size of 1024 space and can meet the security needs, which improve RFID data security and can effectively avoid various security problems.
引用
收藏
相关论文
共 50 条
  • [1] Application of chaotic encryption algorithm based on variable parameters in RFID security
    Guo, Yi
    Yang, Jianfang
    Liu, Baolong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [2] A color image encryption algorithm based on chaotic Chebychev and variable-parameters logistic systems
    Zhang, Yunpeng
    Zuo, Fei
    Zhai, Zhengjun
    Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2010, 28 (04): : 628 - 632
  • [3] Improving Security of an Image Encryption Algorithm based on Chaotic Circular Shift
    Li, Weihai
    Yuan, Yuan
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 3694 - +
  • [4] Anti-Collision and Security Protocol of Logistics Warehouse Labels by Integrating RFID and Chaotic Encryption Algorithm
    Gu Y.
    Xia F.
    Wang W.
    Yang S.
    Ye Y.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [5] A Variable-sized Chaotic Block Encryption Algorithm Based on Spatiotemporal Chaotic Map and IDEA
    Liu Jin-mei
    Qiu Shui-sheng
    2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 188 - 191
  • [6] Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm
    Lijun Gao
    Lu Zhang
    Maode Ma
    Wireless Personal Communications, 2017, 96 : 683 - 696
  • [7] Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm
    Gao, Lijun
    Zhang, Lu
    Ma, Maode
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 683 - 696
  • [8] Social media user information security encryption method based on chaotic algorithm
    Yi, Xiao
    International Journal of Web Based Communities, 2024, 20 (1-2) : 128 - 138
  • [9] Dual Scrambling Image Encryption Algorithm Based on Chaotic System with Variable Parameter
    Cao Jianqiu
    Xiao Huarong
    Lan Zhangli
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 83 - 88
  • [10] Encryption algorithm based on chaotic sequences
    Guan, Chun-Yang
    Gao, Fei
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2003, 23 (03): : 363 - 366