Application of chaotic encryption algorithm based on variable parameters in RFID security

被引:0
|
作者
Yi Guo
Jianfang Yang
Baolong Liu
机构
[1] Xi’an Technological University,Centre for Information Technology
[2] Xi’an Technological University,School of Computing Science & Engineering
关键词
RFID system; Segmented Logistic mapping; Security mechanism; Chaotic encryption algorithm;
D O I
暂无
中图分类号
学科分类号
摘要
In the development of the Internet of Things technology, RFID technology plays a very important role in the application of the Internet of Things. However, due to the safety problems caused by the non-contact sensing of the RFID system, the further development of RFID technology in the application is largely hindered. In recent years, chaotic encryption has been applied in the field of cryptography by virtue of its unique characteristics, and it has received more and more attention in the security of RFID data transmission. Using the same key for encryption and decryption operations is a lightweight encryption algorithm. However, there are various problems in the application process of chaotic encryption: (1) nonlinear dynamic characteristics degradation and short-cycle cycle problems will occur under the influence of computer limited accuracy; (2) numerical conversion operations are required during application, to a certain extent It will affect the randomness of the iterative sequence; (3) During the iterative process, the iterative sequence cannot be spread over the entire value interval, and the randomness is poor. This paper proposes an improved segmented Logistic mapping encryption algorithm, uses the m-sequence to perturb initial value and sets a fixed step to change the control parameter value to generate a chaotic key stream sequence, and applies it to the RFID system data transmission security mechanism to encrypt the data. Experimental simulation and performance analysis show that the iterated chaotic sequence has good random distribution characteristics, unpredictability, and traversability. Compared to the previous improvement, the key space is increased to reach the size of 1024 space and can meet the security needs, which improve RFID data security and can effectively avoid various security problems.
引用
收藏
相关论文
共 50 条
  • [21] Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps
    Houcemeddine Hermassi
    Akram Belazi
    Rhouma Rhouma
    Safya Mdimegh Belghith
    Multimedia Tools and Applications, 2014, 72 : 2211 - 2224
  • [22] XTEA ENCRYPTION BASED NOVEL RFID SECURITY PROTOCOL
    Yu, Jack
    Khan, Gul
    Yuan, Fei
    2011 24TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2011, : 58 - 62
  • [23] Security analysis of an RFID protocol based on insubvertible encryption
    Wei, Yongzhuang
    Ouyang, Ning
    Ma, Chunbo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49 (05): : 958 - 961
  • [24] Application of Compound Chaotic Mapping in Voice Encryption Algorithm
    Du, Ruishan
    Li, Yang
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (08): : 44 - 46
  • [25] A novel chaotic map application in image encryption algorithm
    Li, Lizong
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 252
  • [26] The Application of Hybrid Encryption Algorithm in Software Security
    Li, Xinqiang
    Yu, Lili
    Wei, Lihuan
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 669 - 672
  • [27] New chaotic encryption algorithm based on ergodicity
    School of Electronic and Information Engineering, Dalian University of Technology, Dalian 116024, China
    Jisuan Wuli, 2006, 5 (621-625):
  • [28] A speech chaotic encryption algorithm based on network
    Liu, Jing
    Gao, Fei
    Ma, Haiyan
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 283 - 286
  • [29] Image Encryption Algorithm Based on Chaotic Sequence
    Chen, Xiaodi
    Wu, Hong
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL II: SIGNAL PROCESSING, 2020, 516 : 262 - 265
  • [30] Image encryption algorithm based on chaotic system
    Fan, Jiu-Lun
    Zhang, Xue-Feng
    7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 767 - 771