Font Size: a A A

Application Of Chaotic Mapping Based Function In RFID Security Protocol

Posted on:2010-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:X JinFull Text:PDF
GTID:2178360275970355Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Radio frequency identification (RFID) technology is an untouched auto identification technology raised in the 60s and 70s of the last century. Though this technology has been used in many aspects of the industry and every day life, the lack of security mechanism due to the computing limitation of RFID tags has caused the insecurity of data transportation in the RFID system. And this also caused restriction of use of RFID technology in large scale. In this thesis, the security and privacy problem of the RFID system is described to the detail, and assessment of currently proposed security protocols also reveals their shortcomings. Based on these analyses, a new security protocol of RFID system based on the chaotic-mapping-based double Hash function with a pseudo-random list is proposed. This protocol is aimed at the protection of the security of data exchange between readers and tags and the privacy protection of RFID tag owners. An overall analysis of this security protocol is performed, and the applicability of this protocol is verified.
Keywords/Search Tags:RFID, security protocol, chaotic mapping, Hash function
PDF Full Text Request
Related items