Font Size: a A A

The Research Of Safety Engineering Based On RFID

Posted on:2012-09-20Degree:MasterType:Thesis
Country:ChinaCandidate:Z M GaoFull Text:PDF
GTID:2218330362952888Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of the Internet of Things -Radio Frequency Identification (RFID) technology, the RFID technology has been widely used in many real engineering and circulation fields. However,the RFID technique is confronted with serious security problem during the RFID technology provides huge business and convenience for society. How to solve security problem is a key factor constraining the development of the RFID technology..In the RFID system,the encryption technology is the kernel of security, so the key technique for encryption has studied in the thesis. Usually in the RFID system, the many ways of encryption, especially the DES and AES encryption pattern are widely used, but drawbacks of these two ways are apt to crack. The thesis achieves breakthrough on the integer chaos theory which is discrete both in time domain and amplitude.Multiple chaos sequences with different periods origin from different initial value groups were used to prolong period of sequence with being confused by linear-congruence sequence.The chaos sequence similar to pseudo-random sequence is fit to security communication only by transmitting several parameters. The long period chaos sequence needs high accuracy calculation.The research has developed and improved the security theory by Logistic and Lonzes mapping technology. The composition operation through multiple chaos sequence in different period is utilized to prolong period of integer chaos sequence. The initial values of chaos sequence are divided into several groups according to their periods, and chaos sequence coming from different initial groups are used to compound random sequence.Particularly in this paper we put forward a novelty encryption methods"Logistic and Lonzes", and use the Matlab simulink operation modules to simulation the encryption and decryption ways, by using this way the system can become more safety.
Keywords/Search Tags:The Internet of Things, RFID, encryption methods, DES encryption, AES encryption, chaos encryption
PDF Full Text Request
Related items