Font Size: a A A

The Research Of Secuirty Protocol In RFID System Based On Theory Of Chaotic Cryptography

Posted on:2012-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:G H ZhaoFull Text:PDF
GTID:2248330395458815Subject:Electrical theory and new technology
Abstract/Summary:PDF Full Text Request
RFID technology have been using a rf signal to obtain communications data byspace coupling (alternating magnetic field or electromagnetic fields), to achieve thepurpose of recognition technology. The ubiquitous adoption of RFID technology isbecoming integral part of our life. The RFID system works on radio waves, which isthe reason why the system is highly prone to hacker. But, RFID is a system of lowcost and composed of simple computations thus it is difficult to make it a highlysecure system. At present, the methods of RFID security are using a security serverand a security policy. One of them the most famous skill is the security module, thenthey has an authentication skill and an encryption skill.Chaotic phenomenon is a kind of definitive, randomlike process in non-lineardynamic system. The chaotic systems are characterized by sensitive dependence oninitial conditions, similarity to random behavio and continuous broad-band powerspectrum. The unique characteristics of cryptography make suitable for encryptionsequence, and show the most outstanding characteristic of cipher technology. The keylength of encryption technique based on chaos theory is variable. So the intensity ofthe encryption algorithm is greatly improved. Chaos has potential applications inseveral functional blocks of a digital communication system: compression, encryptionand modulation.So far, the RFID system has yet comprehensive information security measures toprotect the applied to practice. In this passage, based on the properties of Logisticchaotic sequence such as high sensitivity to initial values, unpredictability andergodicity, we propose an efficient authentication protocol to solve the privacyproblem such as tracing and eavesdropping. Firstly we provide a comprehensivediscussion of privacy problems and current technologies. Secondly we illustrate thestructure of protocol. Thirdly we describe how the mutual authentication andencrypted communication are executed between a tag and a reader. Finally thesecurity analysis on withstanding attackers for RFID system is given. Related analysisand simulation experiment verified that this RFID Secure Mechanism easily realize,operate fast and can completely meet the security demand of the RFID systems.
Keywords/Search Tags:RFID, Logistic map, Chaotic encryption algorithm, Security protocol
PDF Full Text Request
Related items