Abstract

In the development of the Internet of Things technology, RFID technology plays a very important role in the application of the Internet of Things. However, due to the safety problems caused by the non-contact sensing of the RFID system, the further development of RFID technology in the application is largely hindered. In recent years, chaotic encryption has been applied in the field of cryptography by virtue of its unique characteristics, and it has received more and more attention in the security of RFID data transmission. Using the same key for encryption and decryption operations is a lightweight encryption algorithm. However, there are various problems in the application process of chaotic encryption: (1) nonlinear dynamic characteristics degradation and short-cycle cycle problems will occur under the influence of computer limited accuracy; (2) numerical conversion operations are required during application, to a certain extent It will affect the randomness of the iterative sequence; (3) During the iterative process, the iterative sequence cannot be spread over the entire value interval, and the randomness is poor. This paper proposes an improved segmented Logistic mapping encryption algorithm, uses the m-sequence to perturb initial value and sets a fixed step to change the control parameter value to generate a chaotic key stream sequence, and applies it to the RFID system data transmission security mechanism to encrypt the data. Experimental simulation and performance analysis show that the iterated chaotic sequence has good random distribution characteristics, unpredictability, and traversability. Compared to the previous improvement, the key space is increased to reach the size of 1024 space and can meet the security needs, which improve RFID data security and can effectively avoid various security problems.

Highlights

  • RFID technology is a non-contact automatic identification technology using wireless radio frequency signals

  • It can be drawn from the previous m-sequence analysis that the period of the m-sequence is N = 2n − 1, the initial value and control parameters are expressed in 16-bit binary form, assuming that the number of iterations is 1000, and the control parameter change step range is (2.01, 2.98) ∪ (3.11, 4), The minimum value of the parameter m is in the range m ∈ (2.01, 2.012), and the value of the decimal point i is in the range (0, 15], the size of the space of the encryption key Key (N, i, n, s, m) is roughly: K = (216 − 1) × (15 × 1015) × 103 × (1.99 × 103) × 0.002 ≈ 3.91 × 1024

  • Using the improved chaotic encryption algorithm discussed above, it is applied to the RFID security mechanism, so that the key sequence encryption operation generated by the RFID information and the unique serial number of the tag corresponds to ensure the security of RFID data transmission

Read more

Summary

Introduction

RFID technology is a non-contact automatic identification technology using wireless radio frequency signals. An improved segmented Logistics mapping is proposed, and the improved algorithm is experimentally analyzed and applied to the RFID security mechanism In this process, we refer to a large number of literature and research ideas, including doctoral dissertations, master’s thesis, and conference journal papers, focusing on the method of m-sequence disturbance initial value in the improved algorithm and the change process of control parameters in each iteration, and The improved chaotic map is compared with the chaotic map that has been proposed in terms of the characteristics of the chaotic map. In order to further understand the relevant characteristics of this segmented Logistic mapping, analyze the value interval and distribution when it is in a chaotic state, use MATLAB software to simulate the experiment, and set it to generate when the initial value is x0 = 0.2 and the number of iterations is 500. The changes in the initial value and control parameters make the generated key stream sequence more random and unpredictable, increasing the key space and enhancing the confidentiality of the algorithm

Results and discussion
Implementation mechanism of improved chaotic encryption algorithm in RFID
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call