Chaos encryption algorithm to deal with security threat to internet of things RFID

被引:1
作者
Xiaoyong, Tian [1 ]
机构
[1] School of Transportation, Wuhan University of Technology
关键词
Chaos theory; Internet of things; Rfid; Security;
D O I
10.4304/jnw.8.5.1168-1174
中图分类号
学科分类号
摘要
Internet of Things RFID system is mainly studied problem in current communication area, where the safety of code message become rather important. Chaos encryption algorithm can disperse not only the time area but the scale, which is suitable for computer to deal with and overcome the limitation of block encryption in DES and AES. Using Sequence of the digital to deal with initial value and combining the one dimensional Logistic chaos and three dimensional Lorenz algorithm realize common encryption algorithm of these two chaos methods to calculate the long-term random sequence under the limitation of precision and improve the security. © 2013 ACADEMY PUBLISHER.
引用
收藏
页码:1168 / 1174
页数:6
相关论文
共 15 条
[1]  
Giusto D., Iera A., Morabito G., Atzori L., The Internet of Things, Springer, (2010)
[2]  
Magrassi P., Berg T., A World of Smart Objects, Gartner Research Report R-17-2243, (2002)
[3]  
Magrassi P., Panarella A., Deighton N., Johnson G., Computers to Acquire Control of the Physical World, (2001)
[4]  
Miles S.B., RFID Technology and Applications, pp. 6-8, (2011)
[5]  
Haining Y., Hongli Z., Binxing F., Xiangzhan Y., A large scale code resolution service network in the internet of things, Sensors(basel, Switzerland), 12, 11, (2012)
[6]  
Xiaoxial L., Huang J.S., Zujue C., The research of ranging with timing over packet network for the mine safety application, Journal of Networks, 7, 7, pp. 1054-1062, (2012)
[7]  
Yiming Z., Anti-cloning and secure RFID mutual authentication protocols, Proceedings-2011 4th IEEE Internationa Conference on Broadband Network and Multimedia Technology, pp. 379-384, (2011)
[8]  
Chengxiang T., Bo J., Xiang Z., Yuebo D., RFID-based electronic identity security cloud platform in cyberspace, Journal of Networks, 7, 7, pp. 1131-1138, (2012)
[9]  
Zhengxia W., Internet of things: A new application for intelligent traffic monitoring system, Journal of Networks, 6, 6, pp. 887-894, (2011)
[10]  
Wang S., Ma Q., Zhang Y., Li Y., An authentication protocol for RFID tag and its simulation, Journal of Networks, 6, 3, pp. 446-453, (2011)