Chaos encryption algorithm to deal with security threat to internet of things RFID

被引:1
作者
Xiaoyong, Tian [1 ]
机构
[1] School of Transportation, Wuhan University of Technology
关键词
Chaos theory; Internet of things; Rfid; Security;
D O I
10.4304/jnw.8.5.1168-1174
中图分类号
学科分类号
摘要
Internet of Things RFID system is mainly studied problem in current communication area, where the safety of code message become rather important. Chaos encryption algorithm can disperse not only the time area but the scale, which is suitable for computer to deal with and overcome the limitation of block encryption in DES and AES. Using Sequence of the digital to deal with initial value and combining the one dimensional Logistic chaos and three dimensional Lorenz algorithm realize common encryption algorithm of these two chaos methods to calculate the long-term random sequence under the limitation of precision and improve the security. © 2013 ACADEMY PUBLISHER.
引用
收藏
页码:1168 / 1174
页数:6
相关论文
共 50 条
  • [21] Security in the internet of things
    Aigner M.
    Cryptology and Information Security Series, 2010, 4 : 109 - 124
  • [22] Internet of Things Security
    Chahid, Yassine
    Benabdellah, Mohamed
    Azizi, Abdelmalek
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [23] Design and analysis of a new RFID Security Protocol for Internet of things
    Liu, Zixuan
    Yu, Jie
    2020 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, COMPUTER TECHNOLOGY AND TRANSPORTATION (ISCTT 2020), 2020, : 16 - 18
  • [24] A Security and Privacy Model for Mobile RFID Systems in the Internet of Things
    Zhu, Weiling
    Yu, Jianping
    Wang, Ting
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 726 - 732
  • [25] Security of the Internet of Things Based on Game Algorithm
    Yi, Yue-e
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (08) : 80 - 93
  • [26] Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
    Hadjer, Saadi
    Mustapha, Yagoub C. E.
    Rachida, Touhami
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 11 (03): : 9 - 17
  • [27] Access Control with RFID in the Internet of Things
    Jensen, Steffen Elmstrom Holst
    Jacobsen, Rune Hylsberg
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 554 - 559
  • [28] RESEARCH ON FUSION ENCRYPTION ALGORITHM FOR INTERNET OF THINGS MONITORING EQUIPMENT
    Hong, Zhen-Yu
    Qiu, Zhong-Pan
    Zeng, Si-Liang
    Wang, Shui-De
    Sandrine, Mukase
    2017 14TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS & 2017 11TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY & 2017 THIRD INTERNATIONAL SYMPOSIUM OF CREATIVE COMPUTING (ISPAN-FCST-ISCC), 2017, : 425 - 429
  • [29] Cryptographic Encryption and Optimization for Internet of Things Based Medical Image Security
    Selvaraj, Jeeva
    Lai, Wen-Cheng
    Kavin, Balasubramanian Prabhu
    Kavitha, C.
    Seng, Gan Hong
    ELECTRONICS, 2023, 12 (07)
  • [30] Internet of Things - New security and privacy challenges
    Weber R.H.
    Computer Law and Security Review, 2010, 26 (01) : 23 - 30