Chaos encryption algorithm to deal with security threat to internet of things RFID

被引:1
作者
Xiaoyong, Tian [1 ]
机构
[1] School of Transportation, Wuhan University of Technology
关键词
Chaos theory; Internet of things; Rfid; Security;
D O I
10.4304/jnw.8.5.1168-1174
中图分类号
学科分类号
摘要
Internet of Things RFID system is mainly studied problem in current communication area, where the safety of code message become rather important. Chaos encryption algorithm can disperse not only the time area but the scale, which is suitable for computer to deal with and overcome the limitation of block encryption in DES and AES. Using Sequence of the digital to deal with initial value and combining the one dimensional Logistic chaos and three dimensional Lorenz algorithm realize common encryption algorithm of these two chaos methods to calculate the long-term random sequence under the limitation of precision and improve the security. © 2013 ACADEMY PUBLISHER.
引用
收藏
页码:1168 / 1174
页数:6
相关论文
共 50 条
[41]   Security Review On The Internet of Things [J].
Whitter-Jones, Jack .
2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2018, :163-168
[42]   Security design and application of Internet of things based on asymmetric encryption algorithm and neural network for COVID-19 [J].
Tang Yongjun .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (06) :8703-8711
[43]   Security algorithm of Internet of Things based on ZigBee protocol [J].
Wang, Yongkang ;
Chen, Chunxia ;
Jiang, Qijie .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6) :14759-14766
[44]   Building the Internet of Things Using RFID The RFID Ecosystem Experience [J].
Welbourne, Evan ;
Battle, Leilani ;
Cole, Garret ;
Gould, Kayla ;
Rector, Kyle ;
Raymer, Samuel ;
Balazinska, Magdalena ;
Borriello, Gaetano .
IEEE INTERNET COMPUTING, 2009, 13 (03) :48-55
[45]   Security algorithm of Internet of Things based on ZigBee protocol [J].
Yongkang Wang ;
Chunxia Chen ;
Qijie Jiang .
Cluster Computing, 2019, 22 :14759-14766
[46]   Physical-Layer Detection and Security of Printed Chipless RFID Tag for Internet of Things Applications [J].
Khadka, Grishma ;
Ray, Biplob ;
Karmakar, Nemai Chandra ;
Choi, Jinho .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (17) :15714-15724
[47]   A flexible encryption technique for the internet of things environment [J].
Medileh, Saci ;
Laouid, Abdelkader ;
Nagoudi, El Moatez Billah ;
Euler, Reinhardt ;
Bounceur, Ahcene ;
Hammoudeh, Mohammad ;
AlShaikh, Muath ;
Eleyan, Amna ;
Khashan, Osama Ahmed .
AD HOC NETWORKS, 2020, 106
[48]   A hybrid security protocol based on honey encryption and hyperchaotic systems for improving security in internet of things [J].
Wang, Weimeng ;
Liu, Chengliang ;
Zhu, Weiqiao ;
Xie, Chenhui .
SCIENTIFIC REPORTS, 2025, 15 (01)
[49]   A Communication Protocol of RFID Systems in Internet of Things [J].
Gao, HuiDan ;
Guo, YaJun ;
Cui, JianQun ;
Hao, HengGeng ;
Shi, Hui .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02) :91-102
[50]   Autonomic schemes for threat mitigation in Internet of Things [J].
Ashraf, Qazi Mamoon ;
Habaebi, Mohamed Hadi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 49 :112-127