Browse > Article
http://dx.doi.org/10.17661/jkiiect.2016.9.5.451

Design of an RFID Communication Protocol Using Synchronized Chaotic Systems  

Yim, Geo-Su (Department of Electrical Engineering, Paichai University)
Publication Information
The Journal of Korea Institute of Information, Electronics, and Communication Technology / v.9, no.5, 2016 , pp. 451-457 More about this Journal
Abstract
To improve security in the data communication field, many studies on the application of chaotic signals to encryption have been conducted in recent years. In this study, a new security protocol where the initial value sensitivity and noise similarity of chaotic signals have been applied to an RFID communication channel was designed. In the case of chaotic systems, if the initial values become identical, the same signals are generated at the same time after that point even though the two systems have been calculated independently. Therefore, an unpredictable security channel can be produced based on such characteristics. However, a security channel can be produced only when an initial value is shared in advance, and thus there is a potential problem of infringement during the transmission of the initial value. To resolve this problem, a method in which a certain proportion of new chaotic signals are applied to two chaotic systems for communication and are then synchronized after some time was proposed. This new method can conceal the initial value, and thus can resolve the problem of the existing communication method using chaotic signals. The designed method was verified with the encryption and decryption of images. It is expected that a more secure RFID system could be established by applying the communication protocol proposed in this study to insecure RFID communication channels.
Keywords
RFID; Chaos; Synchronization; Secure Communication;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 M. Ohkubo, K. Suzuki, and S. Kinoshita, "Enhanced Hash Chain based Schme for Security and Privacy in RFID Systems", Int. J. of Computer Applications, Vol. 28, No. 9, pp. 719-724, 2004.
2 H. G. Schuster, "Deterministic Chaos an Introduction. 2nd", Weinheim: VCH, 1988.
3 H. Y. Kim, N. G. Kim, K. H. Kim, H. C. Bang, and S. J. Kim, "An Authentication Model for Sharing Logistic Information based on RFID System", The Korean Institute of Information Technology, Vol. 9, No. 3. pp. 155-161, March, 2011.
4 K. H. Chung, K. Y. Kim, S. J. Oh, J. K. Lee, Y. S. Park, and K. S. Ahn, "A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems", The Korean Institude of Communications and Information Science, Vol. 35, No. 3, pp. 462-472, Mar, 2010.
5 H. S. Ahn, and K. D. Bu, "Robust RFID Distance-Bounding Protocol based on Mutual Authentication", The Journal of KIIT, Vol. 11, No. 7, pp. 47-55, July 2013.
6 R. H. Abranham, and C. D. Shaw, "Dynamics-The Geometry of Behavior", Addison-Wesley, 1992.
7 G. L. Baker, and J. P. Gollub, "Chaotic Dynamics 2nd", Cambridge University Press, 1996.
8 G. P. Williams, "Chaos Theory Tamed", Taylor & Francis, 1977.
9 A. H. Nayfeh, and B. Balachandran, "Applied Nonlinear Dynamics", Wiley-Interscience, 1995.
10 M. H. Choi, and G. S. Yim, "Passive RFID Certification Protocol Design Using Digital Chaos System", Journal of KIIT, Vol. 12, No. 10, pp. 85-92, Oct 2014.
11 S. A, Weis,S. E. Sarma, R. L. Rivest, and D.W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identifications Systems", Int. Conf. an Security in Pervasive Computing, Mar. 2003.