Browse > Article
http://dx.doi.org/10.17661/jkiiect.2020.13.5.425

Design of RFID Authentication Protocol Using 2D Tent-map  

Yim, Geo-su (Deportment of AI Electrical Engineering, Pai Chai University)
Publication Information
The Journal of Korea Institute of Information, Electronics, and Communication Technology / v.13, no.5, 2020 , pp. 425-431 More about this Journal
Abstract
Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.
Keywords
RFID; Chaos; 2D Tent-map; Chaos-map; Authentication;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 K. Finkenzeller, "RFID Handbook - Second Edition," John wiley & Sons, pp. 2-9, 2003.
2 K. H. Chung, K. Y. Kim, S. J. Oh, J. K. Lee, Y. S. Park, and K. S. Ahn, "A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems," The Korean Institute of Communication and Information Science, Vol. 35, No. 3, pp. 462-472, Mar. 2010.
3 S. J. Oh, K. H. Chung, T. J. Yun, and K. S. Ahn, "An RFID Mutual Authentication Protocol Using One-Time Random Number," The Korean Institute of Communication and Information Science, Vol. 36, No. 7, pp. 858-567, July 2011.   DOI
4 H. S. Ahn, and K. D. Bu, "Robust RFID Distance-Bounding Protocol based on Mutual Authentication," The Journal of KIIT, Vol. 11, No. 7, pp. 47-55, March 2013.
5 S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification System," Security in Pervasive Computation, LNCS 2802, pp. 201-212, Nov. 2004.
6 M. Ohkubo, K. Suzuki, and S. Kinoshita, "Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems," International Journal of Computer Applications, Vol. 28, No. 9, pp. 719-724, 2004.
7 H. G. Schuster, "Deterministic Chaos: an Introduction 2nd(second) edition," VCH, pp 24-32, Dec. 1997.
8 Ali. H. Nayfeh, "Applied Nonlinear Dynamics," A Wiley-Interscience Publication, pp. 6-15, Feb. 1995.
9 E. Ott, "Chaos in Dynamical Systems Second Edition," Cambridge University Press, pp. 15-18, Sep. 2002.
10 G. S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System," Korea Information Assurance Society, Vol. 8, No. 3, pp. 57-84, 2008.
11 H. S. Kim and G. S. Yim, "Design of a digital photo frame for close-range security using the chaotic signals synchronization," J. of the Korea Society of Computer and Information, Vol. 16, No. 2, pp. 201-206, 2011.   DOI
12 G. S. Yim, "IoT MQTT Security Protocol Design Using Chaotic Signals," J. of Korea Institute of Information, Electronics, and Communication Technology, Vol. 11, No. 6, pp. 778-783. Oct. 2018.   DOI