Get access

Authenticated RFID security mechanism based on chaotic maps

Authors

  • Zi-Yao Cheng,

    1. Department of Electronic and Information Engineering, Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing, China
    Search for more papers by this author
  • Yun Liu,

    1. Department of Electronic and Information Engineering, Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing, China
    Search for more papers by this author
  • Chin-Chen Chang,

    Corresponding author
    1. Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan
    • Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan
    Search for more papers by this author
  • Shih-Chang Chang

    1. Department of Computer Science and Information Engineering, National Chung Cheng University, Ming-Hsiung, Chiayi, Taiwan
    Search for more papers by this author

Chin-Chen Chang, Department of Information Engineering and Computer Science, Feng Chia University, No. 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan.

E-mail: alan3c@gmail.com

ABSTRACT

Radio frequency identification (RFID) systems rely on the significant technology of remote, automatic identification with small, low-cost RF elements to complete RF communications securely among all entities. This technology must ensure that secret information or data communicated via radio transmission are not vulnerable to intentional interception, modification for tracing the individual tag holder, or the attachment of any item. With the increase in the number of applications of RFID systems, security and privacy problems have become the focus of significant concern. In this paper, we propose an authenticated RFID security mechanism based on chaotic maps that guarantees a mutually authenticated process and uses a simple and robust chaotic cryptosystem to implement a practical RFID mechanism. The security of the transmitted information and the privacy of personal information or data were our main concerns in the proposed scheme. Also, we have provided detailed information concerning authentication proof and security aspects of our new design. Copyright © 2013 John Wiley & Sons, Ltd.

Get access to the full text of this article

Ancillary