Discussion of chaos algorithm apply in RFID authentication protocol

Heng Li*, Fei Gao, Yanming Xue, Shuo Feng

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Enhancement and promotion of RFID technology, making RFID a growing range of application areas, for cost and technical considerations, the current RFID system, the security ofinformation transmitted under consideration, for people to develop a variety of authentication protocol, for information security to a certain extent improved However, the current authentication protocols are still some gaps, so we are considering the introduction of the existing authentication protocol chaotic algorithm, the plaintext information transmitted encrypted, thus increasing the RFID system's information security.

Original languageEnglish
Title of host publicationInternational Conference on Computer and Communications Security, ICCCS 2009
Pages123-126
Number of pages4
DOIs
Publication statusPublished - 2009
EventInternational Conference on Computer and Communications Security, ICCCS 2009 - Hong Kong, Hong Kong
Duration: 5 Dec 20096 Dec 2009

Publication series

NameInternational Conference on Computer and Communications Security, ICCCS 2009

Conference

ConferenceInternational Conference on Computer and Communications Security, ICCCS 2009
Country/TerritoryHong Kong
CityHong Kong
Period5/12/096/12/09

Keywords

  • Authentication protocol
  • Chaos algorithm
  • RFID
  • Security

Fingerprint

Dive into the research topics of 'Discussion of chaos algorithm apply in RFID authentication protocol'. Together they form a unique fingerprint.

Cite this