Chaotic Encryption Based Information Security of RFID System - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

Chaotic Encryption Based Information Security of RFID System

Description:

A means of automatically identifying a unique object by using a radio ... Phyllis is assumed to be able to physically ... Phyllis. 2006.10 ShangHai ... – PowerPoint PPT presentation

Number of Views:102
Avg rating:3.0/5.0
Slides: 22
Provided by: leeh152
Category:

less

Transcript and Presenter's Notes

Title: Chaotic Encryption Based Information Security of RFID System


1
Chaotic Encryption Based Information Security
of RFID System
  • Xin Ding
  • Nanjing University of
  • Posts and Telecommunications

2
Introduction
  • RFID technology (Radio Frequency Identification)
  • A means of automatically identifying a
    unique object by using a radio frequency
    transmission.

3
RFID system block diagram
Backend computer
Coupling element (Coil, Antenna)
Data
Control unit
TAG
Transceiver
Timing
Power
Reader
4
Threats and Attacks against RFID system
  • In the paperSecurity and Privacy in
    Radio-Frequency Identification Devices written
    by Stephen August Weis from http//rfidioumal.com,
    five kinds of attack behavior are summarized

Phyllis
Mallory
Threats Attacks again RFID system
Eve
Tracy
Denise
GOTO
5
Phyllis
The strongest attacker. Phyllis is assumed to be
able to physically obtain tags and conduct
sophisticated attacks in a lab setting, cant
carry out attacks in public or on a widespread
scale.
BACK
6
Mallory
Mallory does not have physical tag access,but
may actively participate in protocols or
construct her own counterfeit tags.Mallory may
initiate queries to tags or respond to reader
queries at will.

BACK
7
Eve
Eve plays a passive role.She cannot actively
take part in protocols and is limited to
eavesdropping.

BACK
8
Tracy
Tracy is weaker than Eve.She cannot read the
contents of messages,but still may detect their
presence. Tracy may conduct attacks against
Location Privacy

BACK
9
Denise
Denise is the weakest behavior,Denise is limited
to disrupting broadcasts,blocking messages or any
other denial of service attacks.

BACK
10
Why is the RFID information vulnerable to
attacks?
11
A new approach to information security of RFID
system
In the new scheme proposed, the information of
each RFID tag is encrypted with Unique
corresponding Discrete Chaotic Sequence.
12
What is chaos or chaotic system ?
Chaotic system A deterministic, nonlinear,
dynamical system displaying sensitive dependence
on initial conditions and having evolution
through phase space that appears to be quite
random.
13
Properties of chaotic system
  • Being topologically transitive
  • Having a dense collection of points with periodic
    orbits
  • Being sensitive to the initial condition of the
    system
  • initially nearby points of the system can evolve
    very quickly into great different trajectories
  • The property is popularly known as the butterfly
    effect"
  • As a result of the sensitivity, the behavior of
    chaotic systems appears to be random, exhibiting
    an exponential error dispersion

14
Logistic Map



When the map is exhibiting
the chaotic behavior with positive Lyapunov
exponent,having at least one positive Lyapunov
exponent is the most important characteristic of
chaotic system. the map represents a repeated
folding and stretching of the phase space on
which it is defined.
15
The Advantages of DCS
1
Each DCS is non- periodic
2
DCSs are un-correlated
3
Pseudorandom is better than M and Gold sequence
4
The more data the better performance DCS is
16
New diagram of RFID system
Backend computer
Coupling element (Coil, Antenna)
DCSG
Control unit
Data
TAG
Transceiver
Timing

Power
Reader
17
RFID system block diagram
Backend computer
Coupling element (Coil, Antenna)
Control unit
Data
TAG
Transceiver
Timing
Power
Reader
18
New diagram of RFID system
Backend computer
Coupling element (Coil, Antenna)
DCSG
Control unit
Data
TAG
Transceiver
Timing

Power
Reader
19
Discrete Chaotic Sequence Generator
DCS OUT
Parameter,initial condition computing
Discrete chaotic mapping

Threshold computing
20
Selection of parameter and initial condition
Parameter
Initial condition
System Keys
Private Key its globally unique S/N number
Public Key designated by the users
21
Thank You !
  • XINDING , NJPUT
Write a Comment
User Comments (0)
About PowerShow.com