Title: Chaotic Encryption Based Information Security of RFID System
1Chaotic Encryption Based Information Security
of RFID System
- Xin Ding
- Nanjing University of
- Posts and Telecommunications
2Introduction
- RFID technology (Radio Frequency Identification)
- A means of automatically identifying a
unique object by using a radio frequency
transmission.
3 RFID system block diagram
Backend computer
Coupling element (Coil, Antenna)
Data
Control unit
TAG
Transceiver
Timing
Power
Reader
4Threats and Attacks against RFID system
- In the paperSecurity and Privacy in
Radio-Frequency Identification Devices written
by Stephen August Weis from http//rfidioumal.com,
five kinds of attack behavior are summarized
Phyllis
Mallory
Threats Attacks again RFID system
Eve
Tracy
Denise
GOTO
5Phyllis
The strongest attacker. Phyllis is assumed to be
able to physically obtain tags and conduct
sophisticated attacks in a lab setting, cant
carry out attacks in public or on a widespread
scale.
BACK
6 Mallory
Mallory does not have physical tag access,but
may actively participate in protocols or
construct her own counterfeit tags.Mallory may
initiate queries to tags or respond to reader
queries at will.
BACK
7Eve
Eve plays a passive role.She cannot actively
take part in protocols and is limited to
eavesdropping.
BACK
8 Tracy
Tracy is weaker than Eve.She cannot read the
contents of messages,but still may detect their
presence. Tracy may conduct attacks against
Location Privacy
BACK
9Denise
Denise is the weakest behavior,Denise is limited
to disrupting broadcasts,blocking messages or any
other denial of service attacks.
BACK
10Why is the RFID information vulnerable to
attacks?
11A new approach to information security of RFID
system
In the new scheme proposed, the information of
each RFID tag is encrypted with Unique
corresponding Discrete Chaotic Sequence.
12What is chaos or chaotic system ?
Chaotic system A deterministic, nonlinear,
dynamical system displaying sensitive dependence
on initial conditions and having evolution
through phase space that appears to be quite
random.
13Properties of chaotic system
- Being topologically transitive
- Having a dense collection of points with periodic
orbits - Being sensitive to the initial condition of the
system
- initially nearby points of the system can evolve
very quickly into great different trajectories - The property is popularly known as the butterfly
effect" - As a result of the sensitivity, the behavior of
chaotic systems appears to be random, exhibiting
an exponential error dispersion
14Logistic Map
When the map is exhibiting
the chaotic behavior with positive Lyapunov
exponent,having at least one positive Lyapunov
exponent is the most important characteristic of
chaotic system. the map represents a repeated
folding and stretching of the phase space on
which it is defined.
15The Advantages of DCS
1
Each DCS is non- periodic
2
DCSs are un-correlated
3
Pseudorandom is better than M and Gold sequence
4
The more data the better performance DCS is
16New diagram of RFID system
Backend computer
Coupling element (Coil, Antenna)
DCSG
Control unit
Data
TAG
Transceiver
Timing
Power
Reader
17RFID system block diagram
Backend computer
Coupling element (Coil, Antenna)
Control unit
Data
TAG
Transceiver
Timing
Power
Reader
18New diagram of RFID system
Backend computer
Coupling element (Coil, Antenna)
DCSG
Control unit
Data
TAG
Transceiver
Timing
Power
Reader
19Discrete Chaotic Sequence Generator
DCS OUT
Parameter,initial condition computing
Discrete chaotic mapping
Threshold computing
20Selection of parameter and initial condition
Parameter
Initial condition
System Keys
Private Key its globally unique S/N number
Public Key designated by the users
21Thank You !