C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications

14Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio frequency identification (RFID) is a promising wireless sensor technology in the Internet of Things and can be applied for object identification. However, the security issues are still open challenges and should be addressed to achieve enhanced safeguard. Existing security solutions mainly apply logical operators, hash function, and other cryptographic primitives to design authentication schemes. In this paper, we propose a Chebyshev chaotic map-based authentication protocol (C2MP) for the RFID applications. Thereinto, Chebyshev polynomial’s semigroup and chaotic properties are introduced for identity authentication and anonymous data transmission. The proposed C2MP owns the security properties including data integrity, authentication, anonymity, and session freshness. According to the BAN logic, security formal analysis is performed based on the messages formalization, initial assumptions, anticipant goals, and logic verification. It indicates that the proposed C2MP is suitable for universal RFID applications.

Cite

CITATION STYLE

APA

Zhang, Z., Wang, H., & Gao, Y. (2015). C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications. Personal and Ubiquitous Computing, 19(7), 1053–1061. https://doi.org/10.1007/s00779-015-0876-6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free