DOI QR코드

DOI QR Code

Design of RFID Authentication Protocol Using 2D Tent-map

2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계

  • Yim, Geo-su (Deportment of AI Electrical Engineering, Pai Chai University)
  • Received : 2020.09.29
  • Accepted : 2020.10.12
  • Published : 2020.10.30

Abstract

Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.

산업과 기술이 고도화되면서 물류의 운송, 관리, 유통이 대량화되었고 이런 대량의 물류 정보를 효율적으로 관리하기 위해 RFID(Radio-Frequency Identification) 기술이 개발되었다. 관리를 목적으로 하는 RFID는 물류 산업뿐만 아니라 전력전송 및 에너지관리 분야까지 산업 전반에 응용되고 있는 상태이다. 그러나 RFID 장치는 프로그램 개발 용량의 제한으로 개발에 제약을 받고 있고, 이런 제약은 기존의 강인한 암호화 방법을 사용할 수 없어서 보안에 취약함을 가지고 있다. 우리는 이런 RFID의 제약적인 환경에 적용하기 쉬운 단순 연산으로 구현할 수 있는 보안용 혼돈 시스템을 설계하였다. 설계된 시스템은 2차원 Tent-map 혼돈 시스템으로 혼돈계의 매개변수에 따른 신호의 편중 분포 문제점을 해결하기 위해 암호용 매개변수(𝜇1)와 분포용 매개변수(𝜇2)그리고 키값으로 사용될 수 있는 상점 ID 값을 매개변수(𝜃)로 하는 시스템이다. 설계된 RFID 인증 시스템은 난수와 유사하며 초기값으로 재생산이 가능한 혼돈 신호의 특성이 있고 매개변수에 대한 편중 분포 문제를 해결하였기 때문에 기존의 혼돈 시스템을 이용한 암호화 방법보다 효과적이라고 할 수 있다.

Keywords

References

  1. K. Finkenzeller, "RFID Handbook - Second Edition," John wiley & Sons, pp. 2-9, 2003.
  2. K. H. Chung, K. Y. Kim, S. J. Oh, J. K. Lee, Y. S. Park, and K. S. Ahn, "A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems," The Korean Institute of Communication and Information Science, Vol. 35, No. 3, pp. 462-472, Mar. 2010.
  3. S. J. Oh, K. H. Chung, T. J. Yun, and K. S. Ahn, "An RFID Mutual Authentication Protocol Using One-Time Random Number," The Korean Institute of Communication and Information Science, Vol. 36, No. 7, pp. 858-567, July 2011. https://doi.org/10.7840/KICS.2011.36B.7.858
  4. H. S. Ahn, and K. D. Bu, "Robust RFID Distance-Bounding Protocol based on Mutual Authentication," The Journal of KIIT, Vol. 11, No. 7, pp. 47-55, March 2013.
  5. S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification System," Security in Pervasive Computation, LNCS 2802, pp. 201-212, Nov. 2004.
  6. M. Ohkubo, K. Suzuki, and S. Kinoshita, "Enhanced Hash Chain based Scheme for Security and Privacy in RFID Systems," International Journal of Computer Applications, Vol. 28, No. 9, pp. 719-724, 2004.
  7. H. G. Schuster, "Deterministic Chaos: an Introduction 2nd(second) edition," VCH, pp 24-32, Dec. 1997.
  8. Ali. H. Nayfeh, "Applied Nonlinear Dynamics," A Wiley-Interscience Publication, pp. 6-15, Feb. 1995.
  9. E. Ott, "Chaos in Dynamical Systems Second Edition," Cambridge University Press, pp. 15-18, Sep. 2002.
  10. G. S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System," Korea Information Assurance Society, Vol. 8, No. 3, pp. 57-84, 2008.
  11. H. S. Kim and G. S. Yim, "Design of a digital photo frame for close-range security using the chaotic signals synchronization," J. of the Korea Society of Computer and Information, Vol. 16, No. 2, pp. 201-206, 2011. https://doi.org/10.9708/jksci.2011.16.2.201
  12. G. S. Yim, "IoT MQTT Security Protocol Design Using Chaotic Signals," J. of Korea Institute of Information, Electronics, and Communication Technology, Vol. 11, No. 6, pp. 778-783. Oct. 2018. https://doi.org/10.17661/JKIIECT.2018.11.6.778