Security enhancement of the authenticated RFID security mechanism based on chaotic maps

2014 ◽  
Vol 7 (12) ◽  
pp. 2356-2372 ◽  
Author(s):  
Mustapha Benssalah ◽  
Mustapha Djeddou ◽  
Karim Drouiche
2013 ◽  
Vol 6 (2) ◽  
pp. 247-256 ◽  
Author(s):  
Zi-Yao Cheng ◽  
Yun Liu ◽  
Chin-Chen Chang ◽  
Shih-Chang Chang

2018 ◽  
Vol 7 (3.4) ◽  
pp. 223
Author(s):  
H S Annapurna ◽  
M Siddappa

With advancement in technology,   at present, there is possibility to develop low cost sensors in the area of wireless sensor network. Often in practice, there are huge numbers of sensors, which are deployed in hostile environment. Hence, there is a need to develop the security mechanism so that defined applications can serve the purpose. Two areas come under security consideration, protection for communication data and authentication of communicating parties. In this paper, chaos and neural network based centralized security mechanism has been developed. Two different types of chaotic maps, Lozi and Logistic maps have been integrated with feed-forward architecture of neural network to deliver the security provision. The sensitiveness with initial conditions of chaos has been exploited for key development. Proposed method not only provides high level of security but also carries high level of flexibility, scalability and computational efficiency.  


Sign in / Sign up

Export Citation Format

Share Document