Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Chaos Based RFID Authentication Prot...
~
Chung, Hau Leung Harold.
Linked to FindBook
Google Book
Amazon
博客來
Chaos Based RFID Authentication Protocol.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Chaos Based RFID Authentication Protocol./
Author:
Chung, Hau Leung Harold.
Description:
107 p.
Notes:
Source: Masters Abstracts International, Volume: 52-02.
Contained By:
Masters Abstracts International52-02(E).
Subject:
Engineering, Computer. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=MR87258
ISBN:
9780494872581
Chaos Based RFID Authentication Protocol.
Chung, Hau Leung Harold.
Chaos Based RFID Authentication Protocol.
- 107 p.
Source: Masters Abstracts International, Volume: 52-02.
Thesis (M.A.Sc.)--University of Ottawa (Canada), 2013.
Chaotic systems have been studied for the past few decades because of its complex behaviour given simple governing ordinary differential equations. In the field of cryptology, several methods have been proposed for the use of chaos in cryptosystems. In this work, a method for harnessing the beneficial behaviour of chaos was proposed for use in RFID authentication and encryption. In order to make an accurate estimation of necessary hardware resources required, a complete hardware implementation was designed using a Xilinx Virtex 6 FPGA. The results showed that only 470 Xilinx Virtex slices were required, which is significantly less than other RFID authentication methods based on AES block cipher. The total number of clock cycles required per encryption of a 288-bit plaintext was 57 clock cycles. This efficiency level is many times higher than other AES methods for RFID application. Based on a carrier frequency of 13.56Mhz, which is the standard frequency of common encryption enabled passive RFID tags such as ISO-15693, a data throughput of 5.538Kb/s was achieved.
ISBN: 9780494872581Subjects--Topical Terms:
1669061
Engineering, Computer.
Chaos Based RFID Authentication Protocol.
LDR
:02835nam a2200277 4500
001
1961717
005
20140723081141.5
008
150210s2013 ||||||||||||||||| ||eng d
020
$a
9780494872581
035
$a
(MiAaPQ)AAIMR87258
035
$a
AAIMR87258
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Chung, Hau Leung Harold.
$3
2097654
245
1 0
$a
Chaos Based RFID Authentication Protocol.
300
$a
107 p.
500
$a
Source: Masters Abstracts International, Volume: 52-02.
500
$a
Adviser: Ali Miri.
502
$a
Thesis (M.A.Sc.)--University of Ottawa (Canada), 2013.
520
$a
Chaotic systems have been studied for the past few decades because of its complex behaviour given simple governing ordinary differential equations. In the field of cryptology, several methods have been proposed for the use of chaos in cryptosystems. In this work, a method for harnessing the beneficial behaviour of chaos was proposed for use in RFID authentication and encryption. In order to make an accurate estimation of necessary hardware resources required, a complete hardware implementation was designed using a Xilinx Virtex 6 FPGA. The results showed that only 470 Xilinx Virtex slices were required, which is significantly less than other RFID authentication methods based on AES block cipher. The total number of clock cycles required per encryption of a 288-bit plaintext was 57 clock cycles. This efficiency level is many times higher than other AES methods for RFID application. Based on a carrier frequency of 13.56Mhz, which is the standard frequency of common encryption enabled passive RFID tags such as ISO-15693, a data throughput of 5.538Kb/s was achieved.
520
$a
As the strength of the proposed RFID authentication and encryption scheme is based on the problem of predicting chaotic systems, it was important to ensure that chaotic behaviour is maintained in this discretized version of Lorenz dynamical system. As a result, key boundaries and fourth order Runge Kutta approximation time step values that are unique for this new mean of chaos utilization were discovered. The result is a computationally efficient and cryptographically complex new RFID authentication scheme that can be readily adopted in current RFID standards such as ISO-14443 and ISO-15693. A proof of security by the analysis of time series data obtained from the hardware FPGA design is also presented. This is to ensure that my proposed method does not exhibit short periodic cycles, has an even probabilistic distribution and builds on the beneficial chaotic properties of the continuous version of Lorenz dynamical system.
590
$a
School code: 0918.
650
4
$a
Engineering, Computer.
$3
1669061
690
$a
0464
710
2
$a
University of Ottawa (Canada).
$b
Electrical Engineering and Computer Science.
$3
2092550
773
0
$t
Masters Abstracts International
$g
52-02(E).
790
$a
0918
791
$a
M.A.Sc.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=MR87258
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9256545
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login