Open Access

Application of Chaotic Encryption in RFID Data Transmission Security

,  and   
Sep 25, 2019

Cite
Download Cover

Figure 1.

Diagram of the components of the RFID system.
Diagram of the components of the RFID system.

Figure 2.

Data information encryption/decryption schematic.
Data information encryption/decryption schematic.

Figure 3.

Chaotic sequence generator process diagram.
Chaotic sequence generator process diagram.

Figure 4.

Logistic map bifurcation diagram.
Logistic map bifurcation diagram.

Figure 5.

Logistic chaotic encryption flow chart.
Logistic chaotic encryption flow chart.

Figure 6.

RFID system security model.
RFID system security model.

Figure 7.

Read and write control mechanism after chaotic encryption.
Read and write control mechanism after chaotic encryption.
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Computer Sciences, other