108 research outputs found

    The survey on Near Field Communication

    Get PDF
    PubMed ID: 26057043Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.Publisher's Versio

    Privacy-Preserving Electronic Ticket Scheme with Attribute-based Credentials

    Get PDF
    Electronic tickets (e-tickets) are electronic versions of paper tickets, which enable users to access intended services and improve services' efficiency. However, privacy may be a concern of e-ticket users. In this paper, a privacy-preserving electronic ticket scheme with attribute-based credentials is proposed to protect users' privacy and facilitate ticketing based on a user's attributes. Our proposed scheme makes the following contributions: (1) users can buy different tickets from ticket sellers without releasing their exact attributes; (2) two tickets of the same user cannot be linked; (3) a ticket cannot be transferred to another user; (4) a ticket cannot be double spent; (5) the security of the proposed scheme is formally proven and reduced to well known (q-strong Diffie-Hellman) complexity assumption; (6) the scheme has been implemented and its performance empirically evaluated. To the best of our knowledge, our privacy-preserving attribute-based e-ticket scheme is the first one providing these five features. Application areas of our scheme include event or transport tickets where users must convince ticket sellers that their attributes (e.g. age, profession, location) satisfy the ticket price policies to buy discounted tickets. More generally, our scheme can be used in any system where access to services is only dependent on a user's attributes (or entitlements) but not their identities.Comment: 18pages, 6 figures, 2 table

    State of the Art, Trends and Future of Bluetooth Low Energy, Near Field Communication and Visible Light Communication in the Development of Smart Cities

    Get PDF
    The current social impact of new technologies has produced major changes in all areas of society, creating the concept of a smart city supported by an electronic infrastructure, telecommunications and information technology. This paper presents a review of Bluetooth Low Energy (BLE), Near Field Communication (NFC) and Visible Light Communication (VLC) and their use and influence within different areas of the development of the smart city. The document also presents a review of Big Data Solutions for the management of information and the extraction of knowledge in an environment where things are connected by an “Internet of Things” (IoT) network. Lastly, we present how these technologies can be combined together to benefit the development of the smart city

    Forder Application

    Get PDF
    Dissertação de Mestrado em Engenharia InformáticaIn Portugal eating out is a part of the lifestyle. People meet in coffee shops and restaurants, creating business opportunities for the owners of the places. In the summer season there are many bars that open their terrace service. Like many business, there are some ‘quiet times’ during the day – moments, when the place doesn’t receive so many clients. This project proposes an idea on how to maintain the efficiency of the outdoor service with possibly lower costs for the company. The application presented in the given project enables clients to make their requests directly from the table using a cellphone. In the next step the employee receives a notification with the request and he can prepare and deliver the order. Combining Proximity Communication Technologies and a web and mobile application, the communication between a client and an employee may turn out to be fast and comfortable. This solution can have an impact on the number of employees during a calmer time. It is also expected that the client will be able to receive his order in the faster way, through the implemented innovation

    Near Field Communication: From theory to practice

    Get PDF
    This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.Publisher's Versio

    A Survey of Practical Formal Methods for Security

    Get PDF
    In today's world, critical infrastructure is often controlled by computing systems. This introduces new risks for cyber attacks, which can compromise the security and disrupt the functionality of these systems. It is therefore necessary to build such systems with strong guarantees of resiliency against cyber attacks. One way to achieve this level of assurance is using formal verification, which provides proofs of system compliance with desired cyber security properties. The use of Formal Methods (FM) in aspects of cyber security and safety-critical systems are reviewed in this article. We split FM into the three main classes: theorem proving, model checking, and lightweight FM. To allow the different uses of FM to be compared, we define a common set of terms. We further develop categories based on the type of computing system FM are applied in. Solutions in each class and category are presented, discussed, compared, and summarised. We describe historical highlights and developments and present a state-of-the-art review in the area of FM in cyber security. This review is presented from the point of view of FM practitioners and researchers, commenting on the trends in each of the classes and categories. This is achieved by considering all types of FM, several types of security and safety-critical systems, and by structuring the taxonomy accordingly. The article hence provides a comprehensive overview of FM and techniques available to system designers of security-critical systems, simplifying the process of choosing the right tool for the task. The article concludes by summarising the discussion of the review, focusing on best practices, challenges, general future trends, and directions of research within this field

    Smart contract and web dapp for tracing sustainability indicators in the textile and clothing value chain

    Get PDF
    Mestrado em Engenharia Informática na Escola Superior de Tecnologia e Gestão do Instituto Politécnico de Viana do CasteloNa sociedade atual, o têxtil e vestuário é um dos maiores setores de mercado do mundo. O rápido crescimento desta indústria está a ter impactos sem precedentes na sustentabilidade do planeta, respondendo por consequências negativas ambientais, sociais e de saúde. As tendências da fast-fashion, juntamente com a falta de transparência na cadeia de valor têxtil global, somam-se a cenários desfavoráveis para o mundo, à medida que os níveis crescentes de poluição e consumo de recursos dentro da cadeia de valor atingem máximos históricos a cada ano que passa. O ciclo de vida de uma peça de roupa precisa de se adaptar a um modelo económico regenerativo em vez de linear, que acaba no equivalente a um caminhão de lixo de produtos têxteis sendo descartado num aterro sanitário a cada segundo [1]. Não só as indústrias precisam de reformular os seus processos para circularizar as suas cadeias de valor e promover ações sustentáveis, mas também os consumidores precisam de participar do processo de manter os produtos no círculo da cadeia de valor, pois cabe a eles decidir o destino final de um produto vestuário aquando o seu fim da vida útil. Com estas questões em mente, esta dissertação visa desenvolver duas soluções que possam mitigar os problemas a cima mencionados e promover ações sustentáveis rumo a uma economia circular na cadeia de valor do têxtil e vestuário. Uma solução business-to-business baseada em smart contracts do Hyperledger Fabric para gerir a cadeia de valor do têxtil e vestuário com funcionalidade de rastreabilidade foi desenvolvida como prova de conceito para apoiar as reivindicações de sustentabilidade dos participantes na cadeia de valor, da fibra à peça final de vestuário. A actual funcionabilidade de rastreabilidade desenvolvida no smart contract fornece aos operadores da cadeia de valor a capacidade de rastrear um lote até à sua origem, contudo, também limita a escalabilidade devido ao aumento exponencial do tamanho do bloco, especialmente se considerarmos uma cadeia de valor circular. Para os consumidores, foi proposta uma aplicação descentralizada business-to-consumer-to-consumer com elementos de eco-gamificação para promover o envolvimento e motivação do utilizador para a realização de tarefas que contribuam para a adoção de uma economia circular na cadeia de valor do têxtil e vestuário. Após testar a usabilidade da aplicação com o questionário AttrakDiff, concluiu-se que o sistema precisa de focar a sua usabilidade em prol de um produto orientado à tarefa em vez da orientação pessoal atual da aplicação a fim de promover ações que contribuam para a economia circular da cadeia de valor do têxtil e vestuário.In today’s society, Textile and Clothing (T&C) is one of the biggest market sectors world wide.The sheer size and fast growth of this industry is having unprecedented impacts on sustainability, accounting for negative environmental, social and health consequences. The fast-fashion trends along side the lack of transparency in the global T&C value chain add up to unfavorable scenarios for the world as the increas- ing levels of pollution and resource consumption within the value chain reach historic highs with every year that passes. The lifecycle of a clothing item needs to adapt to a regenerative economic model instead of a linear one that ends up in the equivalent of a garbage truck full of textiles being disposed into a landfill every second [1]. Not only do the industries need to revamp their processes to circularize their value chains and promote sustainable actions, but the consumers also need to partake in the process of keeping the products in the value chain loop as it is up to them to make the final decision upon the end-of-life of an item of clothing. With these issues in mind,this dissertation aims to develop two solutions that can mitigate the aforementioned problems and promote sustainable actions towards a circular economy in the T&C value chain. A Proof-of-Concept (PoC) Business-to-Business (B2B) T&C value chainmanagement smart contract solution builton Hyperledger Fabric with traceability features was developed to support the sustainability claims of participants in the value chain, from fiber to garment. The current traceability feature developed into the smart contract provides value chain operators the capabilities to trace a batch back to its origin, however, it also constraints scalability due to the exponential in crease in block size specially if considering a circular value chain. For the consumers, a Business-to-Consumer-to-Consumer (B2C2C) Decentralized Application (DApp) was proposed with eco-gamification elements fo rpromoting the user’s engagement and motivation to complete tasks that contribute for the adoption of a circular economy in the T&C value chain. After testing the consumer DApp’s usability with the AttrakDiff survey, it was concluded that the system needs to focus it susability towards a task-oriented product instead of the current self-oriented results in order to promote actions that contribute to the circular economy of the T&C value chain

    A secure localization framework of RAIN RFID objects for ambient assisted living

    Get PDF
    Internet of things (IoT) is currently on our doorsteps. Numerous domains have beneted from this technology. It ranges from a simple application such as identifying an object up to handling a more complex system. The Radio Frequency IDentication (RFID) is one of the enabling technologies that drive the IoT to its position today. It is small, cheap and does not require any additional power sources. Along with its ubiquitous functionality, this technology enables the positioning of an object within a specic area. Ambient Assisted Living (AAL) is one of the many domains that benet from the IoT. It aims at assisting elderly people in their daily routines by providing new assistive services in smart homes for instance. RFIDs in a smart home come as a great help to an elderly person, for example, to nd an object that they misplaced. However, even with all its benets in simplifying our lives, it is unfortunately double-edged where the advantage that it brings to an object could in turn go against itself. Indeed to be able to help the older adults to locate an object, the system requires certain data in relation to the positioning of the object and its identication. As the passive RFID tag coverage is very small, once its presence is detected, it is dicult to hide it. The ability of this technology in localizing objects gives an opportunity to a third person to take an advantage of the system. In parallel with the persistent and constant need of privacy and secrecy by the users, the objective of this thesis consists of improving the privacy in localizing an object through a new protocol based on the latest version of the RFID second generation passive tag. The proposed protocol must be able to prevent an object from being identied and located by unauthorized parties or a malicious reader. The rst contribution of this work is the assessment of the RFID anti collision management. It is performed through the creation of an OMNET++ framework, modelled and built based on the latest RFID standard developed by GS1 and incorporated by ISO/IEC called Gen2V2 (RFID class 2 Generation 2 Version 2). It is a passive RFID tag that does not require any internal power sources to operate. It communicates using the UHF frequency. The Gen2V2 standard provides a list of cryptographical suites that can be used as a method to authenticate a tag and a reader. This new generation of tags is supported by an alliance of manufacturers called RAIN (RAdio frequency IdenticatioN) that promotes the adoption of the Gen2V2. The anti collision management overall performance is then compared with its theoretical value and four of its cryptographical suites namely PRESENT80, XOR, AES128 and cryptoGPS. Among the performances evaluated within the framework is the number of collisions and the duration required to interrogate a group of tags. Note that an addition of a localization functionality within the framework reveals that exchanged messages through wireless channel prior to the authentication can lead to a malicious localization of an object. To increase the localization privacy within AAL application, we propose therefore a second contribution which is a new localization method that is based on the current Gen2V2 standard exchanges by anonymizing the tag identity
    corecore