127 research outputs found

    Fluorescence lifetime assisted enhanced security feature in travel documents for border control and security applications.

    Get PDF
    Border management and security challenges are increasing considerably in recent years. One of the major concerns is counterfeiting and fraudulent use of identity and other travel documents for crossing border controls. This poses serious threats and safety concerns worldwide, considering the scenario of terrorism and illegal migration across the world. Hence, advanced technologies with improved security features becomes essential to strengthen border security and to enable smooth transits. In this paper, we present a novel dual waveguide based invisible fluorescence security feature with lifetime discrimination and a simple validation system. Molecular fluorescence and lifetimes from the rare earth doped waveguides can be used as additional security features in the identity documents. The validation system consists of a modulated excitation source and fast photo-diodes which helps in the simultaneous detection of multiple security features from the fluorescence waveguides. The rare earth doped fluorescence waveguides are embedded into the identity document as micro-threads or tags which are invisible to the naked eye and are only machine readable. Rare earth fluorescence materials have higher sensitivity and selectivity as they absorb only specific ultraviolet (UV) or visible (VIS) wavelengths to create corresponding fluorescent emissions in the visible or infrared wavelengths. Herein, we present the results based on the fluorescence and fluorescence lifetime spectroscopic studies carried out on the terbium (Tb) and dysprosium (Dy) doped waveguides. The different emission wavelengths and lifetimes of these rare earth elements is a key differentiating feature, providing selectivity and security to the detector systems

    Waveguide-based machine readable fluorescence security feature for border control and security applications.

    Get PDF
    Border security challenges and immigration issues are increasing considerably in recent years. Counterfeiting and fraudulent use of identity and other travel documents are posing serious threats and safety concerns worldwide, ever since the advancement of computers, photocopiers, printers and scanners. Considering the current scenario of illegal migration and terrorism across the world, advanced technologies and improved security features are essential to enhance border security and to enable smooth transits. In this paper, we present a novel dual waveguide based invisible fluorescence security feature and a simple validation system to elevate and strengthen the security at border controls. The validation system consists of an LED (light emitting diode) as excitation source and an array photodetector which helps in the simultaneous detection of multiple features from the fluorescence waveguides. The fluorescence waveguides can be embedded into the identity document as micro-threads or tags which are invisible to the naked eye and are only machine readable. In order to improve the sensitivity, rare earth fluorescence materials are used which absorb only specific ultraviolet (UV) or visible (VIS) wavelengths to create corresponding fluorescent emission lines in the visible or infrared wavelengths. Herein, we present the preliminary results based on the fluorescence spectroscopic studies carried out on the fabricated rare earth doped waveguides. The effect of different rare earth concentrations and excitation wavelengths on the fluorescence intensity were investigated

    A security framework for networked RFID

    Full text link
    In the last decade RFID technology has become a major contender for managing large scale logistics operations and generating and distributing the massive amount of data involved in such operations. One of the main obstacles to the widespread deployment and adoption of RFID systems is the security issues inherent in them. This is compounded by a noticeable lack of literature on how to identify the vulnerabilities of a RFID system and then effectively identify and develop counter measures to combat the threats posed by those vulnerabilities. In this chapter, the authors develop a conceptual framework for analysing the threats, attacks, and security requirements pertaining to networked RFID systems. The vulnerabilities of, and the threats to, the system are identified using the threat model. The security framework itself consists of two main concepts: (1) the attack model, which identifies and classifies the possible attacks, and (2) the system model, which identifies the security requirements. The framework gives readers a method with which to analyse the threats any given system faces. Those threats can then be used to identify the attacks possible on that system and get a better understanding of those attacks. It also allows the reader to easily identify all the security requirements of that system and identify how those requirements can be met

    Tamper detection in RFID-enabled supply chains using fragile watermarking

    Get PDF
    While mainstream RFID research has been focused on solving privacy issues, security in general and data tampering in specific is still an open question. This paper analyzes potential security threats especially data tampering in RFID-enabled supply chains and proposes solutions how these threats might be addressed using fragile watermarking technologies. We first survey RFID system and its security problems, and then explain the importance of fragile watermarking schemes for RFID systems and possible applications using fragile watermarking to detect and locate any modification in RFID systems. Finally we suggest possible solutions using fragile watermarking for RFID-enabled supply chain

    Tamper detection in the EPC network using digital watermarking

    Get PDF

    Tamper Detection in the EPC Network Using Digital Watermarking

    Get PDF
    National Science Foundation of China [70971112, 70902042

    AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems

    Get PDF
    Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services. Hence, significant efforts have been made to design RFID systems that preserve users\u27 privacy. Majority of the privacy preserving protocols for RFID systems require the reader to search all tags in the system in order to identify a single RFID tag which not efficient for large scale systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Another technique is to perform group-based authentication that improves the tradeoff between scalability and privacy by dividing the tags into a number of groups. This novel authentication scheme ensures privacy of the tags. However, the level of privacy provided by the scheme decreases as more and more tags are compromised. To address this issue, in this paper, we propose a group based anonymous private authentication protocol (AnonPri) that provides higher level of privacy than the above mentioned group based scheme and achieves better efficiency (in terms of providing privacy) than the approaches that prompt the reader to perform an exhaustive search. Our protocol guarantees that the adversary cannot link the tag responses even if she can learn the identifier of the tags. Our evaluation results demonstrates that the level of privacy provided by AnonPri is higher than that of the group based authentication technique

    AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems

    Get PDF
    Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services. Hence, significant efforts have been made to design RFID systems that preserve users\u27 privacy. Majority of the privacy preserving protocols for RFID systems require the reader to search all tags in the system in order to identify a single RFID tag which not efficient for large scale systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Another technique is to perform group-based authentication that improves the tradeoff between scalability and privacy by dividing the tags into a number of groups. This novel authentication scheme ensures privacy of the tags. However, the level of privacy provided by the scheme decreases as more and more tags are compromised. To address this issue, in this paper, we propose a group based anonymous private authentication protocol (AnonPri) that provides higher level of privacy than the above mentioned group based scheme and achieves better efficiency (in terms of providing privacy) than the approaches that prompt the reader to perform an exhaustive search. Our protocol guarantees that the adversary cannot link the tag responses even if she can learn the identifier of the tags. Our evaluation results demonstrates that the level of privacy provided by AnonPri is higher than that of the group based authentication technique

    COMPUTER SECURITY

    Get PDF
    The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines

    A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these attacks. These protocols aim to ensure that the tags are in a distant area by measuring the round-trip delays during a rapid challenge-response exchange of short authenticated messages. Terrorist fraud is the most challenging attack to avoid, because a legitimate user (a tag owner) collaborates with an attacker to defeat the authentication system. Many RFID distance bounding protocols have been proposed recently, with encouraging results. However, none of them provides the ideal security against the terrorist fraud. Motivated by this need, we first introduce a strong adversary model for Physically Unclonable Functions (PUFs) based authentication protocol in which the adversary has access to volatile memory of the tag. We show that the security of Sadeghi et al.’s PUF based authentication protocol is not secure in this model. We provide a new technique to improve the security of their protocol. Namely, in our scheme, even if an adversary has access to volatile memory she cannot obtain all long term keys to clone the tag. Next, we propose a novel RFID distance bounding protocol based on PUFs which satisfies the expected security requirements. Comparing to the previous protocols, the use of PUFs in our protocol enhances the system in terms of security, privacy and tag computational overhead. We also prove that our extended protocol with a final signature provides the ideal security against all those frauds, remarkably the terrorist fraud. Besides that, our protocols enjoy the attractive properties of PUFs, which provide the most cost efficient and reliable means to fingerprint chips based on their physical properties
    corecore