440 research outputs found

    Method for registration of vaccines for covid 19, through nfc technology

    Get PDF
    Conferencia de la 8th Eighth International Virtual Conference on Biosignals, Images, and Instrumentation (ICBSII).In these times of pandemic caused by Covid-19, new ways of dealing with the effects of the virus emerge, for this reason multiple measures are being carried out with the intention of mitigating its effects in the event of a possible contagion, which is why vaccinations are being carried out massive in order to be able to defend oneself against potential contagions, in this work an application made using the NFC communication protocol that mobile devices have is shown, as a result the demonstration of the use of the application is presented, where it reflects the data to be entered and can be viewed from any device.Campus At

    Performance Analysis of SAP-NFC Protocol

    Get PDF
    The operations cost of authentication session is considered as strict indicator to evaluate the authentication protocols side by side with the security requirements achievements in the Near Field Communication (NFC) technology. The secure authentication protocol for the NFC mobile payment systems (SAP-NFC) one of the recent authentication protocols that have proposed to achieve high level of security features such as the fully mutual authentication, anonymity and untraceability. Moreover, the SAP-NFC protocol can prevent the current security attacks. This paper, analyzes the performance of the SAP-NFC protocol comparing with the other recent NFC mobile payment protocols in the NFC devices that are included in the system. The performance analysis has illustrated that the SAP-NFC protocol not only supports strong security features, but also offers low cost in term of amount of computations

    An Enhancement of Security Standards based on Pseudonyms

    Get PDF
    ABSTRACT: Nowadays, numerous mobile terminals have been released into market with NFC which stands for Near Field Communication. The smart devices equipped with NFC have made to improve the effective utility range of NFC. Particularly, NFC electronic payment is expected to take place of credit cards in epayment. Regarding that, it is necessary to direct the attention of security issues in NFC. At present, the security standards make use of user's public key at a fixed value in key agreement process. The message's relevancy can be obtained at the public key of NFC. Based on, malicious attacker can form a profile by collecting the required messages which leads to the infringement of privacy of user. The planned work presents conditional privacy protection method based on pseudonyms to overcome the problems mentioned earlier. Two users can communicate to each other based on some set of rules by sending the conditional privacy preserved Protocol Data Unit through NFC terminals. Additionally, the communicating party's identity can be computed to resolve problem if occurs. The proposal is implemented in hardware using ARM 7processor and NFC readers. It works well in decreasing the update cost and computation overhead by taking the merit of physical characteristics of NFC

    Opportunistic mobile social networks: architecture, privacy, security issues and future directions

    Get PDF
    Mobile Social Networks and its related applications have made a very great impact in the society. Many new technologies related to mobile social networking are booming rapidly now-a-days and yet to boom. One such upcoming technology is Opportunistic Mobile Social Networking. This technology allows mobile users to communicate and exchange data with each other without the use of Internet. This paper is about Opportunistic Mobile Social Networks, its architecture, issues and some future research directions. The architecture and issues of Opportunistic Mobile Social Networks are compared with that of traditional Mobile Social Networks. The main contribution of this paper is regarding privacy and security issues in Opportunistic Mobile Social Networks. Finally, some future research directions in Opportunistic Mobile Social Networks have been elaborated regarding the data's privacy and security

    Foreword and editorial - July issue

    Full text link

    ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G

    Get PDF
    • …
    corecore