1,808 research outputs found
Advanced Radio Frequency Identification Design and Applications
Radio Frequency Identification (RFID) is a modern wireless data transmission and reception technique for applications including automatic identification, asset tracking and security surveillance. This book focuses on the advances in RFID tag antenna and ASIC design, novel chipless RFID tag design, security protocol enhancements along with some novel applications of RFID
Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks
Embedded sensing systems are pervasively used in life- and security-critical
systems such as those found in airplanes, automobiles, and healthcare.
Traditional security mechanisms for these sensors focus on data encryption and
other post-processing techniques, but the sensors themselves often remain
vulnerable to attacks in the physical/analog domain. If an adversary
manipulates a physical/analog signal prior to digitization, no amount of
digital security mechanisms after the fact can help. Fortunately, nature
imposes fundamental constraints on how these analog signals can behave. This
work presents PyCRA, a physical challenge-response authentication scheme
designed to protect active sensing systems against physical attacks occurring
in the analog domain. PyCRA provides security for active sensors by continually
challenging the surrounding environment via random but deliberate physical
probes. By analyzing the responses to these probes, and by using the fact that
the adversary cannot change the underlying laws of physics, we provide an
authentication mechanism that not only detects malicious attacks but provides
resilience against them. We demonstrate the effectiveness of PyCRA through
several case studies using two sensing systems: (1) magnetic sensors like those
found wheel speed sensors in robotics and automotive, and (2) commercial RFID
tags used in many security-critical applications. Finally, we outline methods
and theoretical proofs for further enhancing the resilience of PyCRA to active
attacks by means of a confusion phase---a period of low signal to noise ratio
that makes it more difficult for an attacker to correctly identify and respond
to PyCRA's physical challenges. In doing so, we evaluate both the robustness
and the limitations of PyCRA, concluding by outlining practical considerations
as well as further applications for the proposed authentication mechanism.Comment: Shorter version appeared in ACM ACM Conference on Computer and
Communications (CCS) 201
PERFORMANCE ANALYSIS OF SECURITY MEASURES IN NEAR FIELD COMMUNICATION
Nowadays near field communication are largely used in so many different applications for the convenience and ease of use they provide. They store and exchange many personal data, some of them requires more security than others, due to the value they poses, such as banking information and personal identification. And maintaining high level of security is task of the utmost priority.
The main focus of this thesis is establishing a knowledge base for different NFC/RFID devices. Evaluating the different encryption algorithms used currently, based on their encryption/decryption time, their immunity to brute force attack, and the amount of power needed to execute them.
The encryption algorithms will be implemented using Python programing language and tested on a windows computer in order to test their immunity against brute force attack. Encryption/decryption time and the power usage will be tested on a Raspberry Pi, for the similarities it has with modern mobile devices.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format
On the design and implementation of efficient antennas for high frequency-radio frequency identification read/write devices
AbstractThis article describes an in‐depth methodical approach to the development of efficient high‐frequency (HF) antennas for use in radio frequency identification (RFID) systems operating at 13.56 MHz. It presents brief theory relevant to RFID communication and sets up a framework within which features and requirements of antennas are linked to key design parameters such as antenna form‐factor and size; RF power level, material and communication protocol. Tuning circuits necessary to adjust the resonance and power matching characteristics of antennas for good transponder interrogation and response recovery are discussed. To validate the approaches outlined, a stepwise design and measurement of an HF antenna for an ISO/IEC 15693 compliant read/write device (RWD) is described. Common practical problems that are often encountered in such design processes are also commented on. The prototyped antenna was tuned, connected to the RWD via a 50 coaxial cable and tested
Survey: An overview of lightweight RFID authentication protocols suitable for the maritime internet of things
The maritime sector employs the Internet of Things (IoT) to exploit many of its benefits to maintain a competitive advantage and keep up with the growing demands of the global economy. The maritime IoT (MIoT) not only inherits similar security threats as the general IoT, it also faces cyber threats that do not exist in the traditional IoT due to factors such as the support for long-distance communication and low-bandwidth connectivity. Therefore, the MIoT presents a significant concern for the sustainability and security of the maritime industry, as a successful cyber attack can be detrimental to national security and have a flow-on effect on the global economy. A common component of maritime IoT systems is Radio Frequency Identification (RFID) technology. It has been revealed in previous studies that current RFID authentication protocols are insecure against a number of attacks. This paper provides an overview of vulnerabilities relating to maritime RFID systems and systematically reviews lightweight RFID authentication protocols and their impacts if they were to be used in the maritime sector. Specifically, this paper investigates the capabilities of lightweight RFID authentication protocols that could be used in a maritime environment by evaluating those authentication protocols in terms of the encryption system, authentication method, and resistance to various wireless attacks
Modelling the Positional and Orientation Sensitivity of Inductively Coupled Sensors for Industrial IoT Applications
As the Internet of Things (IoT) sector continually expands there is a growing abstraction between physical objects and the data associated with them. At the same time, emerging Industrial-IoT applications rely upon diverse and robust hardware sensing interfaces in order to deliver high quality data. In this paper, the fundamental limitations associated with inductive proximity sensing interfaces are considered in terms of positional and orientation sensitivity and a triaxial approach is proposed that enables arbitrary source-sensor positioning. A matrix transformation model based on the field coupling equations is applied to a number of candidate configurations assessed according their relative source-sensor coverage and graphical visualization of coupling quality. Particular attention is paid to the recombination of tri-sensor outputs involving direct-summation, rectifysummation, best-coil and root-mean-square methods. Of these, the rectify-summation method was observed to provide favorable performance, exceeding 70% coverage for practical cases, thus far exceeding that of traditional co-planar arrangements
Automatic student attendance registration using radio frequency identification (RFID)
Thesis (M. Tech.) - Central University of Technology, Free State, 2010The main aim of this research was to automate student attendance registration, thereby reducing human involvement in the whole process. This was made possible using Radio Frequency Identification (RFID) technology.
The Central University of Technology uses student cards that are compatible for use with RFID technology. As a result, no initial investment (except for the existing personal computer’s and the constructed RFID reader) in infrastructure was required for this project.
The basic working of the project was as follows. The students belonging to a specific class had their vital educational data (Student number, Name) entered into a database table at the time of registration. A student card containing a serial number, with reference to the data contained in the database table, was given to the students after registration.
The students walk into their respective classes and scan their student cards with the RFID reader. The serial number stored in the student card is transferred to the reader and from there wirelessly to the main server using ZigBee technology. In the main server, using Java programming language, the card serial number is sent to the Integrated Development Environment (IDE). In this project the Netbeans IDE (Java platform) was used.
The Netbeans IDE is connected to the Apache Derby database using Java Database Connector (JDBC), so the serial number (which is referenced to the educational data of the students) from the student card is automatically compared with the original database created at the time of registration. Once a match is confirmed between the two entries, the data is entered into a separate database table which serves as the basic attendance sheet for a specific day
Big Data and the Internet of Things
Advances in sensing and computing capabilities are making it possible to
embed increasing computing power in small devices. This has enabled the sensing
devices not just to passively capture data at very high resolution but also to
take sophisticated actions in response. Combined with advances in
communication, this is resulting in an ecosystem of highly interconnected
devices referred to as the Internet of Things - IoT. In conjunction, the
advances in machine learning have allowed building models on this ever
increasing amounts of data. Consequently, devices all the way from heavy assets
such as aircraft engines to wearables such as health monitors can all now not
only generate massive amounts of data but can draw back on aggregate analytics
to "improve" their performance over time. Big data analytics has been
identified as a key enabler for the IoT. In this chapter, we discuss various
avenues of the IoT where big data analytics either is already making a
significant impact or is on the cusp of doing so. We also discuss social
implications and areas of concern.Comment: 33 pages. draft of upcoming book chapter in Japkowicz and Stefanowski
(eds.) Big Data Analysis: New algorithms for a new society, Springer Series
on Studies in Big Data, to appea
Real life Applications of Internet of Things
The Internet of Things is the next technological revolution after the revolution of computer and internet. IoT integrates the new technologies of computing and communication (e.g. Sensor networks, RFID, Mobile communication and IPV6 etc). The Internet of Things is an emerging topic of technical, social, and economic significance. The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate exchange and consume data with minimal human intervention. Internet connect “all people”, Internet of Things connect “all things”. Interconnection of Things or Objects or Machines, e.g., sensors, actuators, mobile phones, electronic devices, home appliances, any existing items and interact with each other via Interne
Integrating the Supply Chain with RFID: A Technical and Business Analysis
This paper presents an in-depth analysis of the technical and business implications of adopting Radio Frequency Identification (RFID) in organizational settings. The year 2004 marked a significant shift toward adopting RFID because of mandates by large retailers and government organizations. The use of RFID technology is expected to increase rapidly in the next few years. At present, however, initial barriers against widespread adoption include standards, interoperability, costs, forward compatibility, and lack of familiarity. This paper describes basic components of an RFID system including tags, readers, and antennas and how they work together using an integrated supply chain model. Our analysis suggests that business needs to overcome human resource scarcity, security, legal and financial challenges and make informed decision regarding standards and process reengineering. The technology is not fully mature and suffers from issues of attenuation and interference. A laboratory experiment conducted by the authors\u27 shows that the middleware is not yet at a plug-and-play stage, which means that initial adopters need to spend considerable effort to integrate RFID into their existing business processes. Appendices contain a glossary of common RFID terms, a list of RFID vendors and detailed findings of the laboratory experiment. NOTE: BECAUSE OF THE ILLUSTRATIONS USED, THIS ARTICLE IS LONG; APPROXIMATELY 850KB IN BOTH JOURNAL AND ARTICLE VERSIO
- …