191 research outputs found

    Ensuring Application Specific Security, Privacy and Performance Goals in RFID Systems

    Get PDF
    Radio Frequency IDentification (RFID) is an automatic identification technology that uses radio frequency to identify objects. Securing RFID systems and providing privacy in RFID applications has been the focus of much academic work lately. To ensure universal acceptance of RFID technology, security and privacy issued must be addressed into the design of any RFID application. Due to the constraints on memory, power, storage capacity, and amount of logic on RFID devices, traditional public key based strong security mechanisms are unsuitable for them. Usually, low cost general authentication protocols are used to secure RFID systems. However, the generic authentication protocols provide relatively low performance for different types of RFID applications. We identified that each RFID application has unique research challenges and different performance bottlenecks based on the characteristics of the system. One strategy is to devise security protocols such that application specific goals are met and system specific performance requirements are maximized. This dissertation aims to address the problem of devising application specific security protocols for current and next generation RFID systems so that in each application area maximum performance can be achieved and system specific goals are met. In this dissertation, we propose four different authentication techniques for RFID technologies, providing solutions to the following research issues: 1) detecting counterfeit as well as ensuring low response time in large scale RFID systems, 2) preserving privacy and maintaining scalability in RFID based healthcare systems, 3) ensuring security and survivability of Computational RFID (CRFID) networks, and 4) detecting missing WISP tags efficiently to ensure reliability of CRFID based system\u27s decision. The techniques presented in this dissertation achieve good levels of privacy, provide security, scale to large systems, and can be implemented on resource-constrained RFID devices

    SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography

    Get PDF
    Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Since the RFID server, reader, and tag communicate via insecure channels, mutual authentication between the reader and the tag is necessary for secure communication. The central database server supports the authentication of the reader and the tag by storing and managing the network data. Recent lightweight RFID authentication protocols have been proposed to satisfy the security features of RFID communication. A serverless RFID system is a new promising solution to alternate the central database for mobile RFID models. In this model, the reader and the tag perform the mutual authentication without the support of the central database server. However, many security challenges arise from implementing the lightweight RFID authentication protocols in the serverless RFID network. We propose a new robust serverless RFID authentication protocol based on the Elliptic Curve Cryptography (ECC) to prevent the security attacks on the network and maintain the confidentiality and the privacy of the authentication messages and tag information and location. While most of the current protocols assume a secure channel in the setup phase to transmit the communication data, we consider in our protocol an insecure setup phase between the server, reader, and tag to ensure that the data can be renewed from any checkpoint server along with the route of the mobile RFID network. Thus, we implemented the elliptic curve cryptography in the setup phase (renewal phase) to transmit and store the data and the public key of the server to any reader or tag so that the latter can perform the mutual authentication successfully. The proposed model is compared under the classification of the serverless model in term of computation cost and security resistance

    Survey on Prominent RFID Authentication Protocols for Passive Tags

    Get PDF
    Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.http://dx.doi.org/10.3390/s1810358

    Identifying Early-Life Behavior to Predict Mothering Ability in Swine Utilizing NUtrack System

    Get PDF
    Early recognition of indicator traits for swine reproduction and longevity supports economical selection decision making. Gilt activity is a key variable impacting a sow’s herd life and productivity. The purpose of this study was to examine early- life behaviors contributing to farrowing traits including gestation length (GL), number born alive (NBA), number weaned (NW), and herd life (HL). Herd life was a binary trait representing if a gilt was culled after one parity. Beginning at approximately 20 weeks of age, video recordings were taken on 480 gilts for 7 consecutive days and processed using the NUtrack system. Activity traits include angle rotated (degree), average speed (m/s), distance travelled (m), time spent eating (s), lying lateral (s), lying sternal (s), standing (s), and sitting (s). Final daily activity values were averaged across the period under cameras. Parity one data was collected for all gilts considered. Data were analyzed using linear regression models and odds ratios (R version 4.0.2). GL was significantly impacted by angle rotated (p = 0.03), average speed (p = 0.07), distance travelled (p = 0.05), time spent lying lateral (p = 0.003), and lying sternal (0.02). NBA was significantly impacted by time spent lying lateral (p = 0.01), lying sternal (p = 0.07), and time spent sitting (p = 0.08). NW was significantly impacted by time spent eating (p = 0.09), time spent lying lateral (p = 0.04), and time spent sitting (p = 0.007). Estimated odds ratios showed gilts traveling below average speeds and spending below average time lying sternal were positively associated with below average GL. Gilts spending below average time lying lateral are associated with below average NW. Gilts spending below average time sitting were negatively associated with below average NW. Gilts spending below average time lying sternal were negatively associated with below average HL. This analysis suggests early-life gilt behavior is associated with sow productivity traits of importance. Further examination of the link between behavior and reproductive traits is necessitated. Utilization of the NUtrack video monitoring system to isolate behavioral differences offers potential to aide in selection decisions. Advisor: Benny Mot

    Characterization of Swine Production Using Measurements Collected via Indoor Positioning System

    Get PDF
    Legislative and market initiatives are requiring that gestating sows move from individual housing to group settings. Little information is known about coping styles of individual sows in these more socially complex environments and thus the impact of different behavioral strategies on sow reproductive success and efficiency was investigated. The movements of 70 sows during periods of reintroduction into large pen gestational housing following insemination was measured with a commercially available system that tracked animal location and accelerations. Principle component analysis (PCA) was used to establish composite variables characterizing each animal’s behavioral response to social reintroduction and revealed the presence of two new variables accounting for over 60% of the variance in behaviors: one pertaining to total movement and the other pertaining to social dominance/rapid movements. Component scores of total movement predicted measures of reproductive successes whereas social dominance/rapid movements predicted piglet birthweight. These findings suggest that different coping styles as measured by an automated, non-invasive, real time tracking system are correlated with the productivity of sows housing in socially complex settings

    Survivability modeling for cyber-physical systems subject to data corruption

    Get PDF
    Cyber-physical critical infrastructures are created when traditional physical infrastructure is supplemented with advanced monitoring, control, computing, and communication capability. More intelligent decision support and improved efficacy, dependability, and security are expected. Quantitative models and evaluation methods are required for determining the extent to which a cyber-physical infrastructure improves on its physical predecessors. It is essential that these models reflect both cyber and physical aspects of operation and failure. In this dissertation, we propose quantitative models for dependability attributes, in particular, survivability, of cyber-physical systems. Any malfunction or security breach, whether cyber or physical, that causes the system operation to depart from specifications will affect these dependability attributes. Our focus is on data corruption, which compromises decision support -- the fundamental role played by cyber infrastructure. The first research contribution of this work is a Petri net model for information exchange in cyber-physical systems, which facilitates i) evaluation of the extent of data corruption at a given time, and ii) illuminates the service degradation caused by propagation of corrupt data through the cyber infrastructure. In the second research contribution, we propose metrics and an evaluation method for survivability, which captures the extent of functionality retained by a system after a disruptive event. We illustrate the application of our methods through case studies on smart grids, intelligent water distribution networks, and intelligent transportation systems. Data, cyber infrastructure, and intelligent control are part and parcel of nearly every critical infrastructure that underpins daily life in developed countries. Our work provides means for quantifying and predicting the service degradation caused when cyber infrastructure fails to serve its intended purpose. It can also serve as the foundation for efforts to fortify critical systems and mitigate inevitable failures --Abstract, page iii

    Passive low frequency RFID for non-destructive evaluation and monitoring

    Get PDF
    Ph. D ThesisDespite of immense research over the years, defect monitoring in harsh environmental conditions still presents notable challenges for Non-Destructive Testing and Evaluation (NDT&E) and Structural Health Monitoring (SHM). One of the substantial challenges is the inaccessibility to the metal surface due to the large stand-off distance caused by the insulation layer. The hidden nature of corrosion and defect under thick insulation in harsh environmental conditions may result in it being not noticed and ultimately leading to failures. Generally electromagnetic NDT&E techniques which are used in pipeline industries require the removal of the insulation layer or high powered expensive equipment. Along with these, other limitations in the existing techniques create opportunities for novel systems to solve the challenges caused by Corrosion under Insulation (CUI). Extending from Pulsed Eddy Current (PEC), this research proposes the development and use of passive Low Frequency (LF) RFID hardware system for the detection and monitoring of corrosion and cracks on both ferrous and non-ferrous materials at varying high temperature conditions. The passive, low cost essence of RFID makes it an enchanting technique for long term condition monitoring. The contribution of the research work can be summarised as follows: (1) implementation of novel LF RFID sensor systems and the rig platform, experimental studies validating the detection capabilities of corrosion progression samples using transient feature analysis with respect to permeability and electrical conductivity changes along with enhanced sensitivity demonstration using ferrite sheet attached to the tag; (2) defect detection using swept frequency method to study the multiple frequency behaviour and further temperature suppression using feature fusion technique; (3) inhomogeneity study on ferrous materials at varying temperature and demonstration of the potential of the RFID system; (4) use of RFID tag with ceramic filled Poly-tetra-fluoro-ethyulene (PTFE) substrate for larger applicability of the sensing system in the industry; (5) lift-off independent defect monitoring using passive sweep frequency RFID sensors and feature extraction and fusion for robustness improvement. This research concludes that passive LF RFID system can be used to detect corrosion and crack on both ferrous and non-ferrous materials and then the system can be used to compensate for temperature variation making it useful for a wider range of applications. However, significant challenges such as permanent deployment of the tags for long term monitoring at higher temperatures and much higher standoff distance, still require improvement for real-world applicability.Engineering and Physical Sciences Research Council (EPSRC) CASE, National Nuclear Laboratory (NNL)

    Development of sensors and non-destructive techniques to determine the performance of coatings in construction

    Get PDF
    The primary objective of this work was to examine and develop techniques for monitoring the degradation of Organically Coated Steel (OCS) in-situ. This included the detection of changes associated with the weathering to both the organic coating and metallic substrate. Initially, a review of current promising techniques was carried out however many were found to be unsuitable for this application and the adaptation of current techniques and the development of new techniques was considered. A brief concept investigation, based on initial testing and considerations, was used to determine a number of sensing techniques to examine. These included embedded, Resonant Frequency Identification (RFID), Magnetic Flux Leakage (MFL) and dielectric sensing. Each of these techniques were assessed for the application, prototyped, and tested against a range of samples to determine the accuracy and sensitivity of degradation detection provided. A range of poorly and highly durable coated samples were used in conjunction with accelerated weathering testing for this aim. Track based electronic printed sensors were presented as both a cut edge corrosion tracking and coating capacitance measurement method. While suffering somewhat from electrical paint compatibility issues both concepts showed merit in initial trials however the capacitive sensor ultimately proved insufficiently responsive to coating changes. The embedded, progressive failure-based, cut edge corrosion sensor was produced and tested in modern coating systems with moderate success. Novel applications of RFID and MLF techniques were considered and proved capable of detecting large changes in substrate condition due to significant corrosion. However, there was a lack of sufficient sensitivity when considering early-stage corrosion of durable modern OCS products. Finally, it was shown that a chipless antenna could be designed and optimised for novelly monitoring the changes to the dielectric properties of a paint layer due to degradation. However, ultimately this test, due to equipment requirements, lent itself more to lab testing than in-situ. Due to some of these limitations a different approach was considered in which the environmental factors influencing degradation were examined with the aim of relating these to performance across a building. It was observed that a combination of high humidity and the build-up of aggressive natural deposits contributed to high degradation rates in sheltered regions, such as building eaves, where microclimates were created. The build-up of deposits and their effect was presented as a key degradation accelerant during in-use service. A unique numerical simulation approach was developed to predict the natural washing, via rain impact and characteristics of the building analysed. This approach showed promise for determining areas unlikely to be naturally washed, and therefore subjected to a degradation accelerating, build-up of deposits. Given these understandings coated wetness sensors were considered as a realistic live-monitoring device capable of determining deposit build up and ultimately OCS lifetime

    Air Force Institute of Technology Research Report 2010

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, Mathematics, Statistics and Engineering Physic
    • …
    corecore