Implementation of a PC Security System using RF Transmitter-Receivers

Size: px
Start display at page:

Download "Implementation of a PC Security System using RF Transmitter-Receivers"

Transcription

1 Smart Computing Review, vol. 2, no. 4, August Smart Computing Review Implementation of a PC Security System using RF Transmitter-Receivers Il-Ho Park Technology Research Center, RetailTech LTD. / 1002, Seven Venture Valley 2-Dong, 625, Sampyung-Dong, Bungdang-Gu, Sungnam-Si, Gyunggi-Do, Korea / ihpark@retailtech.co.kr Received May 16, 2012; Revised July 13, 2012; Accepted July 31, 2012; Published August 31, 2012 Abstract: This paper suggests data communication using an RF Transmitter-Receiver and a PC protection method a connected Receiver and software. Older PC protection systems demanded manual operation, but the suggested method protects PC automatically by checking user Tags when they approach. Forgery is impossible and it is safe from sniffing attacks and spoofing. Keywords: RFID, RF Transmitter-Receiver, PC Protection, Authentication Introduction T oday, due to the increasing dissemination of personal computers and the Internet, work operated by computer is consistently on the rise in all sorts of fields. In accordance to this growing usage of computers, various kinds of security systems are being researched and developed to protect significant information. There are many ways to prevent the discharge of information in traditional computers; inputting a password saved in the user PC, the recognition of smart cards by card readers connected to the computer, and biometric identification technology using fingerprints through fingerprint recognizers attached to the computer. However, there are some drawbacks to the current methods. The password input method demands regular alteration of the password, and if this is lost, it requires great effort to retrieve the data. For smart cards, there are inconveniences from contact cards having to always be inserted into the card reader, and using contactless cards also has inconvenience for its recognition range is very short, causing reception failure. Biometric identification as also creates inconvenience for the necessity of fingerprint recognition for every log-in attempt, and its recognition rate is very poor. RFID Concept and Technology DOI: /smartcr

2 270 Park: Implementation of a PC Security System using RF Transmitter-Receivers RFID Concept and Movement RFID Technology is a developed system based on the bar code and magnetic card systems already adapted very closely to our daily life, but the consistent change of production form, consumer consciousness, cultural, and technical advances accelerates the need of resolving the flaws of magnetic cards. In short, it is a technology to recognize, trace, and identify human beings, objects, animals, and anything else, wirelessly [1]. The RFID system consists of tags, readers, and data process systems capable of processing data read from the tag. Data communication between the tag and reader is enacted by a wireless communication process [1]. The elementary RFID system operates as shown in Figure 1. It consists of a structure enabling tags containing information of the product. It can be used in applications through host computers or dedicated server-middleware using a network or dedicated cable. It recognizes product information with an RF reader using an air interface as its media. It is capable of transmitting and receiving data through a wireless RF channel. The air interface is a wireless communication interface regulation and a generic term for wireless access conditions depending on frequency, communication process, access process, and other factors. An RFID system has a structure of tag answering RFID questions, and antennas are necessary in the tag or reader for wireless communication [1]. Tag An RFID tag is a device containing memory capable of storing data read from antennas used for transmitting and receiving data, power supplies from the reader, tag ID, or the user. The process of recognition through a reader attached to all sorts of objects is necessary [1]. Tags can be divided into two large groups: active tags containing its own power source, and passive tags receiving power supply through a magnetic field [1]. Reader An RFID reader is a device designed for software applications to read and write data from contactless RFID tags. An RFID reader transmits command to an active tag through an HF interface, and function as descrambling answering data received from a tag to digital data. Moreover, an active tag functions with independent power in the tag, useful for functions other than transmitting and receiving commands and answering data, unlike a passive tag which only waits for a reader to scan it [1]. An RFID reader consists of the following parts: antenna components for supplying power to the tag and transmitting and receiving wirelessly, HF interface components for wireless transmission and reception of data through an antenna,

3 Smart Computing Review, vol. 2, no. 4, August control components for analyzing and receiving commands from external interfaces and transmitting data received from the tag, and a communication component for transmitting tag data to external interfaces using various communication methods (serial communication (RS-232, RS-485), USB, wire/wireless LAN) [1]. Cryptologic Certification Protocol Current RFID system studies focus mainly on the certification process through cryptologic methods, and have promoted the Hash-Lock technique [8], expanded Hash-Lock technique [8], Hash-Chain technique [7], Hash based ID modification technique [5], advanced Hash based modification technique [3], Challenge-Response based secured RFID certification technique [2], and external re-encryption technique [6]. Hash-Lock Technique: This is a technique rejecting ID tokens until a suitable value is entered into a tag. This technique uses Hash Functions only once, enabling it to function for a low price. Expanded Hash-Lock Technique: This is expanded, with a location-tracing solution, techniques greater than the Hash-Lock technique, and presumes that the tag contains a Hash Random Number Generator. Regular Key Modification Technique: This is a technique that regularly modifies tags and back-end database key values through the cross-modification of readers and tags, enabling secured communication even if a hacker extorts the key, making the extorted key useless in the next session. Existing PC Security System PC Security Using Password: It is basically a PC security system used in Windows user log-in or Screen Saver log-in and has the benefits of simple to use and free of charge. But it has the inconvenience of having to input the password through a keyboard, and users must modify the password continuously for security. Moreover, leakage of the password while being input is a security hole, and losing the password is also a concern. PC Security Using Biometric Identification: It is a method of certification using fingerprints: a user makes contact with hardware capable of fingerprint recognition and log-ins through authentication using software installed in the PC. This method demands the purchase of high-price fingerprint recognition hardware and passive finger contact. Moreover, it demands contact repeatedly due to poor recognition, causing concerns of fingerprint information leakage. PC Security Using Smart Card Method: It is a communication method with the reader using card-type RFID tags. A user needs to possess the card and needs to authenticate by placing the card close to the USB or serial reader connected to the PC. This method has disadvantages in short recognition distance, and passive card use. Moreover, it is capable of duplication and counterfeit. Design for PC Security System Using RFID Transmitter-Receiver RF Transmitter (Tag) Design (1) Tag initializes all internal modules; the primary phase to transmit data to the reader.

4 272 Park: Implementation of a PC Security System using RF Transmitter-Receivers (2) Tag composites values to be conveyed to the reader. Among these values, tag initially checks for battery power and if the power drops blow certain volume or if the battery check module judges a battery power disorder, the flag value sets to 0. If no disorder is detected, the flag sets to 1 and proceeds to the next process. (3) Tag can select the wireless signal intention for its purpose beforehand, and the set value is saved in the IC internal register and adjusts the RF output intensity. (4) In MCU, the flag value transmitted from a battery check circuit and RF dissemination intensity is combined with a tag ID saved in the memory and form data value to be transferred to the reader. (5) Module to repeat the same operation for the designated period, and repeat from the battery check circuit after a certain amount of time. RF Receiver (Reader) Design (1) If RF receiver is attached to a PC USB port, it uses power supplied from USB port in the PC I/O controller, and initializes all internal modules to transfer data to be transmitted from the RF transmitter to PC security software. (2) If data is transferred from the user s PC through a USB port, a command analysis module determines whether or not it is a connection check command, and after it identifies a connection check command, an ACK signal is transmitted to the connected PC. If it doesn t find a connection, it remains open for reception, standing by for a command transmitted from a user s PC. (3) When connection with a user PC is confirmed, PC security software transmits a command, and it operates by interpreting received data from the RF transmitter-receiver through a command analysis module. (4) Operations corresponding to each command are conducted by combining received data through an RF track for protocol or producing data corresponding to the command. (5) To transmit thus made data to a user PC, value is combined in the main controller through an external interface communication module. (6) The reader continuously transmits received data from the RF transmitter until the transmission conclusion command is received from the user PC, and if an initialization command is received during data transmission, it restarts from the PC connection confirmation.

5 Smart Computing Review, vol. 2, no. 4, August RF Transmitter-Receiver Protocol Design Figure 5 indicates the response protocol for received data from tags to readers or received command from the PC-connected reader, and from the tag. It either receives and transfers each tag ID and information to a PC-connected reader, or receives a command from a reader and conducts corresponding operations and responses according to the result.

6 274 Park: Implementation of a PC Security System using RF Transmitter-Receivers Security Software Design PC security software receives data from an RF receiver (Reader hereinafter) handling data sent by an RF transmitter (Tag hereinafter) in real time, and if data is not received from Tag or the Tag ID is not transferred to the software, PC security begins operating. PC security software prevents the usage of keyboard or mouse other than a program set keyboard. At this moment, if data is not received from the Tag carried by the user, the user is considered to be out of the reader signal range, and the fact that the Reader ID is not being transferred indicates that someone else intentionally removed the Reader, therefore the PC security software begins to protect the data. Authorized ID and passwords are encrypted by a Hash algorithm, therefore it cannot be decrypted by any means. The distinct feature about the used Hash algorithm is that it only provides a one-way function, therefore minimizing system resource usage by an unnecessary descrambling process, and protecting data from trespassers with malicious intent. Materialization and Performance Assessment Materialization If no user possessing a tag registered in PC protector is near, PC security will execute and will look like Figure 6. Primary PC security will be processed with a screen saver and a PC protector lock, and unless a special user key is used, the mouse and keyboard will not operate. If a user possessing a tag registered in the PC protector approaches, security will be automatically cleared, and if the user has lost possession of the tag, the user can clear the security by clearing the screen saver with a special user key and logging into the PC with a registered ID and password. Performance Assessment 1) Performance Assessment for Security Security against Sniffing Offenses: The recommended method is to transmit a sequence between Reader and Tag, and offenders cannot infer the necessary key set for descrambling even if he/she can attain the sequence. Security against Spoofing and Repeat Request Offense: A key-set is essential to use a sequence for crosscertification, to form a sequence, and to descramble the computer. If a key-set is unavailable, a Hash algorithm used for key-set inference cannot be inferred, therefore it is safe. 2) Comparison Analysis

7 Smart Computing Review, vol. 2, no. 4, August Password security requires a user to input a password into a PC, fingerprint recognition requires a user fingerprint, and a smart card requires cards to be inserted into a card reader, making them passive. However, the recommended method is automatic, for the security is cleared when a Reader receives data from the Tag. If not, security operates. Moreover, password security has a weakness to anonymous input. Dictionary offenses and fingerprint recognition is unavailable when a fingerprint contains foreign bodies or abrasions. Smart cards also have concerns regarding card duplication, but the recommended method has only one Tag ID, which is impossible to duplicate. For safety experiments, comparison analysis has been conducted for recognition rate between PC security using fingerprint recognition and an RF transmitter-receiver. For the recommended system, we turned the Tag switch on/off, and for fingerprints, we simply put the fingerprint in a fingerprint recognizer. The experimental assessment for the above content is as Figure 7. Fingerprint recognition presented a 97.5% recognition rate, while the recommended system presented a 99.5% recognition rate. Figure 8 is the result of a comparison assessment of recommended system misjudgment rate and fingerprint recognition misjudgment. Fingerprint recognition presented 5 misjudgments in 200 trials, showing a 2.5% misjudgment rate, while the recommended system presented 1 misjudgment for 200 trials, showing a 0.5% misjudgment rate.

8 276 Park: Implementation of a PC Security System using RF Transmitter-Receivers Conclusion Today, due to increasing dissemination of personal computers and Internet, work operated by computer is consistently on the rise in all sorts of fields. In accordance to this growing usage of computers, computers contain much significant information, and various kinds of security systems are researched and developed to protect them. For existing PC security methods, a password input system required regular modification of passwords, and if the password is lost, it has difficulties in retrieving data. A smart cart system has the inconvenience of inserting a smart card into a card reader, and contactless smart card systems still have a short range of recognition, causing the inconvenience of reception failure. A fingerprint system also has the inconvenience of poor recognition rate compared to other technologies. This paper has studied PC security systems using an RF transmitter-receiver encryption method, and describes the details of PC security system design, materialization, and experiments. A recommended system communicates by encrypting data into Hash data using an RF transmitter and receiver and receiving certification by checking an RF transmitter ID for registration existence through PC security system operated in a PC. The recommended system, unlike existing PC security systems requiring passive movement from users, is convenient for the automatic log-in that doesn t require user actions, but locks and unlocks PC security by the distance of an RF transmitter and RF reader. Also, the readers and tags are small and easy to carry and use on a necklace-type tag. Passwords are vulnerable to dictionary attacks, and fingerprint recognition systems have the potential for recognition failure due to foreign bodies on a user fingerprint, and the potential of information leakage for unauthorized personnel with similar fingerprints. Moreover, RFID in smart cards can be duplicated or damaged by magnetic fields. The recommended system in this paper cannot be duplicated, and is safe due to unlocking the communication between Tag and Reader. It also is semi-permanently usable with battery exchange. Finally, for a comparison experiment between a PC security system using an RF transmitter-receiver and a PC security system using fingerprint recognition to verify PC security system safety, fingerprint PC security showed a 2.5% misjudgment rate while RF transmitter-receiver PC security system showed a 0.5% misjudgment rage. References [1] Ahn, Jae Myoung, RFID technology and application based on EPC GLOBAL NETWORK, [2] Lee, Keun woo, Oh, Dong Kyu, Kwak Jin, Oh, Soo Hyun, Kim, Seung Joo, Won Dong Ho, Safe RFID certification protocol based on Challenge-Response suitable for disperse database environment, Information Processing Society of Korea Thesis C, vol. 12-C, no. 3, pp , June [3] Hwang, Young Joo, Lee, Soo Mi, Lee Dong Hoon, Lim, Jong In, Low-Cost RFID certification protocol under ubiquitous environment, in Proc. of Information Security Society of Korea Summer Information Security Conference, vol.14, no. 1, pp , [4] Jung, Hang Sup Research on fingerprint recognition using Fuzzy Inference, Master s Thesis, [5] Henrich, D. and M?ller, P., Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers, in Proc. of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshop (PERCOMW'04), pp , Article (CrossRef Link) [6] A.Juels, R.Pappu, Squealing Euros : Privacy protection in RFID -enabled banknotes, Financial Cryptography '03, LNCS 2742, pp , Springer-Verlag Heidelberg, [7] M. Ohkubo, K. Suzuki, and S. Kinosita, Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low- Cost RFID, in Proc. of the SCIS 2004, pp , [8] Weis, S. et al., Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, Security Pervasive Computing, 2003 LNCS 2802, pp , Springer-Verlag Heidelberg [9] X. Li, Q.-A. Zeng, Design and Implementation of a Wireless Security System using RF Technology, International Journal of Computing Science, vol. 1, no. 1, Jan [10] G. Verma, P. Tripathi, A Digital Security System with Door Lock System Using RFID Technology, International Journal of Computer Applications, vol. 5, no.11, Aug Article (CrossRef Link) [11] D. R. Reising, M. A. Temple, M. J. Mendenhall, Improved wireless security for GMSK-based devices using RF fingerprinting, International Journal of Electronic Security and Digital Forensics archive, vol. 3 no. 1, pp , Mar Article (CrossRef Link)

9 Smart Computing Review, vol. 2, no. 4, August Il-Ho Park received his BS in Multimedia Science from Chungwoon University, Chungnam, Korea, in From 2007 to now, he has worked as a Researcher at the Technology Research Centre, RetailTech, in Korea. His research interests include RFID/USN, Security, and Smart Space. Copyrights 2012 KAIS

A Study on the Security of RFID with Enhancing Privacy Protection

A Study on the Security of RFID with Enhancing Privacy Protection A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

International Journal of Engineering Research & Management Technology

International Journal of Engineering Research & Management Technology International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of

More information

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for

More information

LibRFID: Automation Software for Library Management System Using RFID Technology

LibRFID: Automation Software for Library Management System Using RFID Technology LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi,

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,

More information

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi

More information

Device-based Secure Data Management Scheme in a Smart Home

Device-based Secure Data Management Scheme in a Smart Home Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,

More information

Tackling Security and Privacy Issues in Radio Frequency Identification Devices

Tackling Security and Privacy Issues in Radio Frequency Identification Devices Tackling Security and Privacy Issues in Radio Frequency Identification Devices Dirk Henrici and Paul Müller University of Kaiserslautern, Department of Computer Science, PO Box 3049 67653 Kaiserslautern,

More information

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,

More information

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,

More information

An Innovative Two Factor Authentication Method: The QRLogin System

An Innovative Two Factor Authentication Method: The QRLogin System An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune

More information

Secure Active RFID Tag System

Secure Active RFID Tag System Secure Active RFID Tag System Isamu Yamada 1, Shinichi Shiotsu 1, Akira Itasaki 2, Satoshi Inano 1, Kouichi Yasaki 2, and Masahiko Takenaka 2 1 Fujitsu Laboratories Ltd. 64 Nishiwaki, Ohkubo-cho, Akashi

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Design and Implementation of Automatic Attendance Check System Using BLE Beacon

Design and Implementation of Automatic Attendance Check System Using BLE Beacon , pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,

More information

Privacy Enhanced Active RFID Tag

Privacy Enhanced Active RFID Tag Privacy Enhanced Active RFID Tag Shingo Kinoshita, Miyako Ohkubo, Fumitaka Hoshino, Gembu Morohashi, Osamu Shionoiri, and Atsushi Kanai NTT Information Sharing Platform Laboratories, NTT Corporation 1-1

More information

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

RFID Security and Privacy: A Research Survey. Vincent Naessens Studiedag Rabbit project

RFID Security and Privacy: A Research Survey. Vincent Naessens Studiedag Rabbit project RFID Security and Privacy: A Research Survey Vincent Naessens Studiedag Rabbit project RFID Security and Privacy: A Research Survey 1. Introduction 2. Security and privacy problems 3. Basic RFID tags 4.

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

A Survey of RFID Authentication Protocols Based on Hash-Chain Method

A Survey of RFID Authentication Protocols Based on Hash-Chain Method Third 2008 International Conference on Convergence and Hybrid Information Technology A Survey of RFID Authentication Protocols Based on Hash-Chain Method Irfan Syamsuddin a, Tharam Dillon b, Elizabeth

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,

More information

Privacy and Security in library RFID Issues, Practices and Architecture

Privacy and Security in library RFID Issues, Practices and Architecture Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library

More information

On the Security of RFID

On the Security of RFID On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com

More information

RFID Security: Threats, solutions and open challenges

RFID Security: Threats, solutions and open challenges RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)

More information

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System , pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department

More information

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key International Journal of Network Security, Vol.18, No.6, PP.1060-1070, Nov. 2016 1060 A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key Trung Thanh Ngo and Tae-Young

More information

International Journal for Research in Computer Science

International Journal for Research in Computer Science TOPIC: MOBILE COMPUTING AND SECURITY ISSUES. ABSTRACT Owodele Odukale The past decade has seen a growth in the use of mobile computing. Its use can be found in areas such as social media, information exchange,

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region

RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

How To Attack A Key Card With A Keycard With A Car Key (For A Car) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car

More information

Security Levels for Web Authentication using Mobile Phones

Security Levels for Web Authentication using Mobile Phones Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se

More information

A Study on User Access Control Method using Multi-Factor Authentication for EDMS

A Study on User Access Control Method using Multi-Factor Authentication for EDMS , pp.327-334 http://dx.doi.org/10.14257/ijsia.2013.7.6.33 A Study on User Access Control Method using Multi-Factor Authentication for EDMS Keunwang Lee 1* 1 Dept.of Multimedia Science, Chungwoon University

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience

More information

The Research and Application of College Student Attendance System based on RFID Technology

The Research and Application of College Student Attendance System based on RFID Technology The Research and Application of College Student Attendance System based on RFID Technology Zhang Yuru, Chen Delong and Tan Liping School of Computer and Information Engineering, Harbin University of Commerce,

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

Safe Authentication Protocol for Secure USB Memories

Safe Authentication Protocol for Secure USB Memories Kyungroul Lee 1, Hyeungjun Yeuk 1, Youngtae Choi 1, Sitha Pho 1, Ilsun You 2 and Kangbin Yim 1 1 Soonchunhyang Univeristy, Dept. of Information Security Engineering, 646 Eupnae, Shinchang, Asan, Korea

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

Security Measures of Personal Information of Smart Home PC

Security Measures of Personal Information of Smart Home PC , pp.227-236 http://dx.doi.org/10.14257/ijsh.2013.7.6.22 Security Measures of Personal Information of Smart Home PC Mi-Sook Seo 1 and Dea-Woo Park 2 1, 2 Department of Integrative Engineering, Hoseo Graduate

More information

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

More information

A Study on Secure Electronic Medical DB System in Hospital Environment

A Study on Secure Electronic Medical DB System in Hospital Environment A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133

More information

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec 2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing

More information

How To Balance Load In Rdi With Power Conservation In A Power Efficient System

How To Balance Load In Rdi With Power Conservation In A Power Efficient System EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID Vijayakumar.G.Dhas 1, Ramanathan Muthukaruppan 2, Konguvel Balakrishnan 2, Rajarajan Ganesan 2 1 Lecturer, Department of Information Technology,

More information

Studying Security Weaknesses of Android System

Studying Security Weaknesses of Android System , pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced

More information

Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards

Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards , pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

The Study on RFID Security Method for Entrance Guard System

The Study on RFID Security Method for Entrance Guard System The Study on RFID Security Method for Entrance Guard System Y.C. Hung 1, C.W. Tsai 2, C.H. Hong 3 1 Andrew@mail.ncyu.edu.tw 2 s0930316@mail.ncyu.edu.tw 3 chhong@csie.ncyu.edu.tw Abstract: The RFID technology

More information

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India archanathange7575@gmail.com,

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a

Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Vol. 8, No. 4 (2015), pp. 275-286 http://dx.doi.org/10.14257/ijca.2015.8.4.27 Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Sol Lim, Kye Joo Lee, So Yeon Kim, Chang Seok Chae,

More information

solutions Biometrics integration

solutions Biometrics integration Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability

More information

A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards

A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards , pp.166-171 http://dx.doi.org/10.14257/astl.205.98.42 A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards Yeo ChangSub 1, Ryu HyunKi 1 and Lee HaengSuk

More information

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V.

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V. EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management

More information

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you

More information

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control

More information

Digital signature in insecure environments

Digital signature in insecure environments Digital signature in insecure environments Janne Varjus Helsinki University of Technology jvarjus@cc.hut.fi Abstract Due to current legislation the digital signatures can be as valid as the hand written

More information

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment , pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer

More information

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,

More information

Data Protection Technical Guidance Radio Frequency Identification

Data Protection Technical Guidance Radio Frequency Identification Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology

More information

Using RFID Technology to Stop Counterfeiting

Using RFID Technology to Stop Counterfeiting Using RFID Technology to Stop Counterfeiting By Eustace Asanghanwa, Crypto & RF Memory Applications Summary RFID technology is well known for providing labeling solutions to automate inventory control.

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur

More information

Economic and Social Council

Economic and Social Council UNITED NATIONS E Economic and Social Council Distr. GENERAL ECE/TRANS/WP.30/AC.2/2008/2 21 November 2007 Original: ENGLISH ECONOMIC COMMISSION FOR EUROPE Administrative Committee for the TIR Convention,

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

A Research on Issues Related to RFID Security and Privacy

A Research on Issues Related to RFID Security and Privacy A Research on Issues Related to RFID Security and Privacy Jongki Kim1, Chao Yang2, Jinhwan Jeon3 1 Division of Business Administration, College of Business, Pusan National University 30, GeumJeong-Gu,

More information

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

A Secure RFID Ticket System For Public Transport

A Secure RFID Ticket System For Public Transport A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It

More information

Two-Level Metadata Management for Data Deduplication System

Two-Level Metadata Management for Data Deduplication System Two-Level Metadata Management for Data Deduplication System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3.,Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea { kongjs,

More information

Protected Cash Withdrawal in Atm Using Mobile Phone

Protected Cash Withdrawal in Atm Using Mobile Phone www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

Efficient Nonce-based Authentication Scheme for. session initiation protocol

Efficient Nonce-based Authentication Scheme for. session initiation protocol International Journal of Network Security, Vol.9, No.1, PP.12 16, July 2009 12 Efficient Nonce-based Authentication for Session Initiation Protocol Jia Lun Tsai Degree Program for E-learning, Department

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

Application of Tracking Technology to Access-control System

Application of Tracking Technology to Access-control System Hitachi Review Vol. 53 (2004),. 2 83 Application of Tracking Technology to Access-control System OVERVIEW: An access-control system that applies tracking technology to control the movement of people and

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM

DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM Part-I: Natural and Applied Sciences ISSN-L: 2223-9553, ISSN: 2223-9944 DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM Safaa A. Mahdi Technical Institute, Babylon, IRAQ. amam2012449@yahoo.com

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India 3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human

More information

Government Information Security System with ITS Product Pre-qualification

Government Information Security System with ITS Product Pre-qualification Government Information Security System with ITS Product Pre-qualification Wan S. Yi 1, Dongbum Lee 2, Jin Kwak 2, Dongho Won 1 1 Information Security Group, Sungkyunkwan University, 300 Cheoncheon-dong,

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection

Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection Low-Cost RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection YUNG-CHIN CHEN 1,*, WEI-LIN WANG 1, AND MIN-SHIANG HWANG 2 1 Department of Computer and Communication Engineering, Asia

More information

Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols

Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols Security Analysis and Complexity Comparison of Some Recent Lightweight RFID Protocols Ehsan Vahedi, Rabab K. Ward and Ian F. Blake Department of Electrical and Computer Engineering The University of British

More information