Electronic Vehicle Registration in Sao Paulo, Brazil

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Electronic Vehicle Registration in Sao Paulo, Brazil"

Transcription

1 Electronic Vehicle Registration in Sao Paulo, Brazil Technical tools in use to a controlled and secure Mass-Implementation Dr. Dario Sassi Thober, President / Director Wernher von Braun Center for Advanced Research

2 EVR in Sao Paulo State, Brazil Pay-per-Use concept ( Point-to-Point System ): Several Multi-Lane Free-Flow Portals on State Highways Cost-effective OBU that allows installation in up to 80% of the State s Fleet Highly-secured OBU to allow Public and Private services to grow around it Vehicle Classification and OCR also included (trucks / cargo represent a significant percentage of toll-collection events) System developed and implemented by Von Braun Labs in two Sao Paulo State Highways in a Pilot-Program

3 SP075 Santos Dumont Highway

4 Ponto a Ponto System: Santos Dumont Highway in Sao Paulo State, Brazil Multi-Lane Free-Flow Portal based on 915MHz with AES128 technology + OCR

5 Another Ponto-a- Ponto site Itatiba Jundiaí in the State of Sao Paulo, Brazil: Toll-Plaza and Free-Flow Portal

6 Providers Allowed Other SLTs BackOffice (Sao Paulo State) Multiple Service- Service- Operator Reader * Tag initialization Local access to connect OCR+Vehicle Class+BlackList Credit * Same architecture as SLT s Remote connection to update new IDs, Keys and Tag status across SLTs in the system. Validates each SLT Controller SLT Antenna Tag w. AES128

7 Tag initialization Gov BackOffice Direct, Secure and Private connection with State s BackOffice to issue tags either at the customerservice site or at the tag s factory

8 Key elements of the Brazilian AVI Vehicles Electronic ID must generate secure, reliable information if services (public or private) affect end-users bank-accounts / pre-paid credits or legal situation Which technology allows secure read/write commands under an internationally recognized standard implemented on passive, battery-less platform similar to 6C operations? Which hardware platforms are based on well-known industrial solutions to mass-deployment?

9 Key elements of the Brazilian AVI Interoperability Based on International Standards (GS1/ISO C) Well established Physical Layer (well-know commercial Reader hardware platforms) Security and Cost Implementation on 6C standard with secure custom commands based on AES128 mechanism Costs similar to 6C implementations within reach

10 It s Based on SINIAV SINIAV is the National System for Automated Vehicle Identification (Sistema Nacional de Identificação Automática de Veículos), which is currently being implemented and deployed throughout the national territory in Brazil. SINIAV was initiated by the Ministry of the Cities (Ministério das Cidades, MC), the Ministry of Science and Technology (Ministério da Ciência e Tecnologia, MCT), and the National Traffic Committee (Conselho Nacional De Trânsito, CONTRAN) in Brazil, based on Resolutions Nr. 212 issued on November 13, 2006, and Resolution Nr. 338 issued on December 17, 2010, by CONTRAN [RES:212:2006, RES:338:2009]. SINIAV foresees the mandatory electronic registration of all vehicles in the country, including passenger cars, trucks, motorbikes, etc. The official deployment phase of SINIAV starts on June 30, 2011, to be completed by June 30, /08/

11 EVR + Vehicle Classification Implementation made by Von Braun Labs to Sem- Parar of a EVR+Vechicle Class system: non installation of any sensor on/in the pavement

12 Implementation made by Von Braun Labs to Sem-Parar of a EVR+Vehicle Class system: non installation of any sensor on/in the pavement

13 Demonstration at highspeed that 915MHz/AES128 tags are not affected either by other 6C Tags or 5.8GHz Transponders in the field of the same reader 6C Tags are easily bought in the openmarket if those are placed in the car to cause jamming (reader overload by tags collision), only 6C tags will be affected those with Secure Protocol will be read as usual

14 Tag evolution in oneyear: 1 st implementation

15 Tag evolution in one-year: 2 nd implementation

16 Tag evolution in one-year: 2 nd implementation

17 Example of a Company s Tag More than 3 commercial implementations developed in less than 15 months

18 915MHz/AES128 Passive Tape-out Tag de Blocos do Chip 915MHz com mecanismos de segurança World s First

19 < SHOW VIDEO >

20 Other applications based on the same Tech. Platform DOU n. 211, Seção 3, Pág. 8 de DOU n. 25, Seção 3, Pág. 8 de

21 Peer Entity Authentication Data Origin Authentication Access Control Data Integrity Timeliness of Data Data Confidentiality Non-Repudiation with Proof of Origin Non-Repudiation with Proof of Delivery VonBraunLabs RFID Universe Supp workforce Supp production Supp time to adjust WF production Supp productivity Supp WF adj Stock Supply Stock Supp target WF productivity Supp target prod sales Supp sales Supp target stock coverage target stock Supp urgency Supp coverage stock correction Supp stock correction Systems Integration Pat. Filled USPO 09 High-Eff. Readers Low-Cost Readers workforce workforce adjustment time to adjust WF target WF target production urgency to correct target production Security Services Cryptographic Security Mechanisms Message Digest (Hashing) Message Authentication Code ORT / MLFF Public Key Certificate (Digital Signature) Challenge-Response Authentication Embedded Encipherment Security & Protocol Development Time-variant Parameterization IC -Design (Analog/Digital) Transponders with Both RFID and Image/others-Sensing Back-Office / BI services based on RFID DFSS / DoE Digital Controllers Wernher von Braun Center for Advanced Research Jan 2010 CONFIDENTIAL

22 Dario S. Thober

Interoperability models in Brazil

Interoperability models in Brazil Dr Dario Sassi Thober, Director WERNHER VON BRAUN LABS thober@vonbraunlabs.org Interoperability models in Brazil IBTTA GENERAL SESSION - INTEROPERABILITY - Plano, TX. May 15 th, 2011 19/03/2014 www.vonbraunlabs.org

More information

VON BRAUN LABS. News WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO. Greetings from Dario S. Thober - CEO

VON BRAUN LABS. News WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO. Greetings from Dario S. Thober - CEO WWW.VONBRAUNLABS.COM News VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO Greetings from Dario S. Thober - CEO Find out about our complete solutions Learn more about our

More information

Automatic Vehicle Identification

Automatic Vehicle Identification Automatic Vehicle Identification Public BU Security and Connectivity Content Automatic Vehicle Identification Introduction Identifying the problem to address Benefits of AVI Applications of AVI AVI technologies

More information

ISO-6C Technology in Tolling Worldwide IBTTA South Africa Eric Redman, VP Sales North America March 12, 2012

ISO-6C Technology in Tolling Worldwide IBTTA South Africa Eric Redman, VP Sales North America March 12, 2012 ISO-6C Technology in Tolling Worldwide IBTTA South Africa Eric Redman, VP Sales North America March 12, 2012 About Federal Signal Technologies Division of Federal Signal Corporation, formed to provide

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS. State Machine Technology. about our technologies

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS. State Machine Technology. about our technologies WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn more about our technologies OUR LABS Highly

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

ETC and VMT on Conceded Highways in Brazil

ETC and VMT on Conceded Highways in Brazil DRIVE TOWARD INTEROPERABILITY ETC and VMT on Conceded Highways in Brazil International Bridge,Tunnel and Turnpike Association IBTTA Global Summit October, 19-21 Prague, Czech Republic CONCEDED NETWORK

More information

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations. Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,

More information

Fleet Management Solutions

Fleet Management Solutions RFID FOR FLEET MANAGEMENT TagItalia is main solution provider for Fleet Management services and devices for public and private transport companies. High level automation in procedures can be obtained using

More information

Cryptography and Network Security Chapter 1

Cryptography and Network Security Chapter 1 Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood

More information

Smart Card 101: Overview of Smart Card Technology. Margaret Free APTA Fare Collection 101 Miami, FL March 28, 2011

Smart Card 101: Overview of Smart Card Technology. Margaret Free APTA Fare Collection 101 Miami, FL March 28, 2011 Smart Card 101: Overview of Smart Card Technology Margaret Free APTA Fare Collection 101 Miami, FL March 28, 2011 Overview Contactless Card Physical Characteristics Credit card sized device Contains one

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements

More information

Introduction of Information Security Research Division

Introduction of Information Security Research Division Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI

More information

Lecture II : Communication Security Services

Lecture II : Communication Security Services Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication

More information

RFID for Managed Parking Lots

RFID for Managed Parking Lots RFID for Managed Parking Lots RFID technology can provide independent, non stop systems for security, parking, and access control. Our RFID technology provides businesses and communities with hands free

More information

SECURITY TRENDS-ATTACKS-SERVICES

SECURITY TRENDS-ATTACKS-SERVICES SECURITY TRENDS-ATTACKS-SERVICES 1.1 INTRODUCTION Computer data often travels from one computer to another, leaving the safety of its protected physical surroundings. Once the data is out of hand, people

More information

RFID TECHNOLOGY: ELEVATING OPERATIONAL EFFICIENCY INTEGRATING TRACKING AND INVENTORY SOLUTIONS

RFID TECHNOLOGY: ELEVATING OPERATIONAL EFFICIENCY INTEGRATING TRACKING AND INVENTORY SOLUTIONS RFID TECHNOLOGY: ELEVATING OPERATIONAL EFFICIENCY INTEGRATING TRACKING AND INVENTORY SOLUTIONS SECURE ASSET TRACKING IN YOUR HANDS The RFID System is designed with two basic parts a transponder tag that

More information

Table: Security Services (X.800)

Table: Security Services (X.800) SECURIT SERVICES X.800 defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. Also the

More information

Evolution of the Brazilian Telematics Space Pre and Post CONTRAN Regulation

Evolution of the Brazilian Telematics Space Pre and Post CONTRAN Regulation Evolution of the Brazilian Telematics Space Pre and Post CONTRAN Regulation Marcio Luz Customer Solution Manager / WirelessCar 1 Content 1. The Volvo Group & Connected services 2. Auto Industry / Brazilian

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

Time & Access System An RFID based technology

Time & Access System An RFID based technology Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.

More information

Information System Security

Information System Security Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The

More information

MICROELECTRONICS WHO WE ARE G R O U P HARDWARE DESIGN IP DESIGN HIGH PERFORMANCE SEMICONDUCTOR DEVICES

MICROELECTRONICS WHO WE ARE G R O U P HARDWARE DESIGN IP DESIGN HIGH PERFORMANCE SEMICONDUCTOR DEVICES WHO WE ARE VONBRAUNLABS is an institute for advanced researchs working with private companies and the Governments, developing systems projects and providing inovation services at hardware, firmware and

More information

Accenture Mobility Services Mobility for Better Business Outcomes. IBTTA 80 th Annual Meeting & Exhibition

Accenture Mobility Services Mobility for Better Business Outcomes. IBTTA 80 th Annual Meeting & Exhibition Accenture Mobility Services Mobility for Better Business Outcomes IBTTA 80 th Annual Meeting & Exhibition Mobile Tolling Solution & Demonstration September, 2012 Orlando Accenture, its logo, and High Performance

More information

Applying RFID in traffic junction monitoring

Applying RFID in traffic junction monitoring Second Conference of Junior Researchers in Civil Engineering 11 Applying RFID in traffic junction monitoring Nikol Krausz BME Department of Photogrammerty and Geoinformatics, e-mail: krausz@mail.bme.hu

More information

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

Privacy and Security in library RFID Issues, Practices and Architecture

Privacy and Security in library RFID Issues, Practices and Architecture Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library

More information

Information Security in a Wireless World

Information Security in a Wireless World Information Security in a Wireless World Dennis D. Steinauer Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Information Security

More information

RFIDs and European Policies

RFIDs and European Policies ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit gerald.santucci@ec.europa.eu European Commission Directorate

More information

Standards: WAVE / DSRC / p

Standards: WAVE / DSRC / p Standards: WAVE / DSRC / 802.11p Spring 2008 Dr. Michele Weigle CS 795/895 Vehicular Networks Outline Overview WAVE DSRC / IEEE 802.11p Device Placement References (VII, 2007) Overview What is WAVE / DSRC

More information

Section 2.3 Authentication Technologies. Authentication

Section 2.3 Authentication Technologies. Authentication Section 2.3 Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys),

More information

CSCI 4541/6541: NETWORK SECURITY

CSCI 4541/6541: NETWORK SECURITY 1 CSCI 4541/6541: NETWORK SECURITY COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10

More information

What is RFID? Lisa Petrini

What is RFID? Lisa Petrini What is RFID? Lisa Petrini A Tool Real-time Information Monitor Assets Remove Human Interaction Serialize Data What is in it for my organization? Reduced Costs Improved Quality Improved Customer Satisfaction

More information

Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking

Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking RFID Technology Review Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking Sponsored by: Presented by: Shane Snyder President 2014 MHI Copyright claimed as to audiovisual works of seminar

More information

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

Maintain Fleet Management Solutions Using Wide Area Wireless Technology Maintain Fleet Management Solutions Using Wide Area Wireless Technology Andreas Kohn Sierra Wireless, Inc. August, 2010 1 Introduction Wireless technology can provide a competitive advantage in today s

More information

Security Operation Management Initiatives in Cooperative Vehicle-Infrastructure Systems for Safe Driving

Security Operation Management Initiatives in Cooperative Vehicle-Infrastructure Systems for Safe Driving Hitachi Review Vol. 65 (2016), No. 1 747 Featured Articles Security Operation Management Initiatives in Cooperative Vehicle-Infrastructure Systems for Safe Driving Akira Mizutani Mai Kawamura Eriko Ando

More information

Self Testing and Product Qualification Processes

Self Testing and Product Qualification Processes GlobalPlatform Self Testing and Product Qualification Processes Version 1.2.1 Public Release May 2013 Document Reference: GPC_PRO_042 Recipients of this document are invited to submit, with their comments,

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

PKI COMPONENTS AND RELATED STANDARDS.

PKI COMPONENTS AND RELATED STANDARDS. PKI COMPONENTS AND RELATED STANDARDS. COMESA/POTRAZ Zimbabwe 4-6 May 2016. Dr. Izzeldin Kamil Amin Associate Professor. Faculty of Mathematical Sciences University of Khartoum. izzeldin@outlook.com PKI

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In

More information

Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM

Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM Automated security, parking and access control system Accurate identification of authorized vehicles Automated entry/exit

More information

Radio Frequency Identification (RFID) Presenter: Dusan Stevanovic April 3, 2007

Radio Frequency Identification (RFID) Presenter: Dusan Stevanovic April 3, 2007 Radio Frequency Identification (RFID) Presenter: Dusan Stevanovic April 3, 2007 Introduction RFID are systems that transmit identity (in the form of a unique serial number) of an object or person wirelessly,

More information

HP Brazil RFID CoE Center of Excellence

HP Brazil RFID CoE Center of Excellence HP Brazil RFID CoE Center of Excellence TEST CENTER DESCRIPTION: The RFID Center of Excellence is prepared to aid customers to visualize in their businesses possible RFID applications as well as to observe

More information

SAP Customer Success Story High Tech Alternative Logic. Alternative Logic: Creating an Innovative Remote Workforce Management Platform

SAP Customer Success Story High Tech Alternative Logic. Alternative Logic: Creating an Innovative Remote Workforce Management Platform Alternative Logic: Creating an Innovative Remote Workforce Management Platform Alternative Logic Limited Industry High tech Software development and consulting Products and Services FieldLogic remote workforce

More information

Road charging systems and technology

Road charging systems and technology Road charging systems and technology History of road user charging in Norway Stockholm : The challenge Technology of road side system, how does it work? Summary Contents Page 2 Business idea Supplier of

More information

Internet of YOUR Things. Stefan Böhler TSP Datacenter

Internet of YOUR Things. Stefan Böhler TSP Datacenter Internet of YOUR Things Stefan Böhler TSP Datacenter Microsoft delivers on the Internet of Things Devices and assets Cloud and infrastructure Analytics Tools Drive Insights Devices A Agent 1010101001100011010101011101001101010101010011011101111011100101010000110101010111010011010

More information

Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015

Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015 Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015 I-PASS Lane Technology In Action Electronic Tolling Overview Antenna Camera Axle Count: 2 Camera 2 AVI Reader Lane Controller Power

More information

RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM

RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM Qi Wenhua, Zhang Qishan, Liu Hailong School of Electronics and Information Engineering BeiHang University, P. R. China 100083 ABSTRACT Security hardware based

More information

Long range identification Identify vehicles reliably

Long range identification Identify vehicles reliably Long range identification Identify vehicles reliably Long range identification Identify vehicles reliably The fast and reliable long range identification solution automatically identifies both drivers

More information

The future of home automation ZigBee or Z-Wave?

The future of home automation ZigBee or Z-Wave? The future of home automation ZigBee or Z-Wave? Mark Grazier - December 14, 2013 Introduction There has been an ongoing debate between which technology is the best overall solution for Home Automation:

More information

Trackability Technologies supporting Business

Trackability Technologies supporting Business Trackability Technologies supporting Business 17/11/2011 Alessandro Dandolo Company profile Alfaproject.net, was born in 2000 as a Start Up Incubator company of Milan Politecnico, specialized in Supply

More information

Using BroadSAFE TM Technology 07/18/05

Using BroadSAFE TM Technology 07/18/05 Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security

More information

Multilane Free-Flow and Video-Tolling Full System in the USA

Multilane Free-Flow and Video-Tolling Full System in the USA Multilane Free-Flow and Video-Tolling Full System in the USA Innovation in Road Transport: Opportunities for Improving Efficiency Session 2 - Information Technologies and Infrastructure Charging Experience

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS 2011) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ)

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS 2011) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car

More information

Applying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance

Applying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance Applying the NFC Secure Element in Mobile Identity Apps RANDY VANDERHOOF Executive Director Smart Card Alliance Session ID: MBS - 403 Session Classification: Mobile Security Agenda Agenda topics NFC basics:

More information

Radio Frequency Identification (RFID) An Overview

Radio Frequency Identification (RFID) An Overview Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify

More information

NFC. Technical Overview. Release r05

NFC. Technical Overview. Release r05 Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those

More information

Review of RFID Business

Review of RFID Business Review of RFID Business One One Platform - Many Solutions Kollakorn Asset Management? Key Relationships & Background 2 Kollakorn Corporate Relationships 3 Kollakorn Thailand Most RFID business is through

More information

Home Automation and Cybercrime

Home Automation and Cybercrime Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7

More information

INTERNET OF THINGS ARCHITECTURE IN THE CONTEXT OF INTELLIGENT TRANSPORTATION SYSTEMS A CASE STUDY TOWARDS A WEB-BASED APPLICATION DEPLOYMENT

INTERNET OF THINGS ARCHITECTURE IN THE CONTEXT OF INTELLIGENT TRANSPORTATION SYSTEMS A CASE STUDY TOWARDS A WEB-BASED APPLICATION DEPLOYMENT INTERNET OF THINGS ARCHITECTURE IN THE CONTEXT OF INTELLIGENT TRANSPORTATION SYSTEMS A CASE STUDY TOWARDS A WEB-BASED APPLICATION DEPLOYMENT Raul Mariano Cardoso State University of Campinas, Faculty of

More information

Positioned To Be In Control

Positioned To Be In Control VEHICLE TRACKING & FLEET MANAGEMENT A GPS tracking device is installed on the vehicle in order to capturedata based on location, speed, direction, mileage, fuel consumption and behavior such as idling,

More information

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods

More information

RF ID Security and Privacy

RF ID Security and Privacy RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from

More information

Sébastien Grazzini - Eutelsat. The SafeTRIP project

Sébastien Grazzini - Eutelsat. The SafeTRIP project Sébastien Grazzini - Eutelsat The SafeTRIP project What is SafeTRIP? Satellite Applications For Emergency handling, Traffic alerts, Road safety and Incident Prevention An integrated project (IP) From user

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies

Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies DR. O. GEOFFREY EGEKWU and JIM RIDINGS Institute for Infrastructure and Information Assurance (IIIA) James Madison University Functions

More information

The Wireless World - 5G and Beyond. Björn Ekelund Ericsson Research

The Wireless World - 5G and Beyond. Björn Ekelund Ericsson Research The Wireless World - 5G and Beyond Björn Ekelund Ericsson Research 9X Mobile data Traffic by 2020 Monthly consumption per device type 2014 2020 4.2 GB 17.3 GB 1.9 GB 8.4 GB 1.0 GB 4.9 GB Ericsson Internal

More information

An Introductory and Elementary Study on RFID & Its Applications

An Introductory and Elementary Study on RFID & Its Applications An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION

CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION 3.1 - Introduction Travel time information is becoming more important for applications ranging from congestion measurement to real-time travel information. Several

More information

RF-ATTENDANCE RFID BASED STUDENT ATTENDANCE AUTOMATION SYSTEM

RF-ATTENDANCE RFID BASED STUDENT ATTENDANCE AUTOMATION SYSTEM RF-ATTENDANCE RFID BASED STUDENT ATTENDANCE AUTOMATION SYSTEM NECESSITY All the parents & Institute Administration are always concerned about their ward s / student s irregular attendance, their tendency

More information

HOW STANDARDIZATION ENABLES THE NEXT INTERNET EVOLUTION

HOW STANDARDIZATION ENABLES THE NEXT INTERNET EVOLUTION HOW STANDARDIZATION ENABLES THE NEXT INTERNET EVOLUTION Marc Jadoul Strategic Marketing Director, Alcatel-Lucent marc.jadoul@alcatel-lucent.com onem2m www.onem2m.org 2014 onem2m About this webinar First

More information

INTEGRATED SOLUTION FOR MOTOTRBO TM THE SMART CHOICE FOR YOUR FUTURE

INTEGRATED SOLUTION FOR MOTOTRBO TM THE SMART CHOICE FOR YOUR FUTURE INTEGRATED SOLUTION FOR MOTOTRBO TM THE SMART CHOICE FOR YOUR FUTURE Integrated Solution for MOTOTRBO TM Networks of any size and topology System infrastructure monitoring and control Bridging for different

More information

Ness UltraProx Mifare Reader

Ness UltraProx Mifare Reader Ness UltraProx Mifare Reader Ness UltraProx-Mifare Smartcard Reader introduction Page 1 INTRODUCTION Following on from the success of the Ness 125Kz UltraProx Proximity Reader, Ness are pleased to announce

More information

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11. Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric

More information

Below are the answers to unanswered questions asked to E-470 Public Highway Authority on the webinar.

Below are the answers to unanswered questions asked to E-470 Public Highway Authority on the webinar. Below are the answers to unanswered questions asked to E-470 Public Highway Authority on the webinar. 1. Can you tell us the percent collection at each notice level? (i.e. how much do you collect on LPT1,

More information

District Energy and the Industrial IoT Benefits of a Connected System

District Energy and the Industrial IoT Benefits of a Connected System District Energy and the Industrial IoT Benefits of a Connected System Presented by: Adam Strynadka Managing Director DeviceLynk What is the Industrial Internet of Things? The Internet of Things (IoT) can

More information

Well-known chemical industry corporation adopts for its dispatch operations, a RFID optimized TRUCK TRACKING SYSTEM

Well-known chemical industry corporation adopts for its dispatch operations, a RFID optimized TRUCK TRACKING SYSTEM Well-known chemical industry corporation adopts for its dispatch operations, a RFID optimized TRUCK TRACKING SYSTEM Automatic and efficient tracking of truck movement within plant premises Efficient queuing

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Radio Frequency Identification (RFID) Vs Barcodes

Radio Frequency Identification (RFID) Vs Barcodes Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want

More information

RFID Will Become the Next Dominant Technology in the Dallas Metroplex

RFID Will Become the Next Dominant Technology in the Dallas Metroplex RFID Will Become the Next Dominant Technology in the Dallas Metroplex Presentation to the IEEE CVT October 18, 2005 Allan Griebenow President & CEO AXCESS International Inc. 1 121 Dallas Metroplex Businesses

More information

Cryptography and Network Security Sixth Edition by William Stallings

Cryptography and Network Security Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 1 Overview The combination of space, time, and strength that must be considered as the basic elements of this theory of defense

More information

MANAGEMENT OF SECURE SYSTEMS AND SECURITY WITHIN OSI 1

MANAGEMENT OF SECURE SYSTEMS AND SECURITY WITHIN OSI 1 MANAGEMENT OF SECURE SYSTEMS AND SECURITY WITHIN OSI 1 Chris J. Mitchell Computer Science Department Royal Holloway and Bedford New College University of London Egham Hill Egham Surrey TW20 0EX England

More information

Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens

Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens Oxford University Press 2007. All rights reserved. 1 Smart systems Smart Labels Smart labels RFID Smart tokens Oxford University

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

Identity: The Key to the Future of Healthcare

Identity: The Key to the Future of Healthcare Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital

More information

A. Background. In this Communication we can read:

A. Background. In this Communication we can read: On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background

More information

Generic RFID Software Platform for Any Application

Generic RFID Software Platform for Any Application FALKEN Secure Networks Inc. (FSN) has introduced a new paradigm to the RFID industry with its generic software platform to simplify System Integration, drive custom development costs out of system acquisition

More information

MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.

MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. About Digital Signature using MyKey Purpose MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. A document digitally

More information

Z-MOBILE : a real time wireless RFID monitoring system ready for positioning & tracking in indoor & outdoor environments

Z-MOBILE : a real time wireless RFID monitoring system ready for positioning & tracking in indoor & outdoor environments Z-MOBILE : a real time wireless RFID monitoring system ready for positioning & tracking in indoor & outdoor environments Increase your efficiency in asset tracking, inventory management, security and process

More information

Technology Trends for Automotive Safety

Technology Trends for Automotive Safety Technology Trends for Automotive Safety March 7, 2005 Jim Misener Transportation Safety Program Leader California PATH Program 1 Automated Train of Cars 2 Outline The Safety Problem Active Safety Systems

More information

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)

More information

Cisco Connected Grid Security for Field Area Network

Cisco Connected Grid Security for Field Area Network White Paper Cisco Connected Grid Security for Field Area Network Introduction Utilities all over the world are undergoing significant transition in their grid from transmission to consumption. Regulatory

More information

Innovation that Matters an IBM story

Innovation that Matters an IBM story Dr. Shiva Kumar Vice President, Enterprise Performance and Industry Analytics Innovation that Matters an IBM story IBM Research IBM Research: Global and Vertically Oriented analytics services tools China

More information

Welcome to Amphenol RF s training module focused on RF interconnect for wireless RF modules and machine to machine (or M2M) applications.

Welcome to Amphenol RF s training module focused on RF interconnect for wireless RF modules and machine to machine (or M2M) applications. Welcome to Amphenol RF s training module focused on RF interconnect for wireless RF modules and machine to machine (or M2M) applications. 1 Amphenol RF is a leading interconnect supplier to manufacturers

More information