Secure Contactless Sphere Smart RFID-Technologies for a Connected World. Werner Haas, Herwig Zeiner & SeCoS Konsortium

Size: px
Start display at page:

Download "Secure Contactless Sphere Smart RFID-Technologies for a Connected World. Werner Haas, Herwig Zeiner & SeCoS Konsortium"

Transcription

1 Secure Contactless Sphere Smart RFID-Technologies for a Connected World Werner Haas, Herwig Zeiner & SeCoS Konsortium Graz, am 7. Oktober 2013

2 Motivation Das Web of Things Vernetzung von Menschen mit diesen physischen Objekten Interaktion mit den physischen Objekten / der Objekte untereinander Sicherheit gewährleisten Schutz der Privatsphäre Sichere Gesamtlösung Elektronik weiterentwickeln + + Höhere Reichweite Schnellere Übertragung 4

3 Projektaufbau & Ergebnisse Future Applications Demonstrations Community Building P1: Web of Things Application Platform P3: Contactless Transmission Technologies 1. Social Connected City 2. Product Software Updates in User Self Service 3. Industrial Lean Maintenance 4. Theft Protected Object 5. Fraud Protected Product P2: Integrated Secure Technologies

4 Access Without Permission A Practical RFID Relay Attack Proximity >50m via Bluetooth Roman Silberschneider, Thomas Korak, and Michael Hutter, Austrochip 2013

5 Mobile Security Research Results Mobile devices as RFID reader platforms Security/privacy vulnerabilities of reader platform might impact the security/privacy of IoT applications E.g. (data dependent) information leakage during computations Execution times Power consumptions EM emanations 9

6 Timing Attacks (1) Exploit execution times of secret computations to recover secret data (e.g., cryptographic key) Why does the execution time vary? Conditional execution of instructions Retrieving data from different memory locations Cache access Data retrieval almost immediately Main-memory access Data retrieval takes more time 10

7 Timing Attacks (2) Approach Gather measurement samples of multiple AES encryptions Statistical analysis of execution times recover (parts) of the secret key Results 3 mobile devices (tablets and smartphones) Reduced 128-bit AES key to ~58-bit AES key potential security vulnerability For further information see list of publications at 11

8 MMID mm-wave RFID MMID system simulations: TX FWD Base Station Channel Transponder RX BWD Channel measurements: Using prototype antenna fc: 63 GHz, BW: 8.5 GHz Half power beam width: 40 Gain: 10 db Philipp Franz Freidl, Michael Gadringer, IHF 12

9 Smart City RFID in Public Transport Fare collection Operating company Data on traffic streams Basis of optimizing bus/train schedules Active check-in/ active check-out Passive checkin/check-out High cost transponders User acceptance? Solution: Active check-in/passive check-out 13

10 Status Dual RF Interface AFE (active check-in/passive check-out demonstrator) Elaboration of preliminary specifications based on expected application conditions Extension of investigation towards semi-passive operating mode Adoption of existing IP-blocks for HF mode operation Design UHF power conversion unit (PCU) in an ultra deep submicron technology High efficiency charge pump along with limiter circuits and ESD structures Design in an advanced pre-layout state Design UHF demodulator with optional high-sensitivity mode for semi-passive operation Square-law detector, baseband amplifier and low-power wakeup Early concept phase Expected tape-out of test-chip featuring UHF PCU and first versions of building blocks of the UHF demodulator: Q2,

11 Wireless Sensor Node with NFC support

12 Wireless Sensor Network Nodes for Home Automation WLAN Router as WSN Gateway WLAN NFC home charging stations W-Mbus P = 300W E=1200kWh Light:On/Off Lock and unlock your home charging station Monitor the power consumption/ power metering of appliances Control appliances

13 FiND-iT RFID Starter Kit RFID Journal s FiNDiT Kit provides a complete UHF RFID solution for small businesses and offices, home offices and consumers to identify, confirm and track assets or items right out of the box.

14 Theft Protected Object 1. Tags anbringen 2. Schutzzone betreten 3. Schutzzone verlassen 4. Diebstahlserkennung 18

15 Trends Infineon secures egovernment services (eid for South Africa) Complete Identity Protection with SmartMX NXP Technology NXP has delivered more than two billion secure SmartMX microcontrollers for Smart Cards and the National Identity Card New Features for RFID Sensors (AMS markets a new generation of RFID sensors) Smart Webzine: Newsletter #210-10/04/

16 Trends Massive Growth of Mobile Payments in Canada New EU rules on personal identity New Directive on Payment Services (PSD-2) A wind of madness blows on ICT Panic seizes our leaders who suddenly are discovering the weakness of our communication systems. Smart Webzine: Newsletter #210-10/04/

17 Fördergeber Das K-Projekt SeCoS wird im Rahmen von COMET Competence Centers for Excellent Technologies durch BMVIT, BMWFJ und die Steirische Wirtschaftsförderungsgesellschaft mbh (SFG) des Landes Steiermark gefördert. Das Programm COMET wird durch die FFG abgewickelt. 21

IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015

IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015 Internet of Things IOT WPAN technologies IoT binnen handbereik EA IoT 2015 Pepijn Herman 2-6-2015 Metatronics Development of smart electronics solution HQ in Eindhoven, The Netherlands Team of 21 engineers

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU! SENSational STMicroelectronics is pleased to present the SENSational Seminar Attend a FREE One-Day Technical Seminar Near YOU! Seminar Sensors and the Internet of Things are changing the way we interact

More information

NFC for embedded applications. Your critical link for the Internet of Things

NFC for embedded applications. Your critical link for the Internet of Things NFC for embedded applications Your critical link for the Internet of Things NFC your critical link for the Internet of Things Home automation Tap your phone to adjust settings for commissioning Cloud-based

More information

Rolf de Vegt, July 8, 2015. IEEE802.11ah Benefits and Use Cases

Rolf de Vegt, July 8, 2015. IEEE802.11ah Benefits and Use Cases Rolf de Vegt, July 8, 2015 IEEE802.11ah Benefits and Use Cases 802.11ah Value Proposition 3rd Band WLAN 802.11g 2.4 GHz 802.11n 2.4 & 5 GHz 802.11ac 5 GHz 802.11ah (sub 1 GHz) Wi-Fi ecosystem WFA certified

More information

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway

More information

ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS

ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS Cyber Physical Systems Sicherheit für eine Welt im Wandel Harald Pötter RF & Smart Sensor Systems Cyber Physical Systems Sicherheit für eine Welt im Wandel Agenda

More information

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker

More information

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for

More information

RFID Penetration Tests when the truth is stranger than fiction

RFID Penetration Tests when the truth is stranger than fiction RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon

More information

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.

More information

RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA

RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs Matt Robshaw and Tyler Williamson Impinj Seattle, USA Overview RAIN RFID The product and standardization landscape Security, performance,

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months

More information

Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.

Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1. 1 Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.1 08/19/2008 D. Liff Added 802.11.n information 1.2 11/09/2010 J.

More information

Break out session Materials / Integration

Break out session Materials / Integration Autosim 6th Technology workshop Break out session Materials / Integration Günther Fabian The Virtual Vehicle Competence Center 30. April 2008 K plus K Kompetenzzentrenprogramm, plus eine Förderinitiative

More information

Hvor går RFID forskning og utvikling?

Hvor går RFID forskning og utvikling? Technology for a better society Enabling the Real Time Enterprise Hvor går RFID forskning og utvikling? Ovidiu Vermesan, SINTEF IKT og Edvin Holsæter, Telenor Iris Plan for presentasjonen RFID segmenter

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

APPLIED AND INTEGRATED SECURITY

APPLIED AND INTEGRATED SECURITY APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Chip Card & Security ICs Mifare NRG SLE 66R35

Chip Card & Security ICs Mifare NRG SLE 66R35 Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information

More information

Trends in der Forschung für kontaktlose Anwendungen

Trends in der Forschung für kontaktlose Anwendungen Trends in der Forschung für kontaktlose Anwendungen 8. Dresdner RFID Symposium 4. 5. 12. 2014; Dresden, Deutschland Holger Bock, Infineon Technologies Austria AG Überblick Einleitung CATRENE-Projekt NewP@ss

More information

Contending With Multiple Wireless Technologies In The Connected Home

Contending With Multiple Wireless Technologies In The Connected Home Contending With Multiple Wireless Technologies In The Connected Home A Technical Paper prepared for the Society of Cable Telecommunications Engineers By Dana Blouin PhD Candidate SIIT Thammasat University

More information

Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag

Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag Thomas Korak Thomas Plos Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology,

More information

TURPAK Vehicle ID Solution Solution Overview for Oil Companies

TURPAK Vehicle ID Solution Solution Overview for Oil Companies TURPAK Vehicle ID Solution Solution Overview for Oil Companies Agenda RFID Wireless Architecture Components Installation Recruiting & Issuing Security Summary RFID Wireless Advantages Proven solution,

More information

REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN

REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN INTRODUCTION: REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN Remote keyless entry (RKE) has captivated automobile buyers, as evidenced by the popularity of RKE on new automobiles and as an aftermarket item.

More information

Towards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna

Towards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna Towards an Internet of Things: Android meets NFC Luca Bedogni Marco Di Felice Dipartimento di Scienze dell Informazione Università di Bologna Outline Internet of Things: History Internet of Things: Definition

More information

DesignWare IP for IoT SoC Designs

DesignWare IP for IoT SoC Designs DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to

More information

Developments in 900 MHz wireless connectivity systems. Guido Dolmans Holst Centre / Imec-NL

Developments in 900 MHz wireless connectivity systems. Guido Dolmans Holst Centre / Imec-NL Developments in 900 MHz wireless connectivity systems Guido Dolmans Holst Centre / Imec-NL 3 HOLST CENTRE PROJECTS SUB-GHZ NUTSHELL 900 MHz UHF RFID European project Pasteur for sensor-enhanced RFID for

More information

Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS

Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Outline The WAPS project Development steps 1. Low-power wireless sensor networks

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES

DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES Information Analytics Expertise APRIL 2015 DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES John Byrne, Senior Principal Analyst +1 408 583 3320 John.byrne@ihs.com Internet

More information

ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 ERDİNÇ YILMAZ 200614038

ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 ERDİNÇ YILMAZ 200614038 ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 200614038 1 Project Name : Sensor Network System Project company : ROBUTEL Contact : www.robutel.com Project instructor : Yrd. Doç. Dr. Orhan GAZİ Contact

More information

Industrial IOT Gateway Family Datasheet

Industrial IOT Gateway Family Datasheet Industrial IOT Gateway Family Datasheet GW-Series Overview Samsara IoT gateways securely connect sensor data to the Samsara cloud. All models include WiFi and built-in cellular connectivity, storage, and

More information

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an

More information

OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications

OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications OBID RFID by FEIG ELECTRONIC OBID classic / OBID classic-pro RFID Reader Technology for Security Applications OBID RFID Reader Technologies RFID Readers from the number 1 manufacturer FEIG ELECTRONIC specialized

More information

Qualcomm Atheros AR4100: Wi-Fi Solution for the Internet of Things

Qualcomm Atheros AR4100: Wi-Fi Solution for the Internet of Things Qualcomm Atheros AR4100: Wi-Fi Solution for the Internet of Things June 2011 PAGE 1 The Internet of Things Is Happening General idea of things, especially everyday objects, that are readable, recognizable,

More information

NACCU 2013. Migrating to Contactless: 2013 1

NACCU 2013. Migrating to Contactless: 2013 1 NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

Security in Near Field Communication (NFC)

Security in Near Field Communication (NFC) Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com

More information

What is a Smart Card?

What is a Smart Card? An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types

More information

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Security/Privacy Models for Internet of things: What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global

More information

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

How To Attack A Key Card With A Keycard With A Car Key (For A Car) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car

More information

Current and Future Trends in Hybrid Cellular and Sensor Networks

Current and Future Trends in Hybrid Cellular and Sensor Networks 2010-10-19 Current and Future Trends in Hybrid Cellular and Sensor Networks Yongjun Liu, Bin Zhen, Yong Xu, Hui Yang, Betty Zhao yongjunliu@huawei.com www.huawei.com ETSI TC M2M Workshop 19-20 October

More information

Atmel Innovative Silicon RFID IDIC Solutions

Atmel Innovative Silicon RFID IDIC Solutions Atmel Innovative Silicon RFID IDIC Solutions 2 2013 / www.atmel.com Table of Contents Atmel: The Expert with Long-term Know-how....4 The Technology.... 4-5 Passive RFID....4 Active RFID....5 RFID Applications....

More information

The Research and Application of College Student Attendance System based on RFID Technology

The Research and Application of College Student Attendance System based on RFID Technology The Research and Application of College Student Attendance System based on RFID Technology Zhang Yuru, Chen Delong and Tan Liping School of Computer and Information Engineering, Harbin University of Commerce,

More information

Intelligent Home Automation and Security System

Intelligent Home Automation and Security System Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology

More information

An Introductory and Elementary Study on RFID & Its Applications

An Introductory and Elementary Study on RFID & Its Applications An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract

More information

Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?

Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland University of Applied Sciences Upper Austria,, Austria IWSSISPMU2012 International Workshop on

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

11 Internet of Things (IoT) Protocols You Need to Know About

11 Internet of Things (IoT) Protocols You Need to Know About 11 Internet of Things (IoT) Protocols You Need to Know About by RS Components There exists an almost bewildering choice of connectivity options for electronics engineers and application developers working

More information

1. NON CONTACT DIGITAL TACHOMETER USING AVR MICROCONTROLLER 2. CELSIUS SCALE THERMOMETER USING Atmega 8 -- 3. BLACK BOX SECURITY SYSTEM FOR CAR USING

1. NON CONTACT DIGITAL TACHOMETER USING AVR MICROCONTROLLER 2. CELSIUS SCALE THERMOMETER USING Atmega 8 -- 3. BLACK BOX SECURITY SYSTEM FOR CAR USING 1. NON CONTACT DIGITAL TACHOMETER USING AVR MICROCONTROLLER 2. CELSIUS SCALE THERMOMETER USING Atmega 8 -- 3. BLACK BOX SECURITY SYSTEM FOR CAR USING SENSORS 4. ULTRASONIC DISTANCE METER 5. 5 CHANNEL IR

More information

The Internet of Things (IoT)

The Internet of Things (IoT) The Internet of Things (IoT) The New New Thing October 2014 Smart Planet Green Environment Environmental Sensors Water, power leak detection Pollution, weather monitoring Smart Cities Connected Communities

More information

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers The Relay2 Smart Access Point (RA100) is an enterprise-class access point designed for deployment in high-density environments

More information

Secure Semi-Passive RFID Tags Prototype and Analysis

Secure Semi-Passive RFID Tags Prototype and Analysis Building Radio frequency IDentification for the Global Environment Secure Semi-Passive RFID Tags Prototype and Analysis Authors: Manfred Aigner (TU Graz), Thomas Plos (TU Graz), Antti Ruhanen (Confidex),

More information

Security & Chip Card ICs SLE 44R35S / Mifare

Security & Chip Card ICs SLE 44R35S / Mifare Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info

More information

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing

More information

3G Wireless-N Smart Energy Gateway

3G Wireless-N Smart Energy Gateway Join BEsmart Partner Alliance Network at www.smartgrid.com.tw/besmart Ideal for 3G Wireless-N Smart Energy Gateway The, 3G Wireless-N Smart Energy Gateway, is an all-in-one router designed for users to

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In

More information

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} John Soldatos Associate Professor, Athens Information Technology

More information

Wi-Fi, Bluetooth, and the Internet of Things

Wi-Fi, Bluetooth, and the Internet of Things WHITEPAPER Mindtribe Product Engineering 25 Kearny St. Suite 200 San Francisco, CA 94108 Introduction, Bluetooth, and the Internet of Things The Internet of Things (IoT) has an increasing number of our

More information

Wireless Mobile Workforce

Wireless Mobile Workforce October 2014 Page 1 The DeltaV Remote Operator Station shown on the Panasonic Toughbook CF-19 (left) and Toughpad FZ-G1. Increased worker productivity and accuracy Mobile operations management Syncade

More information

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,

More information

Home Automation and Cybercrime

Home Automation and Cybercrime Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7

More information

TT-RFID platform - Introduction

TT-RFID platform - Introduction TT-RFID platform - Introduction Version 0.7 01/06/2011 INDEX 1. RFID PROTOCOL - MAIN FEATURES...1 2. COMMAND DISPLAY FOR THE RFID PROTOCOL...2 3. GUIDELINES FOR USING THE RFID PROTOCOL... 4 3.1. CONFIGURATION

More information

Tnet WIRELESS MESH SENSOR NETWORKS

Tnet WIRELESS MESH SENSOR NETWORKS Product Line Overview Tnet WIRELESS MESH SENSOR NETWORKS The fusion of advanced sensor and actuator technology with state of the art wireless networks has enabled a whole new level of applications for

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,

More information

RF Attendance System Framework for Faculties of Higher Education

RF Attendance System Framework for Faculties of Higher Education RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,

More information

WISE-4000 Series. WISE IoT Wireless I/O Modules

WISE-4000 Series. WISE IoT Wireless I/O Modules WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud

More information

advant advanced contactless smart card system

advant advanced contactless smart card system LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and

More information

We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in

We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in the market at competitive prices. - Profile - Digital

More information

Internet of Things: TI's Wireless Connectivity Solutions

Internet of Things: TI's Wireless Connectivity Solutions Internet of Things: TI's Wireless Connectivity Solutions Market Size (units) Why the IoT is attractive 10B + The IoT is an enabling technology that will serve thousands of end products IoT 1B Cell phone

More information

Challenges of the Internet of Things for Sensor and Actuator Applications

Challenges of the Internet of Things for Sensor and Actuator Applications Challenges of the Internet of Things for Sensor and Actuator Applications Thomas Gessner, Torsten Thieme SEMICON Moscow 2015 Smart Systems Integration Session June 17 th, 2015 Source: Journal Internet

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

Exercise 1: Set up the Environment

Exercise 1: Set up the Environment RFID Lab Gildas Avoine, 2014 Contact: gildas.avoine@irisa.fr Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader

More information

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Side Channel Analysis and Embedded Systems Impact and Countermeasures Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side

More information

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China Agenda The Internet of Things ( IoT ): a New and Exciting Application Space A typical IoT application Lighting for Home

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue

More information

Security and Privacy Issues of Wireless Technologies

Security and Privacy Issues of Wireless Technologies Security and Privacy Issues of Wireless Technologies Collin Mulliner http://www.cs.ucsb.edu/~mulliner/ Agenda Introduction Issues Technology specific issues Wi Fi Bluetooth RFID

More information

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology: //DATASHEET XS4 Mini Cutting-edge design + Amazing technology: Stylish design is a SALTO trademark and with the XS4 Mini, we raise the bar on this already high standard thanks to the XS4 Mini s small,

More information

Short-range Low Power Wireless Devices and Internet of Things (IoT)

Short-range Low Power Wireless Devices and Internet of Things (IoT) Short-range Low Power Wireless Devices and Internet of Things (IoT) Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: mats.andersson@connectblue.com Web: www.connectblue.com Version 1.1 February

More information

Presented by: Robert Buczkiewicz, Director, Hardware Development, LS Research Sai Yelisetty, Director Sales & Marketing, DSP Group Arik Gur, Product

Presented by: Robert Buczkiewicz, Director, Hardware Development, LS Research Sai Yelisetty, Director Sales & Marketing, DSP Group Arik Gur, Product Presented by: Robert Buczkiewicz, Director, Hardware Development, LS Research Sai Yelisetty, Director Sales & Marketing, DSP Group Arik Gur, Product Manager ULE, DSP Group Avi Barel, Deputy Chairman, ULE

More information

Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags

Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags Thomas Plos, Manfred Aigner, Thomas Baier, Martin Feldhofer, Michael Hutter, Thomas Korak, Erich Wenger Institute for

More information

Introduction to Silicon Labs. November 2015

Introduction to Silicon Labs. November 2015 Introduction to Silicon Labs November 2015 1 Company Background Global mixed-signal semiconductor company Founded in 1996; public since 2000 (NASDAQ: SLAB) >1,100 employees and 11 R&D locations worldwide

More information

NFC. Technical Overview. Release r05

NFC. Technical Overview. Release r05 Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those

More information

TECHNOLOGICAL FACTORS PROMOTING THE EXPANSION OF INTERNET OF THINGS

TECHNOLOGICAL FACTORS PROMOTING THE EXPANSION OF INTERNET OF THINGS International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 7, Issue 2, March-April 2016, pp. 21-29, Article ID: IJARET_07_02_003 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=7&itype=2

More information

Challenges of Requirements Modelling in the Product Development Process

Challenges of Requirements Modelling in the Product Development Process Challenges of Requirements Modelling in the Product Development Process - Integrated Requirements Modelling DI Michael Maletz michael.maletz@virtuellesfahrzeug.at ProSTEP ivip Symposium 2006 Köln, April

More information

Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center

Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? About the

More information

IoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China

IoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China IoT: New Opportunities for Semiconductor Industry Growth Andrew C. Russell Vice President Marketing Greater China Agenda The Internet of Things ( IoT ): An Exciting, Disruptive Technology and Application

More information

Security in RFID Networks and Protocols

Security in RFID Networks and Protocols International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 425-432 International Research Publications House http://www. irphouse.com /ijict.htm Security

More information

RF Energy Harvesting and Wireless Power for Low-Power Applications

RF Energy Harvesting and Wireless Power for Low-Power Applications RF Energy Harvesting and Wireless Power for Low-Power Applications Emerging Technology P2100 Powerharvester TX91501 Powercaster P2110 Powerharvester P2110 Powerharvester April 6 2012 1 Powercast Technology

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS ************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

A Semi-Passive UHF RFID Tag Chip Applied for Electronic Vehicle Identification (EVI)

A Semi-Passive UHF RFID Tag Chip Applied for Electronic Vehicle Identification (EVI) A Semi-Passive UHF RFID Tag Chip Applied for Electronic Vehicle Identification (EVI) Egas Henes Neto, Eduardo Conrad Junior, Daniel Barcelos, Rafael Soares, Antonio Souza, Josias Mainardi, Rafael Cantalice,

More information

Intelligent Fleet Management System Using Active RFID

Intelligent Fleet Management System Using Active RFID Intelligent Fleet Management System Using Active RFID Ms. Rajeshri Prakash Mane 1 1 Student, Department of Electronics and Telecommunication Engineering, Rajarambapu Institute of Technology, Rajaramnagar,

More information