Secure Contactless Sphere Smart RFID-Technologies for a Connected World. Werner Haas, Herwig Zeiner & SeCoS Konsortium
|
|
- Jeffrey Holmes
- 8 years ago
- Views:
Transcription
1 Secure Contactless Sphere Smart RFID-Technologies for a Connected World Werner Haas, Herwig Zeiner & SeCoS Konsortium Graz, am 7. Oktober 2013
2 Motivation Das Web of Things Vernetzung von Menschen mit diesen physischen Objekten Interaktion mit den physischen Objekten / der Objekte untereinander Sicherheit gewährleisten Schutz der Privatsphäre Sichere Gesamtlösung Elektronik weiterentwickeln + + Höhere Reichweite Schnellere Übertragung 4
3 Projektaufbau & Ergebnisse Future Applications Demonstrations Community Building P1: Web of Things Application Platform P3: Contactless Transmission Technologies 1. Social Connected City 2. Product Software Updates in User Self Service 3. Industrial Lean Maintenance 4. Theft Protected Object 5. Fraud Protected Product P2: Integrated Secure Technologies
4 Access Without Permission A Practical RFID Relay Attack Proximity >50m via Bluetooth Roman Silberschneider, Thomas Korak, and Michael Hutter, Austrochip 2013
5 Mobile Security Research Results Mobile devices as RFID reader platforms Security/privacy vulnerabilities of reader platform might impact the security/privacy of IoT applications E.g. (data dependent) information leakage during computations Execution times Power consumptions EM emanations 9
6 Timing Attacks (1) Exploit execution times of secret computations to recover secret data (e.g., cryptographic key) Why does the execution time vary? Conditional execution of instructions Retrieving data from different memory locations Cache access Data retrieval almost immediately Main-memory access Data retrieval takes more time 10
7 Timing Attacks (2) Approach Gather measurement samples of multiple AES encryptions Statistical analysis of execution times recover (parts) of the secret key Results 3 mobile devices (tablets and smartphones) Reduced 128-bit AES key to ~58-bit AES key potential security vulnerability For further information see list of publications at 11
8 MMID mm-wave RFID MMID system simulations: TX FWD Base Station Channel Transponder RX BWD Channel measurements: Using prototype antenna fc: 63 GHz, BW: 8.5 GHz Half power beam width: 40 Gain: 10 db Philipp Franz Freidl, Michael Gadringer, IHF 12
9 Smart City RFID in Public Transport Fare collection Operating company Data on traffic streams Basis of optimizing bus/train schedules Active check-in/ active check-out Passive checkin/check-out High cost transponders User acceptance? Solution: Active check-in/passive check-out 13
10 Status Dual RF Interface AFE (active check-in/passive check-out demonstrator) Elaboration of preliminary specifications based on expected application conditions Extension of investigation towards semi-passive operating mode Adoption of existing IP-blocks for HF mode operation Design UHF power conversion unit (PCU) in an ultra deep submicron technology High efficiency charge pump along with limiter circuits and ESD structures Design in an advanced pre-layout state Design UHF demodulator with optional high-sensitivity mode for semi-passive operation Square-law detector, baseband amplifier and low-power wakeup Early concept phase Expected tape-out of test-chip featuring UHF PCU and first versions of building blocks of the UHF demodulator: Q2,
11 Wireless Sensor Node with NFC support
12 Wireless Sensor Network Nodes for Home Automation WLAN Router as WSN Gateway WLAN NFC home charging stations W-Mbus P = 300W E=1200kWh Light:On/Off Lock and unlock your home charging station Monitor the power consumption/ power metering of appliances Control appliances
13 FiND-iT RFID Starter Kit RFID Journal s FiNDiT Kit provides a complete UHF RFID solution for small businesses and offices, home offices and consumers to identify, confirm and track assets or items right out of the box.
14 Theft Protected Object 1. Tags anbringen 2. Schutzzone betreten 3. Schutzzone verlassen 4. Diebstahlserkennung 18
15 Trends Infineon secures egovernment services (eid for South Africa) Complete Identity Protection with SmartMX NXP Technology NXP has delivered more than two billion secure SmartMX microcontrollers for Smart Cards and the National Identity Card New Features for RFID Sensors (AMS markets a new generation of RFID sensors) Smart Webzine: Newsletter #210-10/04/
16 Trends Massive Growth of Mobile Payments in Canada New EU rules on personal identity New Directive on Payment Services (PSD-2) A wind of madness blows on ICT Panic seizes our leaders who suddenly are discovering the weakness of our communication systems. Smart Webzine: Newsletter #210-10/04/
17 Fördergeber Das K-Projekt SeCoS wird im Rahmen von COMET Competence Centers for Excellent Technologies durch BMVIT, BMWFJ und die Steirische Wirtschaftsförderungsgesellschaft mbh (SFG) des Landes Steiermark gefördert. Das Programm COMET wird durch die FFG abgewickelt. 21
IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015
Internet of Things IOT WPAN technologies IoT binnen handbereik EA IoT 2015 Pepijn Herman 2-6-2015 Metatronics Development of smart electronics solution HQ in Eindhoven, The Netherlands Team of 21 engineers
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationVON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
More informationSTMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!
SENSational STMicroelectronics is pleased to present the SENSational Seminar Attend a FREE One-Day Technical Seminar Near YOU! Seminar Sensors and the Internet of Things are changing the way we interact
More informationNFC for embedded applications. Your critical link for the Internet of Things
NFC for embedded applications Your critical link for the Internet of Things NFC your critical link for the Internet of Things Home automation Tap your phone to adjust settings for commissioning Cloud-based
More informationRolf de Vegt, July 8, 2015. IEEE802.11ah Benefits and Use Cases
Rolf de Vegt, July 8, 2015 IEEE802.11ah Benefits and Use Cases 802.11ah Value Proposition 3rd Band WLAN 802.11g 2.4 GHz 802.11n 2.4 & 5 GHz 802.11ac 5 GHz 802.11ah (sub 1 GHz) Wi-Fi ecosystem WFA certified
More informationInformation Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
More informationERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS
ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS Cyber Physical Systems Sicherheit für eine Welt im Wandel Harald Pötter RF & Smart Sensor Systems Cyber Physical Systems Sicherheit für eine Welt im Wandel Agenda
More informationDesign And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
More informationRFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
More informationRFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
More informationRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationMIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
More informationRAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA
RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs Matt Robshaw and Tyler Williamson Impinj Seattle, USA Overview RAIN RFID The product and standardization landscape Security, performance,
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationNFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO
NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months
More informationVersion Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.
1 Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.1 08/19/2008 D. Liff Added 802.11.n information 1.2 11/09/2010 J.
More informationBreak out session Materials / Integration
Autosim 6th Technology workshop Break out session Materials / Integration Günther Fabian The Virtual Vehicle Competence Center 30. April 2008 K plus K Kompetenzzentrenprogramm, plus eine Förderinitiative
More informationHvor går RFID forskning og utvikling?
Technology for a better society Enabling the Real Time Enterprise Hvor går RFID forskning og utvikling? Ovidiu Vermesan, SINTEF IKT og Edvin Holsæter, Telenor Iris Plan for presentasjonen RFID segmenter
More informationAchieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
More informationAPPLIED AND INTEGRATED SECURITY
APPLIED AND INTEGRATED SECURITY Directors: Claudia Eckert (Managing) Georg Sigl SECURITY RESEARCH IN MUNICH Fraunhofer Institution for Applied and Integrated Security Claudia Eckert Georg Sigl TU München
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationChip Card & Security ICs Mifare NRG SLE 66R35
Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information
More informationTrends in der Forschung für kontaktlose Anwendungen
Trends in der Forschung für kontaktlose Anwendungen 8. Dresdner RFID Symposium 4. 5. 12. 2014; Dresden, Deutschland Holger Bock, Infineon Technologies Austria AG Überblick Einleitung CATRENE-Projekt NewP@ss
More informationContending With Multiple Wireless Technologies In The Connected Home
Contending With Multiple Wireless Technologies In The Connected Home A Technical Paper prepared for the Society of Cable Telecommunications Engineers By Dana Blouin PhD Candidate SIIT Thammasat University
More informationApplying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag
Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag Thomas Korak Thomas Plos Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology,
More informationTURPAK Vehicle ID Solution Solution Overview for Oil Companies
TURPAK Vehicle ID Solution Solution Overview for Oil Companies Agenda RFID Wireless Architecture Components Installation Recruiting & Issuing Security Summary RFID Wireless Advantages Proven solution,
More informationREMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN
INTRODUCTION: REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN Remote keyless entry (RKE) has captivated automobile buyers, as evidenced by the popularity of RKE on new automobiles and as an aftermarket item.
More informationTowards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna
Towards an Internet of Things: Android meets NFC Luca Bedogni Marco Di Felice Dipartimento di Scienze dell Informazione Università di Bologna Outline Internet of Things: History Internet of Things: Definition
More informationDesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
More informationDevelopments in 900 MHz wireless connectivity systems. Guido Dolmans Holst Centre / Imec-NL
Developments in 900 MHz wireless connectivity systems Guido Dolmans Holst Centre / Imec-NL 3 HOLST CENTRE PROJECTS SUB-GHZ NUTSHELL 900 MHz UHF RFID European project Pasteur for sensor-enhanced RFID for
More informationMarko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS
Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Outline The WAPS project Development steps 1. Low-power wireless sensor networks
More informationImplementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
More informationDEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES
Information Analytics Expertise APRIL 2015 DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES John Byrne, Senior Principal Analyst +1 408 583 3320 John.byrne@ihs.com Internet
More informationÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 ERDİNÇ YILMAZ 200614038
ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 200614038 1 Project Name : Sensor Network System Project company : ROBUTEL Contact : www.robutel.com Project instructor : Yrd. Doç. Dr. Orhan GAZİ Contact
More informationIndustrial IOT Gateway Family Datasheet
Industrial IOT Gateway Family Datasheet GW-Series Overview Samsara IoT gateways securely connect sensor data to the Samsara cloud. All models include WiFi and built-in cellular connectivity, storage, and
More informationRFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department
RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an
More informationOBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications
OBID RFID by FEIG ELECTRONIC OBID classic / OBID classic-pro RFID Reader Technology for Security Applications OBID RFID Reader Technologies RFID Readers from the number 1 manufacturer FEIG ELECTRONIC specialized
More informationQualcomm Atheros AR4100: Wi-Fi Solution for the Internet of Things
Qualcomm Atheros AR4100: Wi-Fi Solution for the Internet of Things June 2011 PAGE 1 The Internet of Things Is Happening General idea of things, especially everyday objects, that are readable, recognizable,
More informationNACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationSecurity in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com
More informationWhat is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
More informationSecurity/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
More informationHow To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
More informationCurrent and Future Trends in Hybrid Cellular and Sensor Networks
2010-10-19 Current and Future Trends in Hybrid Cellular and Sensor Networks Yongjun Liu, Bin Zhen, Yong Xu, Hui Yang, Betty Zhao yongjunliu@huawei.com www.huawei.com ETSI TC M2M Workshop 19-20 October
More informationAtmel Innovative Silicon RFID IDIC Solutions
Atmel Innovative Silicon RFID IDIC Solutions 2 2013 / www.atmel.com Table of Contents Atmel: The Expert with Long-term Know-how....4 The Technology.... 4-5 Passive RFID....4 Active RFID....5 RFID Applications....
More informationThe Research and Application of College Student Attendance System based on RFID Technology
The Research and Application of College Student Attendance System based on RFID Technology Zhang Yuru, Chen Delong and Tan Liping School of Computer and Information Engineering, Harbin University of Commerce,
More informationIntelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
More informationAn Introductory and Elementary Study on RFID & Its Applications
An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract
More informationSoftware Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland University of Applied Sciences Upper Austria,, Austria IWSSISPMU2012 International Workshop on
More informationThe 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
More information11 Internet of Things (IoT) Protocols You Need to Know About
11 Internet of Things (IoT) Protocols You Need to Know About by RS Components There exists an almost bewildering choice of connectivity options for electronics engineers and application developers working
More information1. NON CONTACT DIGITAL TACHOMETER USING AVR MICROCONTROLLER 2. CELSIUS SCALE THERMOMETER USING Atmega 8 -- 3. BLACK BOX SECURITY SYSTEM FOR CAR USING
1. NON CONTACT DIGITAL TACHOMETER USING AVR MICROCONTROLLER 2. CELSIUS SCALE THERMOMETER USING Atmega 8 -- 3. BLACK BOX SECURITY SYSTEM FOR CAR USING SENSORS 4. ULTRASONIC DISTANCE METER 5. 5 CHANNEL IR
More informationThe Internet of Things (IoT)
The Internet of Things (IoT) The New New Thing October 2014 Smart Planet Green Environment Environmental Sensors Water, power leak detection Pollution, weather monitoring Smart Cities Connected Communities
More informationCloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet
Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers The Relay2 Smart Access Point (RA100) is an enterprise-class access point designed for deployment in high-density environments
More informationSecure Semi-Passive RFID Tags Prototype and Analysis
Building Radio frequency IDentification for the Global Environment Secure Semi-Passive RFID Tags Prototype and Analysis Authors: Manfred Aigner (TU Graz), Thomas Plos (TU Graz), Antti Ruhanen (Confidex),
More informationSecurity & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
More informationWi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing
More information3G Wireless-N Smart Energy Gateway
Join BEsmart Partner Alliance Network at www.smartgrid.com.tw/besmart Ideal for 3G Wireless-N Smart Energy Gateway The, 3G Wireless-N Smart Energy Gateway, is an all-in-one router designed for users to
More informationRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
More informationOverview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}
Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} John Soldatos Associate Professor, Athens Information Technology
More informationWi-Fi, Bluetooth, and the Internet of Things
WHITEPAPER Mindtribe Product Engineering 25 Kearny St. Suite 200 San Francisco, CA 94108 Introduction, Bluetooth, and the Internet of Things The Internet of Things (IoT) has an increasing number of our
More informationWireless Mobile Workforce
October 2014 Page 1 The DeltaV Remote Operator Station shown on the Panasonic Toughbook CF-19 (left) and Toughpad FZ-G1. Increased worker productivity and accuracy Mobile operations management Syncade
More informationANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
More informationHome Automation and Cybercrime
Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7
More informationTT-RFID platform - Introduction
TT-RFID platform - Introduction Version 0.7 01/06/2011 INDEX 1. RFID PROTOCOL - MAIN FEATURES...1 2. COMMAND DISPLAY FOR THE RFID PROTOCOL...2 3. GUIDELINES FOR USING THE RFID PROTOCOL... 4 3.1. CONFIGURATION
More informationTnet WIRELESS MESH SENSOR NETWORKS
Product Line Overview Tnet WIRELESS MESH SENSOR NETWORKS The fusion of advanced sensor and actuator technology with state of the art wireless networks has enabled a whole new level of applications for
More informationLocation-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,
More informationRF Attendance System Framework for Faculties of Higher Education
RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,
More informationWISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
More informationadvant advanced contactless smart card system
LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and
More informationWe are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in
We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in the market at competitive prices. - Profile - Digital
More informationInternet of Things: TI's Wireless Connectivity Solutions
Internet of Things: TI's Wireless Connectivity Solutions Market Size (units) Why the IoT is attractive 10B + The IoT is an enabling technology that will serve thousands of end products IoT 1B Cell phone
More informationChallenges of the Internet of Things for Sensor and Actuator Applications
Challenges of the Internet of Things for Sensor and Actuator Applications Thomas Gessner, Torsten Thieme SEMICON Moscow 2015 Smart Systems Integration Session June 17 th, 2015 Source: Journal Internet
More informationHow To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
More informationExercise 1: Set up the Environment
RFID Lab Gildas Avoine, 2014 Contact: gildas.avoine@irisa.fr Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader
More informationSide Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
More informationNXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China
NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China Agenda The Internet of Things ( IoT ): a New and Exciting Application Space A typical IoT application Lighting for Home
More informationGemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
More informationINTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA
COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue
More informationSecurity and Privacy Issues of Wireless Technologies
Security and Privacy Issues of Wireless Technologies Collin Mulliner http://www.cs.ucsb.edu/~mulliner/ Agenda Introduction Issues Technology specific issues Wi Fi Bluetooth RFID
More informationEx15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:
//DATASHEET XS4 Mini Cutting-edge design + Amazing technology: Stylish design is a SALTO trademark and with the XS4 Mini, we raise the bar on this already high standard thanks to the XS4 Mini s small,
More informationShort-range Low Power Wireless Devices and Internet of Things (IoT)
Short-range Low Power Wireless Devices and Internet of Things (IoT) Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: mats.andersson@connectblue.com Web: www.connectblue.com Version 1.1 February
More informationPresented by: Robert Buczkiewicz, Director, Hardware Development, LS Research Sai Yelisetty, Director Sales & Marketing, DSP Group Arik Gur, Product
Presented by: Robert Buczkiewicz, Director, Hardware Development, LS Research Sai Yelisetty, Director Sales & Marketing, DSP Group Arik Gur, Product Manager ULE, DSP Group Avi Barel, Deputy Chairman, ULE
More informationSemi-Passive RFID Development Platform for Implementing and Attacking Security Tags
Semi-Passive RFID Development Platform for Implementing and Attacking Security Tags Thomas Plos, Manfred Aigner, Thomas Baier, Martin Feldhofer, Michael Hutter, Thomas Korak, Erich Wenger Institute for
More informationIntroduction to Silicon Labs. November 2015
Introduction to Silicon Labs November 2015 1 Company Background Global mixed-signal semiconductor company Founded in 1996; public since 2000 (NASDAQ: SLAB) >1,100 employees and 11 R&D locations worldwide
More informationNFC. Technical Overview. Release r05
Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those
More informationTECHNOLOGICAL FACTORS PROMOTING THE EXPANSION OF INTERNET OF THINGS
International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 7, Issue 2, March-April 2016, pp. 21-29, Article ID: IJARET_07_02_003 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=7&itype=2
More informationChallenges of Requirements Modelling in the Product Development Process
Challenges of Requirements Modelling in the Product Development Process - Integrated Requirements Modelling DI Michael Maletz michael.maletz@virtuellesfahrzeug.at ProSTEP ivip Symposium 2006 Köln, April
More informationMobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center
Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? About the
More informationIoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China
IoT: New Opportunities for Semiconductor Industry Growth Andrew C. Russell Vice President Marketing Greater China Agenda The Internet of Things ( IoT ): An Exciting, Disruptive Technology and Application
More informationSecurity in RFID Networks and Protocols
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 425-432 International Research Publications House http://www. irphouse.com /ijict.htm Security
More informationRF Energy Harvesting and Wireless Power for Low-Power Applications
RF Energy Harvesting and Wireless Power for Low-Power Applications Emerging Technology P2100 Powerharvester TX91501 Powercaster P2110 Powerharvester P2110 Powerharvester April 6 2012 1 Powercast Technology
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationSECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS
************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************
More informationEvolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
More informationA Semi-Passive UHF RFID Tag Chip Applied for Electronic Vehicle Identification (EVI)
A Semi-Passive UHF RFID Tag Chip Applied for Electronic Vehicle Identification (EVI) Egas Henes Neto, Eduardo Conrad Junior, Daniel Barcelos, Rafael Soares, Antonio Souza, Josias Mainardi, Rafael Cantalice,
More informationIntelligent Fleet Management System Using Active RFID
Intelligent Fleet Management System Using Active RFID Ms. Rajeshri Prakash Mane 1 1 Student, Department of Electronics and Telecommunication Engineering, Rajarambapu Institute of Technology, Rajaramnagar,
More information