Upload
zebrosprojects
View
212
Download
0
Embed Size (px)
DESCRIPTION
LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING ABSTRACT In this system, we report on a new approach for enhancing security and privacy in certain RFID applications whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples of these applications include access cards, toll cards, credit cards, and other payment tokens. We show that location awareness can be used by both tags and back-end servers for defending against unauthorized reading and relay attacks on RFID systems. On the tag side, we design a location-aware selective unlocking mechanism using which tags can selectively respond to reader interrogations rather than doing so promiscuously. On the server side, we design a location-aware secure transaction verification scheme that allows a bank server to decide whether to approve or deny a payment transaction and detect a specific type of relay attack involving malicious readers.
Citation preview
ZEBROS PROJECTS
Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300,9500075001
WAY TO YOUR GOAL
EMBEDDED SYSTEM PROJECTS
FINAL YEAR PROJECTS
IEEE PROJECTS 2013-2014
CONTACT: 9940098300, 9500075001
E-Mail:[email protected]
ZEBROS PROJECTS
Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300,9500075001
LOCATION-AWARE AND SAFER CARDS: ENHANCING
RFID SECURITY AND PRIVACY VIA LOCATION SENSING
ABSTRACT
In this system, we report on a new approach for enhancing security and privacy
in certain RFID applications whereby location or location-related information (such as
speed) can serve as a legitimate access context. Examples of these applications include
access cards, toll cards, credit cards, and other payment tokens. We show that location
awareness can be used by both tags and back-end servers for defending against
unauthorized reading and relay attacks on RFID systems. On the tag side, we design a
location-aware selective unlocking mechanism using which tags can selectively respond
to reader interrogations rather than doing so promiscuously. On the server side, we
design a location-aware secure transaction verification scheme that allows a bank server
to decide whether to approve or deny a payment transaction and detect a specific type
of relay attack involving malicious readers. The premise of our work is a current
technological advancement that can enable RFID tags with low-cost location (GPS)
sensing capabilities. Unlike prior research on this subject, our defenses do not rely on
auxiliary devices or require any explicit user involvement.
EXISTING SYSTEM
Although a variety of security solutions exist, many of them do not meet the
constraints and requirements of the underlying RFID applications in terms of (one or
more of) efficiency, security, and usability. In an attempt to address these drawbacks,
this system proposes a general research direction one that utilizes sensing technologies
to address unauthorized reading and relay attacks in RFID systems without
necessitating any changes to the traditional RFID usage model.
ZEBROS PROJECTS
Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300,9500075001
PROPOSED SYSTEM
The proposed work is based on a current technological advancement that enables
many RFID tags with low-cost sensing capabilities. Various types of sensors have been
incorporated with many RFID tag. Intel’s Wireless Identification and Sensing Platform
(WISP) is a representative example of a sensor-enabled tag, which extends RFID beyond
simple identification to in-depth sensing. This new generation of RFID devices can
facilitate numerous promising applications for ubiquitous sensing and computation.
They also suggest new ways of providing security and privacy services by leveraging
the unique properties of the physical environment or physical status of the tag (or its
owner). In this system, we specifically focus on the design of context aware security
primitives and protocols by utilizing sensing technologies so as to provide improved
protection against unauthorized reading and relay attacks.
BLOCK DIAGRAM
CONTACT: ZEBROS PROJECTS
PHONE: 9940098300, 9500075001
DESCRIPTIONS
A typical RFID system consists of tags, readers, and/or back-end servers. Tags
are miniaturized wireless radio devices that store information about their
corresponding subject. Such information is usually sensitive and personally identifiable.
For example, a US e-passport stores the name, nationality, date of birth, digital
photograph, and (optionally) fingerprint of its owner. Readers broadcast queries to tags
in their radio transmission ranges for information contained in tags and tags reply with
such information. The queried information is then sent to the server (which may coexist
with the reader) for further processing and the processing result is used to perform
proper actions (such as updating inventory, opening gate, charging toll or approving
payment).
ZEBROS PROJECTS
Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300,9500075001
We present two location-aware defense mechanisms for enhanced RFID security
and privacy. First, we show that location information can be used to design selective
unlocking mechanisms so that tags can selectively respond to reader interrogations.
That is, rather than responding promiscuously to queries from any readers, a tag can
utilize location information and will only communicate when it makes sense to do so,
and thus, raising the bar even for sophisticated adversaries without affecting the RFID
usage model. For example, an office building access card can remain locked unless it is
aware that it is near the (fixed) entrance of the building. Similarly, a toll card can remain
locked unless the car is at the toll booth and/or it is traveling at a speed range regulated
by law.
APPLICATIONS
ATM machine
Shopping places
Other debit card uses places
ADVANTAGES
Low cost
Less delay
Low power
Good efficient
ZEBROS PROJECTS
Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300,9500075001
ZEBROS PROJECTS
SOFTWARE BASED HARDWARE BASED
Networking VLSI
Data Mining Mat lab
Grid Computing Robotics
Network Security Embedded
Image Processing Bio Medical
Web Applications Power Systems
Mobile Computing Power Electronics
Software Engineering Java with Embedded
Cloud Computing Android
What is IEEE?
The Institute of Electrical and Electronics Engineers or IEEE (read eye-triple-e) is Incorporated in the State of New York, United States. It was formed in 1963 by the merger of the Institute of Radio Engineers (IRE, founded 1912) and the American Institute of Electrical Engineers (AIEE, founded 1884). A membership organization comprised of engineers, scientists and students that sets standards for computers and communications. It is a nonprofit organization with more than 365,000 members in around 150 countries.
The IEEE describes itself as "the world's largest technical professional society -- promoting the development and application of electro technology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members."
Why IEEE based projects?
It grantees for standard
It assured latest solution for problems
It delivers new patented technologies at an ever-increasing pace
It access world-class technical information provided by the IEEE and cut down your
research time.
ZEBROS PROJECTS
Office Address: No 4 / Flat No 3D, Sai Kiran Apts, First Main Road, Kasturba Nagar, Chennai-20 web: www.zebros.in e mail : [email protected] mob: 99400 98300,9500075001
OUR FEATURES
24*7 Call Support
Project Execution through Remote System
20 Days Technical classes taken by Corporate Trainer
Unlimited Project & Technical Support through your academic
Project software Installation support
PROJECT SUPPORT
0th Review 1st Review
Abstract Existing System Disadvantages Proposed System Advantages Objective System Requirements System Architecture
Literature Survey Module List Module Description Data Flow Diagram Level DFD Module Wise DFD Problem Definition Review Document Explanation
2nd Review 3rd Review
Use case Diagram Class Diagram Collaboration Diagram Sequence Diagram Activity Diagram Testing & test cases Partial Code Screenshot for First two
module Review Document Explanation
Conclusion References Future Enhancement 65% code (Executable Format) Required Software Review Document Explanation
Final Review
Complete Code with Enhancement
Final Document (University Standard Format)
Complete Explanation for Project Concept & Code