The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio Frequency Identification (RFID) is an efficient technology for identification, tracking and group proof construction. The multi-round protocols for authentication and group proof construction increase the cost with increase in participants. In this work, computational and communication cost of multi-round protocol is calculated to identify the protocol with least cost and high security. The...
Passively powered high frequency (HF) Radio Frequency Identification (RFID) proximity cards have been widely used in many fields. Meanwhile, a lot of security and privacy threats such as cloning, unauthorized tracking have arisen. Many security protocols have been proposed. However, most of them focused on security implication of the logical layer, little attention was paid to characteristics of the...
With the increasing volume of container transport, the international community pay more and more attention to container security. This paper investigates the new concept, key function and key technologies available of the secure and smart container. Especially on the base of application and survey, this paper carries on the research of standard system. Under the current standard system frame, it works...
This paper gives the description of the new approach towards the security of ATM (Automatic Teller Machine) systems. The objective of the paper is to know the Enhanced smart ATM security system which is developed using the Embedded system and advanced technologies. In our proposed system RFID card is used as ATM card, IR sensor in order to sense the presence of the card holders and to turn on Fan...
Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Enhanced-Bivium is a reduced version of Trivium which is suitable for RFID system. In this paper, the security of Enhanced-Bivium is concerned under cube attack, which is one of the best known attack on the reduced round Trivium proposed by Dinur and Shamir at EUROCRYPT 09. Trivium...
RFID (radio frequency identification) is a small electronic device that consists of small chip and an antenna. The biggest challenge for RFID technology is to provide benefits without degrading the secutiry level. This paper proposes a new RFID authentication protocol based on the lightweight stream cipher Enhanced-Bivium. In terms of security we show that the protocol is robust under the attack of...
In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users. In this paper, we cryptanalyze two new-found key exchange and key agreement security schemes which are proposed by Zhang et al. and Kim in 2012 and 2013 respectively. We present the reveal secret parameter, tag impersonation and traceability...
Backscatter wireless communication is an emerging technique widely used in passive radio frequency identification (RFID) systems. Recently, the requirement of a high data rate, data reliability, and secure transmission is becoming the main driving force for the development of RFID systems, which motivates the introduction of multiple-input multiple-output (MIMO) schemes and physical layer security...
This thesis aims to increase the level of food safety information. The combining of food safety information, Internet of Things, triple-play environment and cloud computing is not only can obtain the first-hand information and data of food safety regulatory from the Internet of Things, but also can obtain from the computer network, telecommunication network and television network. Furthermore, it...
The Internet of Things is developing rapidly and becoming a hot topic around the world. It seems to mean everything and nothing. From RFIDs in airports to track luggage, security locks for gates at home to monitoring air or water quality. To cut through the confusion, it helps to classify and describe the Internet of Things from different perspectives.
In present time due to increase in number of kidnapping and road accident cases, parents always worry about their children. This paper recommends a SMS based solution which assists parents to track their children location in real time. To track the location GPS module is used and to identify the identity of the child a RFID card is used which is in built in the system. Whenever a child boards a bus,...
Over the last two decades, traffic congestion has become a "worldwide" phenomenon as a result of increased motor vehicles and population growth. Emerging wireless technologies, such as Radio Frequency Identification (RFID) networks, have a significant impact on improving the efficiency of the road traffic management system in Alexandria. In this paper, we propose an intelligent road-traffic-management...
Radio frequency identification is the paramount exhilarating technologies that revolutionize the working practices by increasing efficiency. It is habitually presented as replacement for barcode system, and the technology has much greater potential such as individual serial numbers for each item and these numbers are examine at some distance. RFID is a technology being adopted in security, business...
Wireless networking plays a most important role to improve the human living standard by providing continuous connectivity and service by using networking devices. In today's world, technology makes more and more convenient life for everyone. Radio Frequency Identification Technology (RFID), which has been growing exponentially in many different industries, inventory tracking and security service such...
The advancements in networking and communication technologies resulted in a novel health care application called Telecare Medicine Information Systems (TMIS). TMIS provides efficient and real time connectivity to patient Body Area Network (BAN) to access patient data remotely by a doctor via an insecure Internet. Due to the involvement of patient sensitive data, and accessing it over an insecure Internet,...
The nature of Information Technology is that there are always new ideas being cultivated and implemented. The Internet of Things (IoT) does not fall outside of this dynamic. A network of wireless “things” that provide data for greater value and service, the Internet of Things seeks to connect the world making all things “smart”. With objects constantly connected, sending and receiving data, there...
Member card can provide personal identification, authentication, data storage, and application processing. It may provide strong marketing media for customer relationship within business organizations. In this paper, the integrated applications of passive radio frequency identification (RFID) and license plate recognition (LPR) are presented. We applied RFID and LPR techniques integrated, meanwhile,...
Elections casts an ennobling influence on the minds of people and forms the prominent feature of our country-India, in which every individual participates vigilantly and the populace remains the sovereign power. The world has been experimenting with diverse technologies to conduct controversy free elections, to fulfill the elementary needs of the people. It should be taken into account that no elector...
Among the Organized crime, Human trafficking hold third place where as the first and second or drug and weapon trade across the globe. Human trafficking is a shame on Humanity. As per the report of Human Rights commission of India over 40,000 children are reported missing every year of which 11000 are untraced [1][2]. Another statics report saying 80% of human trafficking is done for sexual exploitation...
Cases of theft, robbery, terrorist attacks and fire mishaps in public transportation systems across the world are common. It is a tedious task for investigating agencies to track & crack these cases in time. Now the world is moving towards bulk cash free cashless transactions using ATM cards. We are proposing a Centralized bus or rail control system, where a passenger needs to fill up the details...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.