The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Companies, institutes have numerous employees and it is difficult to have the system which accurately detects people accessing entry to restricted areas in offices. Authentication systems like RFID, biometric attendance records people's attendance, enforcing that only assigned people get access to specific places. People can intrude into a restricted area by simply tailgating, also using biometric/RFID...
Nuclear facilities need very strict security mechanism to prevent unauthorized persons from gaining access to critical facility or approaching close enough to harm the facility. Physical Access Control System plays an important role in ensuring the entry of authorized personnel into the premises. There are so many ways by which this system can be designed and implemented, wherein the authenticity...
Radio frequency identification (RFID) is a useful technology that has myriad applications in retail, manufacturing, and healthcare settings. RFID can scan devices in their proximity and report the data to information systems. RFID in healthcare settings presents potential security and privacy concerns to the people and processes being tracked by the devices -- particularly healthcare workers including...
Unmanned Aerial Vehicles (UAVs) or Unmanned Aerial Systems (UASs), known for their easy maneuvering, greater flexibility and low costs, are promised to be an excellent aerial sensor for transportation applications. It could be an effective airborne surveillance system for rapid deployment with low cost. UAVs are very flexible and fast compared to the normal road traffic monitoring techniques. In addition,...
The security of cryptographic functions such as pseudo random number generators (PRNGs) can usually not be mathematically proven. Instead, statistical properties of the generator are commonly evaluated using standardized test batteries on a limited number of output values. This paper demonstrates that valuable additional information about the properties of the algorithm can be gathered by analyzing...
This study presents the design and prototype development of a time - controlled access system consisting of an Arduino Mega ADK 2560 microcontroller integrated with a PN532 RFID/NFC Shield, Ethernet Shield, LCD, solenoid lock and a control circuit for the loads to address security issues and help save power consumptions of any institutions. When a passive RFID tag is placed in the reading range of...
ZigBee is a wireless standard based on IEEE 802.15.4 specification for a set of communication protocols. It is intended for remote control and sensor applications. ZigBee is designed to use low power digital radio signals for personal area networks which require secure networking. The use of the ZigBee protocol accommodates and facilitates for carrying out secure communications, ciphering frames and...
EPCglobal recently announced the revised Gen2 standard — called Gen2 version 2. Gen2v2 includes several new security and file management features to fit various possible application requirements. Inspired by these new features, we propose a security protocol with mutual authentication and data cryptographic mechanism between reader and tag for the UHF passive RFID system. The tag verilog core was...
This document describes the development of an access control system using NFC (Near Field Communication Communications), and using the power of a computer system, this system offers versatility in places where handled multiple locations with multiple local accessing, by specific times like a campus with multiples classrooms, rooms in a hotel, rental system of warehouses, etc. In access control systems...
With the extensive applications of the Internet of things in many fields, Internet of things confronted various problems of privacy protection. As a heterogeneous converged network, Internet of things is particular. This study looks into the basic knowledge and privacy protection technology of Internet of things. The protection schemes mentioned above in the medical health care scene environment have...
It used to be difficult to precisely understand the situation of miners underground according to the existed miner safety management system. To solve this problem, we propose an improved safety management system based on iris identification and RFID (Radio Frequency Identification) technique. It combines several modern identification and communication techniques such as iris identification, RFID,...
Tag Authentication is an essential issue in RFID system which is wildly applied in many areas. Compared to the per-tag-based authentication, the batch-mode authentication has better performance for complex applications. However, many existing batch authentication protocols suffer from security and privacy threats, low efficiency problem or high communication and computation cost. In order to solve...
Established automatic fare collection (AFC) solutions for public transport systems that use proximity HF radio frequency identification (RFID) smart cards are lacking a convenient method to determine the alighting point of a passenger. This paper considers an AFC system based on passive HF/UHF dual band RFID transponders. A UHF RFID link is envisaged for remote passenger detection. The paper discusses...
The Internet of Things (IoT) is a emerging revolution technology that mankind has ever seen. IoT represents the future vision of computing and communication. IoT introduce the world of information and communication technology (ICT) for connectivity of anything at anytime from anywhere. Current Internet is considered as “Internet of People”, connecting the users of all over the world with various ways...
The use of smart border entry systems significantly increases the reliability and efficiency of borders control measures. To deal with the increasing numbers of passengers and tighter security controls, pro-active automatic decision-making support to border control authorities is needed. Modern biometric passports, also known as ePassports, integrates an electronic RFID chip into the paper document,...
Internet of Things(IoT) refers to a network of all physical objects which are interconnected via internet and the communication that takes place between them. It helps in transfer of large amount of data between devices without human intervention. These data has to be stored, processed and reused in an efficient way. Security associated with these data are also of paramount importance. Mainframe systems,...
Car parking has become a serious problem of everyday occurrence for educational institutions with the decreasing parking supply, increasing enrollments and high percentage of vehicle ownership, in result causing congestion, time and money wastage. This problem is getting worse and more frustrating in Jazan University due to the fact that majority of students, faculty and staff members own cars and...
Internet of Things (IoT) has been given a lot of emphasis since the 90s when it was first proposed as an idea of interconnecting different electronic devices through a variety of technologies. However, during the past decade IoT has rapidly been developed without appropriate consideration of the profound security goals and challenges involved. This study explores the security aims and goals of IoT...
Networked systems have adapted Radio Frequency identification technology (RFID) to automate their business process. The Networked RFID Systems (NRS) has some unique characteristics which raise new privacy and security concerns for organizations and their NRS systems. The businesses are always having new realization of business needs using NRS. One of the most recent business realization of NRS implementation...
The advent of a new era of smart objects and networks of things inspired us to present a unified proposal for a model of a smart academic forum. It's an IoT architectural model that spans almost all vital divisions of the academic forum. We present IoT-architecture showing how academic services as well as data records could be delivered in an automated way to make academic life easier. This work elucidates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.