SlideShare uma empresa Scribd logo
1 de 11
PRESENTED BY,

J. DHANANANDHINI,
II- ME- CSE
1
MUTHAYAMMAL ENGINEERING
COLLEGE- RASIPURAM

11/10/2013

THROUGH LOCATION SENSING
METHOD ENHANCING RFID
PRIVACY AND SECURITY
AGENDA
o
o
o
o

o
o
o

11/10/2013

o

OBJECTIVE
ABSTRACT
EXISTING WORK
LIMITATIONS
PROPOSED WORK
ADVANTAGES
CONCLUSION
REFERENCES

2
OBJECTIVE
11/10/2013

Aim is to design location- aware secure RFID
schemes.
 Two location aware defense mechanism for
enhancing RFID security and Privacy


1. Location Information can used to design selective
unlocking mechanism.
 2. Location information can be used as the basis of
secure transaction verification


3
ABSTRACT

4

11/10/2013

Location awareness can be used by both tags and back-end
servers - unauthorized reading and relay attacks on RFID
systems.
 For example application include access cards, toll cards, credit
cards, and other payment cards.
 On the tag side to design a location-aware selective unlocking
mechanism.
 On the server side to design a location aware secure
transaction verification scheme.
 In this proposal of work is enhancing privacy and security it
does not rely on auxiliary devices or require any explicit user
involvement.

INTRODUCTION
RFID is low cost, small size it increasingly ubiquitous in
both public and private domains.


To address unauthorized reading and relay attacks in
RFID systems without necessitating any changes to the
traditional RFID usage model



Different types of attacks

1. ―Ghost –and- Leech attack‖
2. ―Reader- and- Ghost attack‖
5

11/10/2013


CONTD.,
11/10/2013

We specifically focus on the design of context
aware security primitives and protocols by utilizing
sensing technologies
 To
provide
improved
protection
against
unauthorized reading and relay attacks.
 RFID systems need to satisfy the requirements of
the underlying RFID applications
 In terms of not only efficiency and security, but also
usability.


6
EXISTING WORK

o

o

o
o
o

11/10/2013

o

Hardware-based selective unlocking.
These include: Blocker Tag , RFID Enhancer Proxy,
RFID Guardian, and Vibrate-to-Unlock .
Cryptographic Protocals
Distance Bounding Protocals
Context- Aware- Selective
Another selective unlocking scheme
―Motion Detection‖

7
PROPOSED WORK

8

11/10/2013

A general research direction—one that utilizes sensing
technologies
 To address unauthorized reading and relay attacks in
RFID systems without necessitating any changes to the
traditional RFID usage model.
 here two location-aware defense mechanisms for
enhanced RFID security and privacy
 1. To show that location information can be used to
design selective unlocking mechanisms.
 2. To show that location information can be used as a
basis for secure transaction verification to defend
against the reader-and-ghost attacks.

ADVANTAGES
11/10/2013

To prevent privacy leakage due to unauthorized
parties.
 Stronger cross-layer security protection.
 No need of any Auxilary device.


9
CONCLUSION
11/10/2013

Using location and derived speed information, we
designed location aware Selective unlocking
mechanisms and a location aware transaction
verification mechanism.
 To demonstrate the feasibility of our location-aware
defense mechanisms, we integrated a low-cost
GPS receiver with a RFID tag.
 RFID platforms and improved tolerance to errors
whenever applicable.


10
REFERENCES
M. Buckner, R. Crutcher, M.R. Moore, and S.F. Smith, ―GPS
and Sensor- Enabled RFID Tags,‖http://www.ornl.
gov/webworks/cppr/y2001/pres 118169.pdf, 2013.



GM- 101 Cost Effective GPS Module with Ttl Rs-232
Interface,http://www.alibaba.com/productgs/435104168/
GM_101_Cost_Effective_GPS_ Module html,2011.



M. Buettner, R. Prasad, M. Philipose, and D. Wetherall,
―Recognizing Daily Activities with RFID-Based Sensors,‖
Proc.Int’l Conf. Ubiquitous Computing (UbiComp), 2009.

11/10/2013



11

Mais conteúdo relacionado

Mais procurados

A Meeting Master Picture for a Patent
A Meeting Master Picture for a PatentA Meeting Master Picture for a Patent
A Meeting Master Picture for a PatentClarity Thinker
 
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportMachine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportTariq Tauheed
 
13213792 pps7
13213792 pps713213792 pps7
13213792 pps7JannyC
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita NandyIpshitaNandy
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptxKhappiyo
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)Pasquale Tursi
 
Rfid based automated bank locker system
Rfid based automated bank locker systemRfid based automated bank locker system
Rfid based automated bank locker systemeSAT Publishing House
 
PCI Compliance (for developers)
PCI Compliance (for developers)PCI Compliance (for developers)
PCI Compliance (for developers)Maksim Djackov
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology Ho Vu
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...IRJET Journal
 
RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDRFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDFaisal Razzak
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontrollerrajkanakaraj007
 
RFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTRFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTnikhilpatewar
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware AuthenticationCoder Tech
 
Owasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publishOwasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publishAli Kazmi
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemMahmudul Hasan
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile applicationVikrant Kansal
 
Protecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware AttacksProtecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware AttacksNetop
 

Mais procurados (20)

A Meeting Master Picture for a Patent
A Meeting Master Picture for a PatentA Meeting Master Picture for a Patent
A Meeting Master Picture for a Patent
 
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportMachine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
 
13213792 pps7
13213792 pps713213792 pps7
13213792 pps7
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita Nandy
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)
 
Rfid based automated bank locker system
Rfid based automated bank locker systemRfid based automated bank locker system
Rfid based automated bank locker system
 
RFID based Attendance System
RFID based Attendance SystemRFID based Attendance System
RFID based Attendance System
 
PCI Compliance (for developers)
PCI Compliance (for developers)PCI Compliance (for developers)
PCI Compliance (for developers)
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology
 
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
 
RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDRFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFID
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
 
RFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTRFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPT
 
My ppt
My pptMy ppt
My ppt
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
Owasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publishOwasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publish
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access System
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
 
Protecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware AttacksProtecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware Attacks
 

Destaque

ARM 7: ICANN - Security, stability and resilience of the Internet
ARM 7: ICANN - Security, stability and resilience  of the InternetARM 7: ICANN - Security, stability and resilience  of the Internet
ARM 7: ICANN - Security, stability and resilience of the InternetAPNIC
 
Vintech Essl T&A
Vintech Essl T&AVintech Essl T&A
Vintech Essl T&Avintech
 
The existing and future role of RFID technology in Dairy Supply Chain from Fa...
The existing and future role of RFID technology in Dairy Supply Chain from Fa...The existing and future role of RFID technology in Dairy Supply Chain from Fa...
The existing and future role of RFID technology in Dairy Supply Chain from Fa...Shuhab Tariq
 
A proposal of Using RFID Technology in Improving Scheduling and Route Plannin...
A proposal of Using RFID Technology in Improving Scheduling and Route Plannin...A proposal of Using RFID Technology in Improving Scheduling and Route Plannin...
A proposal of Using RFID Technology in Improving Scheduling and Route Plannin...Afrooz Moatari-Kazerouni
 
Digital Disruption Proposal: FridgePilot
Digital Disruption Proposal: FridgePilot  Digital Disruption Proposal: FridgePilot
Digital Disruption Proposal: FridgePilot Lewis Hill
 
Research paper on Automated Vending Machine
Research paper on Automated Vending MachineResearch paper on Automated Vending Machine
Research paper on Automated Vending MachineThe BharatPutra
 
Project Proposal Sample: RFID on Warehouse Management System
Project Proposal Sample: RFID on Warehouse Management SystemProject Proposal Sample: RFID on Warehouse Management System
Project Proposal Sample: RFID on Warehouse Management SystemCheri Amour Calicdan
 

Destaque (9)

ARM 7: ICANN - Security, stability and resilience of the Internet
ARM 7: ICANN - Security, stability and resilience  of the InternetARM 7: ICANN - Security, stability and resilience  of the Internet
ARM 7: ICANN - Security, stability and resilience of the Internet
 
Vintech Essl T&A
Vintech Essl T&AVintech Essl T&A
Vintech Essl T&A
 
RFID_proposal_draft
RFID_proposal_draftRFID_proposal_draft
RFID_proposal_draft
 
The existing and future role of RFID technology in Dairy Supply Chain from Fa...
The existing and future role of RFID technology in Dairy Supply Chain from Fa...The existing and future role of RFID technology in Dairy Supply Chain from Fa...
The existing and future role of RFID technology in Dairy Supply Chain from Fa...
 
A proposal of Using RFID Technology in Improving Scheduling and Route Plannin...
A proposal of Using RFID Technology in Improving Scheduling and Route Plannin...A proposal of Using RFID Technology in Improving Scheduling and Route Plannin...
A proposal of Using RFID Technology in Improving Scheduling and Route Plannin...
 
Digital Disruption Proposal: FridgePilot
Digital Disruption Proposal: FridgePilot  Digital Disruption Proposal: FridgePilot
Digital Disruption Proposal: FridgePilot
 
Research paper on Automated Vending Machine
Research paper on Automated Vending MachineResearch paper on Automated Vending Machine
Research paper on Automated Vending Machine
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Project Proposal Sample: RFID on Warehouse Management System
Project Proposal Sample: RFID on Warehouse Management SystemProject Proposal Sample: RFID on Warehouse Management System
Project Proposal Sample: RFID on Warehouse Management System
 

Semelhante a Through Location Sensing Enhancing RFID Security and Privacy

AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyIRJET Journal
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsTELKOMNIKA JOURNAL
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsSRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsAM Publications,India
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesskumartarget
 
20563-38910-2-PB.pdf
20563-38910-2-PB.pdf20563-38910-2-PB.pdf
20563-38910-2-PB.pdfIjictTeam
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfNikhil Khunteta
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
A Security Framework in RFID
A Security Framework in RFIDA Security Framework in RFID
A Security Framework in RFIDijtsrd
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt aryayidegev626
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantationAlexander Decker
 

Semelhante a Through Location Sensing Enhancing RFID Security and Privacy (20)

AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for Society
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement Indoors
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsSRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologies
 
20563-38910-2-PB.pdf
20563-38910-2-PB.pdf20563-38910-2-PB.pdf
20563-38910-2-PB.pdf
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
A Security Framework in RFID
A Security Framework in RFIDA Security Framework in RFID
A Security Framework in RFID
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt arya
 
A sector analysis for rfid human implantation
A sector analysis for rfid human implantationA sector analysis for rfid human implantation
A sector analysis for rfid human implantation
 

Último

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 

Último (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Through Location Sensing Enhancing RFID Security and Privacy

  • 1. PRESENTED BY, J. DHANANANDHINI, II- ME- CSE 1 MUTHAYAMMAL ENGINEERING COLLEGE- RASIPURAM 11/10/2013 THROUGH LOCATION SENSING METHOD ENHANCING RFID PRIVACY AND SECURITY
  • 3. OBJECTIVE 11/10/2013 Aim is to design location- aware secure RFID schemes.  Two location aware defense mechanism for enhancing RFID security and Privacy  1. Location Information can used to design selective unlocking mechanism.  2. Location information can be used as the basis of secure transaction verification  3
  • 4. ABSTRACT 4 11/10/2013 Location awareness can be used by both tags and back-end servers - unauthorized reading and relay attacks on RFID systems.  For example application include access cards, toll cards, credit cards, and other payment cards.  On the tag side to design a location-aware selective unlocking mechanism.  On the server side to design a location aware secure transaction verification scheme.  In this proposal of work is enhancing privacy and security it does not rely on auxiliary devices or require any explicit user involvement. 
  • 5. INTRODUCTION RFID is low cost, small size it increasingly ubiquitous in both public and private domains.  To address unauthorized reading and relay attacks in RFID systems without necessitating any changes to the traditional RFID usage model  Different types of attacks 1. ―Ghost –and- Leech attack‖ 2. ―Reader- and- Ghost attack‖ 5 11/10/2013 
  • 6. CONTD., 11/10/2013 We specifically focus on the design of context aware security primitives and protocols by utilizing sensing technologies  To provide improved protection against unauthorized reading and relay attacks.  RFID systems need to satisfy the requirements of the underlying RFID applications  In terms of not only efficiency and security, but also usability.  6
  • 7. EXISTING WORK o o o o o 11/10/2013 o Hardware-based selective unlocking. These include: Blocker Tag , RFID Enhancer Proxy, RFID Guardian, and Vibrate-to-Unlock . Cryptographic Protocals Distance Bounding Protocals Context- Aware- Selective Another selective unlocking scheme ―Motion Detection‖ 7
  • 8. PROPOSED WORK 8 11/10/2013 A general research direction—one that utilizes sensing technologies  To address unauthorized reading and relay attacks in RFID systems without necessitating any changes to the traditional RFID usage model.  here two location-aware defense mechanisms for enhanced RFID security and privacy  1. To show that location information can be used to design selective unlocking mechanisms.  2. To show that location information can be used as a basis for secure transaction verification to defend against the reader-and-ghost attacks. 
  • 9. ADVANTAGES 11/10/2013 To prevent privacy leakage due to unauthorized parties.  Stronger cross-layer security protection.  No need of any Auxilary device.  9
  • 10. CONCLUSION 11/10/2013 Using location and derived speed information, we designed location aware Selective unlocking mechanisms and a location aware transaction verification mechanism.  To demonstrate the feasibility of our location-aware defense mechanisms, we integrated a low-cost GPS receiver with a RFID tag.  RFID platforms and improved tolerance to errors whenever applicable.  10
  • 11. REFERENCES M. Buckner, R. Crutcher, M.R. Moore, and S.F. Smith, ―GPS and Sensor- Enabled RFID Tags,‖http://www.ornl. gov/webworks/cppr/y2001/pres 118169.pdf, 2013.  GM- 101 Cost Effective GPS Module with Ttl Rs-232 Interface,http://www.alibaba.com/productgs/435104168/ GM_101_Cost_Effective_GPS_ Module html,2011.  M. Buettner, R. Prasad, M. Philipose, and D. Wetherall, ―Recognizing Daily Activities with RFID-Based Sensors,‖ Proc.Int’l Conf. Ubiquitous Computing (UbiComp), 2009. 11/10/2013  11